Flylib.com
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176
Authors:
Roger A. Grimes
BUY ON AMAZON
Malicious Mobile Code: Virus Protection for Windows
Copyright
Preface
About This Book
Why Another Book on Viruses?
What This Book Doesn t Cover
Organization of the Book
Conventions Used in This Book
Software Covered in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction
1.1 The Hunt
1.2 What Is Malicious Mobile Code?
1.3 Malicious Code and the Law
1.4 Malicious Code-Writing Subculture
1.5 MMC Terminology
1.6 Summary
Chapter 2. DOS Computer Viruses
2.1 Introduction
2.2 DOS Technologies
2.3 DOS Virus Technologies
2.4 Types of DOS Viruses
2.5 Virus Defense Mechanisms
2.6 Examples of DOS Viruses
2.7 Detecting a DOS-Based Computer Virus
2.8 Removing a DOS Virus
2.9 Protecting Yourself from Viruses
2.10 Risk Assessment -- Low
2.11 Summary
Chapter 3. Windows Technologies
3.1 Windows Technologies
3.2 New Windows Versions
3.3 Summary
Chapter 4. Viruses in a Windows World
4.1 DOS Viruses on Windows Platforms
4.2 Windows Viruses on Windows Platforms
4.3 Signs and Symptoms of Windows NT Virus Infections
4.4 Windows Virus Examples
4.5 Detecting a Windows Virus
4.6 Removing Viruses
4.7 Removing Infected Files
4.8 Preventing Viruses in Windows
4.9 Future
4.10 Risk Assessment -- Medium
4.11 Summary
Chapter 5. Macro Viruses
5.1 Microsoft Office Version Numbers
5.2 What Is a Macro Virus?
5.3 Microsoft Word and Excel Macros
5.4 Working with Macros
5.5 Office 2000 Security
5.6 Macro Virus Technologies
5.7 Macro Virus Examples
5.8 Detecting Macro Viruses
5.9 Removing Macro Viruses and Repairing the Damage
5.10 Preventing Macro Viruses
5.11 Risk Assessment -- High
5.12 Summary
Chapter 6. Trojans and Worms
6.1 The Threat
6.2 What Are Trojan Horses and Worms?
6.3 Signs and Symptoms
6.4 Types of Trojans
MalwareH2 P class
6.6 Becoming Familiar with Your PC
6.7 Trojan and Worm Examples
6.8. Detecting and Removing Trojansand Worms
6.9 Preventing Trojans and Worms
6.10 Risk Assessment -- High
6.11 Summary
Chapter 7. Instant Messaging Attacks
7.1 Introduction to Instant Messaging
7.2 Types of Instant Messaging
7.3 Introduction to Internet Relay Chat
7.4 Hacking Instant Messaging
7.6 Detecting Malicious IM
7.7 Removing Malicious IM
7.8 Protecting Yourself from IM Attacks
7.9 Risk Assessment -- Medium
7.10 Summary
Chapter 8. Internet Browser Technologies
8.1 Introduction
8.2 Browser Technologies
8.3 Web Languages
8.4 Other Browser Technologies
8.5 When to Worry About Browser Content
8.6 Summary
Chapter 9. Internet Browser Attacks
9.1 Browser-Based Exploits
9.2 Examples of Attacks and Exploits
9.3 Detecting Internet Browser Attacks
9.4 Removing and Repairing the Damage
9.5 Preventing Internet Browser Attacks
9.6 Risk Assessment -- Medium
9.7 Summary
Chapter 10. Malicious Java Applets
10.1 Java
10.2 Java Security
10.3 Java Exploits
10.4 Example Java Exploits
10.5 Detecting Malicious Java Applets
10.6 Removing Malicious Java Code
10.7 Protecting Yourself from Malicious Java Code
10.8 Risk Assessment -- Low
10.9 Summary
Chapter 11. Malicious ActiveX Controls
11.1 ActiveX
11.2 ActiveX Security
11.3 ActiveX Security Criticisms
11.4 Malicious ActiveX Examples
11.5 Detecting Malicious ActiveX Controls
11.6 Removing and Preventing Malicious Active Controls
11.7 Risk Assessment -- Medium
11.8 Summary
Chapter 12. Email Attacks
12.1 Introduction
12.2 Email Programs
12.3 Email Exploits
12.4 Detecting Email Attacks
12.5 Removing Infected Email
12.6 Preventing Email Attacks
12.7 Risk Assessment -- High
12.8 Summary
Chapter 13. Hoax Viruses
13.1 The Mother of All Computer Viruses
13.2 Categories of Hoax Messages
13.3 Detection
13.4 Removing and Preventing Hoax Viruses
13.5 Risk Assessment -- Low
13.6 Summary
Chapter 14. Defense
14.1 Defense Strategy
14.2 Malicious Mobile Code Defense Plan
14.3 Use a Good Antivirus Scanner
14.4 Antivirus Scanning Locations
14.5 The Best Steps Toward Securing Any Windows PC
14.6 Additional Defense Tools
14.7 Antivirus Product Review
14.8 Future
14.9 Summary
Chapter 15. The Future
15.1 The Future of Computing
15.2 MMC Exploits
15.3 Real Defense Solutions
15.4 Summary
Colophon
INDEX
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176
Authors:
Roger A. Grimes
BUY ON AMAZON
Software Configuration Management
The DoD CM Process Model
A Practical Approach to Documentation and Configuration Status Accounting
A Practical Approach to Configuration Verification and Audit
Configuration Management and Data Management
Appendix P Project Statement of Work
FileMaker Pro 8: The Missing Manual
Setting up Field Controls
Format the Number/Date/Time/Graphic
Creating a Relational Database
Text Parsing Calculations
The Importance of the Layout
SQL Hacks
Hack 6. Dont Perform the Same Calculation Over and Over
Hack 12. Simplify Complicated Updates
Number Crunching
Hack 96. Create an Audit Trail
Hack 98. Find and Stop Long-Running Queries
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
The Routers Configuration
Cable
Peer Groups
Basic Switch Configuration
ping
Ruby Cookbook (Cookbooks (OReilly))
Checking a Credit Card Checksum
Graphing Data
Automatically Sending Error Messages to Your Email
Automatically Generating Documentation
Multitasking and Multithreading
802.11 Wireless Networks: The Definitive Guide, Second Edition
Wired Equivalent Privacy (WEP)
Physical-Layer Architecture
Gaussian Frequency Shift Keying (GFSK)
Power over Ethernet (PoE)
Network Analyzers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies