What people are saying - Write a review
We haven't found any reviews in the usual places.
TABLE OF CONTENTS
HOW CAN AWIRUS PENETRATE A COMPUTER P
8 other sections not shown
algorithm anti-virus software assembly language AUTOEXEC.BAT binary boot sector bootstrap sector viruses buff bulletin boards bytes Cascade characters checksums command COMMAND.COM computer system computer virus computer viruses CONFIG.SYS contains copy Datacrime dBASE DEBUG decryption detect dial disassembled disk boot sector disk bootstrap sector disk drives drive_and_path encryption key example EXE files executed FINGER fingerprints floppy disk Fu Manchu hard disk hexadecimal infected disk infected file infected program Infective length infp instructions interception interrupt table Italian virus Jerusalem local_path logic bomb machine memory memory-resident MS-DOS mutation normally Offset operating system organisation package parasitic viruses payload PC-DOS return ERROR scanning software SEARCH search_files sequence shareware static int stropy struct Suriv switch tdefine Trojan horse uninfected Unix unsigned char unsigned int virus attack virus code virus infection virus patterns VIRUS SIDE-EFFECTS void worm write-protected