Malicious Mobile Code: Virus Protection for Windows |
By Roger A. Grimes |
| |
Publisher | : O'Reilly |
Pub Date | : August 2001 |
ISBN | : 1-56592-682-X |
Pages | : 542 |
| | | Copyright |
| | Preface |
| | | About This Book |
| | | Why Another Book on Viruses? |
| | | What This Book Doesn't Cover |
| | | Organization of the Book |
| | | Conventions Used in This Book |
| | | Software Covered in This Book |
| | | Comments and Questions |
| | | Acknowledgments |
|
| | Chapter 1. Introduction |
| | | Section 1.1. The Hunt |
| | | Section 1.2. What Is Malicious Mobile Code? |
| | | Section 1.3. Malicious Code and the Law |
| | | Section 1.4. Malicious Code-Writing Subculture |
| | | Section 1.5. MMC Terminology |
| | | Section 1.6. Summary |
|
| | Chapter 2. DOS Computer Viruses |
| | | Section 2.1. Introduction |
| | | Section 2.2. DOS Technologies |
| | | Section 2.3. DOS Virus Technologies |
| | | Section 2.4. Types of DOS Viruses |
| | | Section 2.5. Virus Defense Mechanisms |
| | | Section 2.6. Examples of DOS Viruses |
| | | Section 2.7. Detecting a DOS-Based Computer Virus |
| | | Section 2.8. Removing a DOS Virus |
| | | Section 2.9. Protecting Yourself from Viruses |
| | | Section 2.10. Risk Assessment -- Low |
| | | Section 2.11. Summary |
|
| | Chapter 3. Windows Technologies |
| | | Section 3.1. Windows Technologies |
| | | Section 3.2. New Windows Versions |
| | | Section 3.3. Summary |
|
| | Chapter 4. Viruses in a Windows World |
| | | Section 4.1. DOS Viruses on Windows Platforms |
| | | Section 4.2. Windows Viruses on Windows Platforms |
| | | Section 4.3. Signs and Symptoms of Windows NT Virus Infections |
| | | Section 4.4. Windows Virus Examples |
| | | Section 4.5. Detecting a Windows Virus |
| | | Section 4.6. Removing Viruses |
| | | Section 4.7. Removing Infected Files |
| | | Section 4.8. Preventing Viruses in Windows |
| | | Section 4.9. Future |
| | | Section 4.10. Risk Assessment -- Medium |
| | | Section 4.11. Summary |
|
| | Chapter 5. Macro Viruses |
| | | Section 5.1. Microsoft Office Version Numbers |
| | | Section 5.2. What Is a Macro Virus? |
| | | Section 5.3. Microsoft Word and Excel Macros |
| | | Section 5.4. Working with Macros |
| | | Section 5.5. Office 2000 Security |
| | | Section 5.6. Macro Virus Technologies |
| | | Section 5.7. Macro Virus Examples |
| | | Section 5.8. Detecting Macro Viruses |
| | | Section 5.9. Removing Macro Viruses and Repairing the Damage |
| | | Section 5.10. Preventing Macro Viruses |
| | | Section 5.11. Risk Assessment -- High |
| | | Section 5.12. Summary |
|
| | Chapter 6. Trojans and Worms |
| | | Section 6.1. The Threat |
| | | Section 6.2. What Are Trojan Horses and Worms? |
| | | Section 6.3. Signs and Symptoms |
| | | Section 6.4. Types of Trojans |
| | | Section 6.5. Trojan Technology |
| | | Section 6.6. Becoming Familiar with Your PC |
| | | Section 6.7. Trojan and Worm Examples |
| | | Section 6.8. Detecting and Removing Trojansand Worms |
| | | Section 6.9. Preventing Trojans and Worms |
| | | Section 6.10. Risk Assessment -- High |
| | | Section 6.11. Summary |
|
| | Chapter 7. Instant Messaging Attacks |
| | | Section 7.1. Introduction to Instant Messaging |
| | | Section 7.2. Types of Instant Messaging |
| | | Section 7.3. Introduction to Internet Relay Chat |
| | | Section 7.4. Hacking Instant Messaging |
| | | Section 7.5. Examples of IRC Attacks |
| | | Section 7.6. Detecting Malicious IM |
| | | Section 7.7. Removing Malicious IM |
| | | Section 7.8. Protecting Yourself from IM Attacks |
| | | Section 7.9. Risk Assessment -- Medium |
| | | Section 7.10. Summary |
|
| | Chapter 8. Internet Browser Technologies |
| | | Section 8.1. Introduction |
| | | Section 8.2. Browser Technologies |
| | | Section 8.3. Web Languages |
| | | Section 8.4. Other Browser Technologies |
| | | Section 8.5. When to Worry About Browser Content |
| | | Section 8.6. Summary |
|
| | Chapter 9. Internet Browser Attacks |
| | | Section 9.1. Browser-Based Exploits |
| | | Section 9.2. Examples of Attacks and Exploits |
| | | Section 9.3. Detecting Internet Browser Attacks |
| | | Section 9.4. Removing and Repairing the Damage |
| | | Section 9.5. Preventing Internet Browser Attacks |
| | | Section 9.6. Risk Assessment -- Medium |
| | | Section 9.7. Summary |
|
| | Chapter 10. Malicious Java Applets |
| | | Section 10.1. Java |
| | | Section 10.2. Java Security |
| | | Section 10.3. Java Exploits |
| | | Section 10.4. Example Java Exploits |
| | | Section 10.5. Detecting Malicious Java Applets |
| | | Section 10.6. Removing Malicious Java Code |
| | | Section 10.7. Protecting Yourself from Malicious Java Code |
| | | Section 10.8. Risk Assessment -- Low |
| | | Section 10.9. Summary |
|
| | Chapter 11. Malicious ActiveX Controls |
| | | Section 11.1. ActiveX |
| | | Section 11.2. ActiveX Security |
| | | Section 11.3. ActiveX Security Criticisms |
| | | Section 11.4. Malicious ActiveX Examples |
| | | Section 11.5. Detecting Malicious ActiveX Controls |
| | | Section 11.6. Removing and Preventing Malicious Active Controls |
| | | Section 11.7. Risk Assessment -- Medium |
| | | Section 11.8. Summary |
|
| | Chapter 12. Email Attacks |
| | | Section 12.1. Introduction |
| | | Section 12.2. Email Programs |
| | | Section 12.3. Email Exploits |
| | | Section 12.4. Detecting Email Attacks |
| | | Section 12.5. Removing Infected Email |
| | | Section 12.6. Preventing Email Attacks |
| | | Section 12.7. Risk Assessment -- High |
| | | Section 12.8. Summary |
|
| | Chapter 13. Hoax Viruses |
| | | Section 13.1. The Mother of All Computer Viruses |
| | | Section 13.2. Categories of Hoax Messages |
| | | Section 13.3. Detection |
| | | Section 13.4. Removing and Preventing Hoax Viruses |
| | | Section 13.5. Risk Assessment -- Low |
| | | Section 13.6. Summary |
|
| | Chapter 14. Defense |
| | | Section 14.1. Defense Strategy |
| | | Section 14.2. Malicious Mobile Code Defense Plan |
| | | Section 14.3. Use a Good Antivirus Scanner |
| | | Section 14.4. Antivirus Scanning Locations |
| | | Section 14.5. The Best Steps Toward Securing Any Windows PC |
| | | Section 14.6. Additional Defense Tools |
| | | Section 14.7. Antivirus Product Review |
| | | Section 14.8. Future |
| | | Section 14.9. Summary |
|
| | Chapter 15. The Future |
| | | Section 15.1. The Future of Computing |
| | | Section 15.2. MMC Exploits |
| | | Section 15.3. Real Defense Solutions |
| | | Section 15.4. Summary |
|
| | Colophon |
| | Index |