Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] P2P (peer-to-peer) computing P3P (Platform for Privacy Preferences) Pack package, Java packers paging systems PAK archive files Pakistani Brain virus 2nd PalmPilot parallel port services parasites parasitic viruses 2nd PART command, IRC partition table Pascal Pass Ripper Trojan horse Passport Wallet password caching password dumping password files password stealers password-protecting shares PATCH.COM PATH environment variable Pathogen virus payload PBRUSH.EXE PC boot sequence AUTOEXEC.BAT cold versus warm boot PCT 1.0 (Private Communications Technology) PDF.OCX PE (Portable Executable) PE Diminisher peer-to-peer (P2P) computing peer-to-peer model, instant messaging peer-to-server, instant messaging Pegasus 2nd Perl PersistMoniker Personal Address Book personal firewalls personal folder files (PST), Microsoft Outlook PERSONAL.XLS 2nd 3rd peterszor.com Petite PGP PGP (Pretty Good Privacy) PGP Open Source group Phase0 Trojan horse Phineas Trojan horse photo CD images PhotoDraw PHP (Hypertext Preprocessor Scripting Language) PHP.NewWorld PHP.Pirus PHP.Sysbat Physical Security policy PICTURE.EXE Trojan horse PICTURE.GIF.EXE PID (Process ID) PIFEDIT.EXE Pile, Christopher PIN numbers PING commands Ping Pong virus Ping-Pong virus Pirch 2nd PIX PKARC PKCS #10 PKCS #7 PKI (Public Key Initiative) PKLITE PKUNZIP PKware hoax virus PKZIP 2nd PKZIP archive files Platform for Privacy Preferences (P3P) platforms Plug and Play plug-ins plug-ins, Java Pluperfect virus hoax Point-to-Point Tunneling Protocol Policy Manager polymorphic viruses polymorphism POP3 Poppy virus PORNO.COM port mappers port mapping port numbers port redirection port scanners port scanning Trojans Portable Executable (PE) Portal of Doom Trojan horse 2nd 3rd Ports Finder Portuguese Atelier Web Security Port Scanner (AWSPS) POST (power on self-test) Postman Trojan horse power on self-test [See POST] PowerScript Powersoft predefined templates prefixes, CARO names prependers prepending viruses Pretty Good Privacy (PGP) Pretty Park.EXE PrettyPark worm Preview pane, email 2nd Princeton University 2nd PRINT command print server cards Print Spooler print templates, browser Priority Trojan horse 2nd privacy private chats Private Communications Technology (PCT 1.0) private keys 2nd PRIVATE.MDB Prizzy virus Process ID (PID) processes, Windows environment Profile Assistant ProgenicTrojan Trojan horse PROGMAN.EXE Program Information file (PIF) Program Manager shell program segment prefix (PSP) Project Explorer Prosiak Trojan horse 2nd Protected mode, 32-bit Windows platforms protected mode, Intel 386 protection domains Proxy Server proxy servers PSAPI.DLL PSP (program segment prefix) PST.EXE Psyber Stream Server Trojan horse public channel public decrypting key public key cryptography Public Key Iniative (PKI) publisher•s certificate revocation punters PWSTEAL prefix (Trojans that steal passwords) Python |
Team-Fly |
Top |