What people are saying - Write a review
We haven't found any reviews in the usual places.
PREFACE AND ACKNOWLEDGEMENTS
HOW CAN A VIRUS PENETRATE A COMPUTER?
8 other sections not shown
algorithm ANSI.SYS anti-virus software assembly language AUTOEXEC.BAT binary boot sector bootstrap sector viruses bulletin boards Cascade characters Checksumming software checksums command COMMAND.COM computer system computer viruses CONFIG.SYS contains copy Datacrime dBASE DEBUG decryption define DES.C detection dial dirty PC disassembled disk boot sector disk bootstrap sector disk drives display the message encryption key EPROM example EXE files executed FINGER FINGER.C fingerprints floppy disk Fu Manchu hard disk hexadecimal infected disk infected file infected program Infective length instructions interrupt table Italian virus Jerusalem logic bomb machine memory MS-DOS mutation normally Offset operating system organisation original boot sector package parasitic viruses payload PC becomes infected PC-DOS return ERROR scanning software SEARCH sequence shareware static int struct Suriv Trojan horse uninfected Unix unsigned char unsigned int virus attack Virus Bulletin virus code virus infection virus patterns VIRUS SIDE-EFFECTS void worm