Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

radio channels 

RAM (random access memory) 

random access memory  [See RAM]

random evolution viruses 

random execution 

random numbers , encryption 

Rapid Response Plan

    damage, assessing 

    eradication plan, implementing 

    facts, collecting 

    initial alert, reporting to team 

    public relations impact, determining 

    reoccurrence, planning for 

    spread, minimizing 

    users, notifying  

Raptor Firewall 

RAT (remot administration Trojan) 

RB000.CAB 

RDISK.EXE  2nd 

read-only memory basic input/output system  [See ROM BIOS]

real mode  2nd 

Real Network  2nd 

Real Player 

Recently Used File List 

Recovery Console 

recursive scanning 

Recycle Bin  2nd  3rd 

Red Cross virus 

redirection  2nd 

reformatting disks 

REG.DAT 

REGBACK.EXE 

REGEDIT 

REGEDIT.EXE  2nd 

REGEDT32.EXE  2nd 

Register.ID vulnerability 

RegisterServiceProcess 

registration database 

registry 

    repairing 

Registry Checker utility 

Registry Entry files 

registry file 

registry permissions 

Regmon 

RegObj 

Reinstall Office option 

relay servers, email 

Rembomb Trojan horse 

remote access trojans 

remote administration Trojan (RAT) 

remote control programs 

Remote Explorer registry key 

Remote Explorer virus 

Remote Grab Trojan horse 

remote scripting 

Remote Windows Shutdown Trojan horse 

REMOTE.INI 

removing viruses

    booting with clean DOS diskettes 

    in-use file replacement 

    infected files, replacing 

    registry restoration 

     researching viruses 

    startup programs 

    virus services,disabling 

renaming system executables 

Repair Office option 

Repair Tool 

research-only malicious code 

researching viruses 

resource sharing  2nd 

Restricted Sites security zone 

revocation, digital certificates 

RFC 2426 

rich text file (RTF) 

ring 0 

rings 

RingZeroTrojan horse 

Rip 

Ripper virus 

risk assessment

    ActiveX 

    browsers 

    DOS viruses 

    email 

    IM attacks 

    Java 

    macro viruses 

    Trojan horses 

    Windows viruses 

RJCrush 

RMDIR command 

RoboHack Trojan horse 

rogue programs  2nd 

rogue UDP packets 

ROM BIOS 

ROM BIOS (read-only memory basic input/output system)  2nd  3rd 

Rosenberg, Rob 

routers 

RSA Data Security, Inc. 

Run As feature 

Run registry key 

RUN= statement  2nd 

Runner 

RunOnce registry key 

RunOnceEx registry key 

RunServices registry key 

RunServicesOnce registry key 

Russian New Year exploit 


Team-Fly    
Top

Категории