با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده


1 Sweetgreen's CEO explains why his salads are so expensive 1:12:26
Virus.DOS.Kuku: Recreating MS-DOS Malware in Python.
Manage episode 395726693 series 3474671
This story was originally published on HackerNoon at: https://hackernoon.com/virusdoskuku-recreating-ms-dos-malware-in-python.
Reverse engineering the kuku virus in Python and how I did it.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #malware, #retro, #programming, #linux, #windows-10, #computer-virus, #reverse-engineering, #python, and more.
This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page, and for more stories, please visit hackernoon.com.
The original KUKU virus was written in TURBO-BASIC, which is even more painful to read than regular assembly. Kuku means in multiple Slav languages something like "I gotch you" The source code can be found in the VX Underground malware collection.
204 قسمت
Manage episode 395726693 series 3474671
This story was originally published on HackerNoon at: https://hackernoon.com/virusdoskuku-recreating-ms-dos-malware-in-python.
Reverse engineering the kuku virus in Python and how I did it.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #malware, #retro, #programming, #linux, #windows-10, #computer-virus, #reverse-engineering, #python, and more.
This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page, and for more stories, please visit hackernoon.com.
The original KUKU virus was written in TURBO-BASIC, which is even more painful to read than regular assembly. Kuku means in multiple Slav languages something like "I gotch you" The source code can be found in the VX Underground malware collection.
204 قسمت
همه قسمت ها
×


1 Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture 14:20




1 Synthetic Data, Hashing, Enterprise Data Leakage, and the Reality of Privacy Risks: What to Know 5:35





1 Stay Safe: Critical Information Your Employees Should Know Following the Crowdstrike IT Chaos 4:39





1 Actionable Threat Intelligence at Google Scale: Meet Google Threat Intelligence Powered by Gemini 7:08







به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.