Introduction - If you have any usage issues, please Google them yourself
Based on the research on the current developing trends of malicious programs, comparing
systematically the various technologies and methodologies with respect to the hiding and detection of registry.