Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Macintosh  2nd 

Macintosh computers 

Macro Editor  2nd 

macro languages  2nd 

Macro Virus Protection Tool 

macro viruses  2nd  3rd 

    add-ins 

    automacros 

    class module viruses 

    construction kits 

    cross-platform infectors 

    damage caused by 

    droppers 

    ease of programming 

    email 

    encrypted 

    false-positive warning messages 

    foreign language versions 

    future of 

    global templates 

    implementation of 

    inability to view 

    macro copying commands 

    Macro Editor 

    macro languages 

    Microsoft Excel  2nd 

    Microsoft Word  2nd 

    Most Recently Used list 

    Organizer 

    polymorphic 

    prevalence of 

    preventing 

    random evolution 

    removing 

    Shiver virus 

    spreading 

    Startup directory 

    Startup directory files 

    stealth 

    unexpected appearance of new macros 

    unexpected changes in documents 

    VBA 

    viewing with text editors 

    Visual Basic Editor (VBE) 

    Visual Basic for Applications 

    warning signs 

MacroCopy command 

Macromedia 

mail lists 

mail servers 

mailbombers 

Major variant, CARO naming convention 

MAKEDISK.BAT 

malicious file transers 

malicious mobile code  [See MMC]

malicious mobile code written in DOS batch file language prefix (BAT) 

malicious mobile code written in Java prefix (Java) 

management champion 

Map Network Drive 

MAPI (Message Application Program Interface) 

MAPI (Messaging Application Programming Interface) 

MAPIAddress function 

MAPIReadMail function 

MAPISendMail function 

Marker virus 

mass deop attack 

master boot record  [See MBR]

Master File Table (MFT) 

MasterCard 

Masters Paradise Trojan horse  2nd 

Maverick•s Matrix Trojan horse 

MBR (master boot record)  2nd 

MBR modification warning message 

MBRINT13.SYS 

MBT Trojan horse 

McAfee VirusScan 

McAfee, John 

MCI WorldCom 

McLain, Fred 

MD5 (Message-Digesting-5) algorithm 

mdie keyword 

mdos keyword 

media convergence 

Melissa virus  2nd  3rd  4th  5th  6th 

MeltingScreen.exe 

MEM.EXE 

memory rings 

memory-resident viruses 

menu interception 

Message Application Program Interface (MAPI) 

Message Transfer Agent 

Message Transfer Agent (MTA) 

Message-Digesting-5 (MD5) algorithm 

MessageLabs 

Messaging Application Programming Interface (MAPI) 

Messaging Internet Relay Chat (MIRC) 

metamorphic viruses 

MFT (Master File Table) 

Michelangelo virus  2nd  3rd  4th 

Microsoft Access 

    applications 

    Data Project files 

    databases 

    Project Extension files 

Microsoft Active Desktop 

Microsoft Cabinet Archive files 

Microsoft Common Console documents 

Microsoft Dial-up Networking files 

Microsoft Excel  2nd  3rd 

    4.0 macro file 

    add-in files 

    workbook files 

Microsoft Exchange Server, removing viruses 

Microsoft FrontPage 

Microsoft Installer Package 

Microsoft Installer Patch 

Microsoft Kernel Power Toys kit 

Microsoft Management Console (MMC) 

Microsoft Office 2000 

    add-ins and templates 

    automatic resigning 

    Developer Kit 

    Microsoft Excel 

    security levels 

    trusted and untrusted macros 

Microsoft Office 95 and Windows 95 Business Guide 

Microsoft Office 97 

Microsoft Office HTML Script vulnerability 

Microsoft Office XP 

Microsoft Outlook 

    blocked file attachments 

    CDO (collaboration data objects) 

    Email Security Update  2nd 

    Level 1 attachments 

    MAPI (Message Application Program Interface) 

    personal folder files 

    security patches 

    security zone 

    versions 

    vulnerabilities 

Microsoft Outlook Express

    personal folder files 

    versions 

    vulnerabilities 

Microsoft Passport 

Microsoft PhotoDraw 

Microsoft PowerPoint  2nd 

Microsoft Publisher 

Microsoft Wallet 

Microsoft Windows 95 Software Compatibility Test 

Microsoft Windows operating system

    design flaws 

    prefixes 

Microsoft Windows, history 

Microsoft Word  2nd  3rd 

Microsoft.Net 

Millenium Trojan horse 

Millennium Trojan horse 

MIME (Multipurpose Internet Mail Extensions) 

Minor variant, CARO naming convention 

Mirabilis LTD 

mIRC 

MIRC (Messaging Internet Relay Chat) 

mIRC script 

MIRC.INI 

missing file extensions 

MMC (malicious mobile code)

    households, impact upon 

    in the wild 

    Internet, role of 

    number of existing malicious code programs 

    research-only 

    rogue programs 

    technological war 

    trojan horses 

    viruses 

    worms 

MMC (Microsoft Management Console) 

MMX (multimedia extension) 

mobile messaging 

Mobile Phone virus hoax 

mobile users 

MODE command, IRC 

Modem Subcarrier virus hoax 

Modifier, CARO naming convention 

monitoring, government 

Monkey MBR virus 

Morris Internet worm 

Most Recently Used (MRU) 

Mozilla  2nd 

MP3 

mping keyword 

Mr. Wormy IRC worm 

MRU(Most Recently Used) 

MS-DOS 7.0 

MS-DOS Compatibility mode  2nd 

MS-Proxy 

MSCONFIG 

MSCONFIG.EXE 

MSDOS.SYS  2nd  3rd 

MSGcommand, IRC 

MSHTA.EXE  2nd 

MSHTML.DLL 

MSINFO16.TLB 

MSINFO32 

MSINFO32.EXE 

msize keyword 

MSKERNEL32.VBS 

MSN 

MSN Hotmail 

MSN Messenger 

MSN today 

MTA (Message Transfer Agent) 

mtimer keyword 

multiboot feature, Windows NT 

multimedia extension (MMX) 

multipartite viruses  2nd  3rd 

Multipurpose Internet Mail Extensions (MIME) 

music, downloading 

Mutation Engine (MtE or DAME) 

Mutilate Trojan horse 

MV.EXE 

My Computer 

My Network Places 

myCIO.com 

MYPIC.COM 


Team-Fly    
Top

Категории