Copyrighted Material
Total Page:16
File Type:pdf, Size:1020Kb
4127idx.qxd 6/19/02 5:53 PM Page 503 INDEX Note to the Reader: Throughout this index boldfaced page numbers indicate primary discus- sions of a topic. Italicized page numbers indicate illustrations. Symbols & Numbers ADfilter, 475 ADinf, 146 @nonymouse.com, 409 Adleman, Len, 7 9/11 Contributions hoax, 456 Adleman, Leonard M., 393 “100% Done! Safe recovery successful!” administrator account, attack using, 228 message, 119 ADP file extension, 26, 57 419 Fraud, 350 AdsGone, 470, 475 666test virus, 70, 110 AdSubtract, 470, 475 777 virus, 70 Advanced Rule Settings dialog box (Sygate 2014 virus, 52 Personal Firewall), 294–295, 295 Advanced Settings dialog box (Internet A Connection Firewall), 287, 287 advertising AAAZAO macro, 62 pop-up windows for, 466–472 AAAZFS macro, 62 removing banner and other from Web page, Aadcom, 368 473–476 ABC Banners, 474 spyware for, 366–368 Achilles’Shield and MailDefense, 146 Advertising Killer, 470, 475 Acoragil virus, 118 adware, 259–260, 366–368, 493 ActiveX, 10, 22, 68–69 companies, 368 configuration to prevent auto-run, 76–78 and P2P file swapping, 367 disabling scripting, 184 AIM (AOL Instant Messenger), 124 McAfee to block, 161 AirSnort, 272 from Web page, 29 algorithm, 493 Activis, 117 AltaVista AV Family Filter, 489 Ad-aware, 372, 373, 373–374 Altnet SecureInstall, 260 Ad Extinguisher, 475 COPYRIGHTED MATERIALuninstalling, 261 Ad Muncher, 475 Amazon.com AdDelete, 475, 476 attack on, 208 AdDesigner.com, 474 privacy policy, 315–316 address book user profiling, 312 digital IDs in, 395 America Online, e-mail blocking, 442–443, 443 virus spread by, 8 American Civil Liberties Union, 334 ADE file extension, 26, 57 Cyber-Liberties, 490 4127idx.qxd 6/19/02 5:53 PM Page 504 504 American Library Association Office of Intellectual Freedom • AVI file extension American Library Association Office of using, 149–164 Intellectual Freedom, 490 automatically running, 178 American Management Association, 321, 325 McAfee VirusScan, 157–164 “And finally I would like to say…” message, 60 Norton AntiVirus, 149–156 AnnaKournikova (VBS/SST) virus, 67, 75, 111 using multiple, 186 anonymity virus definition updates, 179–180 in communities, 415–416 importance, 167–168 in e-mailing, 411–413 in McAfee VirusScan, 163–164 in instant messaging, 414–415 in Norton AntiVirus, 156 in IRC, 415 AOL Instant Messenger, 251–252, 256 in newsgroups, 414 Apple Learning Interchange, 489 in Web surfing, 406–411 Applebee’s Gift Certificates hoax, 457 Anonymize.net, 409, 412, 414, 415 Ask Jeeves for Kids, 489 Anonymizer.com, 409, 410, 410–411 assault, with Internet-based attacks, 218 anonymizers, 332, 406, 493 Atom virus, 57 how they work, 407, 407 Atomic virus, 57 popular sites, 409–410 attachments to e-mail, 15, 23 as proxy server, 407–408 avoiding unrequested, 174–175 Anonymizers.com, 409 opening in Eudora, 115, 116 Anonymous Newsfeed, 414 risk from, 30, 33, 94, 107 Anonymous.To, 412 scanning by antivirus software, 180 ANT 4 MailChecking, 446 treatment of, 111–112 anti-spam software, 446 attack by virus. See computer viruses AntiCode Archives, 229 auction fraud online, 342–348 Antigen, 170 protection on eBay, 344–348 AntiOnline InfoSec Mailing List, 229 types, 343–344 AntiOnline.com, 222 audio files, 26 AntiPopUp, 470 on Web sites, 479 AntiSniff, 301 Audiogalaxy, 253, 257, 367 antispy software, 372 authentication, 493. See also digital ID antivirus software, 16, 138–164, 493 with biometrics, 403 benefits from virus reports, 37 racing, 231–232 commercial programs, 140–145 Authenticode software, 400 e-mail scanning, 112 Auto-DCC-Get mIRC feature, 118 ease of use, 178 disabling, 94, 122 features to look for, 138–140 auto-execute macros, 56, 493 online services, 147–148 Auto-Protect feature of Norton AntiVirus, problem resolution with, 149 152–153, 153 quarantined file analysis and repair, automatic execution of macros, disabling, 184 155–156 avast!, 146 shareware and freeware, 146–147 AVG Professional Edition, 140, 141 Trojan horses pretending to be, 84 AVI file extension, 26 4127idx.qxd 6/19/02 5:53 PM Page 505 Babylonia virus • BrowseSafe 505 B behavior analysis, 171, 171–172 Bell Labs, 6 Babylonia virus, 71, 110 Better Business Bureau, 341 Back Orifice, 87, 88, 119 BHO (browser helper object), 367, 494 backdoor, 493 BHO Cop, 372 backdoor software, for Internet-based attacks, 215 bidding on eBay, 346–348 BackDoor-Sub7 Trojan, 87 BidPay, 339 backdoor Trojan horses, 85, 86–87, 493 “bill caricature” e-mail subject, 99–100 and data-driven attack, 235 “Bill Gates is guilty of monopoly” message, Netstat addresses for, 93 73–74 Netstat utility to search for, 91–93 biological virus, 5 Background Check Gateway, 329 biometrics, 493 background operation of McAfee VirusScan, 160 for authentication, 403 BackTrace feature, in Sygate Personal blackhole lists, 426, 493 Firewall, 292 BlackICE PC Protection, 281, 282 backtracing software, 221, 303, 493 block lists, 433, 493 backup files, 16, 182, 245 blocking banner ads, 474–476 backdoor programs in, 303 Bloodhound feature in Norton, 153, 167 managing, 271 Blue Mountain Cards hoax, 129 restoring, 199 BMP file extension, 26 Backup Plus, 182 BOClean, 95 Badman Trojan, 87 BoDetect, 146 Badtrans worm, 14, 88–89, 97–98, 110 boot process of computer, 43, 43 banner ads, 493 virus effect on, 44 blocking, 474–476 boot sector, 493 creating, 474 boot sector viruses, 6, 9, 42–47, 493 how they work, 474 common examples, 45–46 types, 473, 473–474 current risk, 46 Banner Zapper, 475 detection, 46 BannerSwap, 474 how they work, 42–45 BAS file extension, 26 protection against, 47 BAT file extension, 25, 26 removal, 46–47 Bat worm, 119 boserve.exe, 88 batch files, 25, 493 Bounce, 486, 486 BBBOnline, 319 Brain virus, 7 BeanHive virus, 71 Break the Chain, 461 BearShare, 260, 367 Brightmail, 447 behavior Brilliant Digital Entertainment, 260, 368 moderately safe, 29–31 uninstalling software, 261 overreaction, 37–39 browser. See Web browser risky, 31–34 browser helper object (BHO), 367, 494 very safe, 28–29 BrowseSafe, 484 4127idx.qxd 6/19/02 5:53 PM Page 506 506 Brunner, John • CNN.com, attack on Brunner, John, The Schockwave Rider, 97 hoaxes, 456–459 brute-force password crack, 389 scams, 460–461 BubbleBoy virus, 71, 98, 110 urban legends, 459–460 buffer overflow, 229, 494 chat. See instant messaging bulletin board services, 7 chat and instant messaging viruses, 11, 24, bullying and flaming, 355–356 117–122 Buy.com, attack on, 208 risk from, 31, 33–34 chat channel, 494 Chernobyl virus, 50 C Child Abducted from Sam’s Club urban cabinet (CAB) files, 202 legend, 459 cable connection, and risk of attack, 219, 239 children caching Web pages on proxy server, 268 content filtering of Web sites, 482–483 California hoax, 132 as cracker, 212 Canter, Laurence, 431 hoaxes involving, 458 Carey, Allan, 309 online predators, 358–361 Carnivore software, 331–332, 368–371, 494 protection against, 360–362 how it works, 369 risk from, 358–359 case sensitivity in passwords, 390 privacy for, 313–314 cashier’s checks for eBay payment, 346, 347 search sites for, 489 CASPER virus, 50 Web browsers for, 485–486 catching a virus. See computer viruses, Children’s Internet Protection Act, 490 transmission process Children’s Online Privacy Protection Act, 313 CD-ROMs Choke worm, 124 from Microsoft, macro viruses in, 56 Cisco, 285 purchasing for addresses, 438 Class Project hoax, 458 Celent Communications, 339 The Cleaner, 95 censorship, vs. content filtering, 490 cleaning infected files, 196–198 censorware, 494 in McAfee VirusScan, 161 Censorware Project, 490 of specific viruses, 198 Center for Digital Democracy, 334 clear GIFs, 477, 494 Center for Internet Studies, 321 click-through, 474, 494 Center for Media Education, 313 ClickTillUWin program, 260, 368 Cerasale, Jerry, 451 client/server computing, 251 CERT Coordination Center, 222, 303 climateprediction.com, 255 certificate authority, 494 closing files, and virus damage, 62 certificate store, 494 CMD file extension, 26 chain letters, 430–431, 454–455, 494 CMOS settings, 35–36 dealing with, 461 CNET, 32 information about, 461 Download.com, 181 types, 455–461 News.com, 185 classic chain, 455 CNN.com, attack on, 208 4127idx.qxd 6/19/02 5:53 PM Page 507 Coalition Against Unsolicited Commercial Email • computer viruses 507 Coalition Against Unsolicited Commercial Email, minimal measures, 189–190 334, 428 moderate measures, 179–185 code signature of virus, 138, 494 vs. biological virus, 5 CodeRed virus, 98 dangers, 4–5 costs, 5 and data-driven attack, 235 impact, 4 finding new, 167 Colors virus, 57 history, 6–8 COM file extension, 25 vs. hoaxes, 133–134 and virus spread, 20 how they work, 5–6 Comet Cursor, 479 infected file possibilities, 25–28 Command AntiVirus, 140, 142 life cycle, 12 Command on Demand, 147–148 rate of increase, 166 common sense, 246 recognition of infection, 35–37 Communications Decency Act, 490 response to attack, 37–39 communities, anonymity in, 415–416 cleaning system, 196–198 Compact Flash cards, and virus spread, 21 disaster preparation, 192–193 companies. See corporations immediate response, 193–196 companion viruses, 48, 494 restoring system, 198–202 complacency, and Internet-based attacks, 219 risks, 28–34 compressed files assessment, 34–35 content filtering and, 170 moderately safe behavior, 29–31 scanning by antivirus software, 144 risky behavior, 31–34 computer very safe behavior, 28–29 boot process, 43, 43 threat from new, 166 spyware to monitor activity, 364–366 heuristic scanning and, 169–172 surveillance by employer, 323 integrity checking and, 168, 168–169 Computer