Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] F-Secure 2nd fake news reports false- negatives , virus scanner reports false-positive false-positive, virus scanner reports Family name , CARO naming convention Farmer, Dan 2nd FAT (file allocation table) 2nd FAT16 FAT32 FAT32EBD.EXE Fatal System Stop Errors fax cover letters FBI (Federal Bureau of Investigation) 2nd 3rd 4th FBI Secret virus FDISK FDISK.EXE 2nd Federal Bureau of Investigaion (FBI) Federal Bureau of Investigation (FBI) Federal Computer Abuse Act (1994) Federal Trade Commission Federal Trade Commission (FTC) file allocation table (FAT) file associations, changing file caching file compression file corruption problems file dates, checking file downloads file extensions file extensions, DOS defaults File Find feature File Find instruction file I/O operations file infections file protection (xFP) file sharing File Signature Verification file storage systems file streams file transfer protocol (FTP) file transfers, malicious file type associations, Windows file types file upload forms file-copying subroutines file- infecting viruses appending cavity cluster companion overwriting prepending file-overwriting viruses FileClose macro FILELIST.XML 2nd Filemon FileNail Trojan horse FileSave macro FileSystemObject 2nd FileSystemObject ActiveX control Finjan Software 2nd 3rd Firehotcker Trojan horse Firewall-1 2nd firewalls 2nd 3rd 4th 5th First Virginia Bank Fish virus FIX IE LOG.TXT FIX-CIH utility FIXBOOT FIXMBR Flip virus flooding floppy diskettes 2nd Flushot FOLDER.HTT 2nd Fono virus FONO98.VXD Fore Trojan horse form letters FORMAT FORMAT command FORMAT.COM FORMAT.EXE Fortezza frames frames, browser FreeBSD 2nd FreeBSDNet FreeLinks Friendly virus FrontPage FTC (Federal Trade Commission) FTP (file transfer protocol) FTP99CMP Trojan horse function identifiers FunLove virus future, malicious mobile code approved content authentication code auditing denial of service (DoS) attacks digital copiers government involvement hacktivism ISP scanning Linux viruses penalties for offenders popularity secure applications unauthorized code changes |
Team-Fly |
Top |