Techniques which will allow bypass of the majority of modern proactive protection and firewalls.Сообщение от Greg Hoglund at rootkitdotcom
Rules are two kinds - global rules and rules for applications. Generally speaking, at the heart of bypass of any protection are 1) assumptions, 2) exceptions, and 3) errors made by developers of protection.