Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows

By Roger A. Grimes

Slots : 1

Table of Contents

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

tags

    HTML  2nd 

    HTTP 

    JavaScript 

Tamos Soft 

tape backups , restoring from 

TAR 

Task Manager 

Task Manager, Windows NT 

TASKMGR.SYS 

Taskpads 

taunting messages 

Tauscan 

Tck/Tk 

TCP/IP (Transmission Control Protocol/Internet Protocol) 

TCP/IP ports 137, 138, and 139 

TCPView Pro 

Telecommando Trojan horse 

Telefonica virus 

Telfonica virus 

Telnet  2nd 

Telnet attacks 

TELNET.EXE 

templates, Microsoft Word 

Temporary Internet Files folder 

Tequila virus 

Termite virus 

text editors, viewing macro viruses with 

text-to-GUI transition, boot process 

Thawte 

The Invasor Trojan horse 

The Prayer Trojan horse  2nd 

The Spy Trojan horse 

The Thing  2nd 

The thing Trojan horse 

tHing Trojan horse 

third-party cookies 

ThisDocument object 

Thorin virus 

threat hoax emails 

throttling, antivirus software 

Tiananmen Square massacre  2nd 

timestamping 

timestamps, checking 

Tiny Telnet Server Trojan horse 

Tiny-32 virus 

TLS (Transport Layer Security) 

toolbars , repairing 

ToolsMacro macro 

Total Conventional Memory 

Total Eclypse Trojan horse 

Transcout Trojan horse 

Transmission Control Protocol/Internet Protocol  [See TCP/IP]

Transport Layer Security (TLS) 

transport plug-ins 

Trend Micro  2nd  3rd 

trends, computing 

Trin00 Flood attack program 

Trin00 Flood Trojan horse 

Triple-DES communication encryption 

Triplicate virus 

TRO prefix (Trojan) 

Trojan Cow Trojan horse 

trojan horses  2nd 

Trojan horses

    audio and video capture 

    Back Orifice 

    backdoor programs 

    binders 

    browsers 

    compressors 

    denial of service (DoS) attacks 

    detecting 

    direct action 

    distributed attacks 

    ExplorerZip 

    HAPPY.EXE 

    history of 

    implementation of 

    IRC 

    keyloggers 

    network redirection 

    password stealers 

    phone dialing 

    PHP 

    PICTURE.EXE 

    port mapping 

    port scanning 

    PrettyPark 

    preventing 

    Qaz 

    remote administration Trojan (RAT) 

    removing 

    script 

    source code, hiding as 

    stealth 

    sweep lists 

    symptoms of 

    viruses, compared to 

    well-known ports 

    worms, compared to 

Trojan prefix (TRO) 

Trojan Spirit 2001 Trojan horse 

Trojans that steal passwords prefix (PWSTEAL) 

trust relationships, viewing 

trust, digital certificates 

trusted authors 

trusted code 

trusted computer programs 

trusted publishers 

trusted root authority 

Trusted Root Certification Authorities 

Trusted Sites security zone 

trusted sources 

TUNEOCX.OCX 

tutorial books, MMC 

TUVEVEU.GIF.vbs 

twins 

TYPE command 

types, MIME 

typing 


Team-Fly    
Top

Категории