Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] radio channels RAM (random access memory) random access memory [See RAM] random evolution viruses random execution random numbers , encryption Rapid Response Plan damage, assessing eradication plan, implementing facts, collecting initial alert, reporting to team public relations impact, determining reoccurrence, planning for spread, minimizing users, notifying Raptor Firewall RAT (remot administration Trojan) RB000.CAB RDISK.EXE 2nd read-only memory basic input/output system [See ROM BIOS] real mode 2nd Real Network 2nd Real Player Recently Used File List Recovery Console recursive scanning Recycle Bin 2nd 3rd Red Cross virus redirection 2nd reformatting disks REG.DAT REGBACK.EXE REGEDIT REGEDIT.EXE 2nd REGEDT32.EXE 2nd Register.ID vulnerability RegisterServiceProcess registration database registry repairing Registry Checker utility Registry Entry files registry file registry permissions Regmon RegObj Reinstall Office option relay servers, email Rembomb Trojan horse remote access trojans remote administration Trojan (RAT) remote control programs Remote Explorer registry key Remote Explorer virus Remote Grab Trojan horse remote scripting Remote Windows Shutdown Trojan horse REMOTE.INI removing viruses booting with clean DOS diskettes in-use file replacement infected files, replacing registry restoration researching viruses startup programs virus services,disabling renaming system executables Repair Office option Repair Tool research-only malicious code researching viruses resource sharing 2nd Restricted Sites security zone revocation, digital certificates RFC 2426 rich text file (RTF) ring 0 rings RingZeroTrojan horse Rip Ripper virus risk assessment ActiveX browsers DOS viruses IM attacks Java macro viruses Trojan horses Windows viruses RJCrush RMDIR command RoboHack Trojan horse rogue programs 2nd rogue UDP packets ROM BIOS ROM BIOS (read-only memory basic input/output system) 2nd 3rd Rosenberg, Rob routers RSA Data Security, Inc. Run As feature Run registry key RUN= statement 2nd Runner RunOnce registry key RunOnceEx registry key RunServices registry key RunServicesOnce registry key Russian New Year exploit |
Team-Fly |
Top |