R

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

radio channels 
RAM (random access memory) 
random access memory  [See RAM]
random evolution viruses 
random execution 
random numbers , encryption 
Rapid Response Plan
    damage, assessing 
    eradication plan, implementing 
    facts, collecting 
    initial alert, reporting to team 
    public relations impact, determining 
    reoccurrence, planning for 
    spread, minimizing 
    users, notifying  
Raptor Firewall 
RAT (remot administration Trojan) 
RB000.CAB 
RDISK.EXE  2nd 
read-only memory basic input/output system  [See ROM BIOS]
real mode  2nd 
Real Network  2nd 
Real Player 
Recently Used File List 
Recovery Console 
recursive scanning 
Recycle Bin  2nd  3rd 
Red Cross virus 
redirection  2nd 
reformatting disks 
REG.DAT 
REGBACK.EXE 
REGEDIT 
REGEDIT.EXE  2nd 
REGEDT32.EXE  2nd 
Register.ID vulnerability 
RegisterServiceProcess 
registration database 
registry 
    repairing 
Registry Checker utility 
Registry Entry files 
registry file 
registry permissions 
Regmon 
RegObj 
Reinstall Office option 
relay servers, email 
Rembomb Trojan horse 
remote access trojans 
remote administration Trojan (RAT) 
remote control programs 
Remote Explorer registry key 
Remote Explorer virus 
Remote Grab Trojan horse 
remote scripting 
Remote Windows Shutdown Trojan horse 
REMOTE.INI 
removing viruses
    booting with clean DOS diskettes 
    in-use file replacement 
    infected files, replacing 
    registry restoration 
     researching viruses 
    startup programs 
    virus services,disabling 
renaming system executables 
Repair Office option 
Repair Tool 
research-only malicious code 
researching viruses 
resource sharing  2nd 
Restricted Sites security zone 
revocation, digital certificates 
RFC 2426 
rich text file (RTF) 
ring 0 
rings 
RingZeroTrojan horse 
Rip 
Ripper virus 
risk assessment
    ActiveX 
    browsers 
    DOS viruses 
    email 
    IM attacks 
    Java 
    macro viruses 
    Trojan horses 
    Windows viruses 
RJCrush 
RMDIR command 
RoboHack Trojan horse 
rogue programs  2nd 
rogue UDP packets 
ROM BIOS 
ROM BIOS (read-only memory basic input/output system)  2nd  3rd 
Rosenberg, Rob 
routers 
RSA Data Security, Inc. 
Run As feature 
Run registry key 
RUN= statement  2nd 
Runner 
RunOnce registry key 
RunOnceEx registry key 
RunServices registry key 
RunServicesOnce registry key 
Russian New Year exploit 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net