1.6 Summary Chapter 1 gave a generalized overview of malicious mobile code and the world of malicious code writers. You should now be familiar with viruses, worms, Trojans, malicious ActiveX and Java applets, and Internet scripting attacks. Subsequent chapters will cover each type of malicious mobile code in detail. Chapter 2 starts the first lesson by covering DOS viruses and computer virus technology. |
Team-Fly |
Top |