Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Macintosh 2nd Macintosh computers Macro Editor 2nd macro languages 2nd Macro Virus Protection Tool macro viruses 2nd 3rd add-ins automacros class module viruses construction kits cross-platform infectors damage caused by droppers ease of programming encrypted false-positive warning messages foreign language versions future of global templates implementation of inability to view macro copying commands Macro Editor macro languages Microsoft Excel 2nd Microsoft Word 2nd Most Recently Used list Organizer polymorphic prevalence of preventing random evolution removing Shiver virus spreading Startup directory Startup directory files stealth unexpected appearance of new macros unexpected changes in documents VBA viewing with text editors Visual Basic Editor (VBE) Visual Basic for Applications warning signs MacroCopy command Macromedia mail lists mail servers mailbombers Major variant, CARO naming convention MAKEDISK.BAT malicious file transers malicious mobile code [See MMC] malicious mobile code written in DOS batch file language prefix (BAT) malicious mobile code written in Java prefix (Java) management champion Map Network Drive MAPI (Message Application Program Interface) MAPI (Messaging Application Programming Interface) MAPIAddress function MAPIReadMail function MAPISendMail function Marker virus mass deop attack master boot record [See MBR] Master File Table (MFT) MasterCard Masters Paradise Trojan horse 2nd Maverick•s Matrix Trojan horse MBR (master boot record) 2nd MBR modification warning message MBRINT13.SYS MBT Trojan horse McAfee VirusScan McAfee, John MCI WorldCom McLain, Fred MD5 (Message-Digesting-5) algorithm mdie keyword mdos keyword media convergence Melissa virus 2nd 3rd 4th 5th 6th MeltingScreen.exe MEM.EXE memory rings memory-resident viruses menu interception Message Application Program Interface (MAPI) Message Transfer Agent Message Transfer Agent (MTA) Message-Digesting-5 (MD5) algorithm MessageLabs Messaging Application Programming Interface (MAPI) Messaging Internet Relay Chat (MIRC) metamorphic viruses MFT (Master File Table) Michelangelo virus 2nd 3rd 4th Microsoft Access applications Data Project files databases Project Extension files Microsoft Active Desktop Microsoft Cabinet Archive files Microsoft Common Console documents Microsoft Dial-up Networking files Microsoft Excel 2nd 3rd 4.0 macro file add-in files workbook files Microsoft Exchange Server, removing viruses Microsoft FrontPage Microsoft Installer Package Microsoft Installer Patch Microsoft Kernel Power Toys kit Microsoft Management Console (MMC) Microsoft Office 2000 add-ins and templates automatic resigning Developer Kit Microsoft Excel security levels trusted and untrusted macros Microsoft Office 95 and Windows 95 Business Guide Microsoft Office 97 Microsoft Office HTML Script vulnerability Microsoft Office XP Microsoft Outlook blocked file attachments CDO (collaboration data objects) Email Security Update 2nd Level 1 attachments MAPI (Message Application Program Interface) personal folder files security patches security zone versions vulnerabilities Microsoft Outlook Express personal folder files versions vulnerabilities Microsoft Passport Microsoft PhotoDraw Microsoft PowerPoint 2nd Microsoft Publisher Microsoft Wallet Microsoft Windows 95 Software Compatibility Test Microsoft Windows operating system design flaws prefixes Microsoft Windows, history Microsoft Word 2nd 3rd Microsoft.Net Millenium Trojan horse Millennium Trojan horse MIME (Multipurpose Internet Mail Extensions) Minor variant, CARO naming convention Mirabilis LTD mIRC MIRC (Messaging Internet Relay Chat) mIRC script MIRC.INI missing file extensions MMC (malicious mobile code) households, impact upon in the wild Internet, role of number of existing malicious code programs research-only rogue programs technological war trojan horses viruses worms MMC (Microsoft Management Console) MMX (multimedia extension) mobile messaging Mobile Phone virus hoax mobile users MODE command, IRC Modem Subcarrier virus hoax Modifier, CARO naming convention monitoring, government Monkey MBR virus Morris Internet worm Most Recently Used (MRU) Mozilla 2nd MP3 mping keyword Mr. Wormy IRC worm MRU(Most Recently Used) MS-DOS 7.0 MS-DOS Compatibility mode 2nd MS-Proxy MSCONFIG MSCONFIG.EXE MSDOS.SYS 2nd 3rd MSGcommand, IRC MSHTA.EXE 2nd MSHTML.DLL MSINFO16.TLB MSINFO32 MSINFO32.EXE msize keyword MSKERNEL32.VBS MSN MSN Hotmail MSN Messenger MSN today MTA (Message Transfer Agent) mtimer keyword multiboot feature, Windows NT multimedia extension (MMX) multipartite viruses 2nd 3rd Multipurpose Internet Mail Extensions (MIME) music, downloading Mutation Engine (MtE or DAME) Mutilate Trojan horse MV.EXE My Computer My Network Places myCIO.com MYPIC.COM |
Team-Fly |
Top |