Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Acceptable Use policy Access Controller, Java Access macro virus prefix (AM) ACPI (Advanced Configuration and Power Interface) Active Content Active Desktop 2nd 3rd Active Directory service Active Server Pages (ASP) Active Stream Redirector (ASX) ActiveDeskopMover ActiveX .OCX file extension Authenticode 2nd browser security buffer overflows cabinet archival files certificate authorities certificate revocation certificates class ID controls detecting malicious controls DHTML Edit control vulnerability digital fingerprint digital signing downloading components encryption Exploder Eyedog granularity, lack of hashing help desk controls history HTML example InfoSpace Compromise inspecting certificates Java, compared to kill bit flag Norton Utilities OUACTRL.OCX public key cryptography Quicken exploit removing malicious controls removing unnecesary controls Runner Safe for Initialization Safe for Scripting 2nd safe for scripting, marking controls as sandbox, lack of scripting Scriptlet.typlib security Setup control Setup Install control SYSMON.OCX tampering, inability to prevent Taskpads trust trusted users weak revocation add-ins address books Administrative Tools Administrator account Adobe Acrobat Reader Adobe Acrobat Reader documents Adobe Reader Advance Power Management feature, BIOS Advanced Configuration and Power Interface (ACPI) Advanced Security Control agents [See bots] Agnitum AIM (AOL Instant Messenger) 2nd AIMSpy Trojan horse Aircop virus alt.comp.virus AM prefix (Access macro virus) Amazon Ambush Trojan horse annoyance anonymity, email and Anthrax virus antibiotic programs AntiEXE virus antimalicious mobile code organizations antitrust case, Microsoft antivirus (AV) programs Antivirus for Firewalls AntiVirus Research Center antivirus scanners archived files browser security cleaning rate compressors customization decryption desktop disabling email capabilities email servers entry point changers executing file servers firewalls gateways heuristics history importance of 2nd Internet-based Java logging McAfee notification platforms polymorphism proactive research recursive scanning rescue diskette routers scheduling speed and reliability stability technical support transparency Trojan horses udpates, automated Windows viruses 2nd AOL AOL Instant Messenger (AIM) 2nd AOL prefix (America Online-specific malicious mobile code) AOLTrojan 1.1 Trojan horse API (Application Programming Interface) 32-bit modes dynamic linking libraries Win32 API appending viruses Apple AppletKiller appliance computing Application log application monitors Application Programming Interface [See API] application service provider (ASP) 2nd Appworx Inc. archive file types archived files archives, Java ARJ archive files armored virus ASHIELD ASP (Active Server Pages) ASP (application service provider) assembly language 2nd 3rd ASX (Active Stream Redirector) asymmetric key pair AT.EXE Attack FTP Trojan horse audio and video capture 2nd auditing feature, Windows NT Aureate Media Corp Authenticode 2nd 3rd 4th 5th Auto_Close macro Auto_Open macro 2nd AutoCAD 2nd AUTOCHECK.EXE AutoClose macro 2nd AutoComplete AutoComplete, browsers AutoExec macro AUTOEXEC.BAT 2nd 3rd 4th 5th 6th 7th AUTOEXEC.NT AutoExit macro automated bots AutoNew macro AutoOpen macro AV (antivirus) programs avatars AVBOOT AWSPS (Portuguese Atelier Web Security Port Scanner) Axent |
Team-Fly |
Top |