kurt wismer <kurtw@sympatico.ca> wrote in news:f931pn$r8m$1
@registered.motzarella.org:

> Andy Walker wrote:
> [snip]
>> I understand what your saying, but some scanners take into account
>> other metrics like the existence of certain registry keys, or even the
>> structure of supporting files used as databases for the malware. A
>> complete deconstruction of the offending malware *could* produce
>> enough information to snare all its variants. Heh! but then who's got
>> the time... ;-)

>
> a *complete* deconstruction of the malware (or any program, really)
> falls outside the realm of computability as it is reducible to the
> halting problem...


Again, I want to thank you for stepping in and explaining the obvious.
BugHunter is not the only program which can be defeated using the tricks
Andy specified.


--
Dustin Cook
Author of BugHunter - MalWare Removal Tool - v2.2c
email: bughunter.dustin@gmail.com.removethis
web..: http://bughunter.it-mate.co.uk
Pad..: http://bughunter.it-mate.co.uk/pad.xml