How to identify whether a software being used is pirated or licensed from log files?

I got log files of a specific software of a couple of systems, I was trying to identify the pirated and genuine versions of the software by looking at them. I haven’t been able to figure it out with proof. Any suggestions wou… Continue reading How to identify whether a software being used is pirated or licensed from log files?

Developing an Effective Change Management Program

Detection of change is easy… There, I said it. Anyone can do it. One thousand monkeys with keyboards can pound out scripts to detect change. What is not so easy, what the monkeys can’t do, is reconcile change. Even worse, it’s usually… Continue reading Developing an Effective Change Management Program

What are the heuristic detection techniques most often used in modern AVs?

Whenever I read books or academic papers and the subject of heuristic malware detection is brought up they always say the same thing: “it can be either static or dynamic”, “it may use emulation”, “may detect new malware, but … Continue reading What are the heuristic detection techniques most often used in modern AVs?