|
1. Mark Russinovich, David Solomon. Microsoft Windows Internals, Fourth Edition. Dec, 2004. 2. Johnson M. Hart. Windows System Programming 3/e 中文版. Feb, 2006. 3. Robert Slade, David Harley, Urs E. Gattiker.病毒聖經 (Viruses Revealed). Aug, 2002. 4. Microsoft Platform SDK, Windows File Protection. 5. MSDN Library Internet Explorer Development, Internet Explorer Architecture. 6. Tim Rains. Microsoft “Port Reporter” Tool. Jan, 2005. 7. W32.Sasser.Worm http://www.symantec.com/security_response/writeup.jsp?docid=2004-050116-1831-99 8. W32.Mytob@mm http://www.symantec.com/security_response/writeup.jsp?docid=2005-022614-4627-99 9. Infostealer.Lineage http://www.symantec.com/security_response/writeup.jsp?docid=2005-011211-3355-99 10. Kaspersky, 卡巴斯基實驗室發佈 2005 年十一月病毒二十大排行榜 http://www.ithome.com.tw/plog/index.php?op=ViewArticle&articleId=606&blogId=28 11. Microsoft, A definition of the Run keys in the Windows XP registry http://support.microsoft.com/kb/314866 12. Mark Russinovich. Advanced Malware Cleaning. Nov, 2006. http://www.microsoft.com/emea/itsshowtime/sessionh.aspx?videoid=359 13. Greg Hoglund, The definition of a rootkit. Feb, 2006. http://www.rootkit.com/blog.php?newsid=440 14. tataye, “Beast” Trojan, Aug, 2004. http://beastdoor.com/ 15. Wikipedia, rootkit http://en.wikipedia.org/wiki/Rootkit
|