A computer file may be scanned for suspicious words 18 occurring within suspicious contexts 20. Thus, messages embedded by malware authors within their malware may be detected. The detection of such embedded messages may be used to identify otherwise unknown items of malware or as a pre-filtering technique for controlling the use of further scanning techniques.

 
Web www.patentalert.com

< Generating reusable software assets from distributed artifacts

> Topology aware grid services scheduler architecture

~ 00437