Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

LaDue, Mark D. 

lag, IRC network data latency 

Lantastic 

Laroux virus  2nd 

Last Known Good copy 

Launch 

law enforcement

    Federal Computer Abuse Act (1994) 

    jail sentences 

    National Infrastructure Protection Center (NIPC) 

    United States Code, Title 18 

LeBlanc, David 

Legacy virus 

Leprosy virus 

LHA archive files 

LHARC  2nd 

Life Stages worm 

limited intrusion  2nd 

Link Looker 

LINKS.VBS 

Linux  2nd 

LIST command, IRC 

list servers 

LiveScript 

LOAD= statement  2nd 

Local Computer zone 

Local Intranet zone 

Local Security Authority (LSA) 

Logged Trojan horse 

logging feature, Windows NT 

LOGO.SYS 

Lotus 1-2-3  2nd 

Lotus AmiPro 

Lotus cc\:Mail 

Lotus Corp 

Lotus Domino 

LOVE-LETTER-FOR-YOU.TXT.VBS 

low-level software 

LSA (Local Security Authority) 

LSASS.EXE 

Lycos 

LZEXE 

LZH archive files 


Team-Fly    
Top

Категории