M


MAC. See Media Access Control

MACLs. See mandatory access control lists

Mail. See e-mail; Windows Mail

malicious code, 524. See also information security

three-step approach for management of, 524-525

malicious exploitation techniques, 43-60

malicious file attachments, 58, 351-384. See also e-mail

file extension tricks, 380-381

number of, 352

table list

details of file type, 352-379

file extension, 352-379

file type, 352-379

risk level, 352-379

Malicious Software Removal Tool (MSRT), 13-14, 225-229

command-line switches, 228

download, 227

malware, automated, 4, 62-71, 225. See also adware; bot(s); client protection; hacker(s); information security; spyware; Trojans; viruses; Windows Defender; worms

anti-, 524, 531-532

Microsoft and, 239-240

bootable, 76

business v. home computer attacks, 520

criminal gain through, 64, 70, 71

defense, 241, 520

e-mail defense against, 398

hybrid, 63

IE and, 253-254, 289

intentions of, 64, 70, 71, 520

locations modified by, 65-70

application areas, 66

file areas, 66

folder areas, 67

other, 67

registry keys, 67-70

PM's impact on, 253-254

removal procedures, 71

as side-effect install, 240

types, 62-70

UAC and, 122, 123, 158, 169

wireless networks and, 474-475

mandatory access control lists (MACLs), 173. See also access control lists

definition, 173

mandatory integrity controls (MICs), 22-23, 116, 146. See also integrity controls

man-in-the-middle (MitM) attacks, 27, 50, 57

Margosis, Aaron, 128

Master Boot Record (MBR), 74, 75

MBR. See Master Boot Record

Media Access Control (MAC) addresses, 478

media devices, controlled, 19, 525

Message Integrity Code (MIC), 466

Metasploit Framework (MSF), 53, 57

web interface, 53

MIC. See Message Integrity Code

Microsoft, anti-malware and, 239-240

Microsoft Desktop Optimization Pack (MSDOP), 221-222

technologies, 221-222

Web information on, 222

Microsoft Management Console (MMC), 486

Microsoft Security Web Site, 230

Quick Link, 230

Microsoft Windows Internals, Fourth Edition (Russinovich, Solomon), 73

MICs. See mandatory integrity controls

Milw0rm Web site, 52

MIME type identifier, 105

MIMO. See Multimedia In Multimedia Out

Miscellaneous (security zone setting), 270-275, 279-281. See also specific settings

misconfiguration, 56

application, 56-57

OS, 56-57

MitM attacks. See man-in-the-middle attacks

mixed/down-level environment, Windows Firewall and, 438-442

MLGPOs. See multiple local Group Policy objects

Mlink.exe utility, 23

MMC. See Microsoft Management Console

"Modify an object label," 141

Moskowitz, Jeremy, 485, 518

Mozilla Firefox, 245, 246

security of, 246

vulnerabilities v. market share, 247

Msascui.exe, 233

MSDOP. See Microsoft Desktop Optimization Pack

MSF. See Metasploit Framework

Msmpeng.exe, 233

MSN Explorer, 214

MSRT. See Malicious Software Removal Tool

Multimedia In Multimedia Out (MIMO), 464

multiple local Group Policy objects (MLGPOs), 486-491. See also Group Policy

in domain environment, 491

precedence, 489-491

Web information on, 491



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net