What people are saying - Write a review
We haven't found any reviews in the usual places.
Theory of Viruses
Operation of PC Viruses
15 other sections not shown
Other editions - View all
access control active algorithm anti-virus Apple Macintosh application archive Atari ST audit backups BIOS BITNET block boot sector virus bugs bulletin bytes caused CERT chain letter checksum code segment command COMMAND.COM compiler component computer security computer system computer viruses copy daemon damage DECNET detection disinfection disk drive electronic encryption environment executable code executable files floppy Fridrik Skulason function hardware host program IBM PC incident infector initialisation integrity intercept Internet worm interrupt vector jump large number loaded login machine Macintosh malicious software manager manipulation master boot record memory modified monitor node normally nVIR offence operating system organisation password PC Cyborg permit processor propagation protocol relocation table remote replication resource resource fork restricted sequence server signature specific spread startup system file techniques track trojan horse trusted UNIX utilised utilities viral code virus code virus infection