Skip to content

Malicious Mobile Code Virus Protection for Windows

Best in textbook rentals since 2012!

ISBN-10: 156592682X

ISBN-13: 9781565926820

Edition: 2001

Authors: Roger A. Grimes

List price: $44.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there "are…    
Customers also bought

Book details

List price: $44.99
Copyright year: 2001
Publisher: O'Reilly Media, Incorporated
Publication date: 9/4/2001
Binding: Paperback
Pages: 542
Size: 6.75" wide x 8.75" long x 1.00" tall
Weight: 1.694
Language: English

Roger A. Grimes (CPA, CISSP, CEH, MCSE: Security) is a 19-year Windows security veteran with 6 books and over 150 national magazine articles on the subject. Roger is a 3-time Microsoft MVP in Windows Security (and MVP of the Month in December 2005). He participated in the Microsoft Windows Server 2003 Learning curriculum and was an Early Achiever of theWindows Server 2003 MSCE: Security desination. Roger has written advanced Windows security courses for Microsoft, Foundstone, and SANS.

Preface
Introduction
The Hunt
What Is Malicious Mobile Code?
Malicious Code and the Law
Malicious Code-Writing Subculture
MMC Terminology
Summary
DOS Computer Viruses
Introduction
DOS Technologies
DOS Virus Technologies
Types of DOS Viruses
Virus Defense Mechanisms
Examples of DOS Viruses
Detecting a DOS-Based Computer Virus
Removing a DOS Virus
Protecting Yourself from Viruses
Summary
Windows Technologies
Windows Technologies
New Windows Versions
Summary
Viruses in a Windows World
DOS Viruses on Windows Platforms
Windows Viruses on Windows Platforms
Signs and Symptoms of Windows NT Virus Infections
Windows Virus Examples
Detecting a Windows Virus
Removing Viruses
Removing Infected Files
Preventing Viruses in Windows
Future
Summary
Macro Viruses
What Is a Macro Virus?
Microsoft Word and Excel Macros
Working with Macros
Office 2000 Security
Macro Virus Technologies
Macro Virus Examples
Detecting Macro Viruses
Removing Macro Viruses and Repairing the Damage
Preventing Macro Viruses
Summary
Trojans and Worms
The Threat
What Are Trojan Horses and Worms?
Signs and Symptoms
Types of Trojans
Trojan Technology
Becoming Familiar with Your PC
Trojan and Worm Examples
Detecting and Removing Trojans and Worms
Preventing Trojans and Worms
Summary
Instant Messaging Attacks
Introduction to Instant Messaging
Types of Instant Messaging
Introduction to Internet Relay Chat
Hacking Instant Messaging
Examples of IRC Attacks
Detecting Malicious IM
Removing Malicious IM
Protecting Yourself from IM Attacks
Summary
Internet Browser Technologies
Introduction
Browser Technologies
Web Languages
Other Browser Technologies
When to Worry About Browser Content
Summary
Internet Browser Attacks
Browser-Based Exploits
Examples of Attacks and Exploits
Detecting Internet Browser Attacks
Removing and Repairing the Damage
Preventing Internet Browser Attacks
Summary
Malicious Java Applets
Java
Java Security
Java Exploits
Example Java Exploits
Detecting Malicious Java Applets
Removing Malicious Java Code
Protecting Yourself from Malicious Java Code
Summary
Malicious ActiveX Controls
ActiveX
ActiveX Security
ActiveX Security Criticisms
Malicious ActiveX Examples
Detecting Malicious ActiveX Controls
Removing and Preventing Malicious Active Controls
Summary
Email Attacks
Introduction
Email Programs
Email Exploits
Detecting Email Attacks
Removing Infected Email
Preventing Email Attacks
Summary
Hoax Viruses
The Mother of All Computer Viruses
Categories of Hoax Messages
Detection
Removing and Preventing Hoax Viruses
Summary
Defense
Defense Strategy
Malicious Mobile Code Defense Plan
Use a Good Antivirus Scanner
Antivirus Scanning Locations
The Best Steps Toward Securing Any Windows PC
Additional Defense Tools
Antivirus Product Review
Future
Summary
The Future
The Future of Computing
MMC Exploits
Real Defense Solutions
Summary
Index