Вопросы детской диетологии.
Том 21.
2023.
С. 65-72
In this chapter, we examine ten commonly used malware persistence methods on Windows operating systems. Our goal is to explain the principles behind these techniques, which enable malicious programs to remain active on a system. We provide examples of typical malware associated with each technique, along with useful tools for identifying them. Additionally, we offer mitigation strategies and recommendations that users and malware analysts can use to remove or prevent malware persistence methods. © 2024 selection and editorial matter, Ahmed A. Abd El-Latif, Yassine Maleh, Mohammed A. El-Affendi and Sadique Ahmad; individual chapters, the contributors.