[1] “Win2K Processes,” http://users.aber.ac.uk/anw1/processes.html.
[2] David A. Solomon and Mark E. Russinovich , Inside Microsoft Windows 2000, Third Edition, Microsoft Press, 2000.
[3] CERT Coordination Center, “Wuarchive Ftpd Trojan Horse,” April 6, 1994, www.cert.org/advisories/CA-1994-07.html.
[4] CERT Coordination Center, “Trojan Horse Version of TCP Wrappers,” January 21, 1999, www.cert.org/advisories/CA-1999-01.html.
[5] Ken Thompson , “Reflections on Trusting Trust,” Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761–763, www.acm.org/classics/sep95/.
[6] Watts S. Humphrey , “Bugs or defects?” http://interactive.sei.cmu.edu/news@sei/columns/watts_new/1999/March/watts-mar99.htm#humphrey.
[7] Kathryn Balint , “Software Firms ...