T

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

tags
    HTML  2nd 
    HTTP 
    JavaScript 
Tamos Soft 
tape backups , restoring from 
TAR 
Task Manager 
Task Manager, Windows NT 
TASKMGR.SYS 
Taskpads 
taunting messages 
Tauscan 
Tck/Tk 
TCP/IP (Transmission Control Protocol/Internet Protocol) 
TCP/IP ports 137, 138, and 139 
TCPView Pro 
Telecommando Trojan horse 
Telefonica virus 
Telfonica virus 
Telnet  2nd 
Telnet attacks 
TELNET.EXE 
templates, Microsoft Word 
Temporary Internet Files folder 
Tequila virus 
Termite virus 
text editors, viewing macro viruses with 
text-to-GUI transition, boot process 
Thawte 
The Invasor Trojan horse 
The Prayer Trojan horse  2nd 
The Spy Trojan horse 
The Thing  2nd 
The thing Trojan horse 
tHing Trojan horse 
third-party cookies 
ThisDocument object 
Thorin virus 
threat hoax emails 
throttling, antivirus software 
Tiananmen Square massacre  2nd 
timestamping 
timestamps, checking 
Tiny Telnet Server Trojan horse 
Tiny-32 virus 
TLS (Transport Layer Security) 
toolbars , repairing 
ToolsMacro macro 
Total Conventional Memory 
Total Eclypse Trojan horse 
Transcout Trojan horse 
Transmission Control Protocol/Internet Protocol  [See TCP/IP]
Transport Layer Security (TLS) 
transport plug-ins 
Trend Micro  2nd  3rd 
trends, computing 
Trin00 Flood attack program 
Trin00 Flood Trojan horse 
Triple-DES communication encryption 
Triplicate virus 
TRO prefix (Trojan) 
Trojan Cow Trojan horse 
trojan horses  2nd 
Trojan horses
    audio and video capture 
    Back Orifice 
    backdoor programs 
    binders 
    browsers 
    compressors 
    denial of service (DoS) attacks 
    detecting 
    direct action 
    distributed attacks 
    ExplorerZip 
    HAPPY.EXE 
    history of 
    implementation of 
    IRC 
    keyloggers 
    network redirection 
    password stealers 
    phone dialing 
    PHP 
    PICTURE.EXE 
    port mapping 
    port scanning 
    PrettyPark 
    preventing 
    Qaz 
    remote administration Trojan (RAT) 
    removing 
    script 
    source code, hiding as 
    stealth 
    sweep lists 
    symptoms of 
    viruses, compared to 
    well-known ports 
    worms, compared to 
Trojan prefix (TRO) 
Trojan Spirit 2001 Trojan horse 
Trojans that steal passwords prefix (PWSTEAL) 
trust relationships, viewing 
trust, digital certificates 
trusted authors 
trusted code 
trusted computer programs 
trusted publishers 
trusted root authority 
Trusted Root Certification Authorities 
Trusted Sites security zone 
trusted sources 
TUNEOCX.OCX 
tutorial books, MMC 
TUVEVEU.GIF.vbs 
twins 
TYPE command 
types, MIME 
typing 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net