Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

J2ME (Java2 Micro Edition) 

Jabber 

Jammer 

JAR (Java Archive) 

Jar Signing 

Java 

    Access Controller 

    ActiveX, compared to 

    antivirus scanners  

    applets versus applications 

    archives 

    BeanHive virus 

    browsers 

    byte code 

    Byte Code Verifier 

    Class Loader 

    CLASSPATH  2nd 

    customizing permissions 

    detecting malicious applets 

    DigiCrime 

    disabling 

    DNS Spoofing 

    exploits 

    firewalls 

    history 

    hoax bombs  

    Hostile Thread applet 

    Internet Explorer security zones 

    Just-In-Time (JIT) compiler 

    JVM security holes 

     name spaces 

    NoisyBear applet 

    plug-ins 

    removing malicious code 

    sandbox  2nd  3rd  4th 

    scratch pad 

    Security Manager  2nd 

    source code example 

    Strange Brew virus 

    Verifier vulnerability 

Java applets 

Java Archive (JAR) 

Java Development Kit (JDK) 

Java prefix (malicious mobile code written in Java) 

Java runtime environment 

Java Software Division, Sun Microsystems 

Java Virtual Machine (JVM) 

Java2 Micro Edition (J2ME) 

JAVALOG.TXT 

JavaScript  2nd  3rd 

JavaScript virus or worm prefix (JS) 

JavaSoft 

JDK (Java Development Kit) 

Jerusalem virus  2nd 

Jerusalem.1808.Apocalypse 

Jet database engine 

Jini 

JIT (Just-In-Time) compiler 

JOIN command, IRC 

Joint Photographic Experts Group (JPEG) 

joke programs 

Joshi virus  2nd 

JPEG (Joint Photographic Experts Group) 

JS prefix (JavaScript virus or worm prefix) 

JS.KAK  2nd 

jump instructions 

Just-In-Time (JIT) compiler 

JVM (Java Virtual Machine) 


Team-Fly    
Top

Категории