Skip to Content
Combating Spyware in the Enterprise
book

Combating Spyware in the Enterprise

by Paul Piccard
August 2006
Intermediate to advanced
448 pages
16h 8m
English
Syngress
Content preview from Combating Spyware in the Enterprise
Forensic Detection
and
Removal
Chapter
6 223
perforin searches
on any
portion
of
the GUID
and
receive
a
response
in
return.
In
using
our
same GUID example,
if
we perform
a
search
for
just
06849E9F
(the
first portion of Acrobat's GUID),
the
result shown will
be
"Adobe Acrobat reader".
Notes from
the
W
Dangerous Internet Explorer Plug-lns^—Download.Ject
Although most Internet Explorer plug-ins allow for expanded function-
afity, such
as
the Google Toolbar and Internet radio station players, they
also allow for malware to track your browsing history* One
such
malicious
application is Downloadject, which installed itself Into Internet Explore
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Personal & Internet Security Work

How Personal & Internet Security Work

Preston Gralla
What Employees Want Most in Uncertain Times

What Employees Want Most in Uncertain Times

Kristine W. Powers, Jessica B.B. Diaz
Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

Publisher Resources

ISBN: 9781597490641