Related HowStuffWorks Articles
- Computer Security Quiz
- 10 Worst Computer Viruses
- How Web Servers Work
- How Firewalls Work
- How Carnivore Worked
- How Operating Systems Work
- How Hard Disks Work
- How Floppy Disk Drives Work
- How Cell-phone Viruses Work
- How BIOS Works
- How E-mail Works
- Antivirus Software Buying Guide
- How do viruses and worms spread in e-mail?
- Someone started controlling my computer over the
Internet -- what happened?
More Great Links
- F-Secure Virus News
- Computer Virus Resources
- Google Directory: Anti Virus
- Virus Hoaxes & Realities
- faqs.org: Computer Virus
Sources
- "Avoiding Social Engineering and Phishing Attacks" U.S. Computer Emergency Readiness Team. (10/4/2007).
www.us-cert.gov/cas/tips/ST04-014.html - Baratz, Adam, and McLaughlin, Charles. " Malware: what it is and
how to prevent it" Ars Technica. 11/11/2004. (10/8/2007). http://arstechnica.com/articles/paedia/malware.ars - Boutin, Paul. "Slammed! An inside view of the worm that crashed the Internet in 15 minutes." Wired Magazine. 7/2003 (10/3/2007). http://www.wired.com/wired/archive/11.07/slammer.html
- Johnston, Stuart J. "Bugs & Fixes: Save Your PC From Virus Attacks."
PC World. 2/27/2002. (10/8/2007).
http://www.pcworld.com/article/id,81968/article.html - Kawamoto, Dawn. "Storm worm rages across the globe."
CNET News.com. 1/19/2007 (10/4/2007).
http://www.news.com/Storm-worm-rages-across-the-globe/2100-7349_3 - Lemos, Robert. "Worm double whammy still hitting hard."
CNET News.com. 8/21/2003 (10/5/2007).
http://www.news.com/Worm-double-whammy-still-hitting-hard
/2100-1002_3-5066875.html - McAfee fact sheet on ILOVEYOU virus. (10/3/2007).http://vil.nai.com/vil/content/v_98617.htm
- "Mydoom virus floods computers worldwide." Times Online. 1/27/2004 (10/3/2007).http://www.timesonline.co.uk/article/0,,1-979473,00.html
- Permeh, Ryan and Maiffret, Marc. "ANALYSIS: .ida "Code Red" Worm." eEye Digital Security. 7/17/2001 (10/3/2007).
http://research.eeye.com/html/advisories/published/AL20010717.html - Rhodes, Keith A., Chief Technologist, U.S. Government Accounting
Office. "Information Security: Code Red, Code Red II, and SirCam
Attacks Highlight Need for Proactive Measures" Aug. 29, 2001 (10/5/2007).http://www.gao.gov/new.items/d011073t.pdf - Schneier, Bruce. "Gathering 'Storm' Superworm Poses Grave Threat
to PC Nets." Wired.com. 10/4/2007 (10/4/2007)http://www.wired.com/politics/security/commentary/security
matters/2007/10/securitymatters_1004 - Turner, Dean, Executive Editor, et. al.; "Symantec Internet
Security Threat Report: Trends for January-June 07" Sept. 2007. (10/8/2007). http://eval.symantec.com/mktginfo/enterprise/
white_papers/entwhitepaper_internet_security_threat_
report_xii_09_2007.en-us.pdf - US-CERT advisory on the Melissa virus. 3/27/1999 (10/3/2007).
http://www.cert.org/advisories/CA-1999-04.html - "Virus Top Twenty for September 2007" Kaspersky Lab. 10/1/2007. (10/8/2007).
http://www.viruslist.com/en/analysis?pubid=204791964
0 komentar:
Posting Komentar