Kernel Level Anti-Spyware Using Device Stack Lock Strategy
Kernel Level Anti-Spyware Using Device Stack Lock Strategy

Mohammed Gheni Alwan

Volume 30, Issue 9 , May 2012, , Page 1582-1592

https://doi.org/10.30684/etj.30.9.11

Abstract
  This paper is devoted to design and implement an Anti spyware software package. The targeted type is the kernel level spyware which is the most dangerous threat due to the capabilities ...  Read More ...
Proposed Method to Enhance the Security of Blowfish Algorithm
Proposed Method to Enhance the Security of Blowfish Algorithm

Shaimaa H. Shaker

Volume 29, Issue 13 , September 2011, , Page 2648-2661

https://doi.org/10.30684/etj.29.13.6

Abstract
  The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data ...  Read More ...
Constructing a Macro Virus to Upgrading Antivirus Programs
Constructing a Macro Virus to Upgrading Antivirus Programs

Wesam S. Bhaya; Alaa Abd Alhesain

Volume 29, Issue 5 , March 2011, , Page 986-993

https://doi.org/10.30684/ etj.29.5.13

Abstract
  A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, ...  Read More ...
New Approach for Modifying DES Algorithm Using 4-States Multi-keys
New Approach for Modifying DES Algorithm Using 4-States Multi-keys

Rehab F. Hassan

Volume 28, Issue 20 , October 2010, , Page 6084-6090

https://doi.org/10.30684/etj.28.20.8

Abstract
  Within the last decade, there has been a vast increase in the accumulationand communication of digital computer data in both the private and public sectors.Much of this information ...  Read More ...