I am looking to find out the mechanics of their technique that essentially uses a browser to infect ones
I have personal experience of contracting a what I believe a virus/malware and it ending up somewhere on the client's computer and not
in the browser cache.How is this possible and how can registry be modified at the same time ? I believe that the virus is able to circumvent
the browser memory/disk space and into the rest of the system ? I just don't know how this is done.
Any comments would be appreciated