Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

F-Secure  2nd 

fake news reports  

false- negatives , virus scanner reports 

false-positive 

false-positive, virus scanner reports 

Family name , CARO naming convention 

Farmer, Dan  2nd 

FAT (file allocation table)  2nd 

FAT16 

FAT32 

FAT32EBD.EXE 

Fatal System Stop Errors 

fax cover letters  

FBI (Federal Bureau of Investigation)  2nd  3rd  4th 

FBI Secret virus 

FDISK 

FDISK.EXE  2nd 

Federal Bureau of Investigaion (FBI) 

Federal Bureau of Investigation (FBI) 

Federal Computer Abuse Act (1994) 

Federal Trade Commission 

Federal Trade Commission (FTC) 

file allocation table (FAT) 

file associations, changing 

file caching 

file compression 

file corruption problems 

file dates, checking 

file downloads 

file extensions 

file extensions, DOS defaults 

File Find feature 

File Find instruction 

file I/O operations 

file infections 

file protection (xFP) 

file sharing 

File Signature Verification 

file storage systems 

file streams 

file transfer protocol (FTP) 

file transfers, malicious 

file type associations, Windows 

file types 

file upload forms 

file-copying subroutines 

file- infecting viruses

    appending 

     cavity  

    cluster 

    companion 

    overwriting 

    prepending 

file-overwriting viruses 

FileClose macro 

FILELIST.XML  2nd 

Filemon 

FileNail Trojan horse 

FileSave macro 

FileSystemObject  2nd 

FileSystemObject ActiveX control 

Finjan Software  2nd  3rd 

Firehotcker Trojan horse 

Firewall-1  2nd 

firewalls  2nd  3rd  4th  5th 

First Virginia Bank 

Fish virus 

FIX IE LOG.TXT 

FIX-CIH utility 

FIXBOOT 

FIXMBR 

Flip virus 

flooding 

floppy diskettes  2nd 

Flushot 

FOLDER.HTT  2nd 

Fono virus 

FONO98.VXD 

Fore Trojan horse 

form letters 

FORMAT 

FORMAT command 

FORMAT.COM 

FORMAT.EXE 

Fortezza 

frames  

frames, browser 

FreeBSD  2nd 

FreeBSDNet 

FreeLinks 

Friendly virus 

FrontPage 

FTC (Federal Trade Commission) 

FTP (file transfer protocol) 

FTP99CMP Trojan horse 

function identifiers 

FunLove virus 

future, malicious mobile code

    approved content 

    authentication 

    code auditing 

    denial of service (DoS) attacks 

    digital copiers 

    government involvement 

    hacktivism 

    ISP scanning 

    Linux viruses 

    penalties for offenders 

    popularity 

    secure applications 

    unauthorized code changes 


Team-Fly    
Top

Категории