
<ul>
	<li>&raquo; What we've done here is taken the old idea of using ptrace() to attack applications and applied it to this virus. </li>
	<li>&raquo; The cool thing about our NOP-infection code is that it operats on any arbitarily sized data block; so, we can load
	 an executables .text from a file or using the ptrace() API to copy that .text segment into our memory space, modify it, and
	 write it back. </li>
	<li>&raquo; /proc for filename + read() =  faster. </li>
</ul>

