E-Book, Englisch, 105 Seiten
Bettany / Halsey Windows Virus and Malware Troubleshooting
1. ed
ISBN: 978-1-4842-2607-0
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 105 Seiten
ISBN: 978-1-4842-2607-0
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
Make your PCs as secure as possible. Limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a common danger. From key loggers and Trojans, intent on stealing passwords and data, to malware that can disable individual PCs or even a company network, the cost to business in downtime and loss of productivity can be enormous.What You Will Learn:Recognize malware and the problems it can causeDefend a PC against malware and virusesConfigure advanced Windows features to prevent attackIdentify types of malware and virus attackDiscover third-party tools and resources available to help remove malwareManually remove malware and viruses from a PCWho This Book Is For:
IT Pros, Windows expert and power users and system administrators
Mike Halsey is a Microsoft MVP (Most Valuable Professional) awardee and technical expert. As the author of Windows 7, 8 and 10 Troubleshooting books and associated videos he's well versed in the problems and issues that PC users, IT Pros and System Administrators face when administering and maintaining all aspects of a PC ecosystem.
Mike is a teacher and prolific author who uses his training in educating people about sometimes complex subjects in simple and straightforward ways to great effect in his books and training videos.
Andrew Bettany is a Microsoft Most Valuable Professional (MVP), recognized for his Windows expertise, and a member of the Microsoft Springboard Technical Expert Panel.
As leader of the IT Academy at the University of York, UK and Microsoft Certified Trainer, Andrew delivers learning and consultancy to businesses on a number of technical areas including Windows deployment and troubleshooting. He has created and manages the 'IT Masterclasses' series of short intensive technical courses, run through his own training company Deliver IT Training Ltd.
Passionate about learning and helping others he frequently donates his time to work with Microsoft. He is a frequent speaker and proctor at TechEd conferences worldwide. In 2011 he delivered a 'train the trainer' class in earthquake-hit Haiti to help the community rebuild their technology skills and returned again in November 2013 to deliver a second bootcamp. Very active on social media, Andrew can be found on LinkedIn Facebook and Twitter. He lives in a village just outside of the beautiful city of York in Yorkshire (UK).
Autoren/Hrsg.
Weitere Infos & Material
1;Contents at a Glance;6
2;Contents;7
3;About the Authors;11
4;About the Technical Reviewer;12
5;Windows Troubleshooting Series;13
6;Chapter 1: What Is Malware?;14
6.1;A Brief History of Malware;14
6.2;The Psychology of Infection?;15
6.3;Different Types of Malware;16
6.3.1;Viruses and Worms;17
6.3.2;Spyware;17
6.3.3;Adware;17
6.3.4;Trojans;17
6.3.5;Bots;17
6.3.6;Rootkits/Bootkits;18
6.3.7;Backdoors;19
6.3.8;Ransomware;19
6.3.9;Spam and Phishing E-mails;19
6.4;The Future of Malware;20
6.5;Summary;21
7;Chapter 2: Prevention and Defense;22
7.1;Organizational-Level Security;23
7.2;Core Microsoft Security Features;23
7.2.1;Security Center/Security and Maintenance;24
7.2.2;User Account Control;24
7.2.3;Windows Firewall/Advanced Firewall;25
7.2.4;Malicious Software Removal Tool;26
7.2.5;Windows Update;26
7.3;Windows Startup Security;27
7.3.1;BitLocker Encryption;27
7.3.2;Secure Boot;28
7.3.3;Trusted Boot;28
7.3.4;Early Launch Anti-Malware;28
7.4;Anti-Malware Features;29
7.4.1;Windows SmartScreen;29
7.4.2;Windows Defender/Security Essentials;30
7.4.3;Windows Defender Offline;30
7.5;Other Security Features;31
7.5.1;App Containers;31
7.6;32-Bit (×86) and 64-Bit (×64) PCs;32
7.7;Restricting Access to Files;32
7.8;Summary;33
8;Chapter 3: Malware Defense in Depth;34
8.1;Firewalls;34
8.2;Keylogging Software;36
8.3;Software Firewalls;37
8.4;Organizational Firewalls;38
8.5;Blacklists and Whitelists;39
8.5.1;The Rise of the Internet of Things;40
8.6;The Windows Advanced Firewall;40
8.7;Demilitarized Zone;45
8.8;User Account Control;48
8.9;Summary;52
9;Chapter 4: Identifying Attacks;53
9.1;How Malware Infects PCs;53
9.1.1;Infector-Type Viruses;54
9.1.2;Rootkits and Boot Sector Viruses;56
9.1.3;Macro Viruses;57
9.1.4;E-mail and the Internet;58
9.2;How Malware Infects Networks;58
9.2.1;Network-Based Security;61
9.3;Identifying External Attacks;62
9.3.1;Firewall Attacks and DDoS;62
9.3.2;E-mail-Borne Viruses and Ransomware;63
9.3.3;Spear Phishing;65
9.3.4;Targeted Application Hacking;65
9.4;Identifying Internal Attacks;66
9.5;Summary;68
10;Chapter 5: External Malware and Virus Resources;69
10.1;Malware Protection Center;69
10.1.1;Get Updates for Security Software;70
10.1.2;Download Security Software;72
10.1.3;Get Microsoft Support;73
10.2;Microsoft Baseline Security Analyzer;75
10.3;Windows Defender;77
10.4;Third-Party Malware and Malware Removal Tools in Depth;80
10.4.1;Malicious Software Removal Tool;81
10.4.2;Windows Defender Offline;82
10.4.3;Microsoft Safety Scanner;84
10.4.4;Diagnostics and Recovery Toolset (DaRT);85
10.5;Windows Defender Advanced Threat Protection;88
10.6;Summary;89
11;Chapter 6: Manually Removing Malware;90
11.1;Manually Removing Malware;90
11.1.1;Step 1: Isolate the PC;90
11.1.2;Step 2: Identify the Running Process(es);91
11.1.3;Step 3: Deactivate the Malware;92
11.1.4;Step 4: Test the Results;95
11.1.5;Step 5: Retest the PC;97
11.1.6;Step 6: Remove the Malware;97
11.2;Rootkit Removal;98
11.3;Using BCDEdit;100
11.4;Summary;102
12;Index;103




