C

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C language 
C++  2nd 
C-Sharp (C#) 
CA (Certificate Authority) 
Cabanas virus 
cabinet archival files (.CAB) 
cache, vulnerability of 
cached data bugs  
caching, browsers 
Caligula MS Word macro virus 
Caligula virus 
Canalisation3D.SCR 
Cap macro virus 
Cap virus 
capitalization, use of in hoax email 
Carnegie Mellon 
Carnivore 
CARO (Computer Antivirus Researchers Organization) naming conventions 
Carzy virus 
Cascade virus  2nd 
Cascading style sheets  2nd 
CAST-256 encryption 
cavity viruses 
CCIAPI (Common Content Inspection Application Programming Interface) 
CCITT X.509 
CD-ROM 
CD10 virus 
CDBRK.VXD 
CDO (collaboration data objects) 
Cell Phone virus hoax 
cell phones 
central processing unit (CPU) 
CERT 
CERT (Computer Emergency Response Team)  2nd  3rd 
Certificate Authority (CA) 
Certificate Manager Export wizard 
certificates 
certificates, digital 
Cervenka, Tom 
CGI (Common Gateway Interface) 
chain letter emails 
channel desyncs 
channel op 
Channel Registration Service (Chanserv) 
channel takeover, IRC 
chat  [See IM]
chat channels 
CHAT command, DCC 
ChatMan 
ChatWeb 
Check Point  2nd 
check_files virus macro 
checksum algorithm 
checksums versus scan strings 
CHKDSK.EXE  2nd 
Chode worm 
Chupacabra Trojan horse 
CIAC (Computer Incident Advisory Capability)  2nd  3rd 
CIH virus  2nd 
cipher routines 
Cisco 
Class 2 Digital IDs 
Class 3 Commercial Software Publisher Digital ID 
class ID (CLSID) 
Class Loader, Java 
class module viruses 
CLASSID 
CLASSPATH, Java  2nd 
cleaning rate, antivirus scanners  
CLEANUP.REG 
Client-to-Client Protocol (CTCP) 
client/server email 
Clinton virus hoax 
Clone 
CLSID 
CLSID (class ID) 
cluster viruses 
CMC (common messaging calls) 
Cmdr Bomber virus 
CMOS memory 
CO (Corporate Administrator) 
code integrity checkers (CRC) 
code segment instruction pointer (CS\:IP) 
Code Signing 
Code Store Database registry key 
CODEBASE 
Codebreaker group  
Cohen, Dr. Frederick  2nd 
cold boot  2nd 
collaboration data objects (CDO) 
Colors virus  2nd 
Coma Trojan horse 
command interpreters 
command line switches 
Command Software 
COMMAND.COM  2nd  3rd  4th  5th  6th 
commercial antivirus researchers 
Common Content Inspection API 
Common Content Inspection Application Programming Interface (CCIAPI) 
Common Gateway Interface (CGI) 
common messaging calls (CMC) 
companion viruses 
Compaq Presario 
Compiled Help Vulnerability 
Compiled HTML Help files 
complete system compromise  2nd 
compressors 
Computer Antivirus Researchers Organization (CARO) naming conventions 
Computer Associates 
Computer Associates• InoculateIT Antivirus AVBoot Version 1.1 
Computer Chaos Club  2nd 
Computer Emergency Response Team (CERT) 
Computer Incident Advisory Capability (CIAC) 
Computer Misuse Act of 1990, United Kingdom 
Computer Security Defense Plan 
Computer Virus Myths home page  2nd 
Computer Virus Prevalence Survey 
Computer Virus Prevalence Survey 2000 
Concept macro virus 
Concept virus  2nd  3rd 
confidential information, inadvertent release of 
CONFIG.NT 
CONFIG.SYS  2nd  3rd  4th  5th  6th  7th  8th 
connection-oriented protocols 
connectionless protocols 
construction kits  2nd 
construction kits, macro viruses 
consumer preferences, tracking 
Content Vectoring Protocol (CVP) 
contests, MMC 
ControlSet001 
ControlSet002 
cookie hijacking 
cookies  2nd 
coordinated denial of service attacks 
coprocessing viruses 
Corel Draw  2nd 
Corel Script  2nd 
covert hack attacks 
CPU (central processing unit) 
CRC (code integrity checkers) 
creation date 
credit cards, stolen 
Critical Path 
Cross Infection Tutorial for Office 97 
cross-referencing virus names  
Crunch 
CRYPTEXT.DLL 
crypto box 
Crypto virus 
CS\:IP (code segment insruction pointer) 
CSCRIPT.EXE  2nd  3rd  4th 
CSH 
CTCP (Client-to-Client Protocol) 
CTCP flood 
Ctrl+Alt+Del 
Ctrl-Alt-Del  2nd 
Cult of the Dead Cow 
Cunning virus 
CurrentControlSet 
CurrentControlSet registry key 
Custom Installation Wizard 
Cutler, David 
CVP (Content Vectoring Protocol) 
CyberCop Scanner 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net