Virus Protection for Windows by Roger A

Total Page:16

File Type:pdf, Size:1020Kb

Virus Protection for Windows by Roger A Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Publisher: O'Reilly Pub Date: August 2001 ISBN: 1-56592-682-X Table of Pages: 542 • Contents • Index • Reviews Reader • Reviews • Errata Copyright Preface About This Book Why Another Book on Viruses? What This Book Doesn't Cover Organization of the Book Conventions Used in This Book Software Covered in This Book Comments and Questions Acknowledgments Chapter 1. Introduction Section 1.1. The Hunt Section 1.2. What Is Malicious Mobile Code? Section 1.3. Malicious Code and the Law Section 1.4. Malicious Code-Writing Subculture Section 1.5. MMC Terminology Section 1.6. Summary Chapter 2. DOS Computer Viruses Section 2.1. Introduction Section 2.2. DOS Technologies Section 2.3. DOS Virus Technologies Section 2.4. Types of DOS Viruses Section 2.5. Virus Defense Mechanisms Section 2.6. Examples of DOS Viruses Section 2.7. Detecting a DOS-Based Computer Virus Section 2.8. Removing a DOS Virus Section 2.9. Protecting Yourself from Viruses Section 2.10. Risk Assessment -- Low Section 2.11. Summary Chapter 3. Windows Technologies Section 3.1. Windows Technologies Section 3.2. New Windows Versions Section 3.3. Summary Chapter 4. Viruses in a Windows World Section 4.1. DOS Viruses on Windows Platforms Section 4.2. Windows Viruses on Windows Platforms Section 4.3. Signs and Symptoms of Windows NT Virus Infections Section 4.4. Windows Virus Examples Section 4.5. Detecting a Windows Virus Section 4.6. Removing Viruses Section 4.7. Removing Infected Files Section 4.8. Preventing Viruses in Windows Section 4.9. Future Section 4.10. Risk Assessment -- Medium Section 4.11. Summary Chapter 5. Macro Viruses Section 5.1. Microsoft Office Version Numbers Section 5.2. What Is a Macro Virus? Section 5.3. Microsoft Word and Excel Macros Section 5.4. Working with Macros Section 5.5. Office 2000 Security Section 5.6. Macro Virus Technologies Section 5.7. Macro Virus Examples Section 5.8. Detecting Macro Viruses Section 5.9. Removing Macro Viruses and Repairing the Damage Section 5.10. Preventing Macro Viruses Section 5.11. Risk Assessment -- High Section 5.12. Summary Chapter 6. Trojans and Worms Section 6.1. The Threat Section 6.2. What Are Trojan Horses and Worms? Section 6.3. Signs and Symptoms Section 6.4. Types of Trojans Section 6.5. Trojan Technology Section 6.6. Becoming Familiar with Your PC Section 6.7. Trojan and Worm Examples Section 6.8. Detecting and Removing Trojansand Worms Section 6.9. Preventing Trojans and Worms Section 6.10. Risk Assessment -- High Section 6.11. Summary Chapter 7. Instant Messaging Attacks Section 7.1. Introduction to Instant Messaging Section 7.2. Types of Instant Messaging Section 7.3. Introduction to Internet Relay Chat Section 7.4. Hacking Instant Messaging Section 7.5. Examples of IRC Attacks Section 7.6. Detecting Malicious IM Section 7.7. Removing Malicious IM Section 7.8. Protecting Yourself from IM Attacks Section 7.9. Risk Assessment -- Medium Section 7.10. Summary Chapter 8. Internet Browser Technologies Section 8.1. Introduction Section 8.2. Browser Technologies Section 8.3. Web Languages Section 8.4. Other Browser Technologies Section 8.5. When to Worry About Browser Content Section 8.6. Summary Chapter 9. Internet Browser Attacks Section 9.1. Browser-Based Exploits Section 9.2. Examples of Attacks and Exploits Section 9.3. Detecting Internet Browser Attacks Section 9.4. Removing and Repairing the Damage Section 9.5. Preventing Internet Browser Attacks Section 9.6. Risk Assessment -- Medium Section 9.7. Summary Chapter 10. Malicious Java Applets Section 10.1. Java Section 10.2. Java Security Section 10.3. Java Exploits Section 10.4. Example Java Exploits Section 10.5. Detecting Malicious Java Applets Section 10.6. Removing Malicious Java Code Section 10.7. Protecting Yourself from Malicious Java Code Section 10.8. Risk Assessment -- Low Section 10.9. Summary Chapter 11. Malicious ActiveX Controls Section 11.1. ActiveX Section 11.2. ActiveX Security Section 11.3. ActiveX Security Criticisms Section 11.4. Malicious ActiveX Examples Section 11.5. Detecting Malicious ActiveX Controls Section 11.6. Removing and Preventing Malicious Active Controls Section 11.7. Risk Assessment -- Medium Section 11.8. Summary Chapter 12. Email Attacks Section 12.1. Introduction Section 12.2. Email Programs Section 12.3. Email Exploits Section 12.4. Detecting Email Attacks Section 12.5. Removing Infected Email Section 12.6. Preventing Email Attacks Section 12.7. Risk Assessment -- High Section 12.8. Summary Chapter 13. Hoax Viruses Section 13.1. The Mother of All Computer Viruses Section 13.2. Categories of Hoax Messages Section 13.3. Detection Section 13.4. Removing and Preventing Hoax Viruses Section 13.5. Risk Assessment -- Low Section 13.6. Summary Chapter 14. Defense Section 14.1. Defense Strategy Section 14.2. Malicious Mobile Code Defense Plan Section 14.3. Use a Good Antivirus Scanner Section 14.4. Antivirus Scanning Locations Section 14.5. The Best Steps Toward Securing Any Windows PC Section 14.6. Additional Defense Tools Section 14.7. Antivirus Product Review Section 14.8. Future Section 14.9. Summary Chapter 15. The Future Section 15.1. The Future of Computing Section 15.2. MMC Exploits Section 15.3. Real Defense Solutions Section 15.4. Summary Colophon Index Top Team-Fly Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Table of Contents Copyright © 2001 O'Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of a Trojan horse and the topic of malicious mobile code is a trademark of O'Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Team-Fly Top Team-Fly Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Table of Contents Preface Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every antivirus researcher. We had to repeat it to every inquiring emailer asking if today's computer virus hoax was something to be afraid of. There was only one problem. We were wrong! Well, we weren't wrong at the time. Then the Internet became everything. Computers advanced. New computer languages were created. Old languages were expanded. Writing programs became easier and so did writing malicious code to do bad things. Write it once today and spread it to 60 million computers tomorrow. Worms, like Melissa and I Love You, routinely shut down tens of thousands of networks in hours. The CIH virus erased the hard drives and corrupted the ROM BIOS chips of over ten thousand computers in a single day. You can unwittingly click on a hacker web site that later on records your credit card and bank account information when you log onto your bank's "secure" web site. Simply joining an instant messaging conversation can allow complete access to your home system. When browsing the Internet, your browser will automatically download and run programs. A rogue program can harm your system and all you did was surf the Web. Today, more than ever, malicious mobile code can hurt your system. There are over fifty thousand different computer viruses, Trojan horses, and malicious Internet programs. Hundreds of web sites and dozens of international hacker clubs are dedicated solely to silently invading your computer system. They have contests with prizes to see who can write the most wicked creation. There is a lot of collective personal effort directed toward destroying your privacy and data. If your job involves computers, malicious programs can be more than an inconvenience. This book will help you protect your Microsoft Windows system and networks. Team-Fly Top Team-Fly Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Table of Contents Preface About This Book This book covers malicious mobile code attacks on Windows PCs, including: computer viruses, macro viruses, Trojan horse programs, worms, email exploits, Java and ActiveX exploits, instant messaging attacks, and Internet browser exploits. This book is written for intermediate and advanced level personal computer users and network administrators who are interested in protecting Windows-based computer assets against malicious mobile code. I am assuming you have an adequate understanding of PC mechanics, such as the concepts of booting, the difference between a program executable and a data file, and what the World Wide Web and the Internet are. Team-Fly Top Team-Fly Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Table of Contents Preface Why Another Book on Viruses? Why write another book on viruses? First, I could not find a good information source covering all the new types of viruses and Trojans. There are dozens of antivirus computer books out on the market today, but most are centered around DOS viruses running on DOS-based computers.
Recommended publications
  • HOL: Building Solutions Using Microsoft Office Infopath 2003
    Hands-On Lab Lab Manual Building Solutions using Microsoft Office InfoPath 2003 Please do not remove this manual from the lab The lab manual will be available from CommNet Release Date: April 2005 m Information in this document is subject to change without notice. The example companies, organizations, products, people, and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarked, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. ©2005 Microsoft Corporation. All rights reserved. Microsoft, MS-DOS, MS, Windows, Windows NT, MSDN, Active Directory, BizTalk, SQL Server, SharePoint, Outlook, PowerPoint, FrontPage, InfoPath, Visual Basic, Visual C++, Visual J++, Visual InterDev, Visual SourceSafe, Visual C#, Visual J#, and Visual Studio are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A. and/or other countries. Other product and company names herein may be the trademarks of their respective owners. Notes Page 2 HOL: Building Solutions using Microsoft Office InfoPath 2003 HOL: Building Solutions using Microsoft Office InfoPath 2003 This lab will help turn you into a knowledgeable developer of InfoPath 2003 form solutions.
    [Show full text]
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • Vbscript Programmer's Reference
    Table of Contents VBScript Programmer's Reference...................................................................................................................1 Introduction.........................................................................................................................................................6 Who is this Book For?............................................................................................................................6 How to Use this Book.............................................................................................................................6 What is VBScript?..................................................................................................................................7 What Can You Do With VBScript?......................................................................................................11 What Tools Do You Need to Use VBScript?.......................................................................................14 What's New in VBScript 5?..................................................................................................................15 Code Conventions.................................................................................................................................17 Tell Us What You Think.......................................................................................................................17 Customer Support.................................................................................................................................18
    [Show full text]
  • Learning React Functional Web Development with React and Redux
    Learning React Functional Web Development with React and Redux Alex Banks and Eve Porcello Beijing Boston Farnham Sebastopol Tokyo Learning React by Alex Banks and Eve Porcello Copyright © 2017 Alex Banks and Eve Porcello. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/insti‐ tutional sales department: 800-998-9938 or [email protected]. Editor: Allyson MacDonald Indexer: WordCo Indexing Services Production Editor: Melanie Yarbrough Interior Designer: David Futato Copyeditor: Colleen Toporek Cover Designer: Karen Montgomery Proofreader: Rachel Head Illustrator: Rebecca Demarest May 2017: First Edition Revision History for the First Edition 2017-04-26: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491954621 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Learning React, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.
    [Show full text]
  • Windows Speed Secrets Unleashed
    Windows Speed Secrets Unleashed Free E -book Top 10 Ways to Speed Up Windows XP or Vista W W W . T U N E - Y O U R - P C . C O M Table of Contents Windows XP XP Speed Tip #1: Disable Startup Programs ..........................................................................2 XP Speed Tip #2: Increase Virtual Memory ............................................................................5 XP Speed Tip #3: Remove Spyware and Adware ...................................................................8 XP Speed Tip #4: Optimize Visual Effects ..............................................................................9 XP Speed Tip #5: Speed Up File Browsing ..........................................................................12 XP Speed Tip #6: Clean Your Windows Registry .................................................................13 XP Speed Tip #7: Enable Direct Memory Access (DMA) ......................................................14 XP Speed Tip #8: Cleanup Your Hard Disk ..........................................................................17 XP Speed Tip #9: Defrag Your Hard Disk .............................................................................19 XP Speed Tip #10: Disable File Indexing..............................................................................21 Windows Vista Vista Speed Tip #1: Disable Startup Programs .....................................................................22 Vista Speed Tip #2: Increase Virtual Memory .......................................................................25
    [Show full text]
  • Supporting Operating System Installation | 3
    cc01SupportingOperatingSystemInstallation.indd01SupportingOperatingSystemInstallation.indd PagePage 1 08/10/1408/10/14 4:334:33 PMPM martinmartin //208/WB01410/XXXXXXXXXXXXX/ch01/text_s208/WB01410/XXXXXXXXXXXXX/ch01/text_s Supporting Operating LESSON 1 System Installation 70-688 EXAM OBJECTIVE Objective 1.1 – Support operating system installation. This objective may include but is not limited to: Support Windows To Go; manage boot settings, including native virtual hard disk (VHD) and multi-boot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE). LESSON HEADING EXAM OBJECTIVE Using a Troubleshooting Methodology Viewing System Information Using the Event Viewer Supporting Windows To Go Support Windows To Go Creating and Deploying a Windows To Go Workspace Drive Booting into a Windows To Go Workspace Managing Boot Settings Manage boot settings, including native virtual hard disk (VHD) and multi-boot Using BCDEdit and BCDBoot Configuring a Multi-Boot System Manage boot settings, including native virtual hard disk (VHD) and multi-boot Configuring a Native VHD Boot File Manage boot settings, including native virtual hard disk (VHD) and multi-boot Understanding VHD Formats Installing Windows 8.1 on a VHD with an Operating System Present Installing Windows 8.1 on a VHD Without an Operating SystemCOPYRIGHTED Present MATERIAL Managing Desktop Images Manage desktop images Capturing Images Modifying Images using DISM Customizing a Windows Installation by Using Windows PE Customize a Windows
    [Show full text]
  • PC Magazine Fighting Spyware Viruses And
    01_577697 ffirs.qxd 12/7/04 11:49 PM Page i PC Magazine® Fighting Spyware, Viruses, and Malware Ed Tittel TEAM LinG - Live, Informative, Non-cost and Genuine ! 01_577697 ffirs.qxd 12/7/04 11:49 PM Page ii PC Magazine® Fighting Spyware, Viruses, and Malware Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256-5774 www.wiley.com Copyright © 2005 by Wiley Publishing Published simultaneously in Canada ISBN: 0-7645-7769-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/RW/RS/QU/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, e-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Oracle Grid Infrastructure Installation Guide for Linux
    Oracle® Grid Infrastructure Installation Guide 11g Release 2 (11.2) for Microsoft Windows x64 (64-Bit) E24169-04 May 2012 Oracle Grid Infrastructure Installation Guide, 11g Release 2 (11.2) for Microsoft Windows x64 (64-Bit) E24169-04 Copyright © 2007, 2012, Oracle and/or its affiliates. All rights reserved. Primary Authors: Janet Stern, Douglas Williams Contributing Authors: Mark Bauer, Jonathan Creighton, Reema Khosla, Barb Lundhild, Saar Maoz, Markus Michalewicz, Philip Newlan, Hanlin Qian Contributors: Karin Brandauer, Barbara Glover, Sujatha Srinivasa Gopalan, Shivanand Hiremath, Yingwei Hu, Wei Huang, Scott Jesse, Sameer Joshi, Alexander Keh, Jai Krishnani, Jifeng Liu, Fangya Lu, Anil Nair, Mohammed Shahnawaz Quadri, Sudhe Sampath, Vishal Saxena, Janelle Simmons, Malaiarasan Stalin, Richard Strohm, Preethi Subramanyam, Preethi Vallam, Zhiqiang Yang This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Iseries Netserver)
    IBM Systems - iSeries Networking iSeries support for Windows Network Neighborhood (iSeries NetServer) Version 5 Release 4 IBM Systems - iSeries Networking iSeries support for Windows Network Neighborhood (iSeries NetServer) Version 5 Release 4 Note Before using this information and the product it supports, read the information in “Notices,” on page 73. Tenth Edition (February 2006) This edition applies to i5/OS version 5, release 4, modification 0 (product number 5722-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. © Copyright International Business Machines Corporation 1998, 2006. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Stop file sharing . .36 Part 1. iSeries NetServer . .1 Access iSeries NetServer file shares with a Windows client . .36 || Chapter 1. What’s new for V5R4 . .3 Case sensitivity of file systems for iSeries NetServer 37 Chapter 2. Printable PDF . .5 Chapter 8. iSeries NetServer print shares . .39 Chapter 3. iSeries NetServer versus Create an iSeries NetServer print share . .39 iSeries Access for Windows . .7 PC client print device drivers for use with iSeries Install iSeries Access for Windows on Windows PCs NetServer print shares . .40 using iSeries NetServer . .7 Stop print sharing . .40 Use iSeries NetServer print shares with Windows Chapter 4. Linux and Samba client 2000, Windows XP, and Windows Server 2003 clients 40 support . .11 Chapter 9. iSeries NetServer domain logon support . .43 Chapter 5.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]