Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] S/MIME (Secure Multipurpose Internet Mail Extensions) Sadam virus Safe for Initialization, ActiveX 2nd Safe for Scripting, ActiveX 2nd Safe Internet Programming Team (SIP) SIP (Safe Internet Programming Team) safe list safe mode Safe mode SAM (Security Account Manager) database SameTime Sampo virus sandbox, Java 2nd 3rd SANS (System Administration, Networking, and Security) group 2nd SATAN (System Administration Tool for Analyzing Networks) Satanz Backdoor Trojan horse scan strings versus checksums SCANDISK.EXE 2nd 3rd ScanProt.dot macros SCANREG.EXE SCANREG.VBS scenarios, virus-spreading Schoolbus Trojan horse Schwindler 1.82 Trojan horse scrap files screensavers SCREG.EXE script attacks script debugging, disabling Script Editor Script Encoded File (.JSE) script errors, displaying script files, IRC hacking scripting languages features Hypertext Preprocessor Scripting Language (PHP) JavaScript JScript remote scripting VBScript Scripting Runtime Engine Scriptlet.typlib Scrnch SCRNSAVE.EXE= statement SCRRUN.DLL SCSI controller cards SDK (software developer•s kit) search engines bots, use of Secret Service SECRING.SKR sectors per cluster sectors per track Secure Electronic Transaction (SET) Secure Hypertext Transfer Protocol (HTTPS) Secure Multipurpose Internet Mail Extensions (S/MIME) Secure Sockets Layer (SSL) secured communication technologies, enabling security ActiveX browsers Security Account Manager (SAM) database Security Certificate files Security Configuration Editor Security Configuration tool security flaws Security Identifier (SID) security levels security levels, Microsoft Office 2000 2nd Security log Security Manager, Java 2nd Security Reference Monitor (SRM) Security Scanners Security Zone Default security zones 2nd 3rd self-healing digital immune system Senna Spy Trojan horse Septic virus SERIALZ.HLP Server Message Block (SMB) server•s certificate revocation service packs services, Windows programs servlets session cookies SET (Secure Electronic Transaction) SETI@home Setup control, ActiveX Setup Information files SETVER.EXE SFC.EXE 2nd SFP (System File Protection) 2nd SFPDB.SFP 2nd SHA hash algorithm shadow RAM cache shared postings shares 2nd SHELL command 2nd Shell registry key Shell Scrap object files SHELL= statement 2nd shells , Unix Shiva Burka Trojan horse Shiver virus ShockRave Trojan horse Shockwave Shrink SID (Security Identifier) Signature Verification Tool utility signatures, decryption signed code, Internet Explorer signed macros SIGVERIF.EXE Silencer Trojan horse Simple MAPI Simpsalapim IRC worm SISTER.DLL Ska skins Skrenta, Richard slave CD-ROM drives slowness, sudden small computers Smart Download SmartLine Inc. SmartWhoIs SMB (Server Message Block) Smeg virus Smith, David L. Smith, Richard SMSS.EXE SMTP (Simple Mail Transfer Protocol) SNA network topology Snap-Ins social engineering Socket23 Trojan horse sockets Sockets de Troie Trojan horse SoftWar Trojan horse software developer•s kit (SDK) software device drivers software publisher certificates Sohr, Karsten Sonar Trojan horse SonicWALL 2nd Sophos 2nd source code HTML source port number SPA virus hoax spacers spammers Spammies spawners SpinRite disk recovery software SPLOG.TXT 2nd spoofed web sites spreadsheets 2nd SpySender Trojan horse SRM (Security Reference Monitor) SSL (Secure Sockets Layer) SSPIPES.SCR stack attacks stack segment instruction pointers Start button Startup group, Windows 3.1 startup programs Startup programs startup sequences Windows 3.x Windows 9x Windows NT state laws stateless requests , HTTP stealing IP addresses stealth 2nd Stealth Spy Trojan horse stealth viruses 2nd STMGR.EXE Stone virus Stoned virus STOP error store-and-forward model store-and-forward model, email Strange Brew virus Strange Days virus Stream virus Streaming Audio Trojan horse Striker Trojan horse style sheets subculture, hackers subfunction identifiers Subseven Trojan horse SubsevenTrojan horse subtypes , MIME Sun Microsystems 2nd Sun Microsystems Start Office Sunday virus super users super-users supervisor SurfinGate SurfinShield 2nd swap file problems swap files sweep lists Swiss UBS SYLK (Symbolic Link) Symantec 2nd 3rd 4th 5th 6th Symbolic Link (SYLK) sympathy request hoax email Synchronization Manager synchronization, IRC SYS.COM 2nd SYSEDIT SYSEDIT.EXE SYSEDIT.EXE command SYSMON.OCX, System Administration Tool for Analyzing Networks (SATAN) System Administration, Networking, and Security (SANS) group System Administration, Networking, and Security Institute (SANS) System File Checker (SFC) System File Checker utility System File Protection (SFP) 2nd system file table system files, repairing System Genie System log system macros system recovery tools System Restore feature, Windows ME System Restore wizard system state feature SYSTEM.DA0 2nd 3rd SYSTEM.DAT 2nd 3rd SYSTEM.INI 2nd 3rd 4th 5th SYSTEM.INI file SystemWizard Systray icon |
Team-Fly |
Top |