Malicious mobile code : virus protection for Windows /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly & Associates,
2001.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Hunt 1
- What Is Malicious Mobile Code? 2
- Malicious Code and the Law 11
- Malicious Code-Writing Subculture 13
- MMC Terminology 20
- 2. DOS Computer Viruses 22
- DOS Technologies 23
- DOS Virus Technologies 32
- Types of DOS Viruses 33
- Virus Defense Mechanisms 43
- Examples of DOS Viruses 48
- Detecting a DOS-Based Computer Virus 50
- Removing a DOS Virus 53
- Protecting Yourself from Viruses 55
- 3. Windows Technologies 59
- Windows Technologies 59
- New Windows Versions 86
- 4. Viruses in a Windows World 93
- DOS Viruses on Windows Platforms 93
- Windows Viruses on Windows Platforms 99
- Signs and Symptoms of Windows NT Virus Infections 102
- Windows Virus Examples 105
- Detecting a Windows Virus 111
- Removing Viruses 118
- Removing Infected Files 121
- Preventing Viruses in Windows 125
- Future 128
- 5. Macro Viruses 130
- What Is a Macro Virus? 131
- Microsoft Word and Excel Macros 135
- Working with Macros 138
- Office 2000 Security 143
- Macro Virus Technologies 147
- Macro Virus Examples 157
- Detecting Macro Viruses 160
- Removing Macro Viruses and Repairing the Damage 166
- Preventing Macro Viruses 173
- 6. Trojans and Worms 180
- Threat 180
- What Are Trojan Horses and Worms? 182
- Signs and Symptoms 184
- Types of Trojans 184
- Trojan Technology 191
- Becoming Familiar with Your PC 194
- Trojan and Worm Examples 199
- Detecting and Removing Trojans and Worms 208
- Preventing Trojans and Worms 221
- 7. Instant Messaging Attacks 226
- Introduction to Instant Messaging 226
- Types of Instant Messaging 228
- Introduction to Internet Relay Chat 230
- Hacking Instant Messaging 235
- Examples of IRC Attacks 242
- Detecting Malicious IM 246
- Removing Malicious IM 247
- Protecting Yourself from IM Attacks 248
- 8. Internet Browser Technologies 251
- Browser Technologies 253
- Web Languages 259
- Other Browser Technologies 266
- When to Worry About Browser Content 274
- 9. Internet Browser Attacks 276
- Browser-Based Exploits 276
- Examples of Attacks and Exploits 277
- Detecting Internet Browser Attacks 293
- Removing and Repairing the Damage 295
- Preventing Internet Browser Attacks 295
- 10. Malicious Java Applets 306
- Java 306
- Java Security 311
- Java Exploits 319
- Example Java Exploits 322
- Detecting Malicious Java Applets 328
- Removing Malicious Java Code 331
- Protecting Yourself from Malicious Java Code 332
- 11. Malicious ActiveX Controls 341
- ActiveX 341
- ActiveX Security 346
- ActiveX Security Criticisms 362
- Malicious ActiveX Examples 365
- Detecting Malicious ActiveX Controls 370
- Removing and Preventing Malicious Active Controls 371
- 12. Email Attacks 383
- Email Programs 384
- Email Exploits 394
- Detecting Email Attacks 398
- Removing Infected Email 399
- Preventing Email Attacks 403
- 13. Hoax Viruses 418
- Mother of All Computer Viruses 418
- Categories of Hoax Messages 422
- Detection 427
- Removing and Preventing Hoax Viruses 432
- 14. Defense 435
- Defense Strategy 435
- Malicious Mobile Code Defense Plan 436
- Use a Good Antivirus Scanner 447
- Antivirus Scanning Locations 455
- Best Steps Toward Securing Any Windows PC 461
- Additional Defense Tools 464
- Antivirus Product Review 471
- Future 475
- 15. Future 477
- Future of Computing 477
- MMC Exploits 483
- Real Defense Solutions 486.