Effective YARA Rules for Security Researchers