Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] C language C++ 2nd C-Sharp (C#) CA (Certificate Authority) Cabanas virus cabinet archival files (.CAB) cache, vulnerability of cached data bugs caching, browsers Caligula MS Word macro virus Caligula virus Canalisation3D.SCR Cap macro virus Cap virus capitalization, use of in hoax email Carnegie Mellon Carnivore CARO (Computer Antivirus Researchers Organization) naming conventions Carzy virus Cascade virus 2nd Cascading style sheets 2nd CAST-256 encryption cavity viruses CCIAPI (Common Content Inspection Application Programming Interface) CCITT X.509 CD-ROM CD10 virus CDBRK.VXD CDO (collaboration data objects) Cell Phone virus hoax cell phones central processing unit (CPU) CERT CERT (Computer Emergency Response Team) 2nd 3rd Certificate Authority (CA) Certificate Manager Export wizard certificates certificates, digital Cervenka, Tom CGI (Common Gateway Interface) chain letter emails channel desyncs channel op Channel Registration Service (Chanserv) channel takeover, IRC chat [See IM] chat channels CHAT command, DCC ChatMan ChatWeb Check Point 2nd check_files virus macro checksum algorithm checksums versus scan strings CHKDSK.EXE 2nd Chode worm Chupacabra Trojan horse CIAC (Computer Incident Advisory Capability) 2nd 3rd CIH virus 2nd cipher routines Cisco Class 2 Digital IDs Class 3 Commercial Software Publisher Digital ID class ID (CLSID) Class Loader, Java class module viruses CLASSID CLASSPATH, Java 2nd cleaning rate, antivirus scanners CLEANUP.REG Client-to-Client Protocol (CTCP) client/server email Clinton virus hoax Clone CLSID CLSID (class ID) cluster viruses CMC (common messaging calls) Cmdr Bomber virus CMOS memory CO (Corporate Administrator) code integrity checkers (CRC) code segment instruction pointer (CS\:IP) Code Signing Code Store Database registry key CODEBASE Codebreaker group Cohen, Dr. Frederick 2nd cold boot 2nd collaboration data objects (CDO) Colors virus 2nd Coma Trojan horse command interpreters command line switches Command Software COMMAND.COM 2nd 3rd 4th 5th 6th commercial antivirus researchers Common Content Inspection API Common Content Inspection Application Programming Interface (CCIAPI) Common Gateway Interface (CGI) common messaging calls (CMC) companion viruses Compaq Presario Compiled Help Vulnerability Compiled HTML Help files complete system compromise 2nd compressors Computer Antivirus Researchers Organization (CARO) naming conventions Computer Associates Computer Associates• InoculateIT Antivirus AVBoot Version 1.1 Computer Chaos Club 2nd Computer Emergency Response Team (CERT) Computer Incident Advisory Capability (CIAC) Computer Misuse Act of 1990, United Kingdom Computer Security Defense Plan Computer Virus Myths home page 2nd Computer Virus Prevalence Survey Computer Virus Prevalence Survey 2000 Concept macro virus Concept virus 2nd 3rd confidential information, inadvertent release of CONFIG.NT CONFIG.SYS 2nd 3rd 4th 5th 6th 7th 8th connection-oriented protocols connectionless protocols construction kits 2nd construction kits, macro viruses consumer preferences, tracking Content Vectoring Protocol (CVP) contests, MMC ControlSet001 ControlSet002 cookie hijacking cookies 2nd coordinated denial of service attacks coprocessing viruses Corel Draw 2nd Corel Script 2nd covert hack attacks CPU (central processing unit) CRC (code integrity checkers) creation date credit cards, stolen Critical Path Cross Infection Tutorial for Office 97 cross-referencing virus names Crunch CRYPTEXT.DLL crypto box Crypto virus CS\:IP (code segment insruction pointer) CSCRIPT.EXE 2nd 3rd 4th CSH CTCP (Client-to-Client Protocol) CTCP flood Ctrl+Alt+Del Ctrl-Alt-Del 2nd Cult of the Dead Cow Cunning virus CurrentControlSet CurrentControlSet registry key Custom Installation Wizard Cutler, David CVP (Content Vectoring Protocol) CyberCop Scanner |
Team-Fly |
Top |