Preface; About This Book; Why Another Book on Viruses?; What This Book Doesn''t Cover; Organization of the Book; Conventions Used in This Book; Software Covered in This Book; Comments and Questions; Acknowledgments;Chapter 1: Introduction; 1.1 The Hunt; 1.2 What Is Malicious Mobile Code?; 1.3 Malicious Code and the Law; 1.4 Malicious Code-Writing Subculture; 1.5 MMC Terminology; 1.6 Summary;Chapter 2: DOS Computer Viruses; 2.1 Introduction; 2.
2 DOS Technologies; 2.3 DOS Virus Technologies; 2.4 Types of DOS Viruses; 2.5 Virus Defense Mechanisms; 2.6 Examples of DOS Viruses; 2.7 Detecting a DOS-Based Computer Virus; 2.8 Removing a DOS Virus; 2.9 Protecting Yourself from Viruses; 2.
10 Risk Assessment -- Low; 2.11 Summary;Chapter 3: Windows Technologies; 3.1 Windows Technologies; 3.2 New Windows Versions; 3.3 Summary;Chapter 4: Viruses in a Windows World; 4.1 DOS Viruses on Windows Platforms; 4.2 Windows Viruses on Windows Platforms; 4.3 Signs and Symptoms of Windows NT Virus Infections; 4.
4 Windows Virus Examples; 4.5 Detecting a Windows Virus; 4.6 Removing Viruses; 4.7 Removing Infected Files; 4.8 Preventing Viruses in Windows; 4.9 Future; 4.10 Risk Assessment -- Medium; 4.11 Summary;Chapter 5: Macro Viruses; 5.
1 Microsoft Office Version Numbers; 5.2 What Is a Macro Virus?; 5.3 Microsoft Word and Excel Macros; 5.4 Working with Macros; 5.5 Office 2000 Security; 5.6 Macro Virus Technologies; 5.7 Macro Virus Examples; 5.8 Detecting Macro Viruses; 5.
9 Removing Macro Viruses and Repairing the Damage; 5.10 Preventing Macro Viruses; 5.11 Risk Assessment -- High; 5.12 Summary;Chapter 6: Trojans and Worms; 6.1 The Threat; 6.2 What Are Trojan Horses and Worms?; 6.3 Signs and Symptoms; 6.4 Types of Trojans; 6.
5 Trojan Technology; 6.6 Becoming Familiar with Your PC; 6.7 Trojan and Worm Examples; 6.8 Detecting and Removing Trojansand Worms; 6.9 Preventing Trojans and Worms; 6.10 Risk Assessment -- High; 6.11 Summary;Chapter 7: Instant Messaging Attacks; 7.1 Introduction to Instant Messaging; 7.
2 Types of Instant Messaging; 7.3 Introduction to Internet Relay Chat; 7.4 Hacking Instant Messaging; 7.5 Examples of IRC Attacks; 7.6 Detecting Malicious IM; 7.7 Removing Malicious IM; 7.8 Protecting Yourself from IM Attacks; 7.9 Risk Assessment -- Medium; 7.
10 Summary;Chapter 8: Internet Browser Technologies; 8.1 Introduction; 8.2 Browser Technologies; 8.3 Web Languages; 8.4 Other Browser Technologies; 8.5 When to Worry About Browser Content; 8.6 Summary;Chapter 9: Internet Browser Attacks; 9.1 Browser-Based Exploits; 9.
2 Examples of Attacks and Exploits; 9.3 Detecting Internet Browser Attacks; 9.4 Removing and Repairing the Damage; 9.5 Preventing Internet Browser Attacks; 9.6 Risk Assessment -- Medium; 9.7 Summary;Chapter 10: Malicious Java Applets; 10.1 Java; 10.2 Java Security; 10.
3 Java Exploits; 10.4 Example Java Exploits; 10.5 Detecting Malicious Java Applets; 10.6 Removing Malicious Java Code; 10.7 Protecting Yourself from Malicious Java Code; 10.8 Risk Assessment -- Low; 10.9 Summary;Chapter 11: Malicious ActiveX Controls; 11.1 ActiveX; 11.
2 ActiveX Security; 11.3 ActiveX Security Criticisms; 11.4 Malicious ActiveX Examples; 11.5 Detecting Malicious ActiveX Controls; 11.6 Removing and Preventing Malicious Active Controls; 11.7 Risk Assessment -- Medium; 11.8 Summary;Chapter 12: Email Attacks; 12.1 Introduction; 12.
2 Email Programs; 12.3 Email Exploits; 12.4 Detecting Email Attacks; 12.5 Removing Infected Email; 12.6 Preventing Email Attacks; 12.7 Risk Assessment -- High; 12.8 Summary;Chapter 13: Hoax Viruses; 13.1 The Mother of All Computer Viruses; 13.
2 Categories of Hoax Messages; 13.3 Detection; 13.4 Removing and Preventing Hoax Viruses; 13.5 Risk Assessment -- Low; 13.6 Summary;Chapter 14: Defense; 14.1 Defense Strategy; 14.2 Malicious Mobile Code Defense Plan; 14.3 Use a Good Antivirus Scanner; 14.
4 Antivirus Scanning Locations; 14.5 The Best Steps Toward Securing Any Windows PC; 14.6 Additional Defense Tools; 14.7 Antivirus Product Review; 14.8 Future; 14.9 Summary;Chapter 15: The Future; 15.1 The Future of Computing; 15.2 MMC Exploits; 15.
3 Real Defense Solutions; 15.4 Summary;Colophon;.