Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] J2ME (Java2 Micro Edition) Jabber Jammer JAR (Java Archive) Jar Signing Java Access Controller ActiveX, compared to antivirus scanners applets versus applications archives BeanHive virus browsers byte code Byte Code Verifier Class Loader CLASSPATH 2nd customizing permissions detecting malicious applets DigiCrime disabling DNS Spoofing exploits firewalls history hoax bombs Hostile Thread applet Internet Explorer security zones Just-In-Time (JIT) compiler JVM security holes name spaces NoisyBear applet plug-ins removing malicious code sandbox 2nd 3rd 4th scratch pad Security Manager 2nd source code example Strange Brew virus Verifier vulnerability Java applets Java Archive (JAR) Java Development Kit (JDK) Java prefix (malicious mobile code written in Java) Java runtime environment Java Software Division, Sun Microsystems Java Virtual Machine (JVM) Java2 Micro Edition (J2ME) JAVALOG.TXT JavaScript 2nd 3rd JavaScript virus or worm prefix (JS) JavaSoft JDK (Java Development Kit) Jerusalem virus 2nd Jerusalem.1808.Apocalypse Jet database engine Jini JIT (Just-In-Time) compiler JOIN command, IRC Joint Photographic Experts Group (JPEG) joke programs Joshi virus 2nd JPEG (Joint Photographic Experts Group) JS prefix (JavaScript virus or worm prefix) JS.KAK 2nd jump instructions Just-In-Time (JIT) compiler JVM (Java Virtual Machine) |
Team-Fly |
Top |