M

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Macintosh  2nd 
Macintosh computers 
Macro Editor  2nd 
macro languages  2nd 
Macro Virus Protection Tool 
macro viruses  2nd  3rd 
    add-ins 
    automacros 
    class module viruses 
    construction kits 
    cross-platform infectors 
    damage caused by 
    droppers 
    ease of programming 
    email 
    encrypted 
    false-positive warning messages 
    foreign language versions 
    future of 
    global templates 
    implementation of 
    inability to view 
    macro copying commands 
    Macro Editor 
    macro languages 
    Microsoft Excel  2nd 
    Microsoft Word  2nd 
    Most Recently Used list 
    Organizer 
    polymorphic 
    prevalence of 
    preventing 
    random evolution 
    removing 
    Shiver virus 
    spreading 
    Startup directory 
    Startup directory files 
    stealth 
    unexpected appearance of new macros 
    unexpected changes in documents 
    VBA 
    viewing with text editors 
    Visual Basic Editor (VBE) 
    Visual Basic for Applications 
    warning signs 
MacroCopy command 
Macromedia 
mail lists 
mail servers 
mailbombers 
Major variant, CARO naming convention 
MAKEDISK.BAT 
malicious file transers 
malicious mobile code  [See MMC]
malicious mobile code written in DOS batch file language prefix (BAT) 
malicious mobile code written in Java prefix (Java) 
management champion 
Map Network Drive 
MAPI (Message Application Program Interface) 
MAPI (Messaging Application Programming Interface) 
MAPIAddress function 
MAPIReadMail function 
MAPISendMail function 
Marker virus 
mass deop attack 
master boot record  [See MBR]
Master File Table (MFT) 
MasterCard 
Masters Paradise Trojan horse  2nd 
Maverick•s Matrix Trojan horse 
MBR (master boot record)  2nd 
MBR modification warning message 
MBRINT13.SYS 
MBT Trojan horse 
McAfee VirusScan 
McAfee, John 
MCI WorldCom 
McLain, Fred 
MD5 (Message-Digesting-5) algorithm 
mdie keyword 
mdos keyword 
media convergence 
Melissa virus  2nd  3rd  4th  5th  6th 
MeltingScreen.exe 
MEM.EXE 
memory rings 
memory-resident viruses 
menu interception 
Message Application Program Interface (MAPI) 
Message Transfer Agent 
Message Transfer Agent (MTA) 
Message-Digesting-5 (MD5) algorithm 
MessageLabs 
Messaging Application Programming Interface (MAPI) 
Messaging Internet Relay Chat (MIRC) 
metamorphic viruses 
MFT (Master File Table) 
Michelangelo virus  2nd  3rd  4th 
Microsoft Access 
    applications 
    Data Project files 
    databases 
    Project Extension files 
Microsoft Active Desktop 
Microsoft Cabinet Archive files 
Microsoft Common Console documents 
Microsoft Dial-up Networking files 
Microsoft Excel  2nd  3rd 
    4.0 macro file 
    add-in files 
    workbook files 
Microsoft Exchange Server, removing viruses 
Microsoft FrontPage 
Microsoft Installer Package 
Microsoft Installer Patch 
Microsoft Kernel Power Toys kit 
Microsoft Management Console (MMC) 
Microsoft Office 2000 
    add-ins and templates 
    automatic resigning 
    Developer Kit 
    Microsoft Excel 
    security levels 
    trusted and untrusted macros 
Microsoft Office 95 and Windows 95 Business Guide 
Microsoft Office 97 
Microsoft Office HTML Script vulnerability 
Microsoft Office XP 
Microsoft Outlook 
    blocked file attachments 
    CDO (collaboration data objects) 
    Email Security Update  2nd 
    Level 1 attachments 
    MAPI (Message Application Program Interface) 
    personal folder files 
    security patches 
    security zone 
    versions 
    vulnerabilities 
Microsoft Outlook Express
    personal folder files 
    versions 
    vulnerabilities 
Microsoft Passport 
Microsoft PhotoDraw 
Microsoft PowerPoint  2nd 
Microsoft Publisher 
Microsoft Wallet 
Microsoft Windows 95 Software Compatibility Test 
Microsoft Windows operating system
    design flaws 
    prefixes 
Microsoft Windows, history 
Microsoft Word  2nd  3rd 
Microsoft.Net 
Millenium Trojan horse 
Millennium Trojan horse 
MIME (Multipurpose Internet Mail Extensions) 
Minor variant, CARO naming convention 
Mirabilis LTD 
mIRC 
MIRC (Messaging Internet Relay Chat) 
mIRC script 
MIRC.INI 
missing file extensions 
MMC (malicious mobile code)
    households, impact upon 
    in the wild 
    Internet, role of 
    number of existing malicious code programs 
    research-only 
    rogue programs 
    technological war 
    trojan horses 
    viruses 
    worms 
MMC (Microsoft Management Console) 
MMX (multimedia extension) 
mobile messaging 
Mobile Phone virus hoax 
mobile users 
MODE command, IRC 
Modem Subcarrier virus hoax 
Modifier, CARO naming convention 
monitoring, government 
Monkey MBR virus 
Morris Internet worm 
Most Recently Used (MRU) 
Mozilla  2nd 
MP3 
mping keyword 
Mr. Wormy IRC worm 
MRU(Most Recently Used) 
MS-DOS 7.0 
MS-DOS Compatibility mode  2nd 
MS-Proxy 
MSCONFIG 
MSCONFIG.EXE 
MSDOS.SYS  2nd  3rd 
MSGcommand, IRC 
MSHTA.EXE  2nd 
MSHTML.DLL 
MSINFO16.TLB 
MSINFO32 
MSINFO32.EXE 
msize keyword 
MSKERNEL32.VBS 
MSN 
MSN Hotmail 
MSN Messenger 
MSN today 
MTA (Message Transfer Agent) 
mtimer keyword 
multiboot feature, Windows NT 
multimedia extension (MMX) 
multipartite viruses  2nd  3rd 
Multipurpose Internet Mail Extensions (MIME) 
music, downloading 
Mutation Engine (MtE or DAME) 
Mutilate Trojan horse 
MV.EXE 
My Computer 
My Network Places 
myCIO.com 
MYPIC.COM 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net