Flylib.com
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176
Authors:
Roger A. Grimes
BUY ON AMAZON
Malicious Mobile Code: Virus Protection for Windows
Copyright
Preface
About This Book
Why Another Book on Viruses?
What This Book Doesn t Cover
Organization of the Book
Conventions Used in This Book
Software Covered in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction
1.1 The Hunt
1.2 What Is Malicious Mobile Code?
1.3 Malicious Code and the Law
1.4 Malicious Code-Writing Subculture
1.5 MMC Terminology
1.6 Summary
Chapter 2. DOS Computer Viruses
2.1 Introduction
2.2 DOS Technologies
2.3 DOS Virus Technologies
2.4 Types of DOS Viruses
2.5 Virus Defense Mechanisms
2.6 Examples of DOS Viruses
2.7 Detecting a DOS-Based Computer Virus
2.8 Removing a DOS Virus
2.9 Protecting Yourself from Viruses
2.10 Risk Assessment -- Low
2.11 Summary
Chapter 3. Windows Technologies
3.1 Windows Technologies
3.2 New Windows Versions
3.3 Summary
Chapter 4. Viruses in a Windows World
4.1 DOS Viruses on Windows Platforms
4.2 Windows Viruses on Windows Platforms
4.3 Signs and Symptoms of Windows NT Virus Infections
4.4 Windows Virus Examples
4.5 Detecting a Windows Virus
4.6 Removing Viruses
4.7 Removing Infected Files
4.8 Preventing Viruses in Windows
4.9 Future
4.10 Risk Assessment -- Medium
4.11 Summary
Chapter 5. Macro Viruses
5.1 Microsoft Office Version Numbers
5.2 What Is a Macro Virus?
5.3 Microsoft Word and Excel Macros
5.4 Working with Macros
5.5 Office 2000 Security
5.6 Macro Virus Technologies
5.7 Macro Virus Examples
5.8 Detecting Macro Viruses
5.9 Removing Macro Viruses and Repairing the Damage
5.10 Preventing Macro Viruses
5.11 Risk Assessment -- High
5.12 Summary
Chapter 6. Trojans and Worms
6.1 The Threat
6.2 What Are Trojan Horses and Worms?
6.3 Signs and Symptoms
6.4 Types of Trojans
MalwareH2 P class
6.6 Becoming Familiar with Your PC
6.7 Trojan and Worm Examples
6.8. Detecting and Removing Trojansand Worms
6.9 Preventing Trojans and Worms
6.10 Risk Assessment -- High
6.11 Summary
Chapter 7. Instant Messaging Attacks
7.1 Introduction to Instant Messaging
7.2 Types of Instant Messaging
7.3 Introduction to Internet Relay Chat
7.4 Hacking Instant Messaging
7.6 Detecting Malicious IM
7.7 Removing Malicious IM
7.8 Protecting Yourself from IM Attacks
7.9 Risk Assessment -- Medium
7.10 Summary
Chapter 8. Internet Browser Technologies
8.1 Introduction
8.2 Browser Technologies
8.3 Web Languages
8.4 Other Browser Technologies
8.5 When to Worry About Browser Content
8.6 Summary
Chapter 9. Internet Browser Attacks
9.1 Browser-Based Exploits
9.2 Examples of Attacks and Exploits
9.3 Detecting Internet Browser Attacks
9.4 Removing and Repairing the Damage
9.5 Preventing Internet Browser Attacks
9.6 Risk Assessment -- Medium
9.7 Summary
Chapter 10. Malicious Java Applets
10.1 Java
10.2 Java Security
10.3 Java Exploits
10.4 Example Java Exploits
10.5 Detecting Malicious Java Applets
10.6 Removing Malicious Java Code
10.7 Protecting Yourself from Malicious Java Code
10.8 Risk Assessment -- Low
10.9 Summary
Chapter 11. Malicious ActiveX Controls
11.1 ActiveX
11.2 ActiveX Security
11.3 ActiveX Security Criticisms
11.4 Malicious ActiveX Examples
11.5 Detecting Malicious ActiveX Controls
11.6 Removing and Preventing Malicious Active Controls
11.7 Risk Assessment -- Medium
11.8 Summary
Chapter 12. Email Attacks
12.1 Introduction
12.2 Email Programs
12.3 Email Exploits
12.4 Detecting Email Attacks
12.5 Removing Infected Email
12.6 Preventing Email Attacks
12.7 Risk Assessment -- High
12.8 Summary
Chapter 13. Hoax Viruses
13.1 The Mother of All Computer Viruses
13.2 Categories of Hoax Messages
13.3 Detection
13.4 Removing and Preventing Hoax Viruses
13.5 Risk Assessment -- Low
13.6 Summary
Chapter 14. Defense
14.1 Defense Strategy
14.2 Malicious Mobile Code Defense Plan
14.3 Use a Good Antivirus Scanner
14.4 Antivirus Scanning Locations
14.5 The Best Steps Toward Securing Any Windows PC
14.6 Additional Defense Tools
14.7 Antivirus Product Review
14.8 Future
14.9 Summary
Chapter 15. The Future
15.1 The Future of Computing
15.2 MMC Exploits
15.3 Real Defense Solutions
15.4 Summary
Colophon
INDEX
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176
Authors:
Roger A. Grimes
BUY ON AMAZON
Java I/O
The Ubiquitous IOException
Pipe Channels
Number Formats
Temperature Sensor Example
The Local Device
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Formatting Forms
Working with Advanced Form Elements
Setting Form Template and Digital Signing Options
Publishing Form Templates
Writing Advanced Event Handlers
Software Configuration Management
Configuration Identification
A Practical Approach to Configuration Verification and Audit
Appendix K Problem/Change Report
Appendix X SCM Guidance for Achieving the Repeatable Level on the Software
Appendix Y Supplier CM Market Analysis Questionnaire
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 220 Branch-Circuit, Feeder, and Service Calculations
Article 330 Metal-Clad Cable Type MC
Article 409: Industrial Control Panels
Article 700 Emergency Systems
Article 701 Legally Required Standby Systems
PMP Practice Questions Exam Cram 2
Answers and Explanations
Project PlanningFacilitating Processes
Exam Prep Questions
Exam Prep Questions
Professional Responsibility
Sap Bw: a Step By Step Guide for Bw 2.0
Summary
Creating Update Rules for the InfoCube
Transferring R/3 Global Settings
Summary
Object Transport
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies