Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Malicious Mobile Code: Virus Protection for…

Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer…

by Roger Grimes

MembersReviewsPopularityAverage ratingConversations



Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

Lousy book--full of inaccuracies and misconceptions. Panned this in a review for the magazine.
  jaygheiser | Jul 23, 2008 |
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
Important places
Important events
Related movies
Awards and honors
First words
Last words
Disambiguation notice
Publisher's editors
Publisher series
Original language

References to this work on external resources.

Wikipedia in English (4)

Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 156592682X, Paperback)

Defending Microsoft Windows against viruses requires careful attention to emerging technical alerts and diligence in installing manufacturers' latest patches and upgrades. You'll do a better job of keeping Windows secure if you have a body of background knowledge about security weaknesses in Windows and familiarity with good security practices. That, for the most part, is what Malicious Mobile Code is about. Roger Grimes shares facts, tells stories, and reveals technical details that will make you realize how serious a threat is posed by malicious mobile code (a catch-all term Grimes uses to describe viruses, Trojans, and the like). Further, his exposition will likely motivate you to take the precautions he recommends.

Some of Grimes's advice is by now obvious (don't run executable files that arrive attached to e-mail messages), but a lot of it will be news to Windows users and even system administrators. For example, he goes into considerable detail on how BackOrifice works, with particular attention to how black-hat hackers use it to build networks of compromised machines that they can use in further attacks. He's liberal with defensive advice, as well, describing how to adjust the settings of your browser, instant messaging client, and other software to stave off attacks. There's much discussion of Registry manipulation, too. More coverage of risks specific to Windows 2000 (and Windows XP, which isn't covered here at all) would make this book better, but since many attacks are generic to 32-bit Windows environments, Grimes's work remains current. --David Wall

Topics covered: Viruses, Trojans, worms, and other nasties--particularly those that can be distributed with e-mail messages, Web pages, or instant messaging tools--that can disable Microsoft Windows, or turn control of it over to unauthorized hackers. Coverage is explanatory, in a "know your enemy" sort of way, and includes lots of defensive strategies.

(retrieved from Amazon Thu, 12 Mar 2015 18:18:33 -0400)

No library descriptions found.

Quick Links

Swap Ebooks Audio
1 avail.1 pay

Popular covers


Average: No ratings.

O'Reilly Media

An edition of this book was published by O'Reilly Media.

» Publisher information page

Is this you?

Become a LibraryThing Author.


You are using the new servers! | About | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 115,246,802 books! | Top bar: Always visible