Stopping Malicious Code at the Desktop

We begin this discussion with a brief look at some of the ways in which malicious code tries to circumvent protection products and establish a foothold on a local computer. To better understand how to protect the desktop from malicious code, we will also discuss methods for identifying and...
By Anthony Tulio
November 6, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg