So I did release by debut EP – Emotion Coder- My Never Ending Wish around the turn of 2013 and it has been sometime since I have put out anything and I plan to fix that very soon with loads of stuff. Balancing bill payments with artistic musings is not as easy as I had imagined, though ideas have been getting recorded with no interruption. It is the completion that takes time, like a picture that never finishes. I believe someone said that procrastination is the biggest evil for any artist to conquer. That and other personal reasons, namely in the excuse of “research” 😉
However, I recently spotted my own creations on torrent for downloads. Secretly this was a dream of mine for sometime since childhood during the days of Audiogalaxy circa mid-to-late naugthies. During those school days, I even read one of the members of the band Ladytron discovering that their albums were on torrent at that time, and he took to chatting with the seeders. He exclaimed that none of the seeders believed that he was the artist himself! Kool thing I noted and I remember it even now after all these years (I do have a very sharp memory/musical memory/spatial memory).
VA-Private Lounge Club 4 ::
Siesta Electronica Series ::
These two snapshots display what is happening to my own creation as part of VA compilations. Thankfully the download rates are not as good as I fear, so no worries for now. However they also do remind me of the dismal state of the actual market sales for most indie and signed niche electronic artists round about now. Marketing and brand building needs a lot more work and I appreciate that it involves moving beyond your comfort zone and putting content while also spreading the word.
At least my dream came true (including other things like – making love to white women, working with computer virii professionally, composing and releasing my own music internationally, mastering music production, playing piano, travelling over Europe, learning and appreciating a lifelong love of surtout French, getting an androgynous look with enviable hair, having my own pro-grade music studio with my own cash and a few others…).
I am a man of simple tastes.
This article will enable you to understand parallel axis graphs and how you might want to implement a fully functional albeit basic yet effective custom control in C#. Graphing and data visualization are hot topics in security and parallel axis graphs are very useful in representing multiple data types or multiple parameters of a system and help patterns emerge from the resulting graph line connections. Such patterns can be very helpful in detecting similarities or anomalies in newer data sets. We will make out own text based data format, our visual control from the graph, a data display using a factory control and interactivity with the data set using opacity as a main tool for demarcating particular line segments adjacent to the data set rows. Further functionality can be built once you get the idea.
Continue reading “BUILDING CUSTOM CONTROLS IN C# – PART 2”
Custom UI Controls require a good grasp of GDI+, collections, delegates and events and smart use of multithreading facilities provided by the C# language. Here we focus on 2D graphics that incorporates the System.Drawing and System.Drawing.Drawing2D namespaces. You will build a custom control as an exercise.
Custom controls are different from components in C# lingo in that they have a user interface which can interact with the user who intends to use it. Therefore the use of a keyboard, mouse, joystick and pen has to be supported. Think of a network visualizer screen or a custom mixer in a music software package, or a 3D mesh control or a simple textbox with zooming feature added – the possibilities are endless and very simple as well once you get the hang of it.
Continue reading “BUILDING CUSTOM CONTROLS in C# – PART 1 :”
Abstract : WMIC has completed more than a decade of existence without having the limelight in terms of its features though windows commandline geeks have always had a soft spot for this embedded interface to WMI or Windows Management Instrumentation exposed in cmd.exe. Here we plan to take a look at the various commands provided and their switches. In normal cmd.exe commands we use find or findstr as a counterpart to grep to find the relevant string item often using wildcards as well. WMIC uses a SQL like language forming WQL – WMIC Query Language as an alternative declarative syntax to get and format data from the default listings. We will look into some of the differences from regular cmd.exe commands usage and of course wmic in relevant detail.
Continue reading “CMD.EXE -II”
Continuing from the previous article (Machine Learning : Naïve Bayes Rule Part I) you learnt about conditional probability and Bayes’ Rule, you also learnt about how to go about implementing the same in machine learning using C# and initiate the first steps to a malware classifier for the Android platform. In this article we go about fine tuning the data set and the trying to understand what might be the best ways to improve the detection rates while reducing on the false positives. Further we also take a good look at spam mail classification go about a similar process for classifying spam mails.
Continue reading “NAÏVE BAYES RULE : BUILDING YOUR OWN MALWARE CLASSIFIER – II”
MACHINE LEARNING : NAÏVE BAYES RULE FOR MALWARE DETECTION AND CLASSIFICATION
ABSTRACT : This paper presents statistics and machine learning principles as an exercise while analysing malware. Conditional probability or Bayes’ probability is what we will use to gain insight into the data gleaned from a sample set and how you might use it to make your own poor man’s malware classifier. Notwithstanding the rather intuitive premise the use of Bayes’ theorem has wide ranging applications from automatic music transcription, speech recognition and spam classifiers. We will first take an overview of what conditional probability is all about and thereafter we will build our own malware classifier for the android platform as well as see the approach you might take to apply the same to mail spam identifiers.
Continue reading “MACHINE LEARNING : NAÏVE BAYES RULE FOR MALWARE DETECTION AND CLASSIFICATION”
ABSTRACT : This article delves upon FOR loops in all its weirdness.
THE LOOP PLAYGROUND
CMD.exe provides FOR loops that work in a rather awkward manner but is quite powerful indeed. In this section let us see how can we understand the for loop switches and their purposes using a problem description and solution approach.
FOR loops remind us of the pleasures of iterations and what can be done by repeating an operation a certain number of times. Adding a condition to the scenario means we can make better use of logical operations.
Continue reading “CMD.EXE – ‘LOOPS’ – PART III”
MD5 = 894DF4FA5D934A9382ACFC20CB057F4D
Abstract : The sample given is a worm whose primary infection vector is removable drives. It has a given set of payloads including autostart preparation entries, user system info enumeration and logging; .cab file creation for payload backups for ostensible transfer and exploit documents dropped from embedded encrypted code. These document files further download other malware to the infected system. This particular variant requires commandline arguments indicating it is part of another triggering agent.
Static and Dynamic analysis : The sections below depict the flow of control in the malware code.
Continue reading “Driver.exe Analysis”
WORKFLOW PERSPECTIVES FOR EFFECTIVE MALWARE REVERSING (BASICALLY – RANTS from yeeeears ago…)
All malware reversers must at some point have faced with a gear lust of sorts; another pan domain time-eating brain slug of sorts. I would like to address the commercial variety not the underground ones as the latter seem to have made the successful crossover by not having options that are pennywise and therefore resort to stealing, thus earning their sinful inventories. Of the plethora of available reversing utilities much of best of erstwhile and contemporary ones are home-brewed. Ergo, the bad ones don’t have the disease, au contraire, they spread it, both the pain and the pleasure.
I will be discussing a few options that are gleaned from my experiences working in a “malware lab”. I ameliorate on the wisdom thus acquired. The rest of this article will explain why I find certain approaches more effective than others as well as successful instances of toolkit configuration and issues resolved as a result of taking such action. I try to focus more on the Windows platform as the core techniques of reversing are platform agnostic.
Continue reading “Horrible Anti-Virus”