| |
| |
Preface | |
| |
| |
| |
Introduction | |
| |
| |
The Hunt | |
| |
| |
What Is Malicious Mobile Code? | |
| |
| |
Malicious Code and the Law | |
| |
| |
Malicious Code-Writing Subculture | |
| |
| |
MMC Terminology | |
| |
| |
Summary | |
| |
| |
| |
DOS Computer Viruses | |
| |
| |
Introduction | |
| |
| |
DOS Technologies | |
| |
| |
DOS Virus Technologies | |
| |
| |
Types of DOS Viruses | |
| |
| |
Virus Defense Mechanisms | |
| |
| |
Examples of DOS Viruses | |
| |
| |
Detecting a DOS-Based Computer Virus | |
| |
| |
Removing a DOS Virus | |
| |
| |
Protecting Yourself from Viruses | |
| |
| |
Summary | |
| |
| |
| |
Windows Technologies | |
| |
| |
Windows Technologies | |
| |
| |
New Windows Versions | |
| |
| |
Summary | |
| |
| |
| |
Viruses in a Windows World | |
| |
| |
DOS Viruses on Windows Platforms | |
| |
| |
Windows Viruses on Windows Platforms | |
| |
| |
Signs and Symptoms of Windows NT Virus Infections | |
| |
| |
Windows Virus Examples | |
| |
| |
Detecting a Windows Virus | |
| |
| |
Removing Viruses | |
| |
| |
Removing Infected Files | |
| |
| |
Preventing Viruses in Windows | |
| |
| |
Future | |
| |
| |
Summary | |
| |
| |
| |
Macro Viruses | |
| |
| |
What Is a Macro Virus? | |
| |
| |
Microsoft Word and Excel Macros | |
| |
| |
Working with Macros | |
| |
| |
Office 2000 Security | |
| |
| |
Macro Virus Technologies | |
| |
| |
Macro Virus Examples | |
| |
| |
Detecting Macro Viruses | |
| |
| |
Removing Macro Viruses and Repairing the Damage | |
| |
| |
Preventing Macro Viruses | |
| |
| |
Summary | |
| |
| |
| |
Trojans and Worms | |
| |
| |
The Threat | |
| |
| |
What Are Trojan Horses and Worms? | |
| |
| |
Signs and Symptoms | |
| |
| |
Types of Trojans | |
| |
| |
Trojan Technology | |
| |
| |
Becoming Familiar with Your PC | |
| |
| |
Trojan and Worm Examples | |
| |
| |
Detecting and Removing Trojans and Worms | |
| |
| |
Preventing Trojans and Worms | |
| |
| |
Summary | |
| |
| |
| |
Instant Messaging Attacks | |
| |
| |
Introduction to Instant Messaging | |
| |
| |
Types of Instant Messaging | |
| |
| |
Introduction to Internet Relay Chat | |
| |
| |
Hacking Instant Messaging | |
| |
| |
Examples of IRC Attacks | |
| |
| |
Detecting Malicious IM | |
| |
| |
Removing Malicious IM | |
| |
| |
Protecting Yourself from IM Attacks | |
| |
| |
Summary | |
| |
| |
| |
Internet Browser Technologies | |
| |
| |
Introduction | |
| |
| |
Browser Technologies | |
| |
| |
Web Languages | |
| |
| |
Other Browser Technologies | |
| |
| |
When to Worry About Browser Content | |
| |
| |
Summary | |
| |
| |
| |
Internet Browser Attacks | |
| |
| |
Browser-Based Exploits | |
| |
| |
Examples of Attacks and Exploits | |
| |
| |
Detecting Internet Browser Attacks | |
| |
| |
Removing and Repairing the Damage | |
| |
| |
Preventing Internet Browser Attacks | |
| |
| |
Summary | |
| |
| |
| |
Malicious Java Applets | |
| |
| |
Java | |
| |
| |
Java Security | |
| |
| |
Java Exploits | |
| |
| |
Example Java Exploits | |
| |
| |
Detecting Malicious Java Applets | |
| |
| |
Removing Malicious Java Code | |
| |
| |
Protecting Yourself from Malicious Java Code | |
| |
| |
Summary | |
| |
| |
| |
Malicious ActiveX Controls | |
| |
| |
ActiveX | |
| |
| |
ActiveX Security | |
| |
| |
ActiveX Security Criticisms | |
| |
| |
Malicious ActiveX Examples | |
| |
| |
Detecting Malicious ActiveX Controls | |
| |
| |
Removing and Preventing Malicious Active Controls | |
| |
| |
Summary | |
| |
| |
| |
Email Attacks | |
| |
| |
Introduction | |
| |
| |
Email Programs | |
| |
| |
Email Exploits | |
| |
| |
Detecting Email Attacks | |
| |
| |
Removing Infected Email | |
| |
| |
Preventing Email Attacks | |
| |
| |
Summary | |
| |
| |
| |
Hoax Viruses | |
| |
| |
The Mother of All Computer Viruses | |
| |
| |
Categories of Hoax Messages | |
| |
| |
Detection | |
| |
| |
Removing and Preventing Hoax Viruses | |
| |
| |
Summary | |
| |
| |
| |
Defense | |
| |
| |
Defense Strategy | |
| |
| |
Malicious Mobile Code Defense Plan | |
| |
| |
Use a Good Antivirus Scanner | |
| |
| |
Antivirus Scanning Locations | |
| |
| |
The Best Steps Toward Securing Any Windows PC | |
| |
| |
Additional Defense Tools | |
| |
| |
Antivirus Product Review | |
| |
| |
Future | |
| |
| |
Summary | |
| |
| |
| |
The Future | |
| |
| |
The Future of Computing | |
| |
| |
MMC Exploits | |
| |
| |
Real Defense Solutions | |
| |
| |
Summary | |
| |
| |
Index | |