Malicious mobile code : virus protection for Windows
Record details
- ISBN: 9781565926820
- ISBN: 156592682X
- ISBN: 1491994703
- ISBN: 9781491994702
- ISBN: 1491994711
- ISBN: 9781491994719
- ISBN: 149199469X
- ISBN: 9781491994696
-
Physical Description:
1 online resource (xviii, 522 pages) : illustrations
remote - Edition: 1st ed.
- Publisher: Sebastopol, CA : O'Reilly & Associates, 2001.
Content descriptions
General Note: | Includes index. |
Formatted Contents Note: | Hunt 1 -- What Is Malicious Mobile Code? 2 -- Malicious Code and the Law 11 -- Malicious Code-Writing Subculture 13 -- MMC Terminology 20 -- 2. DOS Computer Viruses 22 -- DOS Technologies 23 -- DOS Virus Technologies 32 -- Types of DOS Viruses 33 -- Virus Defense Mechanisms 43 -- Examples of DOS Viruses 48 -- Detecting a DOS-Based Computer Virus 50 -- Removing a DOS Virus 53 -- Protecting Yourself from Viruses 55 -- 3. Windows Technologies 59 -- Windows Technologies 59 -- New Windows Versions 86 -- 4. Viruses in a Windows World 93 -- DOS Viruses on Windows Platforms 93 -- Windows Viruses on Windows Platforms 99 -- Signs and Symptoms of Windows NT Virus Infections 102 -- Windows Virus Examples 105 -- Detecting a Windows Virus 111 -- Removing Viruses 118 -- Removing Infected Files 121 -- Preventing Viruses in Windows 125 -- Future 128 -- 5. Macro Viruses 130 -- What Is a Macro Virus? 131 -- Microsoft Word and Excel Macros 135 -- Working with Macros 138 -- Office 2000 Security 143 -- Macro Virus Technologies 147 -- Macro Virus Examples 157 -- Detecting Macro Viruses 160 -- Removing Macro Viruses and Repairing the Damage 166 -- Preventing Macro Viruses 173 -- 6. Trojans and Worms 180 -- Threat 180 -- What Are Trojan Horses and Worms? 182 -- Signs and Symptoms 184 -- Types of Trojans 184 -- Trojan Technology 191 -- Becoming Familiar with Your PC 194 -- Trojan and Worm Examples 199 -- Detecting and Removing Trojans and Worms 208 -- Preventing Trojans and Worms 221 -- 7. Instant Messaging Attacks 226 -- Introduction to Instant Messaging 226 -- Types of Instant Messaging 228 -- Introduction to Internet Relay Chat 230 -- Hacking Instant Messaging 235 -- Examples of IRC Attacks 242 -- Detecting Malicious IM 246 -- Removing Malicious IM 247 -- Protecting Yourself from IM Attacks 248 -- 8. Internet Browser Technologies 251 -- Browser Technologies 253 -- Web Languages 259 -- Other Browser Technologies 266 -- When to Worry About Browser Content 274 -- 9. Internet Browser Attacks 276 -- Browser-Based Exploits 276 -- Examples of Attacks and Exploits 277 -- Detecting Internet Browser Attacks 293 -- Removing and Repairing the Damage 295 -- Preventing Internet Browser Attacks 295 -- 10. Malicious Java Applets 306 -- Java 306 -- Java Security 311 -- Java Exploits 319 -- Example Java Exploits 322 -- Detecting Malicious Java Applets 328 -- Removing Malicious Java Code 331 -- Protecting Yourself from Malicious Java Code 332 -- 11. Malicious ActiveX Controls 341 -- ActiveX 341 -- ActiveX Security 346 -- ActiveX Security Criticisms 362 -- Malicious ActiveX Examples 365 -- Detecting Malicious ActiveX Controls 370 -- Removing and Preventing Malicious Active Controls 371 -- 12. Email Attacks 383 -- Email Programs 384 -- Email Exploits 394 -- Detecting Email Attacks 398 -- Removing Infected Email 399 -- Preventing Email Attacks 403 -- 13. Hoax Viruses 418 -- Mother of All Computer Viruses 418 -- Categories of Hoax Messages 422 -- Detection 427 -- Removing and Preventing Hoax Viruses 432 -- 14. Defense 435 -- Defense Strategy 435 -- Malicious Mobile Code Defense Plan 436 -- Use a Good Antivirus Scanner 447 -- Antivirus Scanning Locations 455 -- Best Steps Toward Securing Any Windows PC 461 -- Additional Defense Tools 464 -- Antivirus Product Review 471 -- Future 475 -- 15. Future 477 -- Future of Computing 477 -- MMC Exploits 483 -- Real Defense Solutions 486. |
Restrictions on Access Note: | Restrictions unspecified |
Reproduction Note: | Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. |
System Details Note: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 |
Action Note: | digitized 2010 HathiTrust Digital Library committed to preserve |
Source of Description Note: | Print version record. |
Search for related items by subject
Genre: | Electronic book. Electronic books. |