About the Authors |
|
xiii | |
About the Technical Reviewer |
|
xv | |
Windows Troubleshooting Series |
|
xvii | |
|
Chapter 1 What Is Malware? |
|
|
1 | (8) |
|
A Brief History of Malware |
|
|
1 | (1) |
|
The Psychology of Infection? |
|
|
2 | (1) |
|
Different Types of Malware |
|
|
3 | (4) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
Spam and Phishing E-mails |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
Chapter 2 Prevention and Defense |
|
|
9 | (12) |
|
Organizational-Level Security |
|
|
10 | (1) |
|
Core Microsoft Security Features |
|
|
10 | (4) |
|
Security Center/Security and Maintenance |
|
|
11 | (1) |
|
|
11 | (1) |
|
Windows Firewall/Advanced Firewall |
|
|
12 | (1) |
|
Malicious Software Removal Tool |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (2) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Early Launch Anti-Malware |
|
|
15 | (1) |
|
|
16 | (2) |
|
|
16 | (1) |
|
Windows Defender/Security Essentials |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
32-Bit (x86) and 64-Bit (x64) PCs |
|
|
19 | (1) |
|
Restricting Access to Files |
|
|
19 | (1) |
|
|
20 | (1) |
|
Chapter 3 Malware Defense in Depth |
|
|
21 | (20) |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
Blacklists and Whitelists |
|
|
26 | (1) |
|
The Rise of the Internet of Things |
|
|
27 | (1) |
|
The Windows Advanced Firewall |
|
|
27 | (5) |
|
|
32 | (3) |
|
|
35 | (4) |
|
|
39 | (2) |
|
Chapter 4 Identifying Attacks |
|
|
41 | (16) |
|
|
41 | (5) |
|
|
42 | (2) |
|
Rootkits and Boot Sector Viruses |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
How Malware Infects Networks |
|
|
46 | (4) |
|
|
49 | (1) |
|
Identifying External Attacks |
|
|
50 | (4) |
|
Firewall Attacks and DDoS |
|
|
50 | (1) |
|
E-mail-Borne Viruses and Ransomware |
|
|
51 | (2) |
|
|
53 | (1) |
|
Targeted Application Hacking |
|
|
53 | (1) |
|
Identifying Internal Attacks |
|
|
54 | (2) |
|
|
56 | (1) |
|
Chapter 5 External Malware and Virus Resources |
|
|
57 | (22) |
|
Malware Protection Center |
|
|
57 | (6) |
|
Get Updates for Security Software |
|
|
58 | (2) |
|
Download Security Software |
|
|
60 | (1) |
|
|
61 | (2) |
|
Microsoft Baseline Security Analyzer |
|
|
63 | (2) |
|
|
65 | (3) |
|
Third-Party Malware and Malware Removal Tools in Depth |
|
|
68 | (8) |
|
Malicious Software Removal Tool |
|
|
69 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
Diagnostics and Recovery Toolset (DaRT) |
|
|
73 | (3) |
|
Windows Defender Advanced Threat Protection |
|
|
76 | (1) |
|
|
77 | (2) |
|
Chapter 6 Manually Removing Malware |
|
|
79 | (14) |
|
Manually Removing Malware |
|
|
79 | (8) |
|
|
79 | (1) |
|
Step 2 Identify the Running Process(es) |
|
|
80 | (1) |
|
Step 3 Deactivate the Malware |
|
|
81 | (3) |
|
|
84 | (2) |
|
|
86 | (1) |
|
Step 6 Remove the Malware |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (2) |
|
|
91 | (2) |
Index |
|
93 | |