Malicious Mobile Code. Virus Protection for Windows
- Autor:
- Roger A. Grimes
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 542
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Malicious Mobile Code. Virus Protection for Windows
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy.
The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out inMalicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book?
Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:
- The current state of the malicious code writing and cracker community
- How malicious code works, what types there are, and what it can and cannot do
- Common anti-virus defenses, including anti-virus software
- How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it
- Macro viruses affecting MS Word, MS Excel, and VBScript
- Java applets and ActiveX controls
- Enterprise-wide malicious code protection
- Hoaxes
- The future of malicious mobile code and how to combat such code
These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever.Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.
Wybrane bestsellery
-
This book will help .NET developers build on their existing knowledge and learn how to make the most of specialized .NET libraries to improve performance, scalability, security, and the user experience of their apps and services. Covering the most up-to-date topics and developments, this book wil...
Apps and Services with .NET 8. Build practical projects with Blazor, .NET MAUI, gRPC, GraphQL, and other enterprise technologies - Second Edition Apps and Services with .NET 8. Build practical projects with Blazor, .NET MAUI, gRPC, GraphQL, and other enterprise technologies - Second Edition
-
Computers cannot understand texts or organize documents. Texts must first be converted into numeric values before they can be used to unlock the hidden connection between documents into topics. This easy-to-follow book simplifies these processes for you, unveiling the power of Gensim to perform c...
The Handbook of NLP with Gensim. Leverage topic modeling to uncover hidden patterns, themes, and valuable insights within textual data The Handbook of NLP with Gensim. Leverage topic modeling to uncover hidden patterns, themes, and valuable insights within textual data
-
Elevate SwiftUI skills by building projects is a project-based guide for Swift programmers to create interactive and fun projects by making the most of SwiftUI. Throughout the book, you’ll build four engaging projects, exploring the impressive cross-platform UI framework and building apps ...
Elevate SwiftUI Skills by Building Projects. Build four modern applications using Swift, Xcode 14, and SwiftUI for iPhone, iPad, Mac, and Apple Watch Elevate SwiftUI Skills by Building Projects. Build four modern applications using Swift, Xcode 14, and SwiftUI for iPhone, iPad, Mac, and Apple Watch
-
Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege esc...
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
This book helps you learn different areas of managing state in Flutter, understand the architectural bits and pieces of each approach, know which approach to use in which situation, and explore the pros and cons of using them. You'll also build a Flutter application from scratch and implement eac...
Managing State in Flutter Pragmatically. Discover how to adopt the best state management approach for scaling your Flutter app Managing State in Flutter Pragmatically. Discover how to adopt the best state management approach for scaling your Flutter app
-
This book is a definitive guide to Galio mobile app development, and shows you how to set up React Native projects for your own ideas. With the help of step-by-step explanations of essential concepts and practical examples, this book helps you to understand the basics of React Native and how Gali...
Lightning-Fast Mobile App Development with Galio. Build stylish cross-platform mobile apps with Galio and React Native Lightning-Fast Mobile App Development with Galio. Build stylish cross-platform mobile apps with Galio and React Native
-
SwiftUI is an innovative new framework for building UI for all Apple platforms. This recipe-based guide covers the new features of SwiftUI 3 introduced in iOS 15 and helps you migrate from UIkit with a simple learning curve through practical solutions. You'll learn how SwiftUI combines with Apple...
SwiftUI Cookbook. A guide to solving the most common problems and learning best practices while building SwiftUI apps - Second Edition SwiftUI Cookbook. A guide to solving the most common problems and learning best practices while building SwiftUI apps - Second Edition
-
Flutter is a revolutionary mobile framework that makes it easy to create cross-platform native-style apps for iOS, Android, and the web. This book covers the full range of topics involved in creating and releasing your first Flutter app - from the essentials of Dart programming and the Flutter fr...
Flutter for Beginners. An introductory guide to building cross-platform mobile applications with Flutter 2.5 and Dart - Second Edition Flutter for Beginners. An introductory guide to building cross-platform mobile applications with Flutter 2.5 and Dart - Second Edition
-
This book helps you use the open-source Flutter framework for building native mobile apps using Dart. You’ll learn about Dart programming and add functionalities to your Android and iOS apps for truly native performance. The book also covers recipes for solving almost any issue that you ma...
Flutter Cookbook. Over 100 proven techniques and solutions for app development with Flutter 2.2 and Dart Flutter Cookbook. Over 100 proven techniques and solutions for app development with Flutter 2.2 and Dart
-
Swift 5.3 is a powerful and accessible programming language that offers a variety of features to build robust mobile, desktop, and server-side applications and machine learning models. This book will help you gain a solid understanding of Swift programming using focused recipes for building Swift...
Swift Cookbook. Over 60 proven recipes for developing better iOS applications with Swift 5.3 - Second Edition Swift Cookbook. Over 60 proven recipes for developing better iOS applications with Swift 5.3 - Second Edition
Ebooka "Malicious Mobile Code. Virus Protection for Windows" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Malicious Mobile Code. Virus Protection for Windows" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Malicious Mobile Code. Virus Protection for Windows" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-919-9470-2, 9781491994702
- Data wydania ebooka:
- 2001-08-14 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 2.6MB
- Rozmiar pliku Mobi:
- 2.6MB
Spis treści ebooka
- Malicious Mobile Code
- Preface
- About This Book
- Why Another Book on Viruses?
- What This Book Doesnt Cover
- Organization of the Book
- Chapter Summary
- Conventions Used in This Book
- Software Covered in This Book
- Comments and Questions
- Acknowledgments
- Preface
- 1. Introduction
- The Hunt
- What Is Malicious Mobile Code?
- Major Types of Malicious Mobile Code
- In the Wild
- Malicious Mobile Code Naming
- VGrep
- How Bad Is the Problem of Malicious Code?
- Home Statistics
- The Growing Problem
- Anti-malicious Mobile Code Organizations
- Malicious Code and the Law
- Malicious Code-Writing Subculture
- Inside the Malicious Hackers Mind
- Typical Virus Writer
- Protesting with Malicious Code
- Malicious Mobile Code for the Social Good?
- Hacker Clubs, Newsletters, and Contests
- Malicious Code Tutorial Books
- How Does Malicious Code Spread?
- MMC Terminology
- Summary
- 2. DOS Computer Viruses
- Introduction
- DOS Technologies
- PC Boot Sequence
- .EXE and .COM Files
- .COM files
- .EXE files
- Software to Hardware
- Interrupts
- DOS Virus Technologies
- Writing a Virus
- Types of DOS Viruses
- Boot Viruses
- How boot viruses infect hard disks
- Special boot virus delivery methods
- Boot Viruses
- Memory Residency
- File-Infecting Viruses
- Overwriting viruses
- Cavity viruses
- Appending viruses
- Other executable types
- Companion viruses
- Cluster viruses
- Virus Defense Mechanisms
- Encryption
- Polymorphism
- Entry Point Changers
- Random Execution
- Stealth
- Armor
- A Good Defense Is a Bad Offense
- Trouble on the Horizon
- Examples of DOS Viruses
- Detecting a DOS-Based Computer Virus
- Removing a DOS Virus
- Protecting Yourself from Viruses
- Risk Assessment -- Low
- Summary
- 3. Windows Technologies
- Windows Technologies
- Windows APIs
- Win32 API
- 32-bit access
- Windows APIs
- Windows Booting
- Windows Technologies Introduced with Windows 3.x
- Text mode to GUI mode booting
- Virtual machines
- Program information files
- Virtual memory and swap files
- NE executable
- Core Windows files
- Dynamic linking libraries
- Processes and services
- Initialization files
- SYSTEM.INI
- WIN.INI
- WININIT.INI
- Startup folder
- Registration database
- File type associations
- Hidden file extensions
- File types that can hurt
- Resource sharing
- Windows Technologies
- Windows 3.x Startup Sequence
- New Technologies in Windows 9x
- Old carryovers
- Dynamic VxDs
- WINSTART.BAT and DOSSTART.BAT
- Portable executables
- Password files
- Integration of browser and web-based content
- Safe mode
- Hard drive file storage schemes
- Memory rings
- Windows 9x Startup Sequence
- Windows NT
- SAM and NT security
- Administrators and domains
- System accounts
- NTFS
- NT file streams
- Multiboot
- Logging and auditing
- NT 4.0 Boot Process
- New Windows Versions
- Windows ME
- System restore
- System file protection
- Windows ME
- Windows 2000
- Potentially abused components
- Future Windows Versions
- Summary
- 4. Viruses in a Windows World
- DOS Viruses on Windows Platforms
- Overall Effects on All Windows Platforms
- Boot virus infections
- File infections
- Overall Effects on All Windows Platforms
- Windows 3.x/DOS Virus Interaction
- DOS boot viruses and Windows 3.x
- DOS file infectors under Windows 3.x
- DOS Viruses on Windows Platforms
- Windows 9x/DOS Virus Interactions
- Windows 9x antivirus features
- Boot viruses and Windows 9x
- DOS file infectors under Windows 9x
- Windows NT/DOS Virus Interaction
- Boot viruses under NT
- DOS file infectors under NT
- DOS Virus in Windows Summary
- Windows Viruses on Windows Platforms
- First Windows Viruses
- Effects of Windows Viruses
- Windows virus implications
- Signs and Symptoms of Windows NT Virus Infections
- Common Signs and Symptoms
- Programs Wont Start
- Windows Cannot Use 32-bit Disk Support
- NT STOP Errors
- Installation Errors
- Swap File Problems
- Windows Virus Examples
- WinNT.Remote Explorer
- WinNT.Infis
- Win95.CIH
- Win32.Kriz
- Win95.Babylonia
- Win95.Fono
- Win95.Prizzy
- Win32.Crypto
- Win32.Bolzano
- Win2K.Stream
- Detecting a Windows Virus
- Unplug the PC from the Network
- Use an Antivirus Scanner
- Use AV Boot in Windows 2000
- Troubleshoot Any Boot Problems
- Run Scandisk
- Boot to Safe Mode
- Look for Newly Modified Executables
- Look for Strange Programs That Automatically Start
- Look for Strange Device Drivers
- Look for 32-bit Performance to be Disabled
- Unexpected System File Protection Messages
- Removing Viruses
- Use an Antivirus Scanner
- Removing Boot Viruses
- Boot with a clean disk
- Removing the Boot Virus Manually
- Removing Infected Files
- Research the Virus
- Stop Any Virus Services
- Boot to the Command-line Mode
- Delete and Replace Infected Files
- Clean Up Startup Areas
- Replace Registry to Remove Malicious Startup Programs
- Using System Recovery Tools
- Restore from a Tape Backup
- Preventing Viruses in Windows
- Install Antivirus Software
- Disable Booting from Drive A
- Dont Run Untrusted Code
- Install Service Packs and Updates
- Reveal File Extensions
- Limit Administrative Logons
- Tighten Security
- Future
- Risk Assessment -- Medium
- Summary
- 5. Macro Viruses
- Microsoft Office Version Numbers
- What Is a Macro Virus?
- Why Virus Writers Like Macro Viruses
- How Macro Viruses Spread
- What a Macro Virus Can Do
- Microsoft Word and Excel Macros
- Word Macros
- Automacros
- Visual Basic for Applications
- Excel Macros
- Working with Macros
- Macro Editor
- Organizer
- Visual Basic Editor
- Office 2000 Security
- Security Levels
- Signed Macros
- Trusting Add-ins and Templates
- Office 2000 Security Peculiarities
- Macro Virus Technologies
- Word Infections
- Excel Infections
- General Macro Virus Techniques
- Class module viruses
- Office disables macro copying commands
- MRU exploits
- Email viruses
- Add-in viruses
- Stealth macro viruses
- Encrypted and polymorphic macro viruses
- Dropping off a friend
- More external manipulation with VBA
- Startup directory files
- Random evolution
- Construction kits
- Cross-platform infectors
- Shiver cross-platform virus
- Language problems
- Macro Virus Examples
- W97M.Melissa.ac
- W97M.Marker
- Caligula Word Virus
- Triplicate Virus
- GaLaDRieL
- W2KM_PSD
- Detecting Macro Viruses
- Macro Warnings
- Ways viruses can get around macro warnings
- Macro Warnings
- False-positives
- Your Word Document Will Only Save as a Template
- Unexpected Document Modifications,Words, Messages, Graphics
- New Macros Appear
- ToolsMacro Is Disabled
- Global Template File Date Is Current
- Startup Directory Contains New Files
- View the Document with a Text Editor
- Removing Macro Viruses and Repairing the Damage
- Try a Virus Scanner
- Get a Clean Application
- Bypass Automacros
- Inspect Data and Delete Malicious Macros
- Repairing Word Documents
- Manually Repairing Other Damage
- Restore from a Backup
- Preventing Macro Viruses
- Disable Macros in Documents
- Upgrade All Versions of Office to the Latest Version
- Automate Document Scanning
- Set Office Security to High
- Locking the VBA Normal Project
- Save Normal Template Prompt
- Confirming Downloads for Office Documents
- Rename DEBUG.EXE
- Word Startup Switches
- Network Security
- Risk Assessment -- High
- The Future of Macro Viruses
- Getting rid of Microsoft Office isnt the answer
- The Future of Macro Viruses
- Summary
- 6. Trojans and Worms
- The Threat
- What Are Trojan Horses and Worms?
- Signs and Symptoms
- Types of Trojans
- Remote Administration Trojans
- Backdoor Programs
- Network Redirect
- Distributed Attacks
- Denial of Service
- Direct Action
- Audio and Video Capturing
- Phone Dialing Trojans
- Password Stealers
- Keyloggers
- Parasites
- Trojan Technology
- Stealth
- Hiding as Source Code
- Compressors
- Binders
- Sweep Lists
- Script Trojans
- Becoming Familiar with Your PC
- Startup Programs
- IP Ports
- TCP and UDP
- NetStat Command
- Trojan and Worm Examples
- Back Orifice
- PICTURE.EXE Trojan
- Win32.Ska-Happy99
- Win32.ExplorerZip
- Win32.PrettyPark
- JS.KAK.Worm
- Bat.Chode.Worm
- Win32.Qaz
- Life Stages Worm
- Detecting and Removing Trojansand Worms
- Cut Off Internet Access
- Use Scanners and Detectors
- Check Your Startup Files
- Check Memory
- Look for Trojan Ports
- Delete Trojan Files
- Extra Steps for Email Worms
- Preventing Trojans and Worms
- Dont Run Unknown Executable Content
- Scanners and Detector Programs
- Disable NetBIOS over TCP/IP
- Download the Latest IE and OS Patches
- Password-Protect Drive Shares
- Consider Limiting Email Attachments
- Rename or Remove Key Executables
- Change File Associations of Potentially Harmful Programs
- Use Firewalls
- Run Programs as a Nonadmin
- Risk Assessment -- High
- Summary
- 7. Instant Messaging Attacks
- Introduction to Instant Messaging
- Types of Instant Messaging Networks
- Mobile Messaging
- Introduction to Instant Messaging
- Types of Instant Messaging
- ICQ
- Internet Relay Chat
- Web Chats
- Proprietary IM Standards
- Introduction to Internet Relay Chat
- IRC Networks
- IRC Clients
- IRC Commands
- Other IRC Features
- DCC
- CTCP
- Hacking Instant Messaging
- Hacking AIM and ICQ
- Punters and busters
- Malicious file transfers
- Name hijacking
- IP address stealing
- Web buffer overflow
- Hacking AIM and ICQ
- Hacking IRC
- Script files
- Bots
- Lag
- Flooding
- NetSplit
- Nick collision kill
- Channel desyncs
- Channel wars
- Network redirection
- Examples of IRC Attacks
- Example Malicious Scripts
- CTCP flood
- Mass deop attack
- Example Malicious Scripts
- IRC Worms and Trojans
- Simpsalapim
- Mr. Wormy
- Using IRC to Send Viruses
- Septic
- Script worms less of a threat now
- Detecting Malicious IM
- Removing Malicious IM
- Protecting Yourself from IM Attacks
- Risk Assessment -- Medium
- Summary
- 8. Internet Browser Technologies
- Introduction
- Browser Technologies
- What Is a Browser?
- Browser versions
- What Is a Browser?
- URLs
- Hiding malicious URLs
- Web Languages
- HTML
- Viewing HTML source code
- HTML versions
- HTML
- XML
- DHTML
- Scripting Languages
- JavaScript
- VBScript
- JScript
- Remote scripting calls
- Hypertext preprocessor script
- HTML Applications
- Other Browser Technologies
- Cascading Style Sheets
- Privacy Issues
- Cookies
- History
- Frames
- File and Password Caching
- AutoComplete
- Microsoft Wallet and Passport
- HTTPS and SSL
- Active Desktop
- Skins
- When to Worry About Browser Content
- Summary
- 9. Internet Browser Attacks
- Browser-Based Exploits
- Examples of Attacks and Exploits
- Viruses and Trojans
- HTML.Internal
- PHP viruses and Trojans
- eBayla
- Hotmail password exploit
- Embedded malicious code in shared postings
- HTML applications
- Viruses and Trojans
- Browser Component Exploits
- Browser print templates
- File upload forms
- Redirection Exploits
- Web spoofing
- JavaScript redirect
- XML redirect
- CSS/DHTML redirect
- Frame problems
- Dotless IP address exploit
- Application Interaction Exploits
- Russian New Year
- Media Player vulnerabilities
- PowerPoint buffer overflow
- Office 2000 ODBC vulnerability
- Telnet attacks
- Active Desktop exploits
- More Office HTML exploits
- Privacy Invasions
- Cookie exploits
- Cookie hijacking
- Web bugs
- Application monitors
- ImportExportFavorites exploit
- Cached data bugs
- Detecting Internet Browser Attacks
- Use an Antivirus Scanner or Firewall
- Check Unexpected or Unexplained Errors
- View Source Code
- Look for the FileSystemObject in Scripts
- Look for Unexpected Newly Modified Files
- Removing and Repairing the Damage
- Remove Malicious Files
- Edit or Delete Modified Files
- Run Repair Tool
- Preventing Internet Browser Attacks
- Configure Browser Settings and Zones
- Internet Explorer security settings
- Internet Explorer security zones
- Internet security registry settings
- New cookie management update
- Internet Explorer Administration Kit
- Configure Browser Settings and Zones
- Install the Latest Version of Browser and Security Patches
- Install and Use an Antivirus Scanner
- Avoid Untrusted Web Sites
- Remove HTA Association
- Risk Assessment -- Medium
- Summary
- 10. Malicious Java Applets
- Java
- Java Virtual Machine
- Java Byte Code
- Java Applet Versus Java Application
- Javas Just-In-Time Compiler
- Java
- Java Security
- Java Security -- Classic Model
- Byte Code Verifier
- Applet Class Loader
- Name spaces
- The Security Manager
- CLASSPATH
- Some say the sandbox is too secure
- Java security expands
- Java Security -- Classic Model
- Java 2 Security -- A Granular Approach
- Archive Formats
- Java archives
- Not all Java browsers are created equally
- Java Exploits
- Paid to Hack
- History of Java exploits
- Paid to Hack
- Types of Exploits
- Attacks within the sandbox
- Social engineering applets
- Java viruses and Trojans
- Applets that break the sandbox
- Example Java Exploits
- Annoying Applets
- Java.NoisyBear
- Hostile Thread Java applet
- DigiCrimes Irritant
- Annoying Applets
- Java Viruses
- Strange Brew Java virus
- BeanHive Java virus
- Hoax Java bombs
- Compromising Intrusions
- DNS subversion trick
- Bug in the Java Byte Code Verifier
- Microsoft Virtual Machine Verifier vulnerability
- Plug-ins
- Detecting Malicious Java Applets
- Removing Malicious Java Code
- Protecting Yourself from Malicious Java Code
- Total Security: Disable Java
- Run Only Trusted Java
- Use an Antivirus Scanner
- Firewalls
- Configure Stronger Browser Java Security
- Internet Explorer Java security
- Java-specific settings in Internet Explorer
- Java Scratch Pad
- Customizing Java permissions in Internet Explorer
- Apply the Latest Security Patches
- Use the Latest Browser Version
- Know Your Java CLASSPATH
- Disable Plug-ins
- Remove Unneeded Applets
- Avoid Malicious Sites
- Be Aware of Social-Engineered Malicious Code
- Risk Assessment -- Low
- Summary
- 11. Malicious ActiveX Controls
- ActiveX
- ActiveX Controls
- ActiveX Scripting
- Safe for scripting and initializing
- Differences Between ActiveX and Java
- Activating ActiveX
- Cabinet archival files
- ActiveX
- ActiveX Security
- Digital Signing and Certificates
- Digital authentication summary
- Encryption
- A simple encryption example
- Public key security
- Hashing
- Certificates and certificate authorities
- Digital certificate incompatibilities
- Certificate granting process
- Trusting the trust giver
- Revocation
- Always trusting a certificate
- Digital Signing and Certificates
- Authenticode
- Java, Authenticode, and Internet Explorer
- Timestamping
- Signed Code in Action
- Internet Explorer and Authenticoded Java
- ActiveX Security Criticisms
- ActiveX Has No Sandbox
- Safe for Scripting Vulnerability
- Buffer Overflows
- Users Cant Be Trusted
- Authenticity Doesnt Prevent Tampering
- Authenticode Is Only as Strong as Its Private Keys
- Weak Revocation
- No Granularity
- ActiveX Controls Are Registered to the Machine
- No Easy Way to See All Controls
- Security in Browser
- Malicious ActiveX Examples
- Exploder
- Runner
- InfoSpace Compromise
- Quicken Exploit
- Microsofts Not Safe for Scripting Controls
- Norton Utilities exploit
- Help desk controls
- DHTML edit vulnerability
- Taskpads
- Scriptlet.typlib and Eyedog exploits
- Office 2000 UA control
- Active Setup control
- Windows 2000 Sysmon Buffer Overflow
- Detecting Malicious ActiveX Controls
- Removing and Preventing Malicious Active Controls
- Run Only Trusted Code
- Kill Bit Setting
- Examine Certificates
- Configure ActiveX Browser Security
- Remove Unnecessary Controls
- Reappearing controls
- Error messages while removing controls
- Viewing and removing all controls
- View Trust Relationships
- Change Safe for Scripting Functionality
- Enable Certificate Revocation Checking
- Risk Assessment -- Medium
- Summary
- 12. Email Attacks
- Introduction
- Email Programs
- Types of Email
- MIME
- Encrypted email
- Newsgroups
- Preview pane
- Hiding behind email
- Types of Email
- Why Is Outlook Such a Popular Target?
- Microsoft Outlook Technology
- Outlook interfaces
- Windows Scripting Host
- Encoded scripts
- Future of WSH
- Email Exploits
- Email Worms
- Bubbleboy
- ILoveYou virus
- Hiding viruses
- Hybris
- Email Worms
- Email Exploits
- Users dont even have to open email to execute exploit
- Internet cache vulnerability
- Compiled help vulnerability
- vCard buffer overflow
- Detecting Email Attacks
- Removing Infected Email
- Information for Microsoft ExchangeServer Administrators
- ExMerge
- Information for Microsoft ExchangeServer Administrators
- Preventing Email Attacks
- Disable Scripting and HTML Content in Email
- Treat Unexpected Emails with Caution
- Keep Email Client Updated
- Run Antivirus Software
- Implement Outlook Security Patch
- Getting around blocked access to file attachments
- Preventing malicious code from using Outlook to spread
- Strengthening overall Outlook security
- Options for Outlook 97 and Outlook Express users
- Problems with Outlook Security Update
- Uninstalling the Outlook Security Update
- Remove WSH Association
- Reveal Hidden File Extensions
- If You Use Web-based Email, Use Vendors Who Use Antivirus Scanners
- Modify Security on Outlook Clients
- Set Up Message Monitoring
- Risk Assessment -- High
- Summary
- 13. Hoax Viruses
- The Mother of All Computer Viruses
- Bamboozled
- Why Do People Write Hoax Messages?
- Partial Truths
- Hoaxes Can Come True
- The Mother of All Computer Viruses
- Categories of Hoax Messages
- Virus Warning
- Good Times virus
- Virus Warning
- Chain Letters
- Sympathy requests
- Fake news reports
- Giveaways
- Threats
- Detection
- Read Message Looking for Telltale Signs
- Search for Information on Hoax
- Web sites about hoaxes
- Commercial vendor web sites
- Removing and Preventing Hoax Viruses
- Let Others Know It Is a Hoax
- Use ExMerge to Delete All Hoax Messages at Once
- Set Up an Email Filter
- Risk Assessment -- Low
- Future Hoaxes Will Be Better
- Summary
- 14. Defense
- Defense Strategy
- Malicious Mobile Code Defense Plan
- How to Create a Malicious Mobile Code Defense Plan
- Get management to buy in
- Pick a plan team
- Pick an operational team
- Take a technology inventory
- Determine plan coverage
- Discuss and write the plan
- Test the plan
- Implement the plan
- Provide quality assurance testing
- Protect new assets
- Test Rapid Response Team
- Predefine a process for updating and reviewing plan
- How to Create a Malicious Mobile Code Defense Plan
- The Plan
- Remember to address foreign computers and networks
- Plan core
- Deployment
- Distributing updates
- Communication plan
- End user education
- Rapid response plan
- Rapid Response Plan Steps
- Use a Good Antivirus Scanner
- Checksums Versus Scan Strings
- Traits of a Good Antivirus Scanner
- Fast and accurate
- Stability
- Transparency
- Runs on your platforms
- Customizable
- Scanner should protect itself
- Good cleaning rate
- Scanning archived files
- Heuristics
- Rescue diskette
- Automated updates
- Good technical support
- Proactive research
- Enterprise capabilities
- Logging
- Notification
- Email capabilities
- Antivirus Scanning Locations
- Desktop
- Email Server
- File Server
- Internet Border
- Where Should Antivirus Software Run?
- Other Antivirus Scanner Considerations
- When to scan
- Internet-based scanning
- Should you disable the antivirus scanner to install new software?
- The Best Steps Toward Securing Any Windows PC
- Additional Defense Tools
- Firewalls
- Intrusion Detection
- Honey Pots
- Port Monitors and Scanners
- Security Scanners
- Internet Content Scanners
- Miscellaneous Utilities
- SmartWhoIs
- Locking programs down
- Filemon and Regmon
- Goat files
- Good Backup
- Antivirus Product Review
- Symantecs Norton Antivirus
- Future
- Summary
- 15. The Future
- The Future of Computing
- Media Convergence
- Distributed Computing
- Other Key Technology Changes
- P2P computing
- Microsofts domination weakens
- Small computers
- Appliance computing
- Government monitoring
- The Future of Computing
- MMC Exploits
- Malicious Code Popularity Will Increase
- Hacktivism Will Rise
- Increase in Linux Viruses
- Connectedness Can Be a Weakness
- Denial of Service Attacks
- Attack of the Killer Copier
- Real Defense Solutions
- Audit All Code
- Ultimate Authentication
- More Secure Applications
- Prevent Unauthorized Code Changes
- ISP Scanning
- Allow Only Approved Content to Execute
- National Security Infrastructure
- Stiffer Penalties
- Summary
- Index
- Colophon
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Malicious Mobile Code. Virus Protection for Windows Roger A. Grimes (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.