Discover how simple is using our products, watch the following video:
...
Table of Contents |
---|
Common FAQ
Q. What is your license policy?
...
Expand |
---|
Malware is detected using an embedded version of Metaesploit against our own collection of rules, as well as through Dynamic analysis of ELF files:
Further, our Dynamic Analysis finds Backdoors based in: Suspicious open TCP ports, suspicious connection to external IPs and URIs, presence of Non-standard services and Suspicious executables. |
...