P

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

P2P (peer-to-peer) computing 
P3P (Platform for Privacy Preferences) 
Pack 
package, Java 
packers 
paging systems 
PAK archive files 
Pakistani Brain virus  2nd 
PalmPilot 
parallel port services 
parasites 
parasitic viruses  2nd 
PART command, IRC 
partition table 
Pascal 
Pass Ripper Trojan horse 
Passport Wallet 
password caching 
password dumping 
password files 
password stealers 
password-protecting shares 
PATCH.COM 
PATH environment variable 
Pathogen virus 
payload 
PBRUSH.EXE 
PC boot sequence 
    AUTOEXEC.BAT 
    cold versus warm boot 
PCT 1.0 (Private Communications Technology) 
PDF.OCX 
PE (Portable Executable) 
PE Diminisher 
peer-to-peer (P2P) computing 
peer-to-peer model, instant messaging 
peer-to-server, instant messaging 
Pegasus  2nd 
Perl 
PersistMoniker 
Personal Address Book 
personal firewalls 
personal folder files (PST), Microsoft Outlook 
PERSONAL.XLS  2nd  3rd 
peterszor.com 
Petite 
PGP 
PGP (Pretty Good Privacy) 
PGP Open Source group  
Phase0 Trojan horse 
Phineas Trojan horse 
photo CD images 
PhotoDraw 
PHP (Hypertext Preprocessor Scripting Language) 
PHP.NewWorld 
PHP.Pirus 
PHP.Sysbat 
Physical Security policy 
PICTURE.EXE Trojan horse 
PICTURE.GIF.EXE 
PID (Process ID) 
PIFEDIT.EXE 
Pile, Christopher 
PIN numbers  
PING commands 
Ping Pong virus 
Ping-Pong virus 
Pirch  2nd 
PIX 
PKARC 
PKCS #10 
PKCS #7 
PKI (Public Key Initiative) 
PKLITE 
PKUNZIP 
PKware hoax virus 
PKZIP  2nd 
PKZIP archive files 
Platform for Privacy Preferences (P3P) 
platforms 
Plug and Play 
plug-ins 
plug-ins, Java 
Pluperfect virus hoax 
Point-to-Point Tunneling Protocol 
Policy Manager 
polymorphic viruses 
polymorphism 
POP3 
Poppy virus 
PORNO.COM 
port mappers 
port mapping 
port numbers 
port redirection 
port scanners  
port scanning Trojans 
Portable Executable (PE) 
Portal of Doom Trojan horse  2nd  3rd 
Ports Finder 
Portuguese Atelier Web Security Port Scanner (AWSPS) 
POST (power on self-test) 
Postman Trojan horse 
power on self-test  [See POST]
PowerScript 
Powersoft 
predefined templates 
prefixes, CARO names  
prependers 
prepending viruses 
Pretty Good Privacy (PGP) 
Pretty Park.EXE 
PrettyPark worm 
Preview pane, email  2nd 
Princeton University  2nd 
PRINT command 
print server cards 
Print Spooler 
print templates, browser 
Priority Trojan horse  2nd 
privacy 
private chats 
Private Communications Technology (PCT 1.0) 
private keys  2nd 
PRIVATE.MDB 
Prizzy virus 
Process ID (PID) 
processes, Windows environment 
Profile Assistant 
ProgenicTrojan Trojan horse 
PROGMAN.EXE 
Program Information file (PIF) 
Program Manager shell 
program segment prefix (PSP) 
Project Explorer 
Prosiak Trojan horse  2nd 
Protected mode, 32-bit Windows platforms 
protected mode, Intel 386 
protection domains 
Proxy Server 
proxy servers 
PSAPI.DLL 
PSP (program segment prefix) 
PST.EXE 
Psyber Stream Server Trojan horse 
public channel 
public decrypting key 
public key cryptography 
Public Key Iniative (PKI) 
publisher•s certificate revocation 
punters 
PWSTEAL prefix (Trojans that steal passwords) 
Python 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net