Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Babylonia virus 

Back Orifice 

Back Orifice 2000 trojan 

Back Orifice Trojan horse  2nd  3rd 

BackConstruction 1.2 Trojan horse 

backdoor programs 

BackDoor Trojan horse 

Backdoor-G Trojan horse 

backdoors 

BackOffice Resource Kit 4.0 

BackOrifice Trojan horse 

Backup System State Data feature, NT 2000 

backups , system 

BadTimes virus hoax 

BankOne 

Barclays  2nd 

base64 encoding 

Basic 

BAT prefix (malicious mobile code written in DOS batch file language) 

Bat.Chode worm 

batch files 

BattlePong Trojan horse 

BBN SafeKeyper 

BeanHive virus 

BigGluck Trojan horse 

binders 

BIOS interrupt routines 

BitchX 

Bla Trojan horse 

Black Baron 

BlackICE Defender 

BladeRunner Trojan horse 

blank filenames 

Bloody virus 

Bloody! virus 

Blue Screen of Death (BSOD) 

BO jammerkillahV Trojan horse 

BO Trojan horse 

BO2K virus 

Bolzano virus 

bontchev.net 

boot floppies 

Boot prefix (DOS boot virus) 

boot problems, Windows viruses 

boot section, SYSTEM.INI file 

boot sectors, scanning 

boot viruses

    dropper programs 

    floppy diskettes 

    hard disks 

    interrupt 13h 

    master boot record 

    multipartite 

    removing 

booting, Windows platforms 

BOOTLOG.TXT  2nd 

BOOTSECT.DOS 

bots  2nd 

bots, IRC 

BOWhack Trojan horse 

Boza virus 

Brain 

Brain virus  2nd  3rd 

Brooke, O•Neil 

browser attacks

    Active Desktop 

    application monitors  

    cached data bugs  

    Cascading style sheets redirects 

    cookie exploits 

    detecting 

    dotless IP address exploit 

    eBayla virus 

    file upload forms 

     frames  

    Hotmail password exploit 

    HTA (HTML application) 

    HTML.Internal 

    ImportExportFavorites exploit 

    JavaScript redirect 

    Microsoft Office 2000 

    Microsoft PowerPoint 

    Office HTML Script vulnerability 

    PHP viruses and Trojan horses 

    preventing 

    print templates 

    redirection 

    removing malicious files 

    Russian New Year exploit 

    shared postings 

    Telnet 

    Trojan horses 

    viruses 

    web bugs 

    web spoofing 

    Windows Media Player 

    XML redirect 

browsers

    Active Desktop 

    antivirus scanners  

    ASP vulnerabilties 

    AutoComplete feature 

    caching 

    Cascading style sheets 

    cookies  2nd 

    DHTML (Dynamic HTML) 

    e-banking 

    exploiting HTML 

    frames 

    history file 

    HTA (HTML Application) 

    HTML (Hypertext Markup Language) 

    HTTP (Hypertext Transfer Protocol) 

    HTTPS (Secure Hypertext Transfer Protocol) 

    Internet Explorer Administration Kit 

    Java 

    JavaScript 

    JScript 

    Microsoft Wallet 

    PHP 

    privacy 

    registry settings 

    remote scripting 

    security settings 

    security zones 

    skins 

    SSL (Secure Sockets Layer) 

    TLS (Transport Layer Security) 

    URL (Universal Resource Locator) 

    VBScript 

    versions 

    vulnerability to attacks 

    XML (Extensible Markup Language) 

browsers, integrating into operating systems 

BSH 

BSOD (Blue Screen of Death) 

Bubbleboy virus 

BubbleBoy worm 

buddy lists  2nd 

buffer overflow attacks 

buffer overflows 

Bugs Trojan horse 

bulletin boards  

Burger, Ralf 

bus 

business memos 

busters 

butt plugs 

Butt Trumpet plug-in 

Bymer worm 

bypassing Automacros 

Byte Code Verifier, Java 


Team-Fly    
Top

Категории