Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Hack 99 KeyLogger Trojan horse 

hackers

    characteristics of 

    motivation 

    online protesters 

    online support system 

    perceptions of 

    programming for social good 

    subculture 

Hackers Paradise Trojan horse 

hacking signatures 

hacking utilities, IM

    busters 

    channel desyncs 

    channel takover 

    CTCP flood 

    flooding 

    IP address stealing 

    IRC bots 

    lag 

    malicious file transfers 

    mass deop attack 

     name hijacking 

    netsplits 

    network redirection 

    nick collision kill 

    punters 

    script files 

    web buffer overflow 

hacktivism 

Hak Tek Trojan horse 

HANs (home area networks) 

Happy99 worm  2nd 

HAPPY99.EXE 

hard drive partitions 

hardware encryption devices 

hardware manipulation, DOS computer viruses 

hash algorithms 

hash total 

hashing 

header information

    .COM files 

    .EXE files 

    email 

Heep Trojan horse 

help desk personnel 

hexadecimal notation 

hidden file attribute 

hidden file extensions  2nd 

hidden files 

high-level language (HLL)  2nd 

Highland, Harold 

HIMEM.SYS  2nd 

history file, browsers 

hives 

HKCC 

HKCR  2nd  3rd  4th  5th  6th 

HKCU  2nd  3rd 

HKDD 

HKLM  2nd  3rd  4th  5th 

HKU  2nd 

HLL (high-level language)  2nd  3rd 

HMVS macro virus scanner 

hoax bombs , Java 

hoax email

    common messages 

    fake news reports  

    giveaways 

    nonexistent organizations, references to 

    sympathy requests  

    telltale signs 

    threats 

Hoax Kill 

hoax viruses

    BadTimes virus 

     Cell Phone virus 

    chain mail 

    Clinton virus 

    frequency of 

    future technology and 

    Get More Money virus 

    Good Times virus  2nd 

    Modem Subcarrier virus 

    motivation for writing 

    Movile Phone virus 

    partial truths 

    PKware virus 

    Pluperfect virus 

    recognizing 

    reducing impact of 

    SPA virus 

    telltale signs 

    warnings 

    Wobbler virus 

hoax web sites 

Holland Girl virus 

home area networks (HANS) 

honey pots 

hooking  2nd 

Host Control Trojan horse  2nd 

host-based email  2nd 

Hostile Applets Home Page 

Hostile Thread applet, Java 

HotJava  2nd 

HotMail 

Hotmail  2nd 

HotMail 

Hotmail password exploit 

HP JetDirec 

HP Pavilion 

HSBC 

HSFEDRT.SYS 

HSFLOP.PDR 

HTA (HTML Application) 

HTA (HTML application)  2nd 

HTML (Hypertext Markup Language)  2nd  3rd 

    ActiveX example 

    browser vulnerabilities 

    common tags 

     components  

    sample document 

    source code 

    versions 

HTML Application (HTA) 

HTML Help ActiveX control (HHCTRL.OCX) 

HTML.Internal virus 

HTTP (Hypertext Transfer Protocol) 

HTTPS (Secure Hypertext Transfer Protocol) 

HVL Rat Trojan horse 

HWINFO.EXE 

HYBERFIL.SYS  2nd 

Hybris virus  2nd 

HyperTerminal 

Hypertext Markup Language  [See HTML]

Hypertext Markup Language (HTML) 

Hypertext Preprocessor Scripting Language (PHP) 

Hypertext Transfer Protocol (HTTP) 


Team-Fly    
Top

Категории