system
9
Do ANY AV’s use Code Emulation at this point? Norman? F-Secure? Just curious…
VLK, I guess its not heuristics then. What is it, just a way detailed way of comparing signatures to code? What Command seems to be doing here is finding “Traces” of Eicar, and picking them up as “Suspicious” or “Modifications”. I guess thats not really heuristics, just strong comparatives?
Would that be a better way to put it?