Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

S/MIME (Secure Multipurpose Internet Mail Extensions) 

Sadam virus 

Safe for Initialization, ActiveX  2nd 

Safe for Scripting, ActiveX  2nd 

Safe Internet Programming Team (SIP)

    SIP (Safe Internet Programming Team) 

safe list 

safe mode 

Safe mode 

SAM (Security Account Manager) database 

SameTime 

Sampo virus 

sandbox, Java  2nd  3rd 

SANS (System Administration, Networking, and Security) group   2nd 

SATAN (System Administration Tool for Analyzing Networks) 

Satanz Backdoor Trojan horse 

scan strings versus checksums 

SCANDISK.EXE  2nd  3rd 

ScanProt.dot macros 

SCANREG.EXE 

SCANREG.VBS 

scenarios, virus-spreading 

Schoolbus Trojan horse 

Schwindler 1.82 Trojan horse 

scrap files 

screensavers 

SCREG.EXE 

script attacks 

script debugging, disabling 

Script Editor 

Script Encoded File (.JSE) 

script errors, displaying 

script files, IRC hacking 

scripting languages 

    features 

    Hypertext Preprocessor Scripting Language (PHP) 

    JavaScript 

    JScript 

    remote scripting 

    VBScript 

Scripting Runtime Engine 

Scriptlet.typlib 

Scrnch 

SCRNSAVE.EXE= statement 

SCRRUN.DLL 

SCSI controller cards 

SDK (software developer•s kit) 

search engines

    bots, use of 

Secret Service 

SECRING.SKR 

sectors per cluster 

sectors per track 

Secure Electronic Transaction (SET) 

Secure Hypertext Transfer Protocol (HTTPS) 

Secure Multipurpose Internet Mail Extensions (S/MIME) 

Secure Sockets Layer (SSL) 

secured communication technologies, enabling 

security

    ActiveX 

    browsers 

Security Account Manager (SAM) database 

Security Certificate files 

Security Configuration Editor 

Security Configuration tool 

security flaws 

Security Identifier (SID) 

security levels 

security levels, Microsoft Office 2000  2nd 

Security log 

Security Manager, Java  2nd 

Security Reference Monitor (SRM) 

Security Scanners 

Security Zone Default 

security zones  2nd  3rd 

self-healing digital immune system 

Senna Spy Trojan horse 

Septic virus 

SERIALZ.HLP 

Server Message Block (SMB) 

server•s certificate revocation 

service packs  

services, Windows programs 

servlets 

session cookies 

SET (Secure Electronic Transaction) 

SETI@home 

Setup control, ActiveX 

Setup Information files 

SETVER.EXE 

SFC.EXE  2nd 

SFP (System File Protection)  2nd 

SFPDB.SFP  2nd 

SHA hash algorithm 

shadow RAM cache 

shared postings 

shares  2nd 

SHELL command  2nd 

Shell registry key 

Shell Scrap object files 

SHELL= statement  2nd 

shells , Unix 

Shiva Burka Trojan horse 

Shiver virus 

ShockRave Trojan horse 

Shockwave 

Shrink 

SID (Security Identifier) 

Signature Verification Tool utility 

signatures, decryption 

signed code, Internet Explorer 

signed macros 

SIGVERIF.EXE 

Silencer Trojan horse 

Simple MAPI 

Simpsalapim IRC worm 

SISTER.DLL 

Ska 

skins 

Skrenta, Richard 

slave CD-ROM drives  

slowness, sudden 

small computers 

Smart Download 

SmartLine Inc. 

SmartWhoIs 

SMB (Server Message Block) 

Smeg virus 

Smith, David L. 

Smith, Richard 

SMSS.EXE 

SMTP (Simple Mail Transfer Protocol) 

SNA network topology 

Snap-Ins 

social engineering 

Socket23 Trojan horse 

sockets 

Sockets de Troie Trojan horse 

SoftWar Trojan horse 

software developer•s kit (SDK) 

software device drivers 

software publisher certificates 

Sohr, Karsten 

Sonar Trojan horse 

SonicWALL  2nd 

Sophos  2nd 

source code

    HTML 

source port number 

SPA virus hoax 

spacers 

spammers 

Spammies 

spawners 

SpinRite disk recovery software 

SPLOG.TXT  2nd 

spoofed web sites 

spreadsheets  2nd 

SpySender Trojan horse 

SRM (Security Reference Monitor) 

SSL (Secure Sockets Layer) 

SSPIPES.SCR 

stack attacks 

stack segment instruction pointers 

Start button 

Startup group, Windows 3.1 

startup programs 

Startup programs 

startup sequences

    Windows 3.x 

    Windows 9x 

    Windows NT 

state laws 

stateless requests , HTTP 

stealing IP addresses 

stealth  2nd 

Stealth Spy Trojan horse 

stealth viruses  2nd 

STMGR.EXE 

Stone virus 

Stoned virus 

STOP error 

store-and-forward model 

store-and-forward model, email 

Strange Brew virus 

Strange Days virus 

Stream virus 

Streaming Audio Trojan horse 

Striker Trojan horse 

style sheets 

subculture, hackers 

subfunction identifiers 

Subseven Trojan horse 

SubsevenTrojan horse 

subtypes , MIME 

Sun Microsystems  2nd 

Sun Microsystems Start Office 

Sunday virus 

super users 

super-users  

supervisor 

SurfinGate 

SurfinShield  2nd 

swap file problems 

swap files 

sweep lists 

Swiss UBS 

SYLK (Symbolic Link) 

Symantec  2nd  3rd  4th  5th  6th 

Symbolic Link (SYLK) 

sympathy request hoax email 

Synchronization Manager 

synchronization, IRC 

SYS.COM  2nd 

SYSEDIT 

SYSEDIT.EXE 

SYSEDIT.EXE command 

SYSMON.OCX, 

System Administration Tool for Analyzing Networks (SATAN) 

System Administration, Networking, and Security (SANS) group 

System Administration, Networking, and Security Institute (SANS) 

System File Checker (SFC) 

System File Checker utility 

System File Protection (SFP)  2nd 

system file table 

system files, repairing 

System Genie 

System log 

system macros 

system recovery tools 

System Restore feature, Windows ME 

System Restore wizard 

system state feature 

SYSTEM.DA0  2nd  3rd 

SYSTEM.DAT  2nd  3rd 

SYSTEM.INI  2nd  3rd  4th  5th 

SYSTEM.INI file 

SystemWizard 

Systray icon 


Team-Fly    
Top

Категории