Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats |
Contents
INTRODUCTION | 1 |
PROGRAMMED THREATS | 7 |
WHAT IS A COMPUTER VIRUS? | 15 |
Copyright | |
7 other sections not shown
Common terms and phrases
activity ADAPSO anti-viral software Apple Macintosh application backup behavior BIOS boot sector viruses boot sequence Brain virus bulletin board bulletin board systems bytes Cascade Cascade virus cause checksum COMMAND.COM computer crime computer security computer systems computer viruses copy criminal damage Datacrime detect diskette display employee executed federal floppy disks Friday the 13th FuManchu hard disk host code host program Hpat IBM PC IBM PC viruses individuals infected file infected program INIT 29 installs interrupt involved IO.SYS Israeli alias Israeli virus law enforcement logic bomb losses machine mainframe malicious code nVIR operating system P.O. Box partition record passwords personal computers prevent problem programmed threats prosecution protect reboot resource fork screen soft reboot specific spread Statutes system file Table Traceback trigger users Version Aliases viral code viral infection virus Alias virus Boot sector virus Memory resident Virus Variants Description worms



