Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

daily hack probes 

Dalnet  2nd 

dangerous executables 

Dark Avenger 

Dark Avenger virus 

Data Fellow 

data segment instruction pointers 

datafiles 

dates, checking 

DBLBUFF.SYS 

DBLSPACE.BIN  2nd 

DCC (Direct Client to Client) 

DDE (Dynamic Data Exchange) 

DDoS (distributed denial of service) 

de Vitry, David 

DEBUG.EXE  2nd  3rd  4th 

decompression  

decryption 

Deep Throat Trojan horse 

Deep ThroatTrojan horse 

DeepBO Trojan horse 

DeepThroat Trojan horse 

Def Con hacker convention 

default system shares 

defense plan, malicious mobile code

    communication, importance of 

    creating 

    deployment 

    distributing updates 

    end user education 

    foreign computers and networks 

    goals 

    implementation 

    management buy-in 

    new assets, protecting 

    objectives 

    quality assurance 

    team 

    technology inventory 

    testing 

    updating and reviewing  2nd 

    writing 

defense strategy, recommendations 

Define virus 

Delete.bat file 

Delphi 

Delta Trojan horse 

DeltaSource Trojan horse 

Den Zuk boot virus 

denial of service (DoS) attacks  2nd  3rd  4th 

Department of Defense 

Department of Energy 

Der Spaeher Trojan horse  2nd 

DESKTOP.INI 

destination port number 

device drivers  2nd  3rd  4th 

Devil Trojan horse 

DFS (Distributed File System) 

DHCP 

DHTML (Dynamic HTML) 

DHTML Edit control, ActiveX 

DHTMLED.OCX 

digital certificates  2nd 

digital copiers 

Digital Equipment Corporation 

digital fingerprint   2nd 

digital ID 

digital signature 

digital signing 

Digital VAX host email system 

DIR command 

DIR-2 virus 

direct action Trojan horses 

Direct Client to Client (DCC) 

disabling virus services 

Disk Manager 

Disk Quotas 

DISKDIAG.EXE 

DISKPROBE.EXE 

DISKSAVE.EXE 

distributed attacks 

distributed computing 

distributed denial of service (DDoS) 

Distributed File System (DFS) 

Distributed.net 

DLL (dynamic linking library) 

DNS (domain naming servers) 

DNS Spoofing 

Document.ExecCommand( ) 

documents, saving in rich text format 

Doly Trojan horse 

Domain Administrators 

Domain Name System (DNS) 

domain naming servers (DNS) 

domains 

DoS (denial of service) attacks 

DOS batch files 

DOS boot virus prefix (Boot) 

DOS command interpreters 

DOS computer viruses

    .EXE and .COM files 

    all Windows platforms, effect upon 

    boot viruses 

    detecting 

    file- infecting viruses 

    hardware manipulation 

    history 

    interrupts 

    memory-resident viruses 

    nonmemory resident viruses 

    PC boot sequence 

    programming skills required 

    protecting computers from 

    removing 

    Windows 3.x, interaction with 

    Windows 9x, interaction with 

    Windows NT, interaction with 

DOS error messages 

DOS Program Information files 

DOS Virtual Machine (DVM) 

DOS Virtual Machine (VM or DVM) 

DOSSTART.BAT  2nd  3rd 

dotless IP address exploit 

Doubleclick.net 

Download Demon 

Dr. Watson for Windows  2nd  3rd 

drive A booting, disabling 

drive A, booting from  2nd 

Driver Signing 

Driver Verifier 

DRIVES.BAT 

dropper programs 

droppers 

DRVSPACE.BIN  2nd 

DRWTSN32 

dual-boot partitions 

dual-boot systems 

Dump command 

DUNPassword Trojan horse 

DVM (DOS Virtual Machine) 

Dynamic Data Exchange (DDE) 

Dynamic HTML 

Dynamic HTML (DHTML) 

dynamic linking library (DLL) 

dynamic VxDs 


Team-Fly    
Top

Категории