Cargando…

Malicious mobile code : virus protection for Windows /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Grimes, Roger A.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly & Associates, 2001.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Hunt 1
  • What Is Malicious Mobile Code? 2
  • Malicious Code and the Law 11
  • Malicious Code-Writing Subculture 13
  • MMC Terminology 20
  • 2. DOS Computer Viruses 22
  • DOS Technologies 23
  • DOS Virus Technologies 32
  • Types of DOS Viruses 33
  • Virus Defense Mechanisms 43
  • Examples of DOS Viruses 48
  • Detecting a DOS-Based Computer Virus 50
  • Removing a DOS Virus 53
  • Protecting Yourself from Viruses 55
  • 3. Windows Technologies 59
  • Windows Technologies 59
  • New Windows Versions 86
  • 4. Viruses in a Windows World 93
  • DOS Viruses on Windows Platforms 93
  • Windows Viruses on Windows Platforms 99
  • Signs and Symptoms of Windows NT Virus Infections 102
  • Windows Virus Examples 105
  • Detecting a Windows Virus 111
  • Removing Viruses 118
  • Removing Infected Files 121
  • Preventing Viruses in Windows 125
  • Future 128
  • 5. Macro Viruses 130
  • What Is a Macro Virus? 131
  • Microsoft Word and Excel Macros 135
  • Working with Macros 138
  • Office 2000 Security 143
  • Macro Virus Technologies 147
  • Macro Virus Examples 157
  • Detecting Macro Viruses 160
  • Removing Macro Viruses and Repairing the Damage 166
  • Preventing Macro Viruses 173
  • 6. Trojans and Worms 180
  • Threat 180
  • What Are Trojan Horses and Worms? 182
  • Signs and Symptoms 184
  • Types of Trojans 184
  • Trojan Technology 191
  • Becoming Familiar with Your PC 194
  • Trojan and Worm Examples 199
  • Detecting and Removing Trojans and Worms 208
  • Preventing Trojans and Worms 221
  • 7. Instant Messaging Attacks 226
  • Introduction to Instant Messaging 226
  • Types of Instant Messaging 228
  • Introduction to Internet Relay Chat 230
  • Hacking Instant Messaging 235
  • Examples of IRC Attacks 242
  • Detecting Malicious IM 246
  • Removing Malicious IM 247
  • Protecting Yourself from IM Attacks 248
  • 8. Internet Browser Technologies 251
  • Browser Technologies 253
  • Web Languages 259
  • Other Browser Technologies 266
  • When to Worry About Browser Content 274
  • 9. Internet Browser Attacks 276
  • Browser-Based Exploits 276
  • Examples of Attacks and Exploits 277
  • Detecting Internet Browser Attacks 293
  • Removing and Repairing the Damage 295
  • Preventing Internet Browser Attacks 295
  • 10. Malicious Java Applets 306
  • Java 306
  • Java Security 311
  • Java Exploits 319
  • Example Java Exploits 322
  • Detecting Malicious Java Applets 328
  • Removing Malicious Java Code 331
  • Protecting Yourself from Malicious Java Code 332
  • 11. Malicious ActiveX Controls 341
  • ActiveX 341
  • ActiveX Security 346
  • ActiveX Security Criticisms 362
  • Malicious ActiveX Examples 365
  • Detecting Malicious ActiveX Controls 370
  • Removing and Preventing Malicious Active Controls 371
  • 12. Email Attacks 383
  • Email Programs 384
  • Email Exploits 394
  • Detecting Email Attacks 398
  • Removing Infected Email 399
  • Preventing Email Attacks 403
  • 13. Hoax Viruses 418
  • Mother of All Computer Viruses 418
  • Categories of Hoax Messages 422
  • Detection 427
  • Removing and Preventing Hoax Viruses 432
  • 14. Defense 435
  • Defense Strategy 435
  • Malicious Mobile Code Defense Plan 436
  • Use a Good Antivirus Scanner 447
  • Antivirus Scanning Locations 455
  • Best Steps Toward Securing Any Windows PC 461
  • Additional Defense Tools 464
  • Antivirus Product Review 471
  • Future 475
  • 15. Future 477
  • Future of Computing 477
  • MMC Exploits 483
  • Real Defense Solutions 486.