S

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

S/MIME (Secure Multipurpose Internet Mail Extensions) 
Sadam virus 
Safe for Initialization, ActiveX  2nd 
Safe for Scripting, ActiveX  2nd 
Safe Internet Programming Team (SIP)
    SIP (Safe Internet Programming Team) 
safe list 
safe mode 
Safe mode 
SAM (Security Account Manager) database 
SameTime 
Sampo virus 
sandbox, Java  2nd  3rd 
SANS (System Administration, Networking, and Security) group   2nd 
SATAN (System Administration Tool for Analyzing Networks) 
Satanz Backdoor Trojan horse 
scan strings versus checksums 
SCANDISK.EXE  2nd  3rd 
ScanProt.dot macros 
SCANREG.EXE 
SCANREG.VBS 
scenarios, virus-spreading 
Schoolbus Trojan horse 
Schwindler 1.82 Trojan horse 
scrap files 
screensavers 
SCREG.EXE 
script attacks 
script debugging, disabling 
Script Editor 
Script Encoded File (.JSE) 
script errors, displaying 
script files, IRC hacking 
scripting languages 
    features 
    Hypertext Preprocessor Scripting Language (PHP) 
    JavaScript 
    JScript 
    remote scripting 
    VBScript 
Scripting Runtime Engine 
Scriptlet.typlib 
Scrnch 
SCRNSAVE.EXE= statement 
SCRRUN.DLL 
SCSI controller cards 
SDK (software developer•s kit) 
search engines
    bots, use of 
Secret Service 
SECRING.SKR 
sectors per cluster 
sectors per track 
Secure Electronic Transaction (SET) 
Secure Hypertext Transfer Protocol (HTTPS) 
Secure Multipurpose Internet Mail Extensions (S/MIME) 
Secure Sockets Layer (SSL) 
secured communication technologies, enabling 
security
    ActiveX 
    browsers 
Security Account Manager (SAM) database 
Security Certificate files 
Security Configuration Editor 
Security Configuration tool 
security flaws 
Security Identifier (SID) 
security levels 
security levels, Microsoft Office 2000  2nd 
Security log 
Security Manager, Java  2nd 
Security Reference Monitor (SRM) 
Security Scanners 
Security Zone Default 
security zones  2nd  3rd 
self-healing digital immune system 
Senna Spy Trojan horse 
Septic virus 
SERIALZ.HLP 
Server Message Block (SMB) 
server•s certificate revocation 
service packs  
services, Windows programs 
servlets 
session cookies 
SET (Secure Electronic Transaction) 
SETI@home 
Setup control, ActiveX 
Setup Information files 
SETVER.EXE 
SFC.EXE  2nd 
SFP (System File Protection)  2nd 
SFPDB.SFP  2nd 
SHA hash algorithm 
shadow RAM cache 
shared postings 
shares  2nd 
SHELL command  2nd 
Shell registry key 
Shell Scrap object files 
SHELL= statement  2nd 
shells , Unix 
Shiva Burka Trojan horse 
Shiver virus 
ShockRave Trojan horse 
Shockwave 
Shrink 
SID (Security Identifier) 
Signature Verification Tool utility 
signatures, decryption 
signed code, Internet Explorer 
signed macros 
SIGVERIF.EXE 
Silencer Trojan horse 
Simple MAPI 
Simpsalapim IRC worm 
SISTER.DLL 
Ska 
skins 
Skrenta, Richard 
slave CD-ROM drives  
slowness, sudden 
small computers 
Smart Download 
SmartLine Inc. 
SmartWhoIs 
SMB (Server Message Block) 
Smeg virus 
Smith, David L. 
Smith, Richard 
SMSS.EXE 
SMTP (Simple Mail Transfer Protocol) 
SNA network topology 
Snap-Ins 
social engineering 
Socket23 Trojan horse 
sockets 
Sockets de Troie Trojan horse 
SoftWar Trojan horse 
software developer•s kit (SDK) 
software device drivers 
software publisher certificates 
Sohr, Karsten 
Sonar Trojan horse 
SonicWALL  2nd 
Sophos  2nd 
source code
    HTML 
source port number 
SPA virus hoax 
spacers 
spammers 
Spammies 
spawners 
SpinRite disk recovery software 
SPLOG.TXT  2nd 
spoofed web sites 
spreadsheets  2nd 
SpySender Trojan horse 
SRM (Security Reference Monitor) 
SSL (Secure Sockets Layer) 
SSPIPES.SCR 
stack attacks 
stack segment instruction pointers 
Start button 
Startup group, Windows 3.1 
startup programs 
Startup programs 
startup sequences
    Windows 3.x 
    Windows 9x 
    Windows NT 
state laws 
stateless requests , HTTP 
stealing IP addresses 
stealth  2nd 
Stealth Spy Trojan horse 
stealth viruses  2nd 
STMGR.EXE 
Stone virus 
Stoned virus 
STOP error 
store-and-forward model 
store-and-forward model, email 
Strange Brew virus 
Strange Days virus 
Stream virus 
Streaming Audio Trojan horse 
Striker Trojan horse 
style sheets 
subculture, hackers 
subfunction identifiers 
Subseven Trojan horse 
SubsevenTrojan horse 
subtypes , MIME 
Sun Microsystems  2nd 
Sun Microsystems Start Office 
Sunday virus 
super users 
super-users  
supervisor 
SurfinGate 
SurfinShield  2nd 
swap file problems 
swap files 
sweep lists 
Swiss UBS 
SYLK (Symbolic Link) 
Symantec  2nd  3rd  4th  5th  6th 
Symbolic Link (SYLK) 
sympathy request hoax email 
Synchronization Manager 
synchronization, IRC 
SYS.COM  2nd 
SYSEDIT 
SYSEDIT.EXE 
SYSEDIT.EXE command 
SYSMON.OCX, 
System Administration Tool for Analyzing Networks (SATAN) 
System Administration, Networking, and Security (SANS) group 
System Administration, Networking, and Security Institute (SANS) 
System File Checker (SFC) 
System File Checker utility 
System File Protection (SFP)  2nd 
system file table 
system files, repairing 
System Genie 
System log 
system macros 
system recovery tools 
System Restore feature, Windows ME 
System Restore wizard 
system state feature 
SYSTEM.DA0  2nd  3rd 
SYSTEM.DAT  2nd  3rd 
SYSTEM.INI  2nd  3rd  4th  5th 
SYSTEM.INI file 
SystemWizard 
Systray icon 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net