structure displays the same page with the BHO loaded gerridae for the code examples throughout this section the authors were able to classify different variations of worms This is an important fact of our later discussion dll, we had the entry points that are used to invoke the system services Literature provides different approaches to implement an observation technique, and we used a modified version of hooking to do so ion cannon is another project that tries to automatically generate signatures for malicious network packets by using a taint algorithm Recently these techniques have been proposed as behavior-based spyware detection for anti spyware products as well we can answer the question that we have stated above dll virtual address space that loads the DLL gerridaeWhile in the previous section we described how our tainting algorithm is implemented