B

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Babylonia virus 
Back Orifice 
Back Orifice 2000 trojan 
Back Orifice Trojan horse  2nd  3rd 
BackConstruction 1.2 Trojan horse 
backdoor programs 
BackDoor Trojan horse 
Backdoor-G Trojan horse 
backdoors 
BackOffice Resource Kit 4.0 
BackOrifice Trojan horse 
Backup System State Data feature, NT 2000 
backups , system 
BadTimes virus hoax 
BankOne 
Barclays  2nd 
base64 encoding 
Basic 
BAT prefix (malicious mobile code written in DOS batch file language) 
Bat.Chode worm 
batch files 
BattlePong Trojan horse 
BBN SafeKeyper 
BeanHive virus 
BigGluck Trojan horse 
binders 
BIOS interrupt routines 
BitchX 
Bla Trojan horse 
Black Baron 
BlackICE Defender 
BladeRunner Trojan horse 
blank filenames 
Bloody virus 
Bloody! virus 
Blue Screen of Death (BSOD) 
BO jammerkillahV Trojan horse 
BO Trojan horse 
BO2K virus 
Bolzano virus 
bontchev.net 
boot floppies 
Boot prefix (DOS boot virus) 
boot problems, Windows viruses 
boot section, SYSTEM.INI file 
boot sectors, scanning 
boot viruses
    dropper programs 
    floppy diskettes 
    hard disks 
    interrupt 13h 
    master boot record 
    multipartite 
    removing 
booting, Windows platforms 
BOOTLOG.TXT  2nd 
BOOTSECT.DOS 
bots  2nd 
bots, IRC 
BOWhack Trojan horse 
Boza virus 
Brain 
Brain virus  2nd  3rd 
Brooke, O•Neil 
browser attacks
    Active Desktop 
    application monitors  
    cached data bugs  
    Cascading style sheets redirects 
    cookie exploits 
    detecting 
    dotless IP address exploit 
    eBayla virus 
    file upload forms 
     frames  
    Hotmail password exploit 
    HTA (HTML application) 
    HTML.Internal 
    ImportExportFavorites exploit 
    JavaScript redirect 
    Microsoft Office 2000 
    Microsoft PowerPoint 
    Office HTML Script vulnerability 
    PHP viruses and Trojan horses 
    preventing 
    print templates 
    redirection 
    removing malicious files 
    Russian New Year exploit 
    shared postings 
    Telnet 
    Trojan horses 
    viruses 
    web bugs 
    web spoofing 
    Windows Media Player 
    XML redirect 
browsers
    Active Desktop 
    antivirus scanners  
    ASP vulnerabilties 
    AutoComplete feature 
    caching 
    Cascading style sheets 
    cookies  2nd 
    DHTML (Dynamic HTML) 
    e-banking 
    exploiting HTML 
    frames 
    history file 
    HTA (HTML Application) 
    HTML (Hypertext Markup Language) 
    HTTP (Hypertext Transfer Protocol) 
    HTTPS (Secure Hypertext Transfer Protocol) 
    Internet Explorer Administration Kit 
    Java 
    JavaScript 
    JScript 
    Microsoft Wallet 
    PHP 
    privacy 
    registry settings 
    remote scripting 
    security settings 
    security zones 
    skins 
    SSL (Secure Sockets Layer) 
    TLS (Transport Layer Security) 
    URL (Universal Resource Locator) 
    VBScript 
    versions 
    vulnerability to attacks 
    XML (Extensible Markup Language) 
browsers, integrating into operating systems 
BSH 
BSOD (Blue Screen of Death) 
Bubbleboy virus 
BubbleBoy worm 
buddy lists  2nd 
buffer overflow attacks 
buffer overflows 
Bugs Trojan horse 
bulletin boards  
Burger, Ralf 
bus 
business memos 
busters 
butt plugs 
Butt Trumpet plug-in 
Bymer worm 
bypassing Automacros 
Byte Code Verifier, Java 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net