Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] I Seek You Chat [See ICQ] i-Drive i-mode cell phone network I-Worm I/O Supervisor (IOS) IANA (Internet Assigned Number Authority) IBM IBM Christmas worm IBMBIO.COM IBMDOS.COM IC (Internet Content Provider) ICE ICMP Bomber Trojan horse ICQ 2nd ICQ (I Seek You Chat) 2nd ICQ chat ICQKiller Trojan horse IcqTrojan Trojan horse ICSA Labs Identification Servers (Identserv) IDS (Intrusion Detection Systems) IE403R.SYS IEAK (Internet Explorer Administration Kit) 2nd IEXPLORE.EXE IFSHLP.SYS Illusion Mailer Trojan horse ILoveYou virus IM (Instant Messaging) AOL Instant Messenger avatars buddy lists 2nd chat detecting viruses email, compared to ICQ (I Seek You Chat) Instant Meeting IRC (Internet Relay Chat) Jabber mobile messaging MSN Messenger NetMeeting peer-to-peer compared to peer-to-server private propriety protocols public channel SameTime VChat web chat servers WinChat WinPopUp Yahoo Messenger ImportExportFavorites exploit in the wild InCommand Trojan horse Indoctrination Trojan horse INF.SYS Infis virus Information Store information-collecting parasites INI (initialization) files iNi-Killer Trojan horse initialization files (INI) input forms INSENG.DLL Install on Demand, enabling INSTALL.MSI Instant Meeting Instant Messaging [See IM] Instantme instruction sets Intel 386DX chip Intel 80286 chip IntelliMirror Interactive InteRfaCe interfaces, Microsoft Outlook Intermediate Certification Authority International Computer Security Association Labs International Preparedness Scheme Internet Assigned Number Authority (IANA) Internet Communication settings Internet Content Provider (IC) Internet content scanners Internet Explorer 2nd cookies Internet Explorer Administration Kit (IEAK) registry settings security settings 2nd security zones 2nd signed code updates, automatically checking for versions Internet Explorer Administration Kit Internet Explorer Cross-Frame exploit Internet Firewall Appliance Internet Information Servers Internet Protocol Security (IPSec) Internet Relay Chat [See IRC] Internet RFC 1321 Internet RFC 1459 Internet Scanner Internet Security Systems Internet Security Systems (ISS) 2nd Internet security zone Internet Service Provider (IS) Internet telephony Internet-based antivirus scanning Internet-based scripting attacks interrupt code subroutines interrupt numbers interrupt vector table 2nd interrupts Intrusion Detection Systems (IDS) INUSE.EXE invalid site certifications INVITE command, IRC INVITE-ONLY mode, IRC IO.SYS 2nd 3rd 4th 5th IO.VXD IOS (I/O Supervisor) IOS.INI IOS.LOG 2nd IP address stealing IP addresses IPSec (Internet Protocol Security) IRC 2nd IRC (Internet Relay Chat) bots channel wars client programs Client-to-Client Protocol (CTCP) CTCP flood Direct Client to Client (DCC) flooding hacking utilities INVITE command JOIN command KICK command lag LIST command mass deop attack MODE command Mr. Wormy MSG command NAMES command netsplits network redirection networks nick collision kill NICK command nicknames operators PART command protecting your computer removing viruses script files Septic virus Simsalapim worm Trojan horses 2nd viruses WHOIS command worms 2nd IRC chat ircII IRCnet IRCWORM.DAT Irix IS (Internet Service Provider) ISP scanning ISS (Internet Security Systems) ITS.EXE |
Team-Fly |
Top |