The Computer Virus Handbook
This book opens with an overview of viruses and other types of rogue software. It then goes on to give an explanation of how the different types of known viruses operate, along with a look into the future of virus programs. The author then describes effective measures for preventing the spread of viruses, placing an emphasis on anti-virus policies that can be implemented in the workplace.
What people are saying - Write a review
We haven't found any reviews in the usual places.
WHY THIS BOOK IS FOR
PART ONE WHAT ARE COMPUTER VIRUSES
TWO THE INFECTION OF IBM
19 other sections not shown
activity Aliases None Effective antivirus software AUTOEXEC.BAT backup Batch File Batch File Virus BIOS boot sector bootable bytes Type code(s Charles Bowen checksum CHECKUP CHECKUP.LOG file Clean-up command processor COMMAND.COM computer systems computer viruses CONFIG.SYS copy created damage data files Datacrime destructive Detection method Viruscan detectors device driver disk drive diskette display echo echo echo Effective length error ERRORLEVEL EXE files executable files F-Prot F-Prot Removal instructions filename floppy disks FLU_SHOT Friday the 13th hard disk hardware infected files infected program infector Detection method installed Jerusalem load Macintosh managers memory memory-resident Morris MS-DOS normal operating system option personal computers program files protect puter reboot REM REM Removal instructions SCAN/D reported rogue programs rogue software root directory says SCAN shareware shell Source code statute stored system files users utilities viral code virus detection virus infects write write-protected