The Computer Virus CrisisRecognize symptoms, route viruses and correct damage to systems, backups, data files and programs with the help of this text. This edition has been updated to reflect innovations in computer viruses and the methods in the battle against them. The book provides current information on procedures and software for the prevention, assessment, containment and amelioration of exposures plus discussion on the changing nature of the virus threat to networks, minis, mainframes and distributed systems. |
Contents
INTRODUCTION | 1 |
THE DIMENSIONS OF COMPUTER VIRUSES | 21 |
WHAT CAN A VIRUS DO TO MY SYSTEM? | 55 |
Copyright | |
15 other sections not shown
Other editions - View all
Common terms and phrases
Aliases antiviral available free memory AVTK backups boot sector Boot Sector Infector bytes Detection Method CHKDSK COMMAND.COM computer virus copy damage Datacrime delete infected files Desktop file diskette display drive Eff Length encryption EXE files EXE growth F-Prot fected file allocation table file growth file infector file length files General Comments files will increase floppy Friday the 13th hard disk IBM Scan including COMMAND.COM increase in length infect COMMAND.COM Infected COM files infected program infected systems Infector Detection Method Infector General Comments Infector Removal Instructions install itself memory Macintosh mainframe malicious code memory resident microcomputer nVIR operating system Origin partition table Pro-Scan program infected Rare Symptoms reboot ResEdit Resident COM Infector Scan/D ShareWare system files system memory text string things Trojan Type Code uninfected USSR vandal variant viral code VirexPC VirHunt 2.0 Virus is executed virus is memory virus will install ViruScan viruses WDEF