Books & Videos

Table of Contents

  1. Chapter 1 Introduction

    1. The Hunt

    2. What Is Malicious Mobile Code?

    3. Malicious Code and the Law

    4. Malicious Code-Writing Subculture

    5. MMC Terminology

    6. Summary

  2. Chapter 2 DOS Computer Viruses

    1. Introduction

    2. DOS Technologies

    3. DOS Virus Technologies

    4. Types of DOS Viruses

    5. Virus Defense Mechanisms

    6. Examples of DOS Viruses

    7. Detecting a DOS-Based Computer Virus

    8. Removing a DOS Virus

    9. Protecting Yourself from Viruses

    10. Risk Assessment -- Low

    11. Summary

  3. Chapter 3 Windows Technologies

    1. Windows Technologies

    2. New Windows Versions

    3. Summary

  4. Chapter 4 Viruses in a Windows World

    1. DOS Viruses on Windows Platforms

    2. Windows Viruses on Windows Platforms

    3. Signs and Symptoms of Windows NT Virus Infections

    4. Windows Virus Examples

    5. Detecting a Windows Virus

    6. Removing Viruses

    7. Removing Infected Files

    8. Preventing Viruses in Windows

    9. Future

    10. Risk Assessment -- Medium

    11. Summary

  5. Chapter 5 Macro Viruses

    1. Microsoft Office Version Numbers

    2. What Is a Macro Virus?

    3. Microsoft Word and Excel Macros

    4. Working with Macros

    5. Office 2000 Security

    6. Macro Virus Technologies

    7. Macro Virus Examples

    8. Detecting Macro Viruses

    9. Removing Macro Viruses and Repairing the Damage

    10. Preventing Macro Viruses

    11. Risk Assessment -- High

    12. Summary

  6. Chapter 6 Trojans and Worms

    1. The Threat

    2. What Are Trojan Horses and Worms?

    3. Signs and Symptoms

    4. Types of Trojans

    5. Trojan Technology

    6. Becoming Familiar with Your PC

    7. Trojan and Worm Examples

    8. Detecting and Removing Trojansand Worms

    9. Preventing Trojans and Worms

    10. Risk Assessment -- High

    11. Summary

  7. Chapter 7 Instant Messaging Attacks

    1. Introduction to Instant Messaging

    2. Types of Instant Messaging

    3. Introduction to Internet Relay Chat

    4. Hacking Instant Messaging

    5. Examples of IRC Attacks

    6. Detecting Malicious IM

    7. Removing Malicious IM

    8. Protecting Yourself from IM Attacks

    9. Risk Assessment -- Medium

    10. Summary

  8. Chapter 8 Internet Browser Technologies

    1. Introduction

    2. Browser Technologies

    3. Web Languages

    4. Other Browser Technologies

    5. When to Worry About Browser Content

    6. Summary

  9. Chapter 9 Internet Browser Attacks

    1. Browser-Based Exploits

    2. Examples of Attacks and Exploits

    3. Detecting Internet Browser Attacks

    4. Removing and Repairing the Damage

    5. Preventing Internet Browser Attacks

    6. Risk Assessment -- Medium

    7. Summary

  10. Chapter 10 Malicious Java Applets

    1. Java

    2. Java Security

    3. Java Exploits

    4. Example Java Exploits

    5. Detecting Malicious Java Applets

    6. Removing Malicious Java Code

    7. Protecting Yourself from Malicious Java Code

    8. Risk Assessment -- Low

    9. Summary

  11. Chapter 11 Malicious ActiveX Controls

    1. ActiveX

    2. ActiveX Security

    3. ActiveX Security Criticisms

    4. Malicious ActiveX Examples

    5. Detecting Malicious ActiveX Controls

    6. Removing and Preventing Malicious Active Controls

    7. Risk Assessment -- Medium

    8. Summary

  12. Chapter 12 Email Attacks

    1. Introduction

    2. Email Programs

    3. Email Exploits

    4. Detecting Email Attacks

    5. Removing Infected Email

    6. Preventing Email Attacks

    7. Risk Assessment -- High

    8. Summary

  13. Chapter 13 Hoax Viruses

    1. The Mother of All Computer Viruses

    2. Categories of Hoax Messages

    3. Detection

    4. Removing and Preventing Hoax Viruses

    5. Risk Assessment -- Low

    6. Summary

  14. Chapter 14 Defense

    1. Defense Strategy

    2. Malicious Mobile Code Defense Plan

    3. Use a Good Antivirus Scanner

    4. Antivirus Scanning Locations

    5. The Best Steps Toward Securing Any Windows PC

    6. Additional Defense Tools

    7. Antivirus Product Review

    8. Future

    9. Summary

  15. Chapter 15 The Future

    1. The Future of Computing

    2. MMC Exploits

    3. Real Defense Solutions

    4. Summary

  1. Colophon