Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

P2P (peer-to-peer) computing 

P3P (Platform for Privacy Preferences) 

Pack 

package, Java 

packers 

paging systems 

PAK archive files 

Pakistani Brain virus  2nd 

PalmPilot 

parallel port services 

parasites 

parasitic viruses  2nd 

PART command, IRC 

partition table 

Pascal 

Pass Ripper Trojan horse 

Passport Wallet 

password caching 

password dumping 

password files 

password stealers 

password-protecting shares 

PATCH.COM 

PATH environment variable 

Pathogen virus 

payload 

PBRUSH.EXE 

PC boot sequence 

    AUTOEXEC.BAT 

    cold versus warm boot 

PCT 1.0 (Private Communications Technology) 

PDF.OCX 

PE (Portable Executable) 

PE Diminisher 

peer-to-peer (P2P) computing 

peer-to-peer model, instant messaging 

peer-to-server, instant messaging 

Pegasus  2nd 

Perl 

PersistMoniker 

Personal Address Book 

personal firewalls 

personal folder files (PST), Microsoft Outlook 

PERSONAL.XLS  2nd  3rd 

peterszor.com 

Petite 

PGP 

PGP (Pretty Good Privacy) 

PGP Open Source group  

Phase0 Trojan horse 

Phineas Trojan horse 

photo CD images 

PhotoDraw 

PHP (Hypertext Preprocessor Scripting Language) 

PHP.NewWorld 

PHP.Pirus 

PHP.Sysbat 

Physical Security policy 

PICTURE.EXE Trojan horse 

PICTURE.GIF.EXE 

PID (Process ID) 

PIFEDIT.EXE 

Pile, Christopher 

PIN numbers  

PING commands 

Ping Pong virus 

Ping-Pong virus 

Pirch  2nd 

PIX 

PKARC 

PKCS #10 

PKCS #7 

PKI (Public Key Initiative) 

PKLITE 

PKUNZIP 

PKware hoax virus 

PKZIP  2nd 

PKZIP archive files 

Platform for Privacy Preferences (P3P) 

platforms 

Plug and Play 

plug-ins 

plug-ins, Java 

Pluperfect virus hoax 

Point-to-Point Tunneling Protocol 

Policy Manager 

polymorphic viruses 

polymorphism 

POP3 

Poppy virus 

PORNO.COM 

port mappers 

port mapping 

port numbers 

port redirection 

port scanners  

port scanning Trojans 

Portable Executable (PE) 

Portal of Doom Trojan horse  2nd  3rd 

Ports Finder 

Portuguese Atelier Web Security Port Scanner (AWSPS) 

POST (power on self-test) 

Postman Trojan horse 

power on self-test  [See POST]

PowerScript 

Powersoft 

predefined templates 

prefixes, CARO names  

prependers 

prepending viruses 

Pretty Good Privacy (PGP) 

Pretty Park.EXE 

PrettyPark worm 

Preview pane, email  2nd 

Princeton University  2nd 

PRINT command 

print server cards 

Print Spooler 

print templates, browser 

Priority Trojan horse  2nd 

privacy 

private chats 

Private Communications Technology (PCT 1.0) 

private keys  2nd 

PRIVATE.MDB 

Prizzy virus 

Process ID (PID) 

processes, Windows environment 

Profile Assistant 

ProgenicTrojan Trojan horse 

PROGMAN.EXE 

Program Information file (PIF) 

Program Manager shell 

program segment prefix (PSP) 

Project Explorer 

Prosiak Trojan horse  2nd 

Protected mode, 32-bit Windows platforms 

protected mode, Intel 386 

protection domains 

Proxy Server 

proxy servers 

PSAPI.DLL 

PSP (program segment prefix) 

PST.EXE 

Psyber Stream Server Trojan horse 

public channel 

public decrypting key 

public key cryptography 

Public Key Iniative (PKI) 

publisher•s certificate revocation 

punters 

PWSTEAL prefix (Trojans that steal passwords) 

Python 


Team-Fly    
Top

Категории