81 pages matching various in this book
Results 1-3 of 81
What people are saying - Write a review
We haven't found any reviews in the usual places.
Types of Malicious Code
Why This Book?
46 other sections not shown
1able ActiveX controls alter attacker attacker's backdoor backdoor listener bad guys BIOS blocks browser buffer overflow Chapter client command shell configuration connection cookies create default detect device driver discussed e-mail encrypted evil executable file integrity checking file system functionality hard drive hidden hide Hydan ICMP ifconfig implement infected inode inside installed interface Internet Explorer kernel-mode RootKit Linux kernel loadable kernel modules loaded look malicious code malicious mobile code malware memory microcode Microsoft mobile code Netcat operating system options packets password patch promiscuous mode reboot registry key remote running processes script Setiri sniffer system administrator system call table target TCP port tcpdump techniques Trojan horse UDP port user mode user-mode process user-mode RootKits various victim machine virus viruses Web server Windows machine Windows systems worm wrapper