Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] tags HTML 2nd HTTP JavaScript Tamos Soft tape backups , restoring from TAR Task Manager Task Manager, Windows NT TASKMGR.SYS Taskpads taunting messages Tauscan Tck/Tk TCP/IP (Transmission Control Protocol/Internet Protocol) TCP/IP ports 137, 138, and 139 TCPView Pro Telecommando Trojan horse Telefonica virus Telfonica virus Telnet 2nd Telnet attacks TELNET.EXE templates, Microsoft Word Temporary Internet Files folder Tequila virus Termite virus text editors, viewing macro viruses with text-to-GUI transition, boot process Thawte The Invasor Trojan horse The Prayer Trojan horse 2nd The Spy Trojan horse The Thing 2nd The thing Trojan horse tHing Trojan horse third-party cookies ThisDocument object Thorin virus threat hoax emails throttling, antivirus software Tiananmen Square massacre 2nd timestamping timestamps, checking Tiny Telnet Server Trojan horse Tiny-32 virus TLS (Transport Layer Security) toolbars , repairing ToolsMacro macro Total Conventional Memory Total Eclypse Trojan horse Transcout Trojan horse Transmission Control Protocol/Internet Protocol [See TCP/IP] Transport Layer Security (TLS) transport plug-ins Trend Micro 2nd 3rd trends, computing Trin00 Flood attack program Trin00 Flood Trojan horse Triple-DES communication encryption Triplicate virus TRO prefix (Trojan) Trojan Cow Trojan horse trojan horses 2nd Trojan horses audio and video capture Back Orifice backdoor programs binders browsers compressors denial of service (DoS) attacks detecting direct action distributed attacks ExplorerZip HAPPY.EXE history of implementation of IRC keyloggers network redirection password stealers phone dialing PHP PICTURE.EXE port mapping port scanning PrettyPark preventing Qaz remote administration Trojan (RAT) removing script source code, hiding as stealth sweep lists symptoms of viruses, compared to well-known ports worms, compared to Trojan prefix (TRO) Trojan Spirit 2001 Trojan horse Trojans that steal passwords prefix (PWSTEAL) trust relationships, viewing trust, digital certificates trusted authors trusted code trusted computer programs trusted publishers trusted root authority Trusted Root Certification Authorities Trusted Sites security zone trusted sources TUNEOCX.OCX tutorial books, MMC TUVEVEU.GIF.vbs twins TYPE command types, MIME typing |
Team-Fly |
Top |