Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C language 

C++  2nd 

C-Sharp (C#) 

CA (Certificate Authority) 

Cabanas virus 

cabinet archival files (.CAB) 

cache, vulnerability of 

cached data bugs  

caching, browsers 

Caligula MS Word macro virus 

Caligula virus 

Canalisation3D.SCR 

Cap macro virus 

Cap virus 

capitalization, use of in hoax email 

Carnegie Mellon 

Carnivore 

CARO (Computer Antivirus Researchers Organization) naming conventions 

Carzy virus 

Cascade virus  2nd 

Cascading style sheets  2nd 

CAST-256 encryption 

cavity viruses 

CCIAPI (Common Content Inspection Application Programming Interface) 

CCITT X.509 

CD-ROM 

CD10 virus 

CDBRK.VXD 

CDO (collaboration data objects) 

Cell Phone virus hoax 

cell phones 

central processing unit (CPU) 

CERT 

CERT (Computer Emergency Response Team)  2nd  3rd 

Certificate Authority (CA) 

Certificate Manager Export wizard 

certificates 

certificates, digital 

Cervenka, Tom 

CGI (Common Gateway Interface) 

chain letter emails 

channel desyncs 

channel op 

Channel Registration Service (Chanserv) 

channel takeover, IRC 

chat  [See IM]

chat channels 

CHAT command, DCC 

ChatMan 

ChatWeb 

Check Point  2nd 

check_files virus macro 

checksum algorithm 

checksums versus scan strings 

CHKDSK.EXE  2nd 

Chode worm 

Chupacabra Trojan horse 

CIAC (Computer Incident Advisory Capability)  2nd  3rd 

CIH virus  2nd 

cipher routines 

Cisco 

Class 2 Digital IDs 

Class 3 Commercial Software Publisher Digital ID 

class ID (CLSID) 

Class Loader, Java 

class module viruses 

CLASSID 

CLASSPATH, Java  2nd 

cleaning rate, antivirus scanners  

CLEANUP.REG 

Client-to-Client Protocol (CTCP) 

client/server email 

Clinton virus hoax 

Clone 

CLSID 

CLSID (class ID) 

cluster viruses 

CMC (common messaging calls) 

Cmdr Bomber virus 

CMOS memory 

CO (Corporate Administrator) 

code integrity checkers (CRC) 

code segment instruction pointer (CS\:IP) 

Code Signing 

Code Store Database registry key 

CODEBASE 

Codebreaker group  

Cohen, Dr. Frederick  2nd 

cold boot  2nd 

collaboration data objects (CDO) 

Colors virus  2nd 

Coma Trojan horse 

command interpreters 

command line switches 

Command Software 

COMMAND.COM  2nd  3rd  4th  5th  6th 

commercial antivirus researchers 

Common Content Inspection API 

Common Content Inspection Application Programming Interface (CCIAPI) 

Common Gateway Interface (CGI) 

common messaging calls (CMC) 

companion viruses 

Compaq Presario 

Compiled Help Vulnerability 

Compiled HTML Help files 

complete system compromise  2nd 

compressors 

Computer Antivirus Researchers Organization (CARO) naming conventions 

Computer Associates 

Computer Associates• InoculateIT Antivirus AVBoot Version 1.1 

Computer Chaos Club  2nd 

Computer Emergency Response Team (CERT) 

Computer Incident Advisory Capability (CIAC) 

Computer Misuse Act of 1990, United Kingdom 

Computer Security Defense Plan 

Computer Virus Myths home page  2nd 

Computer Virus Prevalence Survey 

Computer Virus Prevalence Survey 2000 

Concept macro virus 

Concept virus  2nd  3rd 

confidential information, inadvertent release of 

CONFIG.NT 

CONFIG.SYS  2nd  3rd  4th  5th  6th  7th  8th 

connection-oriented protocols 

connectionless protocols 

construction kits  2nd 

construction kits, macro viruses 

consumer preferences, tracking 

Content Vectoring Protocol (CVP) 

contests, MMC 

ControlSet001 

ControlSet002 

cookie hijacking 

cookies  2nd 

coordinated denial of service attacks 

coprocessing viruses 

Corel Draw  2nd 

Corel Script  2nd 

covert hack attacks 

CPU (central processing unit) 

CRC (code integrity checkers) 

creation date 

credit cards, stolen 

Critical Path 

Cross Infection Tutorial for Office 97 

cross-referencing virus names  

Crunch 

CRYPTEXT.DLL 

crypto box 

Crypto virus 

CS\:IP (code segment insruction pointer) 

CSCRIPT.EXE  2nd  3rd  4th 

CSH 

CTCP (Client-to-Client Protocol) 

CTCP flood 

Ctrl+Alt+Del 

Ctrl-Alt-Del  2nd 

Cult of the Dead Cow 

Cunning virus 

CurrentControlSet 

CurrentControlSet registry key 

Custom Installation Wizard 

Cutler, David 

CVP (Content Vectoring Protocol) 

CyberCop Scanner 


Team-Fly    
Top

Категории