MAC. See Media Access Control
MACLs. See mandatory access control lists
Mail. See e-mail; Windows Mail
malicious code, 524. See also information security
three-step approach for management of, 524-525
malicious exploitation techniques, 43-60
malicious file attachments, 58, 351-384. See also e-mail
file extension tricks, 380-381
number of, 352
table list
details of file type, 352-379
file extension, 352-379
file type, 352-379
risk level, 352-379
Malicious Software Removal Tool (MSRT), 13-14, 225-229
command-line switches, 228
download, 227
malware, automated, 4, 62-71, 225. See also adware; bot(s); client protection; hacker(s); information security; spyware; Trojans; viruses; Windows Defender; worms
anti-, 524, 531-532
Microsoft and, 239-240
bootable, 76
business v. home computer attacks, 520
criminal gain through, 64, 70, 71
defense, 241, 520
e-mail defense against, 398
hybrid, 63
IE and, 253-254, 289
intentions of, 64, 70, 71, 520
locations modified by, 65-70
application areas, 66
file areas, 66
folder areas, 67
other, 67
registry keys, 67-70
PM's impact on, 253-254
removal procedures, 71
as side-effect install, 240
types, 62-70
UAC and, 122, 123, 158, 169
wireless networks and, 474-475
mandatory access control lists (MACLs), 173. See also access control lists
definition, 173
mandatory integrity controls (MICs), 22-23, 116, 146. See also integrity controls
man-in-the-middle (MitM) attacks, 27, 50, 57
Margosis, Aaron, 128
Master Boot Record (MBR), 74, 75
MBR. See Master Boot Record
Media Access Control (MAC) addresses, 478
media devices, controlled, 19, 525
Message Integrity Code (MIC), 466
Metasploit Framework (MSF), 53, 57
web interface, 53
MIC. See Message Integrity Code
Microsoft, anti-malware and, 239-240
Microsoft Desktop Optimization Pack (MSDOP), 221-222
technologies, 221-222
Web information on, 222
Microsoft Management Console (MMC), 486
Microsoft Security Web Site, 230
Quick Link, 230
Microsoft Windows Internals, Fourth Edition (Russinovich, Solomon), 73
MICs. See mandatory integrity controls
Milw0rm Web site, 52
MIME type identifier, 105
MIMO. See Multimedia In Multimedia Out
Miscellaneous (security zone setting), 270-275, 279-281. See also specific settings
misconfiguration, 56
application, 56-57
OS, 56-57
MitM attacks. See man-in-the-middle attacks
mixed/down-level environment, Windows Firewall and, 438-442
MLGPOs. See multiple local Group Policy objects
Mlink.exe utility, 23
MMC. See Microsoft Management Console
"Modify an object label," 141
Moskowitz, Jeremy, 485, 518
Mozilla Firefox, 245, 246
security of, 246
vulnerabilities v. market share, 247
Msascui.exe, 233
MSDOP. See Microsoft Desktop Optimization Pack
MSF. See Metasploit Framework
Msmpeng.exe, 233
MSN Explorer, 214
MSRT. See Malicious Software Removal Tool
Multimedia In Multimedia Out (MIMO), 464
multiple local Group Policy objects (MLGPOs), 486-491. See also Group Policy
in domain environment, 491
precedence, 489-491
Web information on, 491