<--- Back to Details
First PageDocument Content
Computer virus / Macro virus / Malware / CapDesk / Microsoft Windows / Antivirus software / Spyware / Microsoft Excel / Principle of least privilege / System software / Software / Rogue software
Date: 2004-12-20 19:25:01
Computer virus
Macro virus
Malware
CapDesk
Microsoft Windows
Antivirus software
Spyware
Microsoft Excel
Principle of least privilege
System software
Software
Rogue software

Polaris: Virus Safe Computing for Windows XP

Add to Reading List

Source URL: www.hpl.hp.com

Download Document from Source Website

File Size: 164,00 KB

Share Document on Facebook

Similar Documents

Software / Computing / Computer security / Software testing / Data security / Sandbox / Compartmentalization / Cellular compartment / Seccomp / Compartment / Vulnerability / Principle of least privilege

Clean Application Compartmentalization with SOAAP Khilan Gudka Robert N.M. Watson Jonathan Anderson

DocID: 1qB6h - View Document

System calls / Computer security / Information theory / Principle of least privilege / Privilege / Solaris / Linux kernel / Protection ring / File system / Device driver / Sun Microsystems / Procfs

Opinion: Least Privilege for Solaris Subject Submitted by File Date

DocID: 1pxdc - View Document

Humancomputer interaction / Usability / Human communication / Computer security / Ergonomics / User interface / Principle of least privilege / User / Error message / User interface design / Secure by default

Secure Interaction Design and the Principle of Least Authority Ka-Ping Yee Group for User Interface Research University of California, Berkeley

DocID: 1pnkN - View Document

Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

DocID: 1p8Cz - View Document

Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

DocID: 1p1uA - View Document