A

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Acceptable Use policy 
Access Controller, Java 
Access macro virus prefix (AM) 
ACPI (Advanced Configuration and Power Interface) 
Active Content 
Active Desktop  2nd  3rd 
Active Directory service 
Active Server Pages (ASP) 
Active Stream Redirector (ASX) 
ActiveDeskopMover 
ActiveX 
    .OCX file extension 
    Authenticode  2nd 
    browser security 
    buffer overflows 
    cabinet archival files 
    certificate authorities 
    certificate revocation 
    certificates 
    class ID 
    controls 
    detecting malicious controls 
    DHTML Edit control vulnerability 
    digital fingerprint  
    digital signing 
    downloading components  
    encryption 
    Exploder 
    Eyedog 
    granularity, lack of 
    hashing 
    help desk controls 
    history 
    HTML example 
    InfoSpace Compromise 
    inspecting certificates 
    Java, compared to 
    kill bit flag 
    Norton Utilities 
    OUACTRL.OCX 
    public key cryptography 
    Quicken exploit 
    removing malicious controls 
    removing unnecesary controls 
    Runner 
    Safe for Initialization 
    Safe for Scripting  2nd 
    safe for scripting, marking controls as 
    sandbox, lack of 
    scripting 
    Scriptlet.typlib 
    security 
    Setup control 
    Setup Install control 
    SYSMON.OCX 
    tampering, inability to prevent 
    Taskpads 
    trust 
    trusted users 
    weak revocation 
add-ins 
address books 
Administrative Tools 
Administrator account 
Adobe Acrobat Reader 
Adobe Acrobat Reader documents 
Adobe Reader 
Advance Power Management feature, BIOS 
Advanced Configuration and Power Interface (ACPI) 
Advanced Security Control 
agents   [See bots]
Agnitum 
AIM (AOL Instant Messenger)  2nd 
AIMSpy Trojan horse 
Aircop virus 
alt.comp.virus 
AM prefix (Access macro virus) 
Amazon 
Ambush Trojan horse 
annoyance 
anonymity, email and 
Anthrax virus 
antibiotic programs 
AntiEXE virus 
antimalicious mobile code organizations 
antitrust case, Microsoft 
antivirus (AV) programs 
Antivirus for Firewalls 
AntiVirus Research Center 
antivirus scanners
    archived files 
    browser security 
    cleaning rate 
    compressors 
    customization 
    decryption 
    desktop 
    disabling 
    email capabilities 
    email servers 
    entry point changers 
    executing 
    file servers 
    firewalls 
    gateways 
    heuristics 
    history 
    importance of  2nd 
    Internet-based 
    Java 
    logging 
    McAfee 
    notification 
    platforms 
    polymorphism 
    proactive research 
    recursive scanning 
    rescue diskette 
    routers 
    scheduling 
    speed and reliability 
    stability 
    technical support 
    transparency 
    Trojan horses 
    udpates, automated 
    Windows viruses  2nd 
AOL 
AOL Instant Messenger (AIM)  2nd 
AOL prefix (America Online-specific malicious mobile code) 
AOLTrojan 1.1 Trojan horse 
API (Application Programming Interface)
    32-bit modes 
    dynamic linking libraries 
    Win32 API 
appending viruses 
Apple 
AppletKiller 
appliance computing 
Application log 
application monitors  
Application Programming Interface  [See API]
application service provider (ASP)  2nd 
Appworx Inc. 
archive file types 
archived files 
archives, Java 
ARJ archive files 
armored virus 
ASHIELD 
ASP (Active Server Pages) 
ASP (application service provider) 
assembly language  2nd  3rd 
ASX (Active Stream Redirector) 
asymmetric key pair 
AT.EXE 
Attack FTP Trojan horse 
audio and video capture  2nd 
auditing feature, Windows NT 
Aureate Media Corp 
Authenticode  2nd  3rd  4th  5th 
Auto_Close macro 
Auto_Open macro  2nd 
AutoCAD  2nd 
AUTOCHECK.EXE 
AutoClose macro  2nd 
AutoComplete 
AutoComplete, browsers 
AutoExec macro 
AUTOEXEC.BAT  2nd  3rd  4th  5th  6th  7th 
AUTOEXEC.NT 
AutoExit macro 
automated bots 
AutoNew macro 
AutoOpen macro 
AV (antivirus) programs 
avatars 
AVBOOT 
AWSPS (Portuguese Atelier Web Security Port Scanner) 
Axent 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net