Hardly a week goes by without news of some malicious program or other playing hob with large numbers of computers somewhere on the Internet. Viruses Revealed shows where computer viruses come from, how they spread, and how you can protect the computers you're responsible for. It recognizes that viruses are inherent in the modern computing environment (which makes it easy to share data among machines) and that there's no absolutely certain way to maintain any degree of usefulness in a computer while eliminating all risk of viral infection. From there, the three authors proceed to make their readers informed participants in a dangerous computing world. They do this by defining terms (like dropper, a program that isn't a virus itself but which serves to install one), explaining concepts (like the difficulties antivirus programs face in detecting Trojan programs), and documenting historical events (infamous viruses of the past--Love Bug, Kournikova, and so on--and why they worked).
To their great credit, the authors go to great lengths to be authoritative. They document pretty much everything they say with references and rarely assume that the reader knows what any but the most basic terms mean. Furthermore, they're modest and don't claim that what they say will save your machines from viral attack. Rather, they say that appropriate defenses will reduce your risk of infection, and solid documentation, backup, and recovery mechanisms will help you halt successful attacks early and recover from them promptly. The prose here is well written and often funny--Viruses Revealed is a big winner. --David Wall
Topics covered: Computer viruses--what they are, where they come from, how they work, and how to deal with them. A combination of case studies and explanatory prose shows how to minimize your virus risk, regardless of what kinds of computers you run.
http://rapidshare.com/files/104159110/r
- Anonymous Mass Mailers (1)
- bots (1)
- browser (1)
- cool links (1)
- cracking tools (3)
- dos commands (3)
- ebooks (104)
- Exploits (14)
- file upload (3)
- firefox (1)
- flash games (2)
- free space (2)
- gmail (1)
- google (7)
- google chrome Vulnerability (7)
- graphics (5)
- greasemonkey scripts (8)
- gtalk (4)
- hacking (12)
- hacking ebooks (45)
- hacking tools (42)
- hacking tutorials (22)
- haking tutorials (37)
- hosting (1)
- image hosting (1)
- information (11)
- invisible (2)
- IP Scanner (14)
- java (2)
- javascript (4)
- keygen (1)
- Keyloggers (3)
- magazine (1)
- Mail Bombers (1)
- mcse (1)
- muliti login (1)
- networking (2)
- news (9)
- orkut (15)
- Port Scanner (14)
- proxy (2)
- RapidShare Libraries (1)
- regedit (1)
- Sniffers (1)
- sniffing (1)
- sql injection (5)
- tips n trics (41)
- upload sites (3)
- virus (9)
- virus removal (6)
- visual c++ (2)
- Vulnerability Scanner (1)
- wallpapers (5)
- web based hackiing (1)
- web design (1)
- web templates (1)
- Wireless Hacking (5)
-
▼
2009
(127)
- ► August 2009 (33)
- ► March 2009 (40)
-
▼
February 2009
(17)
- Perl Books
- Security in Computing (4th Edition)
- The Web Application Hacker's Handbook
- Offensive Security Tutorial Videos
- Viruses Revealed
- Virtual Honeypots: From Botnet Tracking/Intrusion
- Computer Hacking Forensic Investigator
- Pen Tester Open Source Toolkit,Volume 2
- Hacking Exposed Windows, Third Edition
- The Art of Computer Virus Research and Defense
- Linux Bible 2008
- Gray Hat Hacking, Second Edition
- Metasploit Toolkit for Penetration Testing
- Metasploit Toolkit for Penetration Testing
- Hacker High School Collection
- Hacker Web Exploitation Uncovered
- Hacker Disassembling Uncovered
-
►
2008
(211)
- ► November 2008 (13)
- ► September 2008 (198)
Blog Archive
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment