Etymologie, Etimología, Étymologie, Etimologia, Etymology, (griech.) etymología, (lat.) etymologia, (esper.) etimologio
US Vereinigte Staaten von Amerika, Estados Unidos de América, États-Unis d'Amérique, Stati Uniti d'America, United States of America, (esper.) Unuigintaj Statoj de Ameriko
Informatik, Informática, Informatique, Informatica, Informatics, (esper.) komputiko
A
Almanac
Almanach erhält neue Bedeutung (W3)
Der engl. "almanac" und der deutsche "Almanach" gehen zurück auf span.-arab. "al-manakh" = "calendar", "almanac" und ist möglicherweise eine Ableitung des giech. "almenichiakon" = "calendar", das eventuell koptischen Ursprungs ist.
Douglas Harper schreibt dazu in seinem etymologischen Online-Wörterbuch weiter:
This word has been the subject of much speculation; its central syllable may be from or influenced by the PIE root of Mod.E. "moon" and "month".
Der "Almanach" könnte sich also aus einem "Mond(kalender)" bzw. einem "Monats(kalender)" entwickelt haben.
Übrigens:
Seien Sie vorsichtig, wenn Sie diese Seiten lesen. - Das Lesen von Lexika und Wörterbüchern macht verdächtig.
(E?)(L?) http://www.etymonline.com/index.php?term=almanac
(E?)(L?) http://cryptome.org/fbi-almanacs.htm
(E?)(L?) http://www.schneier.com/crypto-gram.html
Terrorists and Almanacs
It's so bizarre it's almost self-parody. The FBI issued a warning to police across the nation to be on the watch for people carrying almanacs, because terrorists may use these reference books "to assist with target selection and pre-operational planning."
Gadzooks! People with information are not suspect. Almanacs, reference books, and informational websites are not dangerous tools that aid terrorism. They're useful tools for all of us, and people who use them are better people because of them. I worry about alerts like these, because they reinforce the myth that information is inherently dangerous.
(Aus dem Newsletter von Bruce Schneier vom 15.01.2004.)
Der link führt zum FBI-bulletin.
In Anbetracht der hier gemachten Aussagen könnte sich "Almanach" zur Bezeichnung für ein "Terroristenhandbuch" entwickeln.
auditserve
Audit Articles
(E?)(L?) http://www.auditserve.com/
(E?)(L?) http://www.auditserve.com/AboutUs/Company/tabid/133/Default.aspx
Audit Serve has a 20 year track record of providing industry-leading consulting services. Audit Serve provides a wide range of Audit, Compliance, Security, PCI and SOX Consulting Services.
...
(E?)(L?) http://www.auditserve.com/Articles/tabid/107/Default.aspx
- Audit - General
- IT Cost Management
- Audit - Technical
- Infrastructure
- IT Governance
- Security
- SOX
B
bernsteinlaw
Bernstein's Dictionary of Bankruptcy Terminology
(E?)(L?) http://www.bernsteinlaw.com/publications/bankdict.htm
published by Bernstein Law Firm, P.C.
Suite 2200 Gulf Tower, Pittsburgh, PA 15219
Robert S. Bernstein, managing partner of Bernstein Law Firm, P.C. and former President of the Commercial Law League of America, serves as counsel to bankruptcy trustees, creditors' committees, and creditors in bankruptcy proceedings throughout Pennsylvania, Ohio, and West Virginia. The firm counsels clients in Bankruptcy, Restructuring, Banking, Business, Collections, Mortgage Foreclosure, Insolvency, Real Estate, Administrative, Appellate, and Civil Law.
INTRODUCTION
Bankruptcy is fast becoming an everyday topic of conversation. Its impact on the lives of individuals and corporations can affect them in numerous ways. Like most specialties, bankruptcy law has a language of its own. Its unfamiliar words and phrases make it difficult to comprehend. This dictionary explains the most commonly used bankruptcy terms.
...
black hat (W3)
In der westlichen Welt steht "weiss" für "gut" und "schwarz" für "böse". Und so auch in der Welt der Hacker.
(E?)(L?) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550815,00.html
"Black hat" is used to describe a "hacker" (or, if you prefer, "cracker") who breaks into a computer system or network with malicious intent.
...
The term comes from old Western movies, where "heros" often wore "white hats" and the "bad guys" wore "black hats".
(E?)(L?) http://www.blackhat.com/
The Black Hat Briefings Security Conference
(E?)(L?) http://www.hackingexposed.com/
Hacking Exposed Book Home & Security Resources
(Great site to start learning about what the Black Hats really do!)
Blooover (W3)
Engl. "Blooover" ist eine Kombination von engl. "Bluetooth" und engl. "Hoover".
(E?)(L?) http://www.golem.de/0412/35398.html
...
Der Name "Blooover" wurde deshalb gewählt, weil das Handy damit zum tragbaren "Bluetooth"-Datensauger wird, in Anlehnung an "Hoover"-Staubsager.
...
(E?)(L?) http://trifinite.org/trifinite_stuff_blooover.html
...
Since the application runs on handheld devices and sucks information, it has been called "Blooover" (derived from "Bluetooth Hoover").
...
(E1)(L1) http://books.google.com/ngrams/graph?corpus=0&content=Blooover
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.
Engl. "Blooover" taucht in der Literatur nicht signifikant auf.
Erstellt: 2012-03
Bloover
Der Wikinger mit dem Staubsauger (W1)
(E?)(L?) http://www.golem.de/0412/35398.html
(E?)(L?) http://www.google.de/search?q=bloover
Ende 2004 tat sich wieder eine neue Securitylücke auf, die auch schamlos ausgenutzt wurde. Bei der grossen Anzahl elektronischer Gefahren verschlägt es einem fast die Sprache. Aber immer, wenn Worte fehlen, stellt sich auch ein neuer Begriff ein. In diesem Fall ist es "Bloover".
Es handelt sich dabei um eine Handy-Software, die das Handy in die Lage versetzt über die Bluetooth-Technologie Daten zu sammeln. Die Bezeichnung "Bloover" setzt sich zusammen aus "Bluetooth" und "hoover".
Diese Begriffe haben beide ihrerseits eine kleine Geschichte (s.a. in der Stichwortliste). "Bluetooth" war der Name eines alten Wikingers, der Dänemark und Norwegen vereinigte. Entsprechend vereinigt die so benannte Technologie zwei elektronische Datenverarbeitungsgeräte. Und "hoover" geht zurück auf den Firmennamen "Hoover". Diese wurde bekannt durch ihre Staubsauger, und bald sprach man nur noch vom "Hoover" statt vom "vacuum cleaner".
Und da die die Handy-Software das Handy in einen Datensauger auf Bluetooth-Basis verwandelt, heisst sie eben "Bluetooth-Hoover", abgekürzt "Bloover".
Erstellt: 2005-01
Bluejacker (W3)
(E?)(L?) http://www.tecchannel.de/news/mobile/13836/
Manchem Handy-Besitzer haben sie schon einen gehörigen Schrecken eingejagt, die "Bluejacker". Plötzlich erscheint im Sichtfeld der Hinweis: "Sie haben einen Virus erhalten." oder: "Sie sind gebluejacked". Doch "Bluejacking" ist halb so schlimm, denn es werden lediglich unerwünschte Nachrichten an Bluetooth-fähige Handys verschickt.
"Bluejacking" setzt sich zusammen aus "Bluetooth" und "Hijacking" = "Entführung". Da die meisten Handys nach der Bluetooth-Leistugsklasse 2 funken, ist die Reichweite auf lediglich 10 Meter begrenzt. Klasse-1-Geräte können über eine Entfernung von bis zu 100 Meter mit anderen Bluetooth-Geräten kommunizieren. Von daher klappt das Bluejacking bei Handys nur aus nächster Nähe. Bevorzugte Tatorte sind Cafés, Busse, Bahnhöfe oder Kinos. Anders als beim SMS-Verschicken entstehen keine Kosten, und die Telefonnummer des Opfers muss der Angreifer auch nicht kennen. Zudem funktioniert das Ganze auch an Orten, an denen man keinen Netz-Empfang hat.
...
Botnet (W3)
Engl. "Botnet" setzt sich zusammen aus engl. "bot", der Kurzform für "robot" ("a computer program that runs automatically") und engl. "net" für "Internet". Ursprünglich bezeichnet engl. "robot" eigentlich wertfrei ein automatisch ablaufendes Computerprogramm. Diese neutrale Version findet man auch in "chat bot", einem Chatroboter, der eine menschliche Kommunikation simulier, oder "HotBot", dem Namen eines Suchroboters, der von Inktomi Corporation und HotWired, Inc. entwickelt wurde, oder in der Bezeichnung "robots.txt" für die Datei einer Webpräsenz, die festlegt, ob und welche Suchroboter die Website besuchen sollen. In Bezeichnungen wie "GTbot", für "Global Threat bot", "Botnet" oder der Bezeichnung "Botfrei" für ein "Anti-Botnet-Beratungszentrum", hat "bot" eine rein negative Konnotation erhalten.
(E?)(L?) https://www.botfrei.de/
(E?)(L?) https://www.botfrei.de/ueber.html
Das Anti-Botnet-Beratungszentrum hilft Ihnen, Botnet-Infektionen von Ihrem Computer zu entfernen. Dazu arbeiten wir mit verschiedenen Internetzugangsanbietern zusammen, die betroffene Kunden informieren.
Botnetze sind Netzwerke aus Computern, die nach der Infektion mit Schadsoftware zusammengschlossen werden. Ist Ihr Rechner Teil eines Botnetzes, kann er unbemerkt auf ferngesteuerte Befehle von Cyberkriminellen reagieren und zum Beispiel Spam versenden oder andere Computer infizieren, wenn Sie online sind.
Botnetze fungieren als infrastrukturelle Grundlage von Internetkriminalität und sind eine der größten illegalen Einnahmequellen im Internet. Mit dem Anti-Botnet-Beratungszentrum möchten wir die Zahl der Botnetz-infizierten Computer deutlich verringern und so den Cyberkriminellen die Grundlage entziehen. Jeder einzelne Rechner, der von Schadprogrammen befreit wird, hilft dabei.
(E?)(L?) https://www.botfrei.de/technik.html
...
Unter einem "Botnetz" wird ein Netzwerk aus Computern verstanden, die nach der Infektion mit Schadsoftware zusammengeschlossen werden und, sobald eine Internetverbindung besteht, auf ferngesteuerte Befehle von Cyberkriminellen reagieren können. Die einzelnen Computer werden als "Bot" oder "Zombie" bezeichnet; dabei ist ein "Bot" prinzipiell das schädigende Programm selbst, dessen Bedeutung jedoch auch mit dem System assoziiert wird.
...
(E?)(L?) https://www.webopedia.com/TERM/B/bot.html
Erstellt: 2010-10
bucket brigade attack (W3)
Der "Eimer-Brigaden-Angriff" ist ein böswilliger Angriff auf zwei miteinander in Verbindung stehende Rechner, durch den deren Kommunikation abgehört werden kann. Da sich der Angreifer durch geschickte Manipulation als der jeweils andere Kommunikationsteilnehmer ausgibt, geschieht das Abhören meist unbemerkt. Der Begriff "bucket brigade" lehnt an die alte Methode des Feuerlöschens an, als man noch "Eimer" (= "bucket") von Hand zu Hand bis zum Feuer durchreichte.
Der "Lauscher" in der Mitte nimmt also immer die Meldung eines Teilnehmers an und reicht sie dann an den eigentlichen Empfänger weiter (und das selbe wieder in der anderen Richtung).
C
CAN-SPAM (W3)
Der Begriff "SPAM" ist mittlerweile so weit verbreitet, dass man selbst dann an "SPAM" denkt, wenn es gar nicht wirklich um "SPAM" geht. Und so erging es mir eben auch mit dieser Abkürzung.
"CAN-SPAM" ist ein Akronym für die komplizierte Bezeichnung "Controlling the Assault of Non-Solicited Pornography And Marketing" Act of 2003.
Aber diese Assoziation ist vermutlich gewollt, denn letztlich geht es dann doch wieder um "SPAM".
(E?)(L?) https://www.webopedia.com/TERM/C/CAN_SPAM.html
(E?)(L?) https://www.webopedia.com/TERM/S/SPAM.html
The "CAN-SPAM" Act of 2003 (acronym for "Controlling the Assault of Non-Solicited Pornography And Marketing" Act of 2003) officially came into law on January 1, 2004. The CAN-SPAM Act applies to almost all businesses in the US that use e-mail, and provides recipients of "spam" with the right to opt-out of these "spam messages", and have their opt-out (or unsubscribe) request acted upon. Under the CAN-SPAM Act of 2003, permission of the e-mail recipient is not required prior to sending out the e-mails, however if a recipient wants to unsubscribe or opt-out of the mailings then the business must stop sending the e-mails as per the opt-out request or face severe penalties.
In addition to enforcing an opt-out or unsubscribe system for recipients, the CAN-SPAM Act of 2003 also prohibits some of the common spammer trickery such as:
- changing mail servers to send the spam,
- changing e-mail headers or the "from" e-mail address to hide the identity of the sender, and
- using deceptive subject heading.
Damages for non-compliance can result in the spammer facing fines of up to $250 per illegal e-mail message up to a maximum of $2 million or more if the offense includes certain aggravating violations. In situations involving e-mail deception, the penalty could be jail time.
CAPTCHA, Turing test (W3)
Die Bezeichnung "CAPTCHA" ist die Abkürzung für "Completely Automated Public Turing test to tell Computers and Humans Apart" und wurde im Jahr 2000 von den Carnegie Mellon University "Luis von Ahn", "Manuel Blum" und "Nicholas J. Hopper" und dem IBM-Mitarbeitern "John Langford" eingeführt.
Als "CAPTCHA" bezeichnet man eine Technik, die zwischen der automatischen Interaktion z.B. mit Suchmaschinen und der Interaktion mit Menschen unterscheiden kann. Insbesonder für Geld-Transaktionen soll dies dazu dienen, automatisch ablaufende Penetrationen zu verhindern.
Eine Methode besteht z.B. darin, dem Benutzer ein "Passwort" als Bild darzustellen, das dieser dann in ein Textfeld einträgt. Ein Computer kann den Sinn-Inhalt des Bildes hingegen nicht erkennen und kommt somit nicht über diese Hürde hinaus.
Der Begriff taucht seit einiger Zeit im Zusammenhang mit SPAM im Internet auf. Es handelt sich dabei um Verfahren, um Software-Agenten von Menschen am Computer zu unterscheiden. Eines der bekanntesten Verfahren ist z.B. die Anzeige einer Zeichenfolge als GIF-Bild, die der Besucher eingeben muß, um einen Newsletter zu abonnieren. Damit werden automatische Massenanmeldungen mit Phantasie-Adressen vermieden.
Der Anteil "Turing test" bezieht sich übrigens auf "Alan Turing" einem Mathematiker, der entsprechende Verfahren entwickelte und der auch an der Entschlüsselung der "Enigma" beteiligt war.
Der Begriff "public" steht dabei nicht für die öffentliche Nutzung dieses Verfahrens sondern steht für die Tatsache, dass der Algorithmus öffentlich gemacht wurde (statt ihn geheim zu halten).
(E?)(L?) https://www.webopedia.com/TERM/C/CAPTCHA.html
Carnivor (W3)
(E?)(L?) http://www.heise.de/tp/deutsch/inhalt/te/8357/1.html
(E?)(L?) http://www.stopcarnivore.org/
(E?)(L?) http://www.robertgraham.com/pubs/carnivore-faq.html
Mit dem Carnivore-System kann das FBI angeblich stündlich Millionen von Emails überwachen und gezielt diejenigen an oder von einem Verdächtigen herausfischen.
Bezeichnenderweise trägt das Programm den Namen "Carnivor" = "Fleischfresser".
CISA (W3)
"CISA" steht für "Certified Information Systems Auditor".
(E6)(L?) http://www.isaca.at/
(E6)(L?) http://www.isaca.de/
(E6)(L?) http://www.isaca.org/
Das Hauptprodukt der "ISACA" ist die Ausbildung und Zertifizierung des "Certified Information Systems Auditor" als international anerkannte Qualifikation auf dem Sektor der Informationssystem-Prüfung.
Für IT-Fachleute eröffnen sich durch die Ablegung des CISA-Examens neue Karrierechancen: Schlüsselpositionen in IT-Abteilungen verschiedenster Unternehmen werden in den USA und auch zunehmend in Europa von CISAs besetzt. Das Zertifikat zeichnet vor allem jene Fachleute aus, die sich an die schnell ändernden IT-Umgebungen und die damit verbundenen hohen Anforderungen optimal anpassen können, da neben der Ablegung der Prüfung auch die notwendige laufende Fortbildung mit dem Zertifikat verbunden sind.
...
CME
CME-1234567 (W3)
"CME" steht für "Common Malware Enumeration"
CERT will einheitliche Bezeichnungen für Viren
(E?)(L?) http://www.tecchannel.de/news/internet/18345/
Das US-amerikanische Computer Emergency Readiness Team (US-Cert) koodiniert eine von mehreren Herstellern ergriffene Initiative, einheitliche Bezeichnungen für Computerviren und andere elektronische Schädlinge durchzusetzen.
So haben sich McAfee, Microsoft, Symantec und Trend Micro gemeinsam mit dem Department Of Homeland Security (DHS) dafür ausgesprochen, einen Standard für "Common Malware Enumeration" (CME) zu entwickeln und damit die Verwirrungen um unterschiedliche Namen von Würmern und Viren zu beenden.
Bisher konnte jeder Hersteller, der einen neuen Virus entdeckte, diesen willkürlich bezeichnen. Das führte mitunter dazu, dass fast zeitgleich entdeckte Schädlinge verschiedene Namen erhielten. Das soll nun anders werden. In Anlehnung an die Auflistung der "Common Vulnerabilties and Exposures" (CVE), die das US-Cert gemeinsam mit dem Anbieter Mitre Corp. verwaltet, ist der Aufbau einer CME-Datenbank vorgesehen. Künftig sollen Viren dann nach dem Schema "CME-1234567" dort erfasst werden. Als Ergänzung dazu sollen aber Namen wie "Blaster" oder "Slammer" auch in Zukunft erlaubt sein.
...
(E?)(L?) http://filext.com/alphalist.php?extstart=%5EC
File Extension "CME" = "Crazy Machines Level File" (Pepper Games)
(E?)(L?) http://www.investopedia.com/terms/c/cme.asp
"Chicago Mercantile Exchange" - "CME"
(E?)(L?) http://jargonf.org/wiki/CME
"CME" sigle, masculin. [sécurité] [décisionnel]. "Crise Management Exercice". "Exercice de gestion de crise". Pour ne pas paniquer, normalement, le jour J.
(E1)(L1) http://www.medterms.com/script/main/art.asp?articlekey=2764
"CME" = "Continuing Medical Education"
(E?)(L?) http://us.trendmicro.com/us/trendwatch/awareness-and-prevention/threat-glossary/
CME | CME Initiative
(E6)(L?) http://www.tasklist.org/tasklist_c.html
CMEsys.exe | CMEupd.exe
Erstellt: 2010-09
COBIT (W3)
"COBIT" steht für "Control Objectives for Information and related Technology".
(E6)(L?) http://www.isaca.org/cobit.htm
(E?)(L?) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci1201039,00.html
Cop (W3)
Der Kosename für die US-Polizisten leitet sich nicht, wie oft behauptet, von "copper" ab, weil aus diesem Material die Erkennungsmarken sein sollen, sondern kommt von dem lat. "capere" (bzw. engl. to "capture"), was da heißt: "einfangen".
Teilweise wird es auch als Abkürzung für "constable on patrol" gedeutet.
cryptogram, CRYPTO-GRAM (W3)
Mit engl. "cryptogram" bezeichnet man einen verschlüsselter Text. Auch das etwas veraltete dt. "Kryptogramm" bezeichnet einen Text, in dem bestimmte geheime Informationen enthalten sind, die man nur mit Kenntnis des "Schlüssels" herauslesen kann.
Die Bezeichnung geht zurück auf lat. "crypta" bzw. griech. "krypte" = "unterirdischer (verborgener) Gang" und das entsprechende Verb "krýptein" = "verbergen". Der zweite Teil bezieht sich auf das griech. "grammatikós" = "die Schrift betreffend". Das Kryptogramm ist also eine Botschaft, die in den "Buchstaben" eines Textes "vergraben" liegt.
Man muss sozusagen zwischen den Zeilen lesen können.
Der Security-Spezialist Bruce Schneier hat seinen monatlichen Newsletter passenderweise "CRYPTO-GRAM" genannt. Vieles kann man auch als Nichtfachmann verstehen. Für einige Beiträge benötigt man allerdings Spezialwissen.
(E?)(L?) http://www.schneier.com/crypto-gram.html
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. Back issues are available.
csoonline
The Devil's Infosec Dictionary
Hier findet man lockere Definitionen zu folgenden security-relevanten Begriffen: (21.07.2006)
(E?)(L?) http://www.csoonline.com/article/220527/the-devil-s-infosec-dictionary
24/7 | Access Control List (ACL) | Analyst, security | Back door | Backup | Biometrics | Bot | Business case | Client/server | Clean desk policy | Confidentiality, integrity and availability | Crackers | Cryptography | Cybercrime | Distributed Denial of Service (DDoS) | Downtime | | Firewalls | Hackers | Help desk | Identity theft | Intrusion Detection Systems (IDS) | JOOTT ("jute") | Laptop | Logging | Logical security | Mission critical | Non-repudiation | O.S. hardening | Passwords | Patching | PKI (Public-Key Infrastructure) | Regression testing | Road warriors | Scope creep | Security administrator | Security officer | Total Cost of Ownership (TCO) | Worm | Zombie
CSRC (W3)
"CSRC" steht für "Computer Security Resource Center".
(E?)(L?) http://csrc.nist.gov/
csrc home | groups | publications | drivers | Federal Register Notices | news & events | archive
Erstellt: 2014-03
D
Digital Warfare, InfoWar, Cyberwar, Elektronische Kriegsführung, Information Warrior, Electronic War, Krieg der Zukunft, ABCD-Waffen (W3)
Im Zusammenhang mit der Sicherheit in der Datenverarbeitung und im Internet sind in Fortführung klassischer Militarismen Begriffe gebildet worden, die den besonderen Bezug verdeutlichen. So spricht man von folgenden Szenarien:
- Digital Warfare = Digitale Kriegsführung
- InfoWar = Informationskrieg
- Cyberwar = Krieg im Cyberspace, also im und um virtuelle(n) Computernetz(e)
- Elektronische Kriegsführung
- Information Warrior = der Kämpfer im virtuellen Raum
- Electronic War = Krieg um die Elektronen
- Krieg der Zukunft
Der CIA-Direktor John Deutch hat einmal "das Elektron als die ultimative, präzisionsgesteuerte Waffe unserer Zeit" bezeichnet.
Damit ist das Arsenal der ABC-Waffen erweitert worden zu ABCD-Waffen:
- Atomar
- Biologisch
- Chemisch
- Datentechnisch
Was wird wohl als nächstes kommen? - Nach der Aussage von John Deutch könnte es "Elektronisch" sein.
E
F
FBI (W3)
"FBI" steht für "Federal Bureau of Investigation".
(E?)(L?) http://www.fbi.gov/
(E?)(L?) http://www.fbi.gov/fbihistory.htm
On July 26, 2008, the FBI celebrated its 100th anniversary as an intelligence agency and national security organization and a century of service to the American people. Please explore these pages to learn how a small group of 34 investigators has grown into a cadre of more than 30,000 employees, evolving right along with the changing threats facing our nation.
...
(E?)(L?) http://www.fbi.gov/libref/historic/history/origins.htm
...
The following month, Attorney General Bonaparte appointed a force of Special Agents within the Department of Justice. Accordingly, ten former Secret Service employees and a number of Department of Justice peonage (i.e., compulsory servitude) investigators became Special Agents of the Department of Justice. On July 26, 1908, Bonaparte ordered them to report to Chief Examiner Stanley W. Finch. This action is celebrated as the beginning of the "FBI".
Both Attorney General Bonaparte and President Theodore Roosevelt, who completed their terms in March 1909, recommended that the force of 34 Agents become a permanent part of the Department of Justice. Attorney General George Wickersham, Bonaparte's successor, named the force the "Bureau of Investigation" (pictured left) on March 16, 1909. At that time, the title of "Chief Examiner" was changed to Chief of the "Bureau of Investigation".
...
Fingerprinting (W3)
(E?)(L?) http://www.newsday.com/news/opinion/ny-vpsch143625202jan14,0,1880923.story
(E?)(L?) http://www.schneier.com/crypto-gram.html
Dieses Wort könnte durchaus Anwärter für das Unwort des Jahres werden. Bruce Schneier (chief technical officer of Counterpane Internet Security Inc. in Mountain View, Calif., and author of "Beyond Fear: Thinking Sensibly About Security in an Uncertain World."), der sich normalerweise eher mit Computer-Security beschäftigt, hat am 14. Januar 2004 einen Artikel in "Newsday" veröffentlicht. Darin fragt er nach Sinn und Unsinn und nach den Missbrauchmöglichkeiten dieses Gesetzes der Bush-Administration.
Firewall (W2)
(E?)(L?) http://www.americandialect.org/
In der Datenverarbeitung und vor allem durch das Aufkommen des Internets sind auch viele existierende Wörter mit einem neuen Bedeutungsinhalt belegt worden. In bestimmten Peronenkreisen ist die ursprüngliche Bedeutung in den Hintergrund getreten.
Einige Beispiele finden sich im Bereich der Security:
"Viren" - unterschieden in: "Minen" - "Pilze" - "Trojanische Pferde" - "Standard-Virus" - "Virus mit Gestaltwechsel"
Daneben gibt es auch noch den "Wurm" ("worm") und zur Verteidigung die "Firewall".
Das Eindringen dieser Wörter in die Computersprache ist in den 80er Jahren zu suchen. Oftmals verursacht durch fantasievolle Computer-Enthusiasten oder auch durch Autoren von Science-Fictions.
Die "Firewall", deren erste Erwähnung von "OED" auf das Jahr 1851 angesetzt wird, trat - laut Frank Abate und Fred Shapiro in einem Newslistbeitrag des ADS vom 20.08.2002 - 1987 in einer technischen Beschreibung zum ersten Mal in Zusammenhang mit der Computerei auf.
fismapedia
National Information Assurance (IA) Glossary
Category: CNSSI 4009 Terms
(E?)(L?) http://www.fismapedia.org/index.php?title=Category:CNSSI_4009_Terms
Pages in category "CNSSI 4009 Terms"
The following 200 pages are in this category, out of 1,267 total.
- A
- Access | Access Control | Access Control List | Access Control Mechanism | Access Level | Access List | Access Profile | Access Type | Accountability | Accounting Legend Code | Accounting Number | Accreditation | Accreditation Boundary | Accreditation Package | Accrediting Authority | Add-On Security | Adequate Security | Advanced Encryption Standard | Advisory | Alert | Alternate COMSEC Custodian | Alternative Work Site | Anti-Jam | Anti-Spoof | Application | Assurance | Assured Software | Attack | Attack Sensing and Warning | Audit | Audit Trail | Authenticate | Authentication | Authentication System | Authenticator | Authorization | Authorized Vendor | Authorized Vendor Program | Automated Security Monitoring | Automatic Remote Rekeying | Availability
- B
- BLACK | Back Door | Backup | Banner | Benign | Benign Environment | Binding | Biometrics | Bit Error Rate | Boundary | Brevity List | Browsing | Bulk Encryption
- C
- CCI Assembly | CCI Component | CCI Equipment | CNSSI 4009 Terms | COMSEC Account | COMSEC Account Audit | COMSEC Aid | COMSEC Assembly | COMSEC Boundary | COMSEC Chip Set | COMSEC Control Program | COMSEC Custodian | COMSEC Demilitarization | COMSEC Element | COMSEC End-Item | COMSEC Equipment | COMSEC Facility | COMSEC Incident | COMSEC Insecurity | COMSEC Manager | COMSEC Material | COMSEC Material Control System | COMSEC Modification | COMSEC Module | COMSEC Monitoring | COMSEC Profile | COMSEC Survey | COMSEC System Data | COMSEC Training | CRYPTO | Call Back | Canister | Cascading | Category | Central Office Of Record | Certificate | Certificate Management | Certificate Revocation List | Certification | Certification Authority | Certification Authority Workstation | Certification Package | Certification Test And Evaluation | Certifier | Challenge And Reply Authentication | Check Word | Checksum | Cipher | Cipher Text | Cipher Text Auto-Key | Ciphony | Classified Information | Classified Information Spillage | Clearance | Clearing | Client | Closed Security Environment | Code | Code Book | Code Group | Code Vocabulary | Cold Start | Collaborative Computing | Command Authority | Commercial COMSEC Evaluation Program | Common Criteria | Common Fill Device | Communications Cover | Communications Deception | Communications Profile | Communications Security | Community Risk | Compartmentalization | Compartmented Mode | Compromise | Compromising Emanations | Computer Abuse | Computer Cryptography | Computer Security | Computer Security Incident | Computer Security Subsystem | Computing Environment | Concept Of Operations | Confidentiality | Configuration Control | Configuration Management | Confinement Channel | Contamination | Contingency Key | Continuity of Operations Plan | Controlled Access Area | Controlled Access Protection | Controlled Cryptographic Item | Controlled Interface | Controlled Space | Controlling Authority | Cooperative Key Generation | Cooperative Remote Rekeying | Correctness Proof | Countermeasure | Covert Channel | Covert Channel Analysis | Covert Storage Channel | Covert Timing Channel | Credentials | Critical Infrastructures | Cross Domain Solution | Cryptanalysis | Crypto-Alarm |
| Crypto-Ancillary Equipment | Crypto-Equipment | Crypto-Ignition Key | Cryptographic | Cryptographic Component | Cryptographic Initialization | Cryptographic Logic | Cryptography | Cryptology | Cryptonet | Cryptoperiod | Cryptosecurity | Cryptosynchronization | Cryptosystem | Cryptosystem Analysis | Cryptosystem Evaluation | Cryptosystem Review | Cryptosystem Survey | Cyclic Redundancy Check
- D
- Data Aggregation | Data Encryption Standard | Data Flow Control | Data Integrity | Data Origin Authentication | Data Security | Data Transfer Device | Decertification | Decipher | Decode | Decrypt | Dedicated Mode | Default Classification | Defense-In-Depth | Degaussing | Delegated Development Program | Demilitarized Zone
- D
- Denial Of Service | Descriptive Top-Level Specification | Designated Approval Authority | Dial Back | Digital Signature | Direct Shipment | Discretionary Access Control | Distinguished Name | Domain | Drop Accountability
- E
- Electronic Messaging Services | Electronic Security | Electronic Signature | Electronically Generated Key | Embedded Computer | Embedded Cryptographic System | Embedded Cryptography | Emissions Security | Encipher | Enclave | Enclave Boundary | Encode | Encrypt | End-Item Accounting | End-To-End Encryption | End-To-End Security | Endorsed For Unclassified Cryptographic Item | Endorsement | Entrapment | Erasure | Evaluation Assurance Level | Executive State | Exercise Key | Exploitable Channel | Extraction Resistance | Extranet
- F
- FIREFLY | Fail Safe | Fail Soft | Failure Access | Failure Control | File Protection | File Security | Fill Device | Firewall | Firmware | Fixed COMSEC Facility | Flaw | Flaw Hypothesis Methodology | Flooding | Formal Access Approval | Formal Development Methodology | Formal Method | Formal Proof | Formal Security Policy | Formal Top-Level Specification | Formal Verification | Frequency Hopping | Front-End Security Filter | Full Maintenance | Functional Proponent | Functional Testing
- G
- Gateway | Global Information Grid | Global Information Infrastructure | Guard
- H
- Hacker | Handshaking Procedures | Hard Copy Key | Hardwired Key | High Assurance Guard
- I
- IA Architecture | IA-Enabled Information Technology Product | Identification | Identity Token | Identity Validation | Imitative Communications Deception | Impersonating | Implant | Inadvertent Disclosure | Incident | Incomplete Parameter Checking | Indicator | Individual Accountability | Informal Security Policy | Information Assurance | Information Assurance Manager | Information Assurance Officer | Information Assurance Product | Information Environment | Information Flow Control | Information Operations | Information Owner | Information Security Policy | Information System | Information Systems Security | Information Systems Security Engineering | Information Systems Security Equipment Modification | Information Systems Security Manager | Information Systems Security Officer | Information Systems Security Product | Initialize | Inspectable Space | Integrity | Integrity Check Value | Interconnection Security Agreement | Interface | Interface Control Document | Interim Approval To Operate | Interim Approval To Test | Internal Security Controls | Internet Protocol | Internetwork Private Line Interface | Intrusion
- K
- Key | Key Distribution Center | Key Exchange | Key List | Key Management Infrastructure | Key Pair | Key Production Key | Key Recovery | Key Stream | Key Tag | Key Tape | Key Updating | Key-Auto-Key | Key-Encryption-Key | Keying Material
- L
- Label | Labeled Security Protections | Laboratory Attack | Least Privilege | Level of Concern | Level of Protection | Limited Maintenance | Line Conditioning | Line Conduction | Link Encryption | List-Oriented | Local Authority | Local Management Device/Key Processor | Lock And Key Protection System | Logic Bomb | Logical Completeness Measure | Long Title | Low Probability of Detection | Low Probability of Intercept
- M
- Magnetic Remanence | Maintenance Hook | Maintenance Key | Malicious Applets | Malicious Code | Malicious Logic | Mandatory Access Control | Mandatory Modification | Manipulative Communications Deception | Manual Cryptosystem | Manual Remote Rekeying | Masquerading | Master Crypto-Ignition Key | Memory Scavenging | Message Authentication Code | Message Externals | Message Indicator | Mimicking | Mobile Code | Mode of Operation | Multi-Security Level | Multilevel Device | Multilevel Mode | Multilevel Security | Mutual Suspicion
- N
- National Information Assurance Partnership | National Information Infrastructure | National Security Information | National Security System | Need To Know Determination | Need-To-Know | Network | Network Front-End | Network Reference Monitor | Network Security | Network Security Officer | Network Sponsor | Network System | Network Weaving | No-Lone Zone | Nonrepudiation | Null
- O
- Object | Object Reuse | Off-Line Cryptosystem | Official Information | On-Line Cryptosystem | One-Part Code | One-Time Cryptosystem | One-Time Pad | One-Time Tape | Open Storage | Operational Key | Operational Vulnerability | Operational Waiver | Operations Code | Operations Security | Optional Modification | Organizational Maintenance | Organizational Registration | Over-The-Air Key Distribution | Over-The-Air Key Transfer | Over-The-Air Rekeying | Overt Channel | Overwrite Procedure
- P
- Parity | Partitioned Security Mode | Password | Penetration | Penetration Testing | Per-Call Key | Perimeter | Periods Processing | Permuter | Plain Text | Policy Approving Authority | Policy Certification Authority | Positive Control Material | Preproduction Model | Principal Accrediting Authority | Print Suppression | Privacy System | Privileged User | Production Model | Proprietary Information | Protected Distribution Systems | Protection Philosophy | Protection Profile | Protection Ring | Protective Packaging | Protective Technologies | Protocol | Proxy | Public Domain Software | Public Key Certificate | Public Key Cryptography | Public Key Infrastructure | Purging
- Q
- QUADRANT
- R
- RED | RED Signal | RED/BLACK concept | Randomizer | Read | Read Access | Real Time Reaction | Recovery Procedures | Red Team | Reference Monitor | Release Prefix | Remanence | Remote Access | Remote Rekeying | Repair Action | Reserve Keying Material | Residual Risk | Residue | Resource Encapsulation | Risk | Risk Analysis | Risk Assessment | Risk Index | Risk Management
- S
- Safeguard | Safeguarding Statement | Sanitize | Scavenging | Secure Communications | Secure State | Secure Subsystem | Security Controls | Security Fault Analysis | Security Features Users Guide | Security Filter | Security In Depth | Security Inspection | Security Kernel | Security Label | Security Net Control Station | Security Perimeter | Security Range | Security Requirements | Security Requirements Baseline | Security Safeguards | Security Specification | Security Target | Security Test and Evaluation | Security Testing | Seed Key | Sensitive Compartmented Information | Sensitive Compartmented Information Facility | Sensitive Information | Sensitivity Label | Shielded Enclosure | Short Title | Simple Security Property | Single Point Keying | Sniffer | Software Assurance | Software System Test And Evaluation Process | Special Access Program | Special Access Program Facility | Spillage | Split Knowledge | Spoofing | Spread Spectrum | Start-Up KEK | Storage Object | Strong Authentication | Subassembly | Subject | Subject Security Level | Superencryption | Supersession | Supervisor State | Suppression Measure | | Syllabary | Symmetric Key | Synchronous Crypto-Operation | System Administrator | System Assets | System Development Methodologies | System High | System High Mode | System Indicator | System Integrity | System Low | System Profile | System Security | System Security Engineering | System Security Officer | System Security Plan
- T
- TEMPEST | TEMPEST Test | TEMPEST Zone | TOE Security Functions | TOE Security Policy | TSEC Nomenclature | Tampering | Target of Evaluation | Technical Controls | Technical Vulnerability Information | Telecommunications | Term: Access | Term: Access Control | Term: Access Control List | Term: Access Control Mechanism | Term: Access Level | Term: Access List (IS) | Term: Access Profile | Term: Access Type | Term: Accountability | Term: Accounting Legend Code | Term: Accounting Number | Term: Accreditation | Term: Accreditation Boundary | Term: Accreditation Package | Term: Accrediting Authority | Term: Add-On Security | Term: Adequate Security | Term: Advanced Encryption Standard | Term: Advisory | Term: Alert | Term: Alternate COMSEC Custodian | Term: Alternative Work Site | Term: Anti-Jam | Term: Anti-Spoof | Term: Application | Term: Assurance | Term: Assured Software | Term: Attack | Term: Attack Sensing and Warning | Term: Audit | Term: Audit Trail | Term: Authenticate | Term: Authentication | Term: Authentication System | Term: Authenticator | Term: Authorization | Term: Authorized Vendor | Term: Authorized Vendor Program | Term: Automated Security Monitoring | Term: Automatic Remote Rekeying | Term: Availability | Term: BLACK | Term: Back Door | Term: Backup | Term: Banner | Term: Benign | Term: Benign Environment | Term: Binding | Term: Biometrics | Term: Bit Error Rate | Term: Boundary | Term: Brevity List | Term: Browsing | Term: Bulk Encryption | Term: CCI Assembly | Term: CCI Component | Term: CCI Equipment | Term: COMSEC Account | Term: COMSEC Account Audit | Term: COMSEC Aid | Term: COMSEC Assembly | Term: COMSEC Boundary | Term: COMSEC Chip Set | Term: COMSEC Control Program | Term: COMSEC Custodian | Term: COMSEC Demilitarization | Term: COMSEC Element | Term: COMSEC End-Item | Term: COMSEC Equipment | Term: COMSEC Facility | Term: COMSEC Incident | Term: COMSEC Insecurity | Term: COMSEC Manager | Term: COMSEC Material | Term: COMSEC Material Control System | Term: COMSEC Modification | Term: COMSEC Module | Term: COMSEC Monitoring | Term: COMSEC Profile | Term: COMSEC Survey | Term: COMSEC System Data | Term: COMSEC Training | Term: CRYPTO | Term: Call Back | Term: Canister | Term: Cascading | Term: Category | Term: Central Office of Record | Term: Certificate | Term: Certificate Management | Term: Certificate Revocation List | Term: Certification | Term: Certification Authority | Term: Certification Authority Workstation | Term: Certification Package | Term: Certification Test and Evaluation | Term: Certified TEMPEST Technical Authority | Term: Certifier | Term: Challenge and Reply Authentication | Term: Check Word | Term: Checksum | Term: Cipher | Term: Cipher Text | Term: Cipher Text Auto-Key | Term: Ciphony | Term: Classified Information | Term: Classified Information Spillage | Term: Clearance | Term: Clearing | Term: Client | Term: Closed Security Environment | Term: Code | Term: Code Book | Term: Code Group | Term: Code Vocabulary | Term: Cold Start | Term: Collaborative Computing | Term: Command Authority | Term: Commercial COMSEC Evaluation Program | Term: Common Criteria | Term: Common Fill Device | Term: Communications Cover | Term: Communications Deception | Term: Communications Profile | Term: Communications Security | Term: Community Risk | Term: Compartmentalization | Term: Compartmented Mode | Term: Compromise | Term: Compromising Emanations | Term: Computer Abuse | Term: Computer Cryptography | Term: Computer Security | Term: Computer Security Incident | Term: Computer Security Subsystem | Term: Computing Environment | Term: Concept of Operations | Term: Confidentiality | Term: Configuration Control | Term: Configuration Management | Term: Confinement Channel | Term: Contamination | Term: Contingency Key | Term: Continuity of Operations Plan | Term: Controlled Access Area | Term: Controlled Access Protection | Term: Controlled Cryptographic Item | Term: Controlled Interface | Term: Controlled Space | Term: Controlling Authority | Term: Cooperative Key Generation | Term: Cooperative Remote Rekeying | Term: Correctness Proof | Term: Countermeasure | Term: Covert Channel | Term: Covert Channel Analysis | Term: Covert Storage Channel | Term: Covert Timing Channel | Term: Credentials | Term: Critical Infrastructures | Term: Cross Domain Solution | Term: Cryptanalysis | Term: Crypto-Alarm | Term: Crypto-Ancillary Equipment | Term: Crypto-Equipment | Term: Crypto-Ignition Key | Term: Cryptographic | Term: Cryptographic Component | Term: Cryptographic Initialization | Term: Cryptographic Logic | Term: Cryptography | Term: Cryptology | Term: Cryptonet | Term: Cryptoperiod | Term: Cryptosecurity | Term: Cryptosynchronization | Term: Cryptosystem | Term: Cryptosystem Analysis | Term: Cryptosystem Evaluation | Term: Cryptosystem Review | Term: Cryptosystem Survey | Term: Cyclic Redundancy Check | Term: Data Aggregation | Term: Data Encryption Standard | Term: Data Flow Control | Term: Data Integrity | Term: Data Origin Authentication | Term: Data Security | Term: Data Transfer Device | Term: Decertification | Term: Decipher | Term: Decode | Term: Decrypt | Term: Dedicated Mode | Term: Default Classification | Term: Defense-In-Depth | Term: Degaussing | Term: Delegated Development Program | Term: Demilitarized Zone | Term: Denial of Service | Term: Descriptive Top-Level Specification | Term: Designated Approval Authority | Term: Dial Back | Term: Digital Signature | Term: Direct Shipment | Term: Discretionary Access Control | Term: Distinguished Name | Term: Domain | Term: Drop Accountability | Term: Electronic Key Management System | Term: Electronic Messaging Services | Term: Electronic Security | Term: Electronic Signature | Term: Electronically Generated Key | Term: Embedded Computer | Term: Embedded Cryptographic System | Term: Embedded Cryptography | Term: Emissions Security | Term: Encipher | Term: Enclave | Term: Enclave Boundary | Term: Encode | Term: Encrypt | Term: End-Item Accounting | Term: End-to-End Encryption | Term: End-to-End Security | Term: Endorsed for Unclassified Cryptographic Item | Term: Endorsement | Term: Entrapment | Term: Environment | Term: Erasure | Term: Evaluation Assurance Level | Term: Executive State | Term: Exercise Key | Term: Exploitable Channel | Term: Extraction Resistance | Term: Extranet | Term: FIREFLY | Term: Fail Safe | Term: Fail Soft | Term: Failure Access | Term: Failure Control | Term: File Protection | Term: File Security | Term: Fill Device | Term: Firewall | Term: Firmware | Term: Fixed COMSEC Facility | Term: Flaw | Term: Flaw Hypothesis Methodology | Term: Flooding | Term: Formal Access Approval | Term: Formal Development Methodology | Term: Formal Method | Term: Formal Proof | Term: Formal Security Policy | Term: Formal Top-Level Specification | Term: Formal Verification | Term: Frequency Hopping | Term: Front-End Security Filter | Term: Full Maintenance | Term: Functional Proponent | Term: Functional Testing | Term: Gateway | Term: Global Information Grid | Term: Global Information Infrastructure | Term: Guard | Term: Hacker | Term: Handshaking Procedures | Term: Hard Copy Key | Term: Hardwired Key | Term: High Assurance Guard | Term: IA Architecture | Term: IA-Enabled Information Technology Product | Term: Identification | Term: Identity Token | Term: Identity Validation | Term: Imitative Communications Deception | Term: Impersonating | Term: Implant | Term: Inadvertent Disclosure | Term: Incident | Term: Incomplete Parameter Checking | Term: Indicator | Term: Individual Accountability | Term: Informal Security Policy | Term: Information Assurance | Term: Information Assurance Manager | Term: Information Assurance Officer | Term: Information Assurance Product | Term: Information Environment | Term: Information Flow Control | Term: Information Operations | Term: Information Owner | Term: Information Security Policy | Term: Information System | Term: Information Systems Security | Term: Information Systems Security Engineering | Term: Information Systems Security Equipment Modification | Term: Information Systems Security Manager | Term: Information Systems Security Officer | Term: Information Systems Security Product | Term: Initialize | Term: Inspectable Space | Term: Integrity | Term: Integrity Check Value | Term: Interconnection Security Agreement | Term: Interface | Term: Interface Control Document | Term: Interim Approval to Operate | Term: Interim Approval to Test | Term: Internal Security Controls | Term: Internet Protocol | Term: Internetwork Private Line Interface | Term: Intrusion | Term: Key | Term: Key Distribution Center | Term: Key Exchange | Term: Key List | Term: Key Management Infrastructure | Term: Key Pair | Term: Key Production Key | Term: Key Recovery | Term: Key Stream | Term: Key Tag | Term: Key Tape | Term: Key Updating | Term: Key-Auto-Key | Term: Key-Encryption-Key | Term: Keying Material | Term: Label | Term: Labeled Security Protections | Term: Laboratory Attack | Term: Least Privilege | Term: Level of Concern | Term: Level of Protection | Term: Limited Maintenance | Term: Line Conditioning | Term: Line Conduction | Term: Link Encryption | Term: List-Oriented | Term: Local Authority | Term: Local Management Device/Key Processor | Term: Lock and Key Protection System | Term: Logic Bomb | Term: Logical Completeness Measure | Term: Long Title | Term: Low Probability of Detection | Term: Low Probability of Intercept | Term: Magnetic Remanence | Term: Maintenance Hook | Term: Maintenance Key | Term: Malicious Applets | Term: Malicious Code | Term: Malicious Logic | Term: Mandatory Access Control | Term: Mandatory Modification | Term: Manipulative Communications Deception | Term: Manual Cryptosystem | Term: Manual Remote Rekeying | Term: Masquerading | Term: Master Crypto-Ignition Key | Term: Memory Scavenging | Term: Message Authentication Code | Term: Message Externals | Term: Message Indicator | Term: Mimicking | Term: Mobile Code | Term: Mode of Operation | Term: Multi-Security Level | Term: Multilevel Device | Term: Multilevel Mode | Term: Multilevel Security | Term: Mutual Suspicion | Term: National Information Assurance Partnership | Term: National Information Infrastructure | Term: National Security Information | Term: National Security System | Term: Need to Know Determination | Term: Need-to-Know | Term: Network | Term: Network Front-End | Term: Network Reference Monitor | Term: Network Security | Term: Network Security Officer | Term: Network Sponsor | Term: Network System | Term: Network Weaving | Term: No-Lone Zone | Term: Nonrepudiation | Term: Null | Term: Object | Term: Object Reuse | Term: Off-Line Cryptosystem | Term: Official Information | Term: On-Line Cryptosystem | Term: One-Part Code | Term: One-Time Cryptosystem | Term: One-Time Pad | Term: One-Time Tape | Term: Open Storage | Term: Operational Key | Term: Operational Vulnerability | Term: Operational Waiver | Term: Operations Code | Term: Operations Security | Term: Optional Modification | Term: Organizational Maintenance | Term: Organizational Registration | Term: Over-the-Air Key Distribution | Term: Over-the-Air Key Transfer | Term: Over-the-Air Rekeying | Term: Overt Channel | Term: Overwrite Procedure | Term: Parity | Term: Partitioned Security Mode | Term: Password | Term: Penetration | Term: Penetration Testing | Term: Per-Call Key | Term: Perimeter | Term: Periods Processing | Term: Permuter | Term: Plain Text | Term: Policy Approving Authority | Term: Policy Certification Authority | Term: Positive Control Material | Term: Preproduction Model | Term: Principal Accrediting Authority | Term: Print Suppression | Term: Privacy System | Term: Privileged User | Term: Probe | Term: Production Model | Term: Proprietary Information | Term: Protected Distribution Systems | Term: Protection Philosophy | Term: Protection Profile | Term: Protection Ring | Term: Protective Packaging | Term: Protective Technologies | Term: Protocol | Term: Proxy | Term: Public Domain Software | Term: Public Key Certificate | Term: Public Key Cryptography | Term: Public Key Infrastructure | Term: Purging | Term: QUADRANT | Term: RED | Term: RED Signal | Term: RED/BLACK Concept | Term: Randomizer | Term: Read | Term: Read Access | Term: Real Time Reaction | Term: Recovery Procedures | Term: Red Team | Term: Reference Monitor | Term: Release Prefix | Term: Remanence | Term: Remote Access | Term: Remote Rekeying | Term: Repair Action | Term: Reserve Keying Material | Term: Residual Risk | Term: Residue | Term: Resource Encapsulation | Term: Risk | Term: Risk Analysis | Term: Risk Assessment | Term: Risk Index | Term: Risk Management | Term: Safeguard | Term: Safeguarding Statement | Term: Sanitize | Term: Scavenging | Term: Secure Communications | Term: Secure State | Term: Secure Subsystem | Term: Security Controls | Term: Security Fault Analysis | Term: Security Features Users Guide | Term: Security Filter | Term: Security In Depth | Term: Security Inspection | Term: Security Kernel | Term: Security Label | Term: Security Net Control Station | Term: Security Perimeter | Term: Security Range | Term: Security Requirements | Term: Security Requirements Baseline | Term: Security Safeguards | Term: Security Specification | Term: Security Target | Term: Security Test and Evaluation | Term: Security Testing | Term: Seed Key | Term: Sensitive Compartmented Information | Term: Sensitive Compartmented Information Facility | Term: Sensitive Information | Term: Sensitivity Label | Term: Shielded Enclosure | Term: Short Title | Term: Simple Security Property | Term: Single Point Keying | Term: Sniffer | Term: Software Assurance | Term: Software System Test and Evaluation Process | Term: Special Access Program | Term: Special Access Program Facility | Term: Spillage | Term: Split Knowledge | Term: Spoofing | Term: Spread Spectrum | Term: Start-Up KEK | Term: Storage Object | Term: Strong Authentication | Term: Subassembly | Term: Subject | Term: Subject Security Level | Term: Superencryption | Term: Supersession | Term: Supervisor State | Term: Suppression Measure | | Term: Syllabary | Term: Symmetric Key | Term: Synchronous Crypto-Operation | Term: System Administrator | Term: System Assets | Term: System Development Methodologies | Term: System High | Term: System High Mode | Term: System Indicator | Term: System Integrity | Term: System Low | Term: System Profile | Term: System Security | Term: System Security Engineering | Term: System Security Officer | Term: System Security Plan | Term: TEMPEST | Term: TEMPEST Test | Term: TEMPEST Zone | Term: TOE Security Functions | Term: TOE Security Policy | Term: TSEC Nomenclature | Term: Tampering | Term: Target of Evaluation | Term: Technical Controls | Term: Technical Vulnerability Information | Term: Telecommunications | Term: Test Key | Term: Threat | Term: Threat Analysis | Term: Threat Assessment | Term: Threat Monitoring | Term: Ticket-Oriented | Term: Time Bomb | Term: Time-Compliance Date | Term: Time-Dependent Password | Term: Traditional INFOSEC Program | Term: Traffic Analysis | Term: Traffic Encryption Key | Term: Traffic Padding | Term: Traffic-Flow Security | Term: Tranquility | Term: Transmission Security | Term: Trap Door | Term: Triple DES | Term: Trojan Horse | Term: Trusted Channel | Term: Trusted Computer System | Term: Trusted Computing Base | Term: Trusted Distribution | Term: Trusted Foundry | Term: Trusted Identification Forwarding | Term: Trusted Path | Term: Trusted Process | Term: Trusted Recovery | Term: Trusted Software | Term: Tunneling | Term: Two-Part Code | Term: Two-Person Control | Term: Two-Person Integrity | Term: Type 1 Key | Term: Type 1 Product | Term: Type 2 Key | Term: Type 2 Product | Term: Type 3 Key | Term: Type 3 Product | Term: Type 4 Key | Term: Type 4 Product | Term: Type Certification | Term: U.S. Person | Term: U.S.-Controlled Facility | Term: U.S.-Controlled Space | Term: Unauthorized Disclosure | Term: Unclassified | Term: Untrusted Process | Term: Updating | Term: User | Term: User ID | Term: User Partnership Program | Term: User Representative | Term: Validated Products List | Term: Validation | Term: Variant | Term: Verification | Term: Virtual Private Network |
| Term: Vulnerability | Term: Vulnerability Analysis | Term: Vulnerability Assessment | Term: Web Risk Assessment | Term: Wireless Technology | Term: Work Factor | Term: Worm | Term: Write | Term: Write Access | Term: Zero Fill | Term: Zeroize | Term: Zone of Control | Test Key | Threat | Threat Analysis | Threat Assessment | Term: Privacy System | Term: Privileged User | Term: Probe | Term: Production Model | Term: Proprietary Information | Term: Protected Distribution Systems | Term: Protection Philosophy | Term: Protection Profile | Term: Protection Ring | Term: Protective Packaging | Term: Protective Technologies | Term: Protocol | Term: Proxy | Term: Public Domain Software | Term: Public Key Certificate | Term: Public Key Cryptography | Term: Public Key Infrastructure | Term: Purging | Term: QUADRANT | Term: RED | Term: RED Signal | Term: RED/BLACK Concept | Term: Randomizer | Term: Read | Term: Read Access | Term: Real Time Reaction | Term: Recovery Procedures | Term: Red Team | Term: Reference Monitor | Term: Release Prefix | Term: Remanence | Term: Remote Access | Term: Remote Rekeying | Term: Repair Action | Term: Reserve Keying Material | Term: Residual Risk | Term: Residue | Term: Resource Encapsulation | Term: Risk | Term: Risk Analysis | Term: Risk Assessment | Term: Risk Index | Term: Risk Management | Term: Safeguard | Term: Safeguarding Statement | Term: Sanitize | Term: Scavenging | Term: Secure Communications | Term: Secure State | Term: Secure Subsystem | Term: Security Controls | Term: Security Fault Analysis | Term: Security Features Users Guide | Term: Security Filter | Term: Security In Depth | Term: Security Inspection | Term: Security Kernel | Term: Security Label | Term: Security Net Control Station | Term: Security Perimeter | Term: Security Range | Term: Security Requirements | Term: Security Requirements Baseline | Term: Security Safeguards | Term: Security Specification | Term: Security Target | Term: Security Test and Evaluation | Term: Security Testing | Term: Seed Key | Term: Sensitive Compartmented Information | Term: Sensitive Compartmented Information Facility | Term: Sensitive Information | Term: Sensitivity Label | Term: Shielded Enclosure | Term: Short Title | Term: Simple Security Property | Term: Single Point Keying | Term: Sniffer | Term: Software Assurance | Term: Software System Test and Evaluation Process | Term: Special Access Program | Term: Special Access Program Facility | Term: Spillage | Term: Split Knowledge | Term: Spoofing | Term: Spread Spectrum | Term: Start-Up KEK | Term: Storage Object | Term: Strong Authentication | Term: Subassembly | Term: Subject | Term: Subject Security Level | Term: Superencryption | Term: Supersession | Term: Supervisor State | Term: Suppression Measure | | Term: Syllabary | Term: Symmetric Key | Term: Synchronous Crypto-Operation | Term: System Administrator | Term: System Assets | Term: System Development Methodologies | Term: System High | Term: System High Mode | Term: System Indicator | Term: System Integrity | Term: System Low | Term: System Profile | Term: System Security | Term: System Security Engineering | Term: System Security Officer | Term: System Security Plan | Term: TEMPEST | Term: TEMPEST Test | Term: TEMPEST Zone | Term: TOE Security Functions | Term: TOE Security Policy | Term: TSEC Nomenclature | Term: Tampering | Term: Target of Evaluation | Term: Technical Controls | Term: Technical Vulnerability Information | Term: Telecommunications | Term: Test Key | Term: Threat | Term: Threat Analysis | Term: Threat Assessment | Term: Threat Monitoring | Term: Ticket-Oriented | Term: Time Bomb | Term: Time-Compliance Date | Term: Time-Dependent Password | Term: Traditional INFOSEC Program | Term: Traffic Analysis | Term: Traffic Encryption Key | Term: Traffic Padding | Term: Traffic-Flow Security | Term: Tranquility | Term: Transmission Security | Term: Trap Door | Term: Triple DES | Term: Trojan Horse | Term: Trusted Channel | Term: Trusted Computer System | Term: Trusted Computing Base | Term: Trusted Distribution | Term: Trusted Foundry | Term: Trusted Identification Forwarding | Term: Trusted Path | Term: Trusted Process | Term: Trusted Recovery | Term: Trusted Software | Term: Tunneling | Term: Two-Part Code | Term: Two-Person Control | Term: Two-Person Integrity | Term: Type 1 Key | Term: Type 1 Product | Term: Type 2 Key | Term: Type 2 Product | Term: Type 3 Key | Term: Type 3 Product | Term: Type 4 Key | Term: Type 4 Product | Term: Type Certification | Term: U.S. Person | Term: U.S.-Controlled Facility | Term: U.S.-Controlled Space | Term: Unauthorized Disclosure | Term: Unclassified | Term: Untrusted Process | Term: Updating | Term: User | Term: User ID | Term: User Partnership Program | Term: User Representative | Term: Validated Products List | Term: Validation | Term: Variant | Term: Verification | Term: Virtual Private Network | Term: Vulnerability | Term: Vulnerability Analysis | Term: Vulnerability Assessment | Term: Web Risk Assessment | Term: Wireless Technology | Term: Work Factor | Term: Worm | Term: Write | Term: Write Access | Term: Zero Fill | Term: Zeroize | Term: Zone of Control | Test Key | Threat | Threat Analysis | Threat Assessment | Threat Monitoring | Ticket-Oriented | Time Bomb | Time-Compliance Date | Time-Dependent Password | Traditional INFOSEC Program | Traffic Analysis | Traffic Encryption Key | Traffic Padding | Traffic-Flow Security | Tranquility | Transmission Security | Trap Door | Triple DES | Trojan Horse | Trusted Channel | Trusted Computer System | Trusted Computing Base | Trusted Distribution | Trusted Foundry | Trusted Identification Forwarding | Trusted Path | Trusted Process | Trusted Recovery | Trusted Software | Tunneling | Two-Part Code | Two-Person Control | Two-Person Integrity | Type 1 Key | Type 1 Product | Type 2 Key | Type 2 Product | Type 3 Key | Type 3 Product | Type 4 Key | Type 4 Product | Type Certification
- U
- U.S. Person | U.S.-Controlled Facility | U.S.-Controlled Space | Unauthorized Disclosure | Unclassified | Untrusted Process | Updating | User | User ID | User Partnership Program | User Representative
- V
- Validated Products List | Validation | Variant | Verification | Virtual Private Network | Vulnerability | Vulnerability Analysis | Vulnerability Assessment
- W
- Web Risk Assessment | Wireless Technology | Work Factor | Worm | Write | Write Access
- Z
- Zero Fill | Zeroize | Zone Of Control
fortiguard.com
Threat Encyclopedia
Virus Encyclopedia
(E?)(L?) http://fortiguard.com/encyclopedia
Browse the Fortiguard Labs extensive encyclopedia of threats.
Erstellt: 2018-11
G
Google Hacking, Google Hacker (W3)
Long, Johnny - Google Hacking for Penetration Testers
Sprache: Englisch
Broschiert - 502 Seiten - Syngress Media
Erscheinungsdatum: 6. Januar 2005
ISBN: 1931836361
Synopsis:
... What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through "Google hacking", techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats "Google hackers" to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search. Penetration Testing with "Google Hacks" explores the explosive growth of a technique known as "Google Hacking".
H
hacktivism
Hacktivist (W3)
Der engl. Neologismus "Hacktivism" mag vielleicht auch etwas mit "Hektik" zu tun haben, aber es ist der Versuch Internetseiten zu manipulieren um politische Ziele zu verfolgen. Engl. "hacktivism" setzt sich zusammen aus engl. "hack" und engl. "activism".
Der "Hacktivist" ist "Aktivist", der aus politischen oder moralischen Motiven "hackt". Ziel ist es, die Aufmerksamkeit auf eine bestimmte Situation zu lenken.
(E?)(L?) https://owad.de/word
(E?)(L1) https://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpH,00.html
hacktivism | hacktivist
(E?)(L?) https://www.webopedia.com/TERM/H/hacktivism.html
Formed by combining "hack" with "activism", "hacktivism" is the act of "hacking" into a Web site or computer system in order to communicate a politically or socially motivated message. Unlike a malicious hacker, who may disrupt a system for financial gain or out of a desire to cause harm, the hacktivist performs the same kinds of disruptive actions (such as a DoS attack) in order to draw attention to a cause. For the hacktivist, it is an Internet-enabled way to practice civil disobedience and protest.
(E1)(L1) http://www.wortwarte.de/
Hacktivismus | Hacktivist
(E?)(L?) http://computer.yourdictionary.com/cybercrime-technical-non-offenses-cybervigilantism-and-hacktivism
Cybercrime Technical Non-Offenses: Cybervigilantism and Hacktivism - technical definition (legal terms)
Two activities that often give rise to criminal prosecutions but do not themselves constitute cybercrimes are cybervigilantism and hacktivism. In the conventional world, neither vigilantism (the act of enforcing targeted others to pay a penalty for breaking the law even though the party who attempts the enforcing does not have the legal authority to do so) nor political activism are, in themselves, crimes. For these reasons, cybervigilantism (using a computer to conduct acts of vigilantism) and hacktivism (using a computer and hacking skills to accomplish political activism objectives) - the cyberspace versions of vigilantism and political activism, respectively - are also technically not designated as crimes. They are therefore known to be technical non-offenses.
...
(E1)(L1) http://books.google.com/ngrams/graph?corpus=0&content=hacktivism
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.
Engl. "hacktivism" taucht in der Literatur um das Jahr 1980 auf.
Erstellt: 2013-02
Hoax
Hoaxing
hocus pocus (W3)
This interesting word first entered the English language in 1796. It is thought to have been a contraction of the word "hocus" from the conjuror's term "hocus pocus".
The term "hocus pocus" itself first appeared in the early seventeenth century. It might have derived from the assumed name of a conjuror in the time of King James who called himself "The Kings Majesties most excellent Hocus Pocus" because with the performance of every trick he used to call out the nonsense phrase, "Hocus pocus, tontus talontus, vade celeriter jubeo" (later magicians were known to use the phrase "Hax pax max deus adimax").
This phrase was itself probably an imitation (or mockery) of the phrase used by priests of the Church of Rome when they performed the act of transubstantiation, "hoc est corpus."
...
ETYMOLOGY: Perhaps alteration of "hocus".
...
On appelle "hoax" (en français "canular") un courrier électronique propageant une fausse information et poussant le destinataire à diffuser la fausse nouvelle à tous ses proches ou collègues.
(E1)(L1) http://www.alphadictionary.com/goodword/archive.jsp?year=2005&month=4
(E1)(L1) http://www.alphadictionary.com/goodword/word/hoax
(E1)(L1) https://www.bartleby.com/81/8325.html
(See CANARD.)
(E?)(L?) https://www.bartleby.com/81/2938.html
Canard.
A hoax. ...
...
(E?)(L?) http://www.bsi.bund.de/av/hoaxes/hoaxes.htm
(E6)(L?) http://www.bsi.de/av/VirenHoaxes.htm
Computer-Viren - Hoaxes
Kategorien von Computer-Viren | Erläuterung der Standardeinträge zu den Beschreibungen | Beschreibungen von Viren und Würmern | Trojanische Pferde | Hoaxes (elektronische Enten) | Verteilung der Computer-Viren aus gemeldeten Aufkommen.
Computer-Viren, Internet-Würmer, Trojanische Pferde, Hoaxes, Dialer, Spam - Begriffe, die der Computerbesitzer gar nicht gerne hört. Viren und Würmer sind Programme, die sich von alleine verbreiten. Trojanische Pferde (oder auch Backdoors) führen auf einem Rechner eine verborgene Funktion aus; meistens um Daten auszuspionieren. Dialer zocken den Benutzer mit teuren Telefonnummern ab, und auch Spams (unerwünschte Werbemails) versuchen ihre Produkte an den Mann zu bringen. Es gibt sie, die echten Datenkiller; die meisten Viren/Würmer wollen sich jedoch nur möglichst weit verbreiten. Eines haben aber alle genannten Kategorien gemein: Sie sind unbeliebt und keiner will sie auf seinem Rechner haben.
(E6)(L?) http://www.cdc.gov/hoax_rumors.htm
Gerüchte zu Krankheiten
(E6)(L2) http://hoaxbusters.ciac.org/
Hoaxbusters - Falschmeldungen im Internet
CIAC Hoax Categories
The CIAC Hoaxes in this archive are broken down into the categories shown below. If you do not know which category a hoax is in, try the search engine on the HoaxBusters Home page or the HoaxBusters Hoax Index Page.
Hoax Categories
- Malicious Code (Virus and Trojan ) Warnings - Warnings about Trojans, viruses, and other malicious code that has no basis in fact. The Good Times and other similar warnings are here.
- Urban Myths - Warnings and stories about bad things happening to people and animals that never really happened. These are the poodle in the microwave and needles in movie theater seats variety.
- Give Aways - Stories about give aways by large companies. If you only send this on, some big company will send you a lot of money, clothes, a free vacation, etc., etc. Expect to wait a long time for any of these to pay off.
- Inconsequential Warnings - Out of date warnings and warnings about real things that are not really much of a problem..
- Sympathy Letters and Requests to Help Someone - Requests for help or sympathy for someone who has had a problem or accident.
- Traditional Chain Letters - Traditional chain letters that threaten bad luck if you do not send them on or that request you to send money to the top n people on the list before sending it on..
- Threat Chains - Mail that threatens to hurt you, your computer, or someone else if you do not pass on the message.
- Scam Chains - Mail messages that appear to be from a legitimate company but that are scams and cons.
- Scare Chains - Mail messages that warn you about terrible things that happen to people (especially women).
- Jokes - Warning messages that it's hard to imagine that anyone would believe.
- True Legends - Real stories and messages that are not hoaxes but are still making the rounds of the Internet.
- Hacked History - Real stories where the facts have been adjusted to fit someone's political agenda.
- Unknown Origins - I created this section for stories that just don't ring true, but that I cannot prove one way or the other.
(E?)(L1) http://www.digitalcraft.org/index.php?artikel_id=281
1994:
"Good Times" wird als erster "Hoax" ("Falschmeldung") bekannt: Eine E-Mail mit der Betreffzeile "Good Times" warnt vor einem neuen Virus, der angeblich nur durch das Lesen der Nachricht, das Löschen der Festplatte verursacht. Die Warnung endete mit dem Aufruf "Forward this to all your friends", wodurch der Hoax im Internet weit verbreitet wird.
...
(E1)(L1) http://www.ditl.info/arttest/art7390.php
The Literary Hoax
David Brooks
University of Sydney
The literary "hoax" is strangely larger than its category. This itself is an odd thing to say perhaps, for how can a thing be larger than it is? Yet the term "hoax", particularly in a contemporary sense, has been used so broadly that it could be said to collapse in upon itself. This is in part because, in its very nature, a "hoax" is chameleonic, reactive, takes its inspiration from something outside it, and usually because that thing is different or strange in the first place - somehow outside the hoaxer’s sense of what is sensible or acceptible - and motivates the hoaxer to copy or parody it in any number of different ways. In their attempts to pin it down, theorists of the "hoax" search for synonyms, but every "hoax" has its own particular qualities and seems to require a different range of qualifiers to describe it. There are times, when a society has been affronted or embarrassed by a "hoax" and begun hoax-hunting, when almost every kind of literary masking or misrepresentation is deemed a "hoax". Attempts to restrict the term, as in some ways seems quite logical, to works which are essentially playful attempts to point up public ignorance or gullibility in matters of literary taste and judgement have proved consistently unsuccessful, in part because they do not take into account the possibility that the term "hoax" can thereby be employed as a kind of repressive tolerance: used, that is to say, as a means of defusing more serious or complex kinds of literary misrepresentation by assuming or exaggerating their ludic aspect. Finding that the term has become vague, unhelpful and unwieldy in this and in other ways, people have spoken instead of the spurious, of fakes, of forgery, of literary fraud, of superchery, of misrepresentation, of pseudonymy, of masking, and, in the attempt to establish a kind of typology of the "hoax", have tried in turn to distinguish between these things. A central question - and it is still an open question (for where would the authority come from to determine it?) - becomes, as a consequence, whether we are to consider all of these things as varieties of the hoax, or to consider that the hoax is one amongst these things.
...
(E1)(L1) http://www.etymonline.com/index.php?term=hoax
(E1)(L1) http://www.etymonline.com/index.php?search=hoax
(E6)(L?) http://www.europe.f-secure.com/virus-info/
(E?)(L?) http://listserv.linguistlist.org/cgi-bin/wa?S2=ADS-L&m=37831&I=-3&q=Antedating+of
- 038233 04/05/19 14:39 36 Further Antedating of "Hoax"
- 038231 04/05/19 14:19 22 antedating of "hoax"
(E3)(L1) http://www.gutenberg.net/etext04/dcvgr10.txt
Hoaxing
(E1)(L1) http://www.hagalil.com/lexikon/index.php?title=Hoax
Ein "Hoax" (engl., "Jux", "Scherz", "Schabernack"; auch "Schwindel") bezeichnet eine Falschmeldung, die per E-Mail, Instant Messenger oder auf anderen Wegen (z.B. SMS und MMS) verbreitet wird, von vielen für wahr gehalten und daher an viele Freunde weitergeleitet wird. Das Wort kommt wahrscheinlich aus der Verkürzung von "Hokus" aus "Hokuspokus". Ein "Hoax" kann auch in Form der "Zeitungsente" oder als "Urban Legend" auftreten. Auch der "Aprilscherz" hat oft die Form eines "Hoax". Es kursieren immer wieder auch solche "Hoax" durch das Netz, die aus diffamierenden und volksverhetztenden Gründen dort eingestellt wurden, so z.B. der "Q33NY"-Hoax (siehe Abbildung).
Der "Hoax" stammt aus England, wo er seit 1796 nachgewiesen ist. Ein typisches modernes Beispiel ist der so genannte "Good-Times-Hoax", eine angebliche E-Mail, die beim Öffnen die Festplatte löscht. Die Warnung vor diesem „Virus” verbreitete sich 1994 millionenfach über E-Mail und wurde auch von vielen Zeitungen und Fachinstitutionen veröffentlicht. Die damals vermeintliche Gefahr durch Viren, die sich per E-Mail verbreiten, wurde allerdings erst Jahre später Wirklichkeit, beispielsweise durch Loveletter.
...
(E?)(L?) http://www.hoaxbuster.com/
(E?)(L?) http://www.hoax-info.de/
(E?)(L?) http://www.hoax-info.de/index0.html
Hoax-Informationen mit der Erklärung, was ein Hoax und was ein echter Virus ist;
(E?)(L?) http://www.kes.info/lexikon/lexdata/hoaxes.htm
(E?)(L?) http://vil.mcafee.com/hoax.asp
Hoax-Liste von McAfee ...
(E?)(L?) http://www.liberation.fr/tribune/010170295-canular-et-utopie-politique
Canular et utopie politique
...
Bien mieux que l'expression française de «canular», le terme anglo-saxon de «hoax» (qui renvoie étymologiquement à la mise en oeuvre d'un «tour de prestidigitation renversant») semble plus approprié pour désigner cette émission spéciale barrée d'un bandeau magrittien «ceci n'est peut-être pas une fiction». Dans le langage courant, en effet, le terme de canular, issu de l'argot ésotérique de Normale sup pour qualifier les «épreuves burlesques et les brimades imposées aux nouveaux élèves», édulcore les enjeux de fond, pour donner à la mystification une dimension de pur divertissement sans risque dysphorique et réellement subversif.
...
(E?)(L?) http://www.jargonf.org/
(E?)(L?) http://www.museumofhoaxes.com/origin.html
(E3)(L1) https://owad.de/word
(E?)(L?) https://www.dictionary.com/
(E6)(L?) http://www.sophos.com/virusinfo/articles/glossary.html
Virus hoax
(E?)(L1) http://www.sophos.de/
(E?)(L?) http://www.sophos.de/virusinfo/hoaxes/
Viren-Hoaxes - aktuellste Viren-Hoaxes
(E6)(L?) http://www.symantec.com/region/de/avcenter/hoaxes.html
(E6)(L?) http://www.symantec.com/avcenter/hoax.html
(E?)(L?) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213307,00.html
A virus hoax is a false warning about a computer virus.
...
(E1)(L1) http://www.wortwarte.de/
E-Mail-Hoax | Hoax-Attacke | Hoax-Liste | Hoax-Mail | Hoax-Virenmeldung | Hoax-Warnung | Internet-Hoax | Virenhoax
(E6)(L1) http://www.vds-ev.de/anglizismenindex/suche2.php?str=h&la=on
(E?)(L?) http://www.virus-aktuell.de/
Viren, Hoaxes, Security
(E6)(L?) http://www.virusbtn.com/
Hoaxes
(E?)(L?) http://www.viruslist.com/eng/viruslist.asp
Virus Hoaxes and Non-Viruses
(E?)(L?) http://www.virusportal.com/com/virusinfo/hoaxes/
(E?)(L?) http://www.vmyths.com/
(E?)(L?) http://www.vmyths.com/hoax.cfm
Hoaxes A-Z
Learn about computer virus myths, hoaxes, urban legends, hysteria, and the implications if you believe in them. You can also search a list of computer virus hoaxes & virus hysteria from A to Z.
(E?)(L1) https://www.webopedia.com/TERM/H/hoax.html
(E?)(L?) http://wiesbaden-online.de/old/97/04/05/topnews/hoax.html
(E?)(L?) http://www.wordways.com/biggest.htm
The Biggest Hoax, Chris Cole, 1989
Hoax Number (W3)
Wieso diese Zahlenreihe "Hoax Number" heißt ... ?
(E6)(L1) http://mathworld.wolfram.com/HoaxNumber.html
A composite number defined analogously to a Smith number except that the sum of the number's digits equals the sum of the digits of its distinct prime factors (excluding 1).
The first few hoax numbers are 22, 58, 84, 85, 94, 136, 160, 166, 202, 234, ... (Sloane's A019506), illustrated above as a binary plot, and the corresponding sums of digits are 4, 13, 12, 13, 13, 10, 7, 13, 4, 9, 7, ... (Sloane's A050223).
Honeypot - Rose
(E?)(L?) http://www.helpmefind.com/plant/plants.php
(E?)(L?) http://www.helpmefind.com/gardening/l.php?l=2.18961
(E?)(L?) http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1007&context=onlinedictinvertzoology
honeypot (ARTHRO: Insecta) A wax container deposited inside the entrance of the nest cavity filled with nectar by a solitary queen bumblebee when establishing a colony.
Erstellt: 2013-03
Honeypot (W3)
Engl. "Honeypot" = dt. "Honigtopf" wird eine Einrichtung bezeichnet, die einen Angreifer oder Feind vom eigentlichen Ziel ablenken soll oder in einen Bereich hineinziehen soll, der ihn sonst nicht interessiert hätte. Der Ursprung stammt aus der Überlegung, dass Bären mit einem Honigtopf sowohl abgelenkt als auch in eine Falle gelockt werden könnten.
Der engl. "Honeypot" = "Honigtopf" entstammt eigentlich der Welt der Spionage. Attraktive Frauen wurden als "Lockvogel" (oder eben als "Honigtopf" eingesetzt, um Wissensträger der "anderen Seite" zum Plaudern zu bringen.
Später wurde der "Honeypot" in elektronischen Netzen eingesetzt. Der "Honigtopf" besteht dabei aus einem Server, der Virenprogramme im Netz "anlockt", um deren Funktionsweise zu ergründen und um eventuell ihre Herkunft herauszufinden um dann entsprechende Maßnahmen einzuleiten.
Microsoft war angeblich die erste Firma, der das nicht ausreichte. ("The term "HoneyMonkey" was coined by Microsoft Research in 2005.") Microsoft entwickelte Programme, die nicht nur darauf warteten, dass ein Malware-Programm anklopfte, sondern die selbst aktiv auf die Suche nach Malware-Seiten im Internet gehen (ähnlich dem Robot einer Suchmaschine). Dafür wurde der eingängige Arbeitstitel "HoneyMonkey" gewählt. Die an sich dummen Programme, die "Monkeys" = "Affen" gehen auf die suche nach "Honig", der nun nicht aus vermeintlich offenen Ports besteht sondern genau umgekehrt aus fehlerhaften Internetseiten. "Honey" wurde also zu einem beschönigender Ausdruck für den Mist im Internet.
Ursprünglich wurden mit dem Begriff "Honeypot" aber nicht virtuelle Überwachungssysteme bezeichnet, sondern flotte Bienen aus Fleisch und Blut. Geheimdienste wie der KGB und die Stasi setzten bei Bedarf so genannte "Honigfallen" - sexy Agentinnen oder Prostituierte - ein, um Ahnungslose auszuhorchen oder zu erpressen. Ob es das heute noch gibt, ist - selbstverständlich - geheim.
Die Quelle für folgenden Abschnitt konnte ich nicht mehr finden.
...
The term "honeypot" is often understood to refer to the English children's character Winnie-the-Pooh, a stuffed bear who was lured into various predicaments by his desire for pots of honey.
During the Cold War it was an espionage technique, which inspired spy fiction. The term "honeypot" was used to describe the use of sexual entrapment to gain information. In a common scenario, a pretty female Communist agent would trick a male Western official into handing over secret information.
An alternative explanation for the term is a reflection of the sarcastic term for outhouses and other methods of collecting feces and other human waste in places that lack indoor plumbing. "Honey" is a euphemism for such waste, which is kept in a honeypot until it is picked up by a honey wagon and taken to a disposal area. In this usage, attackers are the equivalent of flies, drawn by the stench of sewage.
...
(E?)(L?) http://www.enisa.europa.eu/activities/cert/support/proactive-detection-of-security-incidents-II-honeypots/at_download/fullReport
Proactive Detection of Security Incidents
Honeypots
2012-11-20
Contents
- 1 EXECUTIVE SUMMARY ............................................................ 9
- 2 INTRODUCTION AND BACKGROUND ................................................. 13
- 2.1 STUDY OBJECTIVES .......................................................... 13
- 2.2 TARGET AUDIENCE ........................................................... 14
- 2.3 SCOPE ..................................................................... 14
- 2.4 METHODOLOGY USED .......................................................... 15
- 2.4.1 Desktop research ........................................................ 15
- 2.4.2 Testing ................................................................. 15
- 2.4.3 Expert group ............................................................ 15
- 2.4.4 Analysis of results, creation of an exercise and the final report ....... 16
- 3 BASIC CONCEPTS .............................................................. 17
- 3.1 WHAT IS A HONEYPOT? ....................................................... 17
- 3.2 TYPES OF HONEYPOTS (BASIC TAXONOMY) ....................................... 17
- 3.2.1 Server-side honeypots ................................................... 18
- 3.2.2 Client-side honeypots.................................................... 18
- 3.2.3 Low-interaction honeypots ............................................... 18
- 3.2.4 High-interaction honeypots............................................... 19
- 3.2.5 Hybrid honeypots ........................................................ 19
- 3.5 HONEYPOTS VS SANDBOXES .................................................... 23
- 3.6 HONEYPOTS VS DARKNETS (NETWORK TELESCOPES) ................................ 24
- 3.7 HONEYPOTS VS INTRUSION DETECTION/PREVENTION SYSTEMS ....................... 25
- 3.8 HONEYPOTS AND WEB SECURITY PROXIES ........................................ 25
- 4 HONEYPOT DEPLOYMENT STRATEGIES .............................................. 27
- 4.1 TYPICAL DEPLOYMENT FACING THE INTERNET .................................... 27
- 4.2 INTERNAL DEPLOYMENT ....................................................... 28
- 4.3 NETWORKS OF SENSORS ....................................................... 28
- 4.4 A NOTE ON THE RISK OF DETECTION............................................ 28
- 4.5 LEGAL COUNSEL ............................................................. 29
- 4.6 CONSIDERATIONS AND REQUIREMENTS FOR DEPLOYMENT ............................ 29
- 4.6.1 Data control ............................................................ 29
- 4.6.2 Data capture ............................................................ 30
- 4.6.3 Data collection ......................................................... 30
- 4.6.4 Data analysis ........................................................... 30
- 4.7 SERVER HONEYPOTS .......................................................... 31
- 4.7.1 Advertisement ........................................................... 31
- 4.7.2 Location ................................................................ 31
- 4.7.3 Level of interaction .................................................... 32
- 4.7.4 Sensor type ............................................................. 32
- 4.7.5 Honeynet characteristics................................................. 33
- 4.8 CLIENT HONEYPOTS........................................................... 33
- 5 INVENTORY AND EVALUATION OF HONEYPOT SOLUTIONS .............................. 35
- 5.1 EVALUATION CRITERIA ....................................................... 35
- 5.1.1 Detection scope ......................................................... 35
- 5.1.2 Accuracy of emulation ................................................... 36
- 5.1.3 Quality of collected data ............................................... 37
- 5.1.4 Scalability and performance.............................................. 38
- 5.1.5 Reliability ............................................................. 39
- 5.1.6 Extensibility ........................................................... 40
- 5.1.7 Ease of use and setting up .............................................. 41
- 5.1.8 Embeddability ........................................................... 42
- 5.1.9 Support ................................................................. 43
- 5.1.10 Costs (Recommendations) ................................................ 44
- 5.1.11 Recommendation on usefulness for CERTs ................................. 45
- 5.2 SERVER SIDE HONEYPOTS ..................................................... 46
- 5.2.1 High interaction server side honeypots .................................. 46
- 5.2.1.1 Argos ................................................................. 46
- 5.2.1.2 HiHAT ................................................................. 50
- 5.2.1.3 HoneyBow .............................................................. 53
- 5.2.1.4 Qebek ................................................................. 56
- 5.2.1.5 Sebek ................................................................. 58
- 5.2.1.6 Summary of high interaction server side honeypots ..................... 64
- 5.2.2 Low interaction server side honeypots.................................... 65
- 5.2.2.1 General purpose honeypots.............................................. 65
- 5.2.2.1.1 Amun ................................................................ 65
- 5.2.2.1.2 Dionaea ............................................................. 69
- 5.2.2.1.3 KFsensor ............................................................ 71
- 5.2.2.1.4 Honeyd .............................................................. 74
- 5.2.2.1.5 Honeytrap ........................................................... 78
- 5.2.2.1.6 nepenthes ........................................................... 81
- 5.2.2.1.7 Tiny Honeypot ....................................................... 83
- 5.2.2.2 Web application honeypots ............................................. 86
- 5.2.2.2.1 DShield Web Honeypot ................................................ 86
- 5.2.2.2.2 GHH (Google Hack Honeypot) .......................................... 88
- 5.2.2.2.3 Glastopf ............................................................ 91
- 5.2.2.3 SSH honeypots ......................................................... 94
- 5.2.2.3.1 Kippo ............................................................... 94
- 5.2.2.3.2 Kojoney ............................................................. 97
- 5.2.2.4 SCADA honeypots....................................................... 100
- 5.2.2.4.1 SCADA HoneyNet Project ............................................. 100
- 5.2.2.4.2 SCADA Honeynet (Digital Bond) ...................................... 102
- 5.2.2.5 VoIP honeypots ....................................................... 106
- 5.2.2.5.1 Dionaea ............................................................ 106
- 5.2.2.5.2 Artemisa ........................................................... 106
- 5.2.2.6 Bluetooth honeypot ................................................... 109
- 5.2.2.6.1 Bluepot ............................................................ 109
- 5.2.2.7 Sinkholes............................................................. 112
- 5.2.2.7.1 HoneySink .......................................................... 112
- 5.2.2.8 USB Honeypots ........................................................ 115
- 5.2.2.8.1 Ghost USB honeypot ................................................. 115
- 5.2.2.9 Summary of low interaction server side honeypots ..................... 118
- 5.3 CLIENT SIDE HONEYPOTS .................................................... 119
- 5.3.1 Low-interaction client honeypots ....................................... 119
- 5.3.1.1 HoneyC ............................................................... 119
- 5.3.1.2 PHoneyC .............................................................. 122
- 5.3.1.3 Monkey-Spider ........................................................ 125
- 5.3.1.4 Thug ................................................................. 127
- 5.3.1.5 Summary .............................................................. 131
- 5.3.2 High-interaction client honeypots ...................................... 132
- 5.3.2.1 Argos ................................................................ 132
- 5.3.2.2 Capture-HPC NG ....................................................... 132
- 5.3.2.3 Shelia ............................................................... 135
- 5.3.2.4 Trigona .............................................................. 138
- 5.3.2.5 Summary of high-interaction client honeypots ......................... 141
- 5.4 HYBRID HONEYPOTS AND SENSOR NETWORKS ....................................... 2
- 5.4.1 HoneySpider Network ...................................................... 2
- 5.4.2 Early warning systems .................................................... 3
- 5.4.3 SURFcert IDS ............................................................. 5
- 5.5 HONEYTOKENS ................................................................ 6
- 5.5.1 Implementation ........................................................... 7
- 5.5.2 Examples ................................................................. 7
- 5.5.2.1 File system ............................................................ 7
- 5.5.2.2 Web server ............................................................. 8
- 5.5.2.3 Email .................................................................. 8
- 5.5.2.4 Financial bait ......................................................... 8
- 5.5.2.5 Copyrights ............................................................. 8
- 5.5.3 Data provision strategies ................................................ 8
- 5.5.3.1 Honeypots and honeytokens .............................................. 9
- 5.5.4 Detecting the use of honeytokens ......................................... 9
- 5.5.4.1 Offensive techniques ................................................... 9
- 6 INVENTORY OF COMMUNITIES, INITIATIVES AND OTHER HONEYPOT RELATED PROJECTS ... 10
- 6.1 THE HONEYNET PROJECT....................................................... 10
- 6.2 NOAH PROJECT .............................................................. 10
- 6.3 WOMBAT .................................................................... 11
- 6.4 ATLAS ARBOR................................................................ 12
- 6.5 PROJECT HONEY POT ......................................................... 12
- 6.6 WASC DISTRIBUTED WEB HONEYPOTS PROJECT .................................... 13
- 7 SANDBOX TECHNOLOGIES AND ONLINE HONEYPOTS ................................... 15
- 7.1 OVERVIEW OF SANDBOX TECHNOLOGIES........................................... 15
- 7.1.1 Cuckoo - a standalone solution for advanced malware analysis ............ 15
- 7.1.2 Online Sandboxes ........................................................ 17
- 7.1.2.1 Anubis ................................................................ 18
- 7.1.2.2 COMODO Automated Analysis System ...................................... 18
- 7.1.2.3 GFI Sandbox ........................................................... 19
- 7.1.2.4 Malwr ................................................................. 19
- 7.1.2.5 Xandora ............................................................... 20
- 7.2 ONLINE HONEYPOTS .......................................................... 20
- 7.2.1 urlQuery ................................................................ 21
- 7.2.2 Wepawet.................................................................. 22
- 7.2.3 JSUNPACK ................................................................ 22
- 7.3 A SUMMARY AND WARNING...................................................... 23
- 8 HONEYPOT SUPPORT TOOLS ...................................................... 24
- 8.1 NEPENTHES SUPPORT TOOLS: PHARM ............................................ 24
- 8.2 DIONAEA SUPPORT TOOLS: CARNIWWHORE ........................................ 24
- 8.3 HONEYD SUPPORT TOOLS: HONEYVIEW, HONEYD2MYSQL, HONEYD-VIZ, HONEYD CONFIGURATION GUI, WINHONEYD AND HOACD ....... 25
- 8.4 KIPPO SUPPORT TOOLS: KIPPO-GRAPH, KIPPO STATS AND DJANGO-KIPPO ............ 26
- 8.5 OTHER TOOLS ............................................................... 26
- 8.5.1 Honeywall ............................................................... 26
- 8.5.2 HP Feeds ................................................................ 27
- 8.5.3 HoneyStats .............................................................. 28
- 9 RECOMMENDED HONEYPOT SOLUTIONS .............................................. 29
- 9.1 THE QUICK WIN ............................................................. 29
- 9.2 WITH ADDITIONAL EFFORT .................................................... 30
- 9.3 FOR THE RESEARCHERS ....................................................... 30
- 10 SHORTCOMINGS, RECOMMENDATIONS AND FUTURE WORK .............................. 31
- 10.1 BARRIERS TO USAGE AND DEPLOYMENT ......................................... 31
- 10.2 GENERAL RECOMMENDATIONS FOR CERTS ........................................ 33
- 10.3 FUTURE DEVELOPMENT AND RESEARCH .......................................... 34
- 11 CONCLUSION ................................................................. 37
- 12 ANNEX I: ABBREVIATIONS ..................................................... 38
(E?)(L?) http://www.honeypots.net/
...
Honeypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot.
...
(E?)(L?) http://www.jargonf.org/
(E?)(L?) http://www.ncasia.com/ViewArt.cfm?Magid=3&Artid=20259&Catid=5&subcat=50
To the uninitiated, a "honeypot" is a network resource that has no production value; any attempt to communicate with it represents a sure sign of an attack. It can be deployed on retired servers, routers, on production systems, or via scripts running emulated services.
Ein "Honigtopf" wird hier ein Netzwerk genannt, dass speziell zur Anlockung von Hackern aufgebaut wird. - Natürlich in Anlehnung an den wirklichen Honigtopf, mit dem man z.B. lästige Fliegen ablenkt, bzw. sie sogar einfängt.
(E?)(L?) http://www.netlingo.com/word/honeypot.php
(E?)(L?) http://palisade.plynt.com/articles/
Web Application Honeypots
(E?)(L?) http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.5339&rep=rep1&type=pdf
VICTORIA UNIVERSITY OF WELLINGTON
Te Whare Wananga o te Upoko o te Ika a Maui
School of Mathematical and Computing Sciences
Computer Science
Wellington
New Zealand
Taxonomy of Honeypots
Christian Seifert, Ian Welch, Peter Komisarczuk
...
(E6)(L1) http://www.schneier.com/crypto-gram-back.html
15 Jun 2001 Honeypots and Honeynet, Invicta Networks, DDOS attacks on grc.com
(E?)(L?) http://www.sex-lexis.com/H
Auch andere verlockende Dinge werden als "honeypot" bezeichnet.
honeypot | Venus' honeypot
(E6)(L?) http://www.sophos.com/spaminfo/explained/spamglossary.html
(E?)(L1) https://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpH,00.html
(E?)(L?) https://www.webopedia.com/TERM/H/honeypot.html
An Internet-attached server that acts as a decoy, luring in potential hackers in order to study their activities and monitor how they are able to break into a system. Honeypots are designed to mimic systems that an intruder would like to break into but limit the intruder from having access to an entire network.
...
(E?)(L1) https://www.webopedia.com/TERM/V/virtual_honeypot.html
virtual honeypot
(E?)(L?) http://de.wikipedia.org/wiki/Honeypot
Als "Honigtopf" oder auch englisch "Honeypot" wird eine Einrichtung bezeichnet, die einen Angreifer oder Feind vom eigentlichen Ziel ablenken soll oder in einen Bereich hineinziehen soll, der ihn sonst nicht interessiert hätte. Der Ursprung stammt aus der Überlegung, dass Bären mit einem Honigtopf sowohl abgelenkt als auch in eine Falle gelockt werden könnten.
Im übertragenen Sinne werden sehr verschiedene Dinge als "Honeypot" bezeichnet.
...
(E?)(L?) http://en.wikipedia.org/wiki/Honeypot_%28computing%29
(E1)(L1) http://ngrams.googlelabs.com/graph?corpus=0&content=Honeypot
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.
Engl. "Honeypot" taucht in der Literatur um das Jahr 1760 auf.
Erstellt: 2013-03
I
ISACA (W3)
"ISACA" steht für "Information Systems Audit and Control Association".
(E6)(L?) http://www.isaca.at/
(E6)(L?) http://www.isaca.de/
(E6)(L?) http://www.isaca.org/
Das Hauptprodukt der "ISACA" ist die Ausbildung und Zertifizierung des "Certified Information Systems Auditor" als international anerkannte Qualifikation auf dem Sektor der Informationssystem-Prüfung.
Für IT-Fachleute eröffnen sich durch die Ablegung des CISA-Examens neue Karrierechancen: Schlüsselpositionen in IT-Abteilungen verschiedenster Unternehmen werden in den USA und auch zunehmend in Europa von CISAs besetzt. Das Zertifikat zeichnet vor allem jene Fachleute aus, die sich an die schnell ändernden IT-Umgebungen und die damit verbundenen hohen Anforderungen optimal anpassen können, da neben der Ablegung der Prüfung auch die notwendige laufende Fortbildung mit dem Zertifikat verbunden sind.
...
Security-Newsletter der ISACA Schweiz (17.02.2006):
(E?)(L1) http://www.isaca.ch/pages/DO_nr.html
- Sarbanes Oxley Basel II (Februar 2005)
- Biometrie (Juni 2005)
- Schnittstellenprüfung (September 2005)
- Prüfungs-Standards (November 2005)
- Customer Relationship Management (Februar 2004)
- IT Governance (April 2004)
- Eurocacs 2004 (Juni 204)
- Professional Judgement in der IT (September 2004)
- Deutschland (Dezember 2004)
- Zahlungssysteme (2003)
- Registerharmonisierung (2003)
- Datenschutz (2003)
- Ausbildung (2002)
- Kaleidoskop (2002)
- ERB Enterprise Resource Planning (2002)
- CAATs (2002)
- Outsourcing Banken (2002)
- Forensic Account (September 2001)
- e-Shop (Juni 2001)
- Computerkriminalität (April 2001)
- Encryption (Februar 2001)
- Netzwerk (Dezember 2000)
- Accompagnement du projet (Decembre 2000)
- COBIT (September 2000)
- E-Business (September 2000)
- Projektbegleitung (Juni 2000)
- Knowledge Management (April 2000)
- Modern IS Audit (Februar 2000)
- Outsourcing (Februar 2000)
- PKI (Dezember 1999)
ITGI (W3)
"ITGI" steht für "IT Governance Institute".
Home of the Control Objectives for Information and related Technology (CobIT).
"IT-Governance" umschreibt das Management von Stabilität, Steuerbarkeit und Transparenz der IT-Ressourcen eines Unternehmens.
Die "Clinton Commission on Critical Infrastructure protection" stellte eine enorme Abhängigkeit der US-Wirtschaft von der IT fest. Dies führte zur Gründung des "IT Governance Institute" ("ITGI").
(E?)(L?) http://www.cio-magazin.de/index.cfm?PageID=246&forumid=236
(E?)(L?) http://admin.gse.or.at/gse/ak1.php?ak_id=12
(E?)(L?) http://www.itgi.org/
J
Joe Job (W3)
Der amerik. Ausdruck "Joe Job" bezeichnet die Nutzung eines E-Mail-Servers um unauthorisierte Massen-E-Mails zu versenden ("e-mail spoofing").
Im Januar 1997 wurde der Service von "Joes.com" benutzt, um eine solche SPAM-Aktion durchzuführen. Dazu sah sich ein Sender gerechtfertigt, nachdem seine vorherigen SPAM-Aktionen "unter eigenem Namen" von "Joes.com" unterbunden wurden. Einige der genervten Empfänger ließen ihren Ärger bei "Joes.com" ab, da sie den Free-Service-Anbieter für den Auslöser der SPAM-Aktion hielten.
Seitdem nennt man diesen Mißbrauch "Joe Job".
(E?)(L?) https://www.webopedia.com/TERM/j/joe_job.html
K
L
Leet
L33t
Leetspeak (W3)
Die Methode Buchstaben durch Zeichen zu ersetzen nennt man "Leet" oder "L33t".
(E?)(L?) http://www.google.de/search?hl=de&q=L33t
(E?)(L?) http://www.urbandictionary.com/define.php?term=l33t
(E?)(L?) http://de.wikipedia.org/wiki/Leetspeak
...
"Leetspeak" (auch "Leetspeek"; von engl. "elite", "Elite") bezeichnet das Ersetzen von Buchstaben durch ähnlich aussehende Ziffern sowie - nach einer erweiterten Definition - Sonderzeichen. So wird der Begriff "Leetspeak" selbst häufig "1337", manchmal "1337 5P34K", selten auch "31337" bzw. "313373" geschrieben.
Häufige Verwendung: Eine "1" sieht wie ein kleines "L" oder "I" aus, "3" ist das Spiegelbild eines "E", und eine "7" ist ein etwas deformiertes "T". Unter der "0" kann man sich ein großes "O" vorstellen. Aus einer "4" wird ein "A" oder ein "h" und aus einer "5" wird ein "S".
Seltenere Verwendung: Eine "2" wird als ein "R" oder auch als "Z" gedeutet. Eine "6" lässt sich als ein "G" deuten, eine "8" als großes "B" sehen und die "9" könnte ein kleines "g" darstellen.
Wenn dazu noch Buchstaben entfallen können bzw. durch gleichwertige Lautkombinationen ersetzt werden, wird aus engl. "Elite" über "Eleet" am Ende "1337".
Leetspeak kann schwer zu lesen sein und ist dadurch als eine Art Geheimcode bestimmter Gruppen der Computerszene zu betrachten. Ursprünglich durchaus ernst gemeint, wird sie heute jedoch fast nur noch selbstironisch in Form von einzelnen bekannten Versatzstücken oder zur Individualisierung von Nicknames mittels Sonderzeichen genutzt. Weitere Verwendung findet Leetspeak bei Nutzern von Internet-Spielen, wobei sich hier nicht genau bestimmen lässt, ob es nun darum geht, weniger erfahrene oder gegnerische Spieler aus der Konversationen auszugrenzen, oder eher anderen Spielern zu imponieren. Traditionell werden nur einzelne Buchstaben durch die ähnlich geformten Ziffern ersetzt. In den letzten Jahren artete dies jedoch dazu aus, dass aus (mehreren) Sonderzeichen einzelne Buchstaben gebastelt wurden; diese moderne Form ist allerdings keine wirkliche "1337-Sprache" mehr.
...
M
Meme (W3)
Security-Articles
"Meme" has become the word for talking about change.
"Meme" was created by the British scientist Richard Dawkins and is defined by Merriam-Webster's Collegiate Dictionary as "an idea, behavior, style, or usage that spreads from person to person within a culture".
N
NIST (W3)
"NIST" steht für "National Institute of Standards and Technology".
(E?)(L?) http://www.nist.gov/
(E6)(L?) http://csrc.nist.gov/
"CSRC" steht für "Computer Security Resource Center"
(E?)(L?) http://csrc.nist.gov/pcig/ppsp.html
(E?)(L?) http://nvd.nist.gov/
"NVD" steht für "National Vulnerability Database".
(E?)(L?) http://web.nvd.nist.gov/view/ncp/repository
National Checklist Program Repository
(E?)(L?) http://csrc.nist.gov/publications/PubsSPs.html
Special Publications (800 Series)
Special Publications in the 800 series present documents of general interest to the computer security community. The Special Publication 800 series was established in 1990 to provide a separate identity for information technology security publications. This Special Publication 800 series reports on ITL's research, guidelines, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations.
nist.gov
National Institute of Standards and Technology (NIST)
Glossary of Key Information Security Terms
(E?)(L?) http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf
NISTIR 7298
Revision 2
Glossary of Key Information Security Terms
Richard Kissel, Editor
...
Glossary of common security terms has been extracted from NIST Federal Information Processing Standards (FIPS), the Special Publication (SP) 800 series, NIST Interagency Reports (NISTIRs), and from the Committee for National Security Systems Instruction 4009 (CNSSI-4009).
This glossary includes most of the terms in the NIST publications. It also contains nearly all of the terms and definitions from CNSSI-4009. This glossary provides a central resource of terms and definitions most commonly used in NIST information security publications and in CNSS information assurance publications.
Erstellt: 2014-03
O
P
Pharming
die neue Form des Phishing (W3)
Dem BSI-Newsletter vom 17.02.2005 war folgender Hinweis zu entnehmen:
Die Welt der Informationstechnologie ist reich an schillernden Begriffen, aber auch so dynamisch wie kaum ein anderer Bereich. Daher werden Ausdrücke wie "Phishing", das ja eben erst im 2004 gross aufkam, schon wieder von neuen überlagert. "Pharming" bezeichnet eine neue Generation von Phishing-Attacken. Im Mittelpunkt des klassischen Daten-Phishens stehen E-Mail-Nachrichten, die gefälschte Links enthalten. Durch diese werden Internetnutzer auf täuschend echt nachgebaute Webseiten gelockt, wo sie dann geheime Daten bekannt geben. Beim Pharming fällt dieser Schritt weg: Durch das Ausnutzen von Sicherheitslöchern in Internetbrowsern werden jene Dateien auf dem Computer manipuliert, die eingegebene Internetadressen in die für den Computer nutzbare IP-Adressen übersetzen. Dadurch gelangen Sie auf eine gefälschte Seite. Als PC-Nutzer sollten Sie deshalb darauf achten, die Sicherheitsupdates für die von ihnen verwendeten Browser regelmässig zu installieren.
(E?)(L?) http://www.bsi-fuer-buerger.de/
(E?)(L?) http://www.csoonline.com/article/220527/the-devil-s-infosec-dictionary
Pharming and phishing
(E?)(L?) http://www.eweek.com/article2/0,1759,1758874,00.asp
Phish
Phisher
Freak (W1)
Phishers Freak phisht freshe Phishe
freshe Phishe phisht Phishers Freak
Bei "yourdictionary" findet man die Aussage, dass es sich aus "phreaking" und "fishing" zusammensetzt, wobei "phreaking" wiederum als Zusammenziehung von "phone-freaking" entstanden zu sein scheint.
Ein "Freak" war ursprünglich ein "Frequenz-Generierer". Und zur Klarstellung, dass es sich um einen TelePHon-Pirat handelte, der mit seiner "blue box" die Freiwahl-Frequenzen ausspähte, nannte man ihn "Phreak" = "Phone-Freak". Und dieses "Ph" soll also auch in "Phishing" stecken. Immerhin läuft das "Passwort-Fishing" ja auch immer noch meist über die alte Telefonleitung.
Phishing scams are when you get e-mails from alleged legitimate institutions (banks, eBay, whatever) saying that your account has been compromised or you've been charged a zillion dollars or whatever. You then visit the site, which is actually fake, fill out your personal information, and you're outta luck.
Phishing-Mails breiten sich rasant aus: Registrierte das IT-Sicherheitsunternehmen MessageLabs im September 2003 lediglich 279 solcher Mails, waren es im März 2004 bereits 215.643. Bislang ist vor allem der englisch-sprachige Raum betroffen, die USA, Großbritannien und Australien. Aber nach Meinung von Experten kann es nur noch eine Frage der Zeit sein, bis die Methode auch in Deutschland Konjunktur hat.
The Anti-Phishing Working Group (APWG) provides news about and current examples of e-mail fraud and scams (archived back to September 2003 with commentaries and summaries of known details). Also includes a list of Web resources providing trend reports, help for those who have been scammed, and the origin of the term "phishing." The APWG is "focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing."
Die Herkunft des ursprünglichen Wortes "freak" ist unsicher.
"Freak" hat allgemein die Bedeutung "Irreguläres".
(E?)(L?) http://www.cio.de/index.cfm?PageID=258&cat=det&maid=6278
(E?)(L?) https://www.waywordradio.org/phish/
(E?)(L?) http://www.eweek.com/article2/0,4149,1399670,00.asp
(E?)(L?) http://www.heute.t-online.de/ZDFheute/artikel/18/0,1367,COMP-0-2125330,00.html
(E?)(L?) http://www.pcworld.com/news/article/0,aid,113431,00.asp
(E1)(L1) http://www.worldwidewords.org/turnsofphrase/tp-phi1.htm
(E1)(L1) https://www.yourdictionary.com/wotd/wotd.pl?date=2004-06-21
...
"-freak" was a slang combining form indicating any kind of obsessive person, such as a "health-freak" or "control-freak." In the context of "phone-freaking", there may also have been a punning reference to the sound "frequencies" being generated by the phreak's mysterious "blue box."
...
(E?)(L?) https://www.bartleby.com/61/36/F0303600.html
A fleck or streak of color.
Im englischen Etymologie-Lexikon wird eine mögliche Verbindung von "freak" zu einem alten friesisch Wort mit der Bedeutung "tanzen" oder zu einem mengl. "frek" = "kühn", "aufbrausend" und aengl. "frec" = "gierig", "gefräßig" aufgeführt. Im 16. Jh. nahm es die Bedeutung "launische Sache" und im 18. Jh. "Phantasievorstellung" an.
(E1)(L1) http://www.etymonline.com/index.php?search=freak
1563, "sudden turn of mind," probably related to O.E. frician "to dance" (not recorded in M.E., but the word may have survived in dialect), or perhaps from M.E. frek "bold, quickly," from O.E. frec "greedy, gluttonous." Sense of "capricious notion" (1563) and "unusual thing, fancy" (1784) preceded that in freak of nature (1847).
The verb "freak out" is first attested 1965 in Amer.Eng., from freak (n.) "drug user" (1945), but the verb meaning "change, distort" goes back to 1911, and the sense in health freak, ecology freak, etc. is attested from 1908.
(E?)(L?) https://www.dictionary.com/
Phishing
Spear phishing (W2)
"Phisher" = "Passwort-Fischer".
Betrüger fordern hierbei in E-Mails dazu auf, einem Link zu folgen und dort persönliche Daten, Passwörter oder PIN-Codes zu aktualisieren bzw. anzugeben. Mit Hilfe dieser Daten können die Betrüger dann ungehindert Konten plündern.
Ein "Freak" war ursprünglich ein "Frequenz-Generierer". Und zur Klarstellung, dass es sich um einen TelePHon-Pirat handelte, der mit seiner "blue box" die Freiwahl-Frequenzen ausspähte, nannte man ihn "Phreak" = "Phone-Freak". Und dieses "Ph" soll also auch in "Phishing" stecken. Immerhin läuft das "Passwort-Fishing" ja auch immer noch meist über die alte Telefonleitung.
Die Bezeichnung "Phishing" (1996) leitet sich vom "Fischen" (engl. "fishing") nach persönlichen Daten ab. Die Ersetzung des "F" durch "Ph" stellt eine Imitation des Begriffes "Phreaking" dar, der sich in den 70er Jahren durch eine Zusammenziehung von "Phone" und "Freak" ergab.
Der Begriff engl. "Spear phishing" bezeichnet Phishing-Aktionen, die sich gezielt gegen eine einzige Person, eine bestimmte Firma, Gruppe oder Organisation richten.
Dem BSI-Newsletter vom 17.02.2005 war folgender Hinweis zu entnehmen:
Die Welt der Informationstechnologie ist reich an schillernden Begriffen, aber auch so dynamisch wie kaum ein anderer Bereich. Daher werden Ausdrücke wie "Phishing", das ja eben erst im 2004 gross aufkam, schon wieder von neuen überlagert. "Pharming" bezeichnet eine neue Generation von Phishing-Attacken. Im Mittelpunkt des klassischen Daten-Phishens stehen E-Mail-Nachrichten, die gefälschte Links enthalten. Durch diese werden Internetnutzer auf täuschend echt nachgebaute Webseiten gelockt, wo sie dann geheime Daten bekannt geben. Beim Pharming fällt dieser Schritt weg: Durch das Ausnutzen von Sicherheitslöchern in Internetbrowsern werden jene Dateien auf dem Computer manipuliert, die eingegebene Internetadressen in die für den Computer nutzbare IP-Adressen übersetzen. Dadurch gelangen Sie auf eine gefälschte Seite. Als PC-Nutzer sollten Sie deshalb darauf achten, die Sicherheitsupdates für die von ihnen verwendeten Browser regelmässig zu installieren.
(E?)(L?) http://1jour1actu.com/france/gare_au_phishing_/
08/06/2005 - Gare au phishing ! - France
(E?)(L?) http://www.antiphishing.org/
(E?)(L?) https://www.bsi-fuer-buerger.de/BSIFB/DE/GefahrenImNetz/Phishing/phishing_node.html
Phishing - gefährliche Umleitung für Ihre Passwörter
...
Seit kurzem gibt es eine weitere Plage: "Phishing". Das klingt nach fischen gehen - und genau so ist es auch. Das Wort setzt sich aus "Password" und "fishing" zusammen, zu Deutsch "nach Passwörtern angeln".
...
(E?)(L?) https://www.bsi-fuer-buerger.de/BSIFB/DE/Risiken/SpamPhishingCo/Phishing/phishing_node.html
Phishing
Gefährliche Umleitung für Ihre Passwörter
Schnell zum Abschnitt
- Trügerische Links und Webseiten
- Woran erkennt man Phishing-E-Mails?
- Woran erkennt man Phishing-Webseiten?
Schlimm genug, dass Spammer Ihre Mailbox zumüllen, andere auf Ihrem PC oder den mobilen Geräten herumschnüffeln wollen oder Schadprogramme einem die Lust am Internet verderben. Phishing: Das klingt nach fischen gehen - und genau so ist es auch. Das Wort setzt sich aus "Password" und "fishing" zusammen, zu Deutsch "nach Passwörtern angeln". Immer öfter fälschen Phishing-Betrüger E-Mails und Internetseiten und haben damit einen Weg gefunden, um an vertrauliche Daten wie Passwörter, Zugangsdaten oder Kreditkartennummern heran zu kommen - die Nutzer geben ihre Daten einfach freiwillig preis.
...
(E?)(L?) https://www.buerger-cert.de/glossar
(E?)(L?) http://www.cornelsen.de/lehrkraefte/1.c.2028553.de
(E?)(L?) http://www.csa.fr/infos/langue/langue_listemots.php?lt=p
- phishing filoutage (n.m.)
- phishing hameçonnage (n.m.)
(E?)(L?) http://www.csoonline.com/article/220527/the-devil-s-infosec-dictionary
Pharming and phishing
(E?)(L?) http://www.franceterme.culture.gouv.fr/FranceTerme/recherche.html
phishing (en)
(E?)(L?) http://sit.sit.fraunhofer.de/studies/de/studie-phishing-2006-de.pdf
(E6)(L1) https://www.gai-netconsult.de/show/index.php?id=52
Ausgabe 17 (Februar 2005)
Sicherheitstests von Webapplikationen für Jedermann (B. Fröbe)
Es werden einfach durchzuführende Tests aufgezeigt, mit denen jeder selber erste Erkenntnisse über die Sicherheit seiner Webapplikationen gewinnen kann.
Umlautdomänen - Spoofing by Design? (Dr. T. Johr)
Mit der Einführung von internationalen Domänennamen können unter Nutzung von exotischen Zeichensätzen in der URL Phishing-Angriffe initiiert werden. Technik und Gegenmaßnahmen werden beschrieben.
Sind Blackberrys sicher? (F. Breitschaft)
Die Nutzung von BlackBerry ermöglicht einen einfachen mobilen Zugriff auf E-Mails und erfreut sich deshalb zunehmender Beliebtheit. Die damit verbundenen Sicherheitsprobleme werden analysiert.
(E?)(L?) http://www.golem.de/specials/phishing/
(E?)(L?) http://hotforwords.com/2009/09/01/phishing/
(E?)(L?) http://www.youtube.com/watch?v=xuEX9B4t7X4
1:57 Phishing for cash!
(E?)(L?) http://www.howstuffworks.com/big.htm
How Phishing Works
(E?)(L?) http://www.icann.org/en/about/learning/glossary
(E?)(L?) http://www.investopedia.com/categories/buzzwords.asp
(E?)(L?) http://www.investopedia.com/terms/p/
(E?)(L?) http://www.jargonf.org/
(E?)(L?) http://techno.lapresse.ca/nouvelles/200605/31/01-14824-filoutage-binettes-et-espiogiciels.php
Phishing - Hammeçonnage - Phishing
(E?)(L?) https://www.lifewire.com/phishing-scams-153131
Popular Phishing Scams and What To Do About Them
by Mary Landesman
Updated October 17, 2016
What is phishing?
...
(E?)(L?) http://listserv.linguistlist.org/cgi-bin/wa?A2=ADS-L;ejNMfQ;200804161732450400C
spear-phishing
(E?)(L?) http://listserv.linguistlist.org/cgi-bin/wa?A2=ADS-L;4VIXbA;200710031423270500A
...
"Spear fishing" is a highly targeted phishing attack. By sending e-mails that appear genuine to all the employees or members of a certain company, government agency, organization or group, spear phishers attempt to trick you into giving out sensitive information.
...
(E?)(L?) http://www.lookstoogoodtobetrue.com/search.aspx?q=phishing
(E?)(L?) http://www.macmillandictionary.com/dictionary/british/phishing
(E?)(L?) http://www.marketing.ch/lexikon.asp?letter=P
(E?)(L?) http://toolbar.netcraft.com/stats/map
Map of current phishing attacks
Netcraft's phishing attack map provides a real-time visualisation of the phishiest countries in the world. Measurements are determined by using IP address delegation information to attribute current phishing sites in our Phishing Site Feed to countries. We then use the number of active sites found by our Web Server Survey to calculate and display the ratio of phishing attacks to web sites in each country.
...
(E?)(L?) http://toolbar.netcraft.com/help/faq/index.html#phishing
Phishing is a name derived from the notion of "fishing for information", and "phreaking", which was an eighties term used for people who hacked phone networks and systems to gain access to free calls, or control over parts of the telephony system. It is a simple concept, which is to try to trick people into disclosing their bank account details, so that the attacker may then log in to the person's Internet bank and withdraw their savings.
(E?)(L?) http://news.netcraft.com/fullindex/
- Netcraft removes phishing attacks in less than half the industry average time - 2013/01/24
- World map of phishing attacks - 2012/12/13
- Chrome version of Netcraft Anti-Phishing Extension Available - 2012/11/19
- Phishing attacks using HTML attachments - 2012/11/13
- Phishing Alerts for Domain Registries 2012/10/25
- Phishing Alerts for Certificate Authorities 2012/09/19
- Phishing on sites using SSL Certificates 2012/08/22
- Nigerian government hosts Halifax phishing site 2012/01/04
- Phishing sites using Extended Validation SSL 2011/12/30
- Governments hosted 146 new phishing sites in July 2011/08/19
- iPad: New incentive for phishing site reporters 2010/06/11
- HMRC phishing site hosted on gov.uk domain 2009/09/01
- Faster Actions Needed Against Phishing Domains 2009/06/22
- New Phishing Attacks Combine Wildcard DNS and XSS 2009/02/17
- New Incentives for Phishing Site Reporters 2009/01/06
- Ongoing Phishing Attack Exposes Yahoo Accounts 2008/10/26
- Citigroup Phishing surged after Wachovia Announcement 2008/10/03
- Phishing kits take advantage of novice fraudsters 2008/01/03
- January Phishing Site Competition Winners 2007/02/15
- Netcraft Phishing Feed To Protect Microsoft Customers 2007/02/06
- Phishing Attacks Continue to Grow in Sophistication 2007/01/15
- Phishing By The Numbers: 609,000 Blocked Sites in 2006 2007/01/15
- November Phishing Site Competition Winners 2006/12/10
- October Phishing Site Competition Winners 2006/11/15
- September Phishing Site Competition Winners 2006/10/09
- Bank, Customers Spar Over Phishing Losses 2006/09/13
- Who can block the largest number of phishing sites in September? 2006/09/01
- Chinese Bank’s Server Used in Phishing Attacks on US Banks 2006/03/12
- Who can block the largest number of phishing sites in January? 2006/01/05
- Phishing By The Numbers: 41,000 Blocked Sites in 2005 2005/12/31
- Phishing Attacks Evolved Steadily Throughout 2005 2005/12/29
- More than 450 Phishing Attacks Used SSL in 2005 2005/12/28
- eBay Fooled by Fast-moving Phishing Scam 2005/12/05
- Report a phishing site, gain a chance to win an Ipod 2005/11/17
- Bank Shuts Down Web Site After Phishing Attack 2005/10/22
- Phishing Defense a Key Factor in eBay-VeriSign Deal 2005/10/11
- New Phishing Attacks Eliminate Need for Target Web Site 2005/06/24
- Wave of Phishing Attacks Hit Regional Banks, Credit Unions 2005/06/13
- Bank Mergers Provide Opportunity for Phishing 2005/06/09
- Honeynet Reports on Traffic to Phishing Sites 2005/05/20
- Online Vigilantes Fight Back Against Phishing Fraudsters 2005/05/18
- Fraudsters seek to make phishing sites undetectable by content filters 2005/05/12
- Fraudsters deploy Botnets as DNS Servers to Sustain Phishing Attacks 2005/05/04
- Banks Hit by Cross-Frame Phishing Attacks 2005/03/17
- Firefox to Disable IDN Support as Phishing Defense 2005/02/15
- Netcraft Anti-Phishing Toolbar Available for Download 2004/12/28
- Tech Giants Target Phishing as New Threats Emerge 2004/12/08
- Phishing Activity Surges Ahead of Holiday e-commerce Season 2004/11/27
- Google sites plagued by phishing opportunities 2004/11/01
- Google fix second phishing vulnerability 2004/10/22
- Phishing Attacks possible on Google 2004/10/20
- Fraudsters go Phishing on eBay 2004/10/15
- Cardholders targetted by Phishing attack using visa-secure.com 2004/10/08
- Life Span of a Phishing Site Averages 54 Hours 2004/08/14
- Phishing Attacks Using Banner Ads to Spread Malware 2004/08/06
- MyDoom Spread Illustrates Challenge for Phishing Defense 2004/07/27
- Microsoft Releases Fix for IE Phishing Exploit 2004/07/02
- IIS Server Malware is Phishing Scam 2004/06/25
- Phishing Attacks Level Off in May 2004/06/22
- Phishing Worm Installs Trojan Without Trickery 2004/06/02
- Another Huge Surge in Phishing Scams in April 2004/05/25
- Anti-Phishing Site Targeted by Hack Attacks 2004/05/11
- More Than 400 Phishing Attacks in March 2004/04/22
- Phishing Trojan Grabs Browser Screen Shots 2004/04/17
- New Phishing Scam Prompts Warnings 2004/04/01
- Phishing Scam Spoofs U.S. Government Site 2004/03/16
- SSL’s Credibility as Phishing Defense Is Tested 2004/03/08
- Phishing Attacks Rise by 50% month on month 2004/02/25
- Phishing Scam Installs Keylogger Via Web Page 2004/02/16
- Jump in Phishing Attacks in December 2004/01/07
(E?)(L?) http://www.netlingo.com/inframes.cfm
(E?)(L?) http://www.netlingo.com/word/spear-phishing.php
spear phishing
(E?)(L?) http://www.onlinemarketing-praxis.de/glossar/phishing
(E?)(L?) http://www.oqlf.gouv.qc.ca/actualites/capsules_hebdo/index_p.html
phishing, 30 septembre 2004 | phishing (voice~), 11 août 2006 | voice phishing,11 août 2006
(E?)(L?) http://www.pcwelt.de/start/sicherheit/antivirus/praxis/2102706/sicherheits_lexikon_diese_begriffe_sollten_sie_kennen/
(E?)(L?) http://www.pcwelt.de/ratgeber/Man-In-The-Middle-NTFS-Streams-Offene-Ports-Phishing-Quellcode-Ratgeber-Sicherheit-473273.html
...
Der Begriff ist ein Kunstwort, das sich aus "Passwort" und dem englischen "fishing" (zu Deutsch "fischen ") zusammensetzt.
...
(E?)(L?) http://www.pcwelt.de/ratgeber/Phishing__Methoden__Gefahren___Praevention-Sicherheit-8587643.html
11.03.2014
Thorsten Eggeling
Phishing: Methoden, Gefahren & Prävention
...
(E?)(L?) http://palisade.plynt.com/articles/
- Anti-phishing - Incident Response
- Anti-Phishing Techniques - Detection Measures
- Anti-Phishing Techniques - Protection Measures
- Phishing Questions
(E?)(L?) http://www.rfc-editor.org/rfc-index2.html
5901 Extensions to the IODEF-Document Class for Reporting Phishing P. Cain, D. Jevans [ July 2010 ] (TXT = 97325) (Status: PROPOSED STANDARD) (Stream: IETF, WG: NON WORKING GROUP)
(E6)(L1) http://www.schneier.com/crypto-gram-back.html
- 15 Jan 2007 Automated targeting system, auditory eavesdropping, licensing boaters, Microsoft anti-phishing, Unabomber's code, transmitters in Canadian coins
- 15 Oct 2005 Phishing, closed-source breathalyzers, automatic license plate scanners, tax breaks for good security, Judge Roberts
(E6)(L?) http://www.secorvo.de/security-news/secorvo-ssn0508.pdf
Editorial:
Der Phisher und die 7 Geißlein
Liebe Kinder, sperrt die Türe gut zu und nehmt euch in acht vor dem Wolf! (...) Der Bösewicht verstellt sich oft, aber an seiner rauen Stimme und an seinen schwarzen Füßen werdet ihr ihn gleich erkennen.
Gebrüder Grimm, Der Wolf und die sieben Geißlein
Fast gleichlautend lesen sich die Mahnungen der deutschen Banken. Letztere leiden unter der zunehmenden Flut von Phishing-Angriffen: Im Mai 2005 zählte Messagelabs über 9 Mio. Phishing-E-Mails, ein trauriger Rekord. Die Anti-Phishing Working Group erhielt im Juli 2005 über 14.000 Phishing-Reports, im Juli 2004 waren es erst 2.000.
...
(E?)(L?) http://www.snopes.com/inboxer/scams/phishing/phishing.asp
(E6)(L?) http://www.sophos.com/spaminfo/explained/spamglossary.html#phishing
(E?)(L1) https://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpP,00.html
phishing | phishing kit | phishing via SMS | SMS phishing | spear phishing | spear-phishing | spearphishing
(E?)(L?) http://about-threats.trendmicro.com/us/glossary/all
(E?)(L?) http://filmlexikon.uni-kiel.de/index.php?action=lexikon&tag=det&id=5208
(E3)(L1) https://www.webopedia.com/TERM/p/phishing.html
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. ...
...
By spamming large groups of people, the "phisher" counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.
Phishing, also referred to as "brand spoofing" or "carding", is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.
(E?)(L?) https://www.webopedia.com/DidYouKnow/Internet/2005/phishing.asp
All About Phishing
...
Did You Know...
The word "phishing" comes from the analogy that Internet scammers are using e-mail lures to "fish" for passwords and financial data from the sea of Internet users. The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users. Since hackers have a tendency to replacing "f" with "ph" the term "phishing" was derived.
Eine weitere Erklärung für das "ph" in "phishing" ist, dass es sich auch um "password fishing" handeln kann.
Ausserdem wird das "ph" historisch auch noch auf "phone" zurückgeführt. Die ersten elektronischen Hacker besorgten sich Freieinheiten durch das Einspielen bestimmter Frequenzfolgen in öffentlichen Telefonen.
(E?)(L?) https://www.webopedia.com/TERM/s/spear_phishing.html
spear phishing
(E?)(L?) http://en.wikipedia.org/wiki/Phishing
Phishing
(E2)(L1) http://www.wordspy.com/
phishing | phone phishing | puddle phishing | spear-phishing
(E1)(L?) http://www.wordspy.com/words/phishing.asp
(E1)(L1) http://www.worldwidewords.org/turnsofphrase/tp-phi1.htm
phishing
(E?)(L?) http://www.worldwidewords.org/nl/hcst.htm
Spear-phishing
(E1)(L1) http://www.wortwarte.de/
| Anti-Phishing-Toolbar | phishen | Phishing-Angriff | Phishing-E-Mail | Phishing-Mail | Phishing-Raubzug | Phishing-Sicherheitscheck | Phishing-Sperre | Phishing-Technik | Phishing-Verfahren | Phishing-Welle | Phishzug
(E1)(L1) http://ngrams.googlelabs.com/graph?corpus=0&content=Phishing
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.
Engl. "Phishing" taucht in der Literatur um das Jahr 1970 auf.
(E?)(L?) https://corpora.uni-leipzig.de/
Erstellt: 2013-02
Phreaking (W3)
Phishers Freak phisht freshe Phishe
freshe Phishe phisht Phishers Freak
Die Bezeichnung "Phreaking" entstand in den 1970er Jahren. Der US-Amerikaner John T. Draper (genannt "Captain Crunch" - das Pseudonym spielt auf eine Werbefigur für Kellog's Cornflakes an) führt mit Hilfe einer Spielzeugpfeife aus einer Packung Frühstücksflocken kostenlos weltweit Telefonate. Eine der zwei Töne, die die Pfeife hervorbringen kann hat eine Frequenz von 2.600 Hertz. Damit lassen sich die Signalisierungsdaten der Telefongesellschaften manipulieren. Insbesondere gelang es Cap'n Crunch den Gebührenzähler zu deaktivieren.
Das Wort engl. "Phreaking" ist aus der Kombination von engl. "phone" und engl. "freak" = dt. "Außergewöhnliches", "irrer Typ", "durchdrehen" u.a. entstanden.
(E?)(L?) http://www.catb.org/jargon/html/go01.html
(E?)(L?) http://home.comcast.net/~wwftd/pq.htm#phreaking
(E?)(L?) http://www.hotforwords.com/words/
(E3)(L1) http://www.jargon.net/jargonfile/p/phreaking.html
(E?)(L?) http://www.jargonf.org/
(E?)(L?) http://toolbar.netcraft.com/help/faq/index.html#phishing
Phishing is a name derived from the notion of "fishing for information", and "phreaking", which was an eighties term used for people who hacked phone networks and systems to gain access to free calls, or control over parts of the telephony system. It is a simple concept, which is to try to trick people into disclosing their bank account details, so that the attacker may then log in to the person's Internet bank and withdraw their savings.
(E6)(L?) http://www.sophos.com/en-us/security-news-trends/glossary/spam-glossary.aspx
(E?)(L1) https://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpP,00.html
(E?)(L1) https://whatis.techtarget.com/definitionsAlpha/0,289930,sid9_alpV,00.html
van Eck phreaking
(E?)(L1) https://www.webopedia.com/Networks/Security
(E?)(L?) http://numb3rs.wolfram.com/season1.html
Episode 111: Sacrifice
A senior computer-science researcher working on a classified government project is found murdered in his Hollywood Hills home, and data has been stolen from his computer. The investigation reveals that the victim was going through a bitter divorce and was trying to keep his wife from getting his money. Charlie also learns that the project the man was working on may involve baseball.
Math used: sabermetrics, econometrics, Van Eck phreaking
(E1)(L1) http://ngrams.googlelabs.com/graph?corpus=0&content=Phreaking
Abfrage im Google-Corpus mit 15Mio. eingescannter Bücher von 1500 bis heute.
Engl. "Phreaking" taucht in der Literatur um das Jahr 1940 / 1970 auf.
(E?)(L?) https://corpora.uni-leipzig.de/
Erstellt: 2013-02
plynt
Palisade
Application Security Intelligence
(E?)(L?) http://palisade.plynt.com/
About Palisade
Palisade is a monthly online magazine that focuses on application security. In each issue, we discuss topics of current interest in developing and using secure software. Palisade articles are written by Paladion's security engineers and usually reflect their work in advising customers develop safer software.
...
(E?)(L?) http://palisade.plynt.com/articles/
Articles in Palisade
All articles are broadly maintained in these three categories. Click on the individual links to go to the article content. Or you could click on the categories themselves. You will be taken to the respective category pages with article summaries.
(E?)(L?) http://palisade.plynt.com/articles/
Features
- Malware Infection on Websites
- Malware - Spreading and Mitigation
- Approach to Business Impact Analysis
- Understanding Encryption Requirements of PCIDSS
- Log Monitoring and Malware Scanning: Stay Ahead of the Threat Curve
- Measuring the Value of Remote Application Security Testing
- Database Links Security
- Defend against Reverse Engineering
- URL Redirection Flaw
- Virtualization - the promised land?
- Mobile Banking Architecture
- Back to Basics: Http Essentials
- Smart Questions for Customer Reference Checks
- HTTP Request Smuggling
- Session Riding Attacks
- Understanding SSL VPN
- The reign of bots
- Pharming on the Net
- Interview: The Challenges of Security Testing
- Security Architecture for Multi-Tier Applications
- Interview: What works in Training Security Testers
- Datamonitor Survey on Software Security Testing
- All About Steganography
- Built-in Intrusion Detection
- Integrating Smart Cards in Web Applications
- Preventing Buffer Overflows
(E?)(L?) http://palisade.plynt.com/articles/
Technical Articles
- Securing a SCADA network - Part I
- Basics of Forensics Log Analysis
- Insight into Web Application Firewalls - Part 1
- Catching Back Doors through Code Reviews
- Testing Mobile Applications for Security Vulnerabilities
- Virtual Keyboard and the Fight Against Keyloggers
- Defeating Encryption in Some Thick Clients
- Cache Control Directives Demystified
- CSRF - The hidden menace
- Common mistakes in two-tier applications
- Wi-Fi Protected Access
- Mobile Banking Architecture
- Application Penetration Tester's Toolkit
- Securing Web Based Payment Systems
- Wireless Security - Cracking WEP
- Wireless Security - How WEP works
- Insecurities in Healthcare Applications
- SaaS Security Testing - The Challenges
- HTTP Request Smuggling
- More on dodging spiders
- Are stored procedures safe against SQL injection?
- Dodging the spiders
- Browser Hijackers
- LinkDemand and InheritanceDemand
- Distributed Reflection Denial of Service: A Bandwidth Attack
- Thick Client Application Security - Attacks
- Security issues in 'Remember Me' feature
- Assert Safely: How to use .Net's Assert wisely
- Rainbow Cracking and Password Security
- Two Factor Authentication
- Defeating Bots with CAPTCHAs
- Securing Documents in Web Applications
- Security in SMS Banking
- Implementing SSL
- Code Obfuscation Part 3 - Hiding Control Flows
- Understanding SSL
- Code Obfuscation - Part 2: Obfuscating Data Structures
- SMS Banking
- Using browser refresh to expose passwords
- Code Obfuscation
- Secure your sessions with Page Tokens
- Security Enhancements in Visual C++
- Google Hacking - Is your web application secure?
- XPath injection in XML databases
- Security Reverse Proxy
- Steganalysis
- Fighting Keyloggers
- Source Code Analyzers
- Backdoors and Trojans in Applications
- Introduction to Code Obfuscation
- Same User, Different Privileges
- Securing Database Connection Strings
- Automated Application Vulnerability Scanners
- Passwords - In Memory Still Green
- Threat Modeling
(E?)(L?) http://palisade.plynt.com/articles/
Best Practices
- Top 5 Secure Coding Tips for PHP applications
- Secure coding techniques in ASP.NET - Part 1
- Best Practices for Protecting Banking Sites
- Securing PHP using Hardening Patch and Suhosin
- Meeting compliance requirements through application & network penetration tests and code reviews
- Selecting Application Security Vendors - Part II
- SAP Baseline Security Audit
- The Payment Application Data Security Standard (PA DSS)
- Mobile Banking - Threats and Mitigation
- 5 Tips for Securing Software as a Service
- Securely Webifying Applications
- Securing IIS Web Servers
- Are Complex Passwords Really Necessary?
- Securing Apache Web Servers
- Thick Client Application Security - Defenses
- Pharming on the Net
- Implementing Password Recovery
- Interviewing software developers
- Encrypting data in Databases
- Selecting Application Security Vendors
- Best Practices in Input Validation
- Catch'em Young - How to discover vulnerabilities early
- Application Logs - Security Best Practices
- Controls for Outsourcing Software Development
- Training your Developers
- Security at Software Requirements Specification
- Authentication - Security Best Practices
Erstellt: 2009-12
privacy
Analyze Your Internet Connection
(E?)(L?) http://privacy.net/analyze-your-internet-connection/
processlibrary
Process Information
(E?)(L?) http://www.processlibrary.com/
Find the latest information about spywares, adwares, trojans, viruses, system processes and common applications.
(E?)(L?) http://www.processlibrary.com/directory/a/
a.exe | a_clearsearch.dll | a0011142.exe | a006.dll | a006.exe | a0067423.exe | a0067428.exe | a4proxy.exe | a64sddd.exe | a65d.exe | aaaamon.dll | ab.exe | AbbyyNewsReader.exe | ABoard.exe | ABox.exe | abrir_cartao.exe | abs.exe | absr.exe | abyssws.exe | ac1st15.dll | acbtnmgr_xxx.exe | ACCAgnt.exe | accelerate.exe | access members area.exe | access.exe | AcctMgr.exe | ACCWIZ.EXE | acespy331t.exe | aclservice.exe | acmonitor_xxx.exe | acombo3d.exe | aconti.exe | acoustic.exe | acroaum.exe | acrobat elements.exe | acrobat.exe | acrodist.exe | acroiehelper.dll | acrord32.exe | acrotray.exe | ACS.exe | acsd.exe | act.exe | actalert.exe | actionagent.exe | activation.exe | activeds.dll | ACTIVEDS.EXE | activeeyes.exe | activemenu.exe | activeplus.exe | activex_300_it.exe | ActivityDisk.exe | actmovie.exe | actualspy.exe | actx1.exe | actxprxy.dll | acu.exe | ad-aware.exe | ad-watch.exe | ad.exe | ad2kclient.exe | adaware.exe | adblck.exe | adblock.exe | AdBlocker.exe | adbltzun.exe | adc.exe | addestroyer.exe | addestroyerinner.exe | addictivetech.exe | addrbook.exe | adg.exe | adgjdet.exe | Adiras.exe | adl_dh.exe | adl_mteststub.exe | adlight2.dll | adlinstallwin32.exe | AdManCtl.exe | admillikeep.exe | admilliserv.exe | admilliservx.dll | admlib32.exe | admunch.exe | admxprox.dll | adobe.exe | AdobeDownloadManager.exe | Adobelm_Cleanup.0001 | Adobelmsvc.exe | adobes.exe | AdobeUpdateManager.exe | adp.exe | adp8035.exe | adperform180safull.exe | adroar.dll | adservice.exe | adsetup.silent.1.13.exe | adsgone.exe | AdskScSrv.exe | ADSL Autoconnect.exe | adsmsext.dll | adss.exe | adstatcomm.dll | adstatkeep.exe | adstatserv.exe | adsub.exe | adtech2005.exe | adtech2006.exe | adtray.exe | adupdater.exe | adusermon.exe | adv.exe | advapi.exe | advapi32.dll | advchk.exe | advert.dll | advpack.dll | adx.exe | aeiwlsta.exe | aelaunch.exe | aexswdusr.exe | agent.exe | AgentSrv.EXE | agentsvr.exe | agfaclnk.exe | agntsrvc.exe | agquickp.exe | agrsmmsg.exe | agsatellite.exe | AgtServ.exe | ahadp.exe | ahfp.exe | ahnsd.exe | ahqinit.exe | ahqtb.exe | aiepk.exe | aiepk2.exe | aim spy plugin.dll | aim.exe | aim6.exe | aim95.exe | aimaol.exe | aimingclick.exe | airplus.exe | AirPlusCFG.exe | airsvcu.exe | AIT | ajrpbi.exe | akiller.exe | AL_ADS~1.EXE | alarm.app.exe | AlarmApp.exe | alarmwatcher.exe | Alaunch.exe | ALCFDRTM.EXE | Alchem.exe | ALCMTR.EXE | ALCWZRD.EXE | alcxmntr.exe | aldaemon.exe | Alerter | alertserver.exe | AlertSvc.exe | alevir.exe | alg.exe | ALMon.exe | almxptray.exe | alogserv.exe | alp2plib.exe | ALsvc.exe | ALT.EXE | ALUNotify.exe | ALUSchedulerSvc.exe | am32.exe | amgrsrvc.exe | amoumain.exe | amovie.ocx | amp2pl.exe | anbmServ.exe | angelex.exe | AnonAntiSpyware.exe | anote.exe | ansmtp.dll | answers.exe | anti_troj.exe | antiav.exe | antiav_exe.exe | antispy.exe | AntiVirus Update.exe | antivirusgold.exe | anvshell.exe | AnyDVD.exe | aocbhm.exe | aol.exe | AOLacsd.exe | AOLDial.exe | AOLHOS~1.EXE | AOLHostManager.exe | AOLServiceHost.exe | aolsoftware.exe | AOLSP Scheduler.exe | aolspscheduler.exe | aoltpspd.exe | aoltray.exe | aoltsmon.exe | aom.exe | aornum.exe | ap0.exe | ap2.exe | ap9h4qmo.exe | Apache.exe | apachemonitor.exe | ApchT2kW.exe | apcsystray.exe | APD123.exe | apdproxy.exe | apev.exe | apntex.exe | apoint.exe | app.exe | appmgr.exe | appservices.exe | appsetup.exe | appwiz.dll | aptezbp.exe | apuc.dll | apvxdwin.exe | aq3setupstandard.exe | aqadcup.exe | AquariumDesktop.exe | archive.exe | Ares.exe | armon32.exe | armon32a.exe | arr.exe | ARUpdate.exe | arupdate.exe | arupld32.exe | AS.exe | asd.exe | asearchassist.dll | asfagent.exe | ash.dll | ash2.dll | ashDisp.exe | ashmaisv.exe | ashserv.exe | ashWebSv.exe | asKernel.exe | asm.exe | asmonitor.exe | asmproserver.exe | aspi_me.exe | aspnet_admin.exe | ASPNet_State.exe | ASPNET_WP.exe | astart.exe | asupport.exe | asuskbservice.exe | AsusProb.exe | aswupdsv.exe | asycfilt.dll | athoc.exe | ati_d3d.dll | Ati2cwad.exe | ati2cwxx.exe | ati2evxx.exe | ati2mdxx.exe | ati2plab.exe | ATI2plxx.exe | ati2ptxx.exe | ati2s9ag.exe | ati2sgag.exe | aticwd32.exe | ATIDtct.EXE | ATIevxx.exe | ATIPta.exe | ATIptaab.exe | atiptaxx.exe | ATIRW.exe | atisched.exe | atitask.exe | atiupdate.exe | atix10.exe | ATKKBService.exe | ATKOSD.exe | atl.dll | atlcustom.exe | atpart~1.dll | atpartners.dll | atrack.exe | atwtusb.exe | audevicemgr.exe | audiosrv.dll | Audition.exe | AUFILE~1.EXE | AUNPS.DLL | AUNPS2.DLL | aupdate.exe | aupdate_uninstall.exe | aurareco.exe | aurora(1).exe | aurora-wise1.exe | Aurora.exe | aurorahandler.dll | ause3-decoded.exe | ause3.exe | ausvc.exe | AuthFw.exe | autobar.exe | autochk.exe | AutoDown.exe | autoheal.exe | autolaunch.exe | automove.exe | autoreg.exe | autorun.exe | autotbar.exe | autotkit.exe | autoupdate.dll | autoupdate.exe | autoupdatev2.exe | aux32.exe | av.exe | avant.exe | avconsol.exe | AVENGINE.EXE | avgamsvr.exe | avgcc.exe | avgcc32.exe | avgctrl.exe | avgemc.exe | avghalsb.exe | avginet.exe | avgmsvr.exe | avgnt.exe | avgregcl.exe | avgserv.exe | avgserv9.exe | avguard.exe | avgupsvc.exe | avgw.exe | avgwb.dat | avicap.dll | avicap32.dll | avifil32.dll | avpcc.exe | avpm.exe | AvRmtCtr.exe | avsched32.exe | avserve.exe | avserve2.exe | avsynmgr.exe | avwupsrv.exe | awfxrn32.dll | awhost32.exe | awlft332.dll | awlhut32.dll | awrem32.exe | awutil32.dll | AXLBRI~1.EXE | axlBridge.exe
(E?)(L?) http://www.processlibrary.com/directory/b/
b2search_v17.exe | b9.exe | babylon.exe | backdoor.prorat.13.exe | backdoor.prorat.13_(57).exe | BackItUp.exe | backup-20040105-225929-414.dll | backupnotify.exe | backweb-137903.exe | backweb-8876480.exe | backWeb.exe | bacstray.exe | bagent.exe | banmanpro.exe | bargain3.exe | bargain4.exe | bargainbuddy.exe | bargains.exe | BascsTray.exe | basfipm.exe | bash.exe | basic ops plugin.dll | bass.exe | batinfex.dll | batmeter.dll | BATSERV2.EXE | bb.exe | bbchk.exe | BbDevMgr.exe | bbgdfvdd.exe | bbi8015.exe | bbi8018.exe | bbi8024.exe | bbi8032.exe | BBLauncher.exe | bboy.exe | bbui.exe | bcb.exe | bcmntray.exe | bcmsmmsg.exe | bcmwltry.exe | BCResident.exe | bcuyfz.exe | bdl14108.exe | bdmcon.exe | bdnagent.exe | bdoesrv.exe | bdrqbac.exe | bdss.exe | bdswitch.exe | bearshare.exe | belt.exe | benetns.exe | bengine.exe | benser.exe | BerasJatah.exe | beremote.exe | beserver.exe | beta.exe | bho.dll | BHODemon.exe | bhp.exe | bhsv.exe | bi5.exe | bib.dll | bifrost.exe | bigfix.exe | bigtra~1.exe | billmind.exe | billminder | bindshell.exe | binkw32.dll | bionet.exe | Biprep.exe | birytx.exe | BitComet.exe | BitLord.exe | bjcfd.exe | bjfvabf.exe | Bjmcmng.exe | bk.exe | bkupexec.exe | blackd.exe | blackice.exe | blat.exe | bldbubg.exe | block-checker.exe | blocker.exe | blss.exe | BlueSoleil.exe | bman.exe | bmmlref.exe | bmupdate.exe | bmwebcfg.exe | bokja.exe | bonjour.exe | bookedspace.exe | boot.exe | bootconf.exe | bot.exe | bp.exe | bpc.exe | bpcpost.exe | bpftp.exe | bpk.exe | bpsinstall.exe | bpumtray.exe | brad32.exe | brasil.exe | brctrcen.exe | Brengkolang.com | BRIDGE.DLL | brmecom.exe | BrMfcmon.exe | BrMfcWnd.exe | Brmfrmps.exe | BRMFRSMG.EXE | bronstab.exe | browsela.dll | browselc.dll | browserhelper.dll | browseui.dll | Brqikmon.exe | brss01a.exe | BRSVC01A.EXE | bs5-lmzdgu.exe | bsclip.exe | bsoft.exe | BTHelpNotifier.exe | BTNtService.exe | btprot.exe | BTSTAC | BTSTAC~1 | btstackserver.exe | bttnserv.exe | bttray.exe | btvid_32.dll | btwdins.exe | Buddy.exe | BUGSFIX.EXE | bundle.exe | bundle_cdt1006.exe | bundle~1.exe | bundleouter.exe | bundleouter2501031120.exe | bundleouter2601031121.exe | bundlersi.exe | bundles.exe | bundles118.exe | bundles53.exe | bvt.exe | bw2.com | bw2.exe | bwcc.dll | bwcc32.dll | bwgo0000 | bxproxy.exe | bxxs5.dll
(E?)(L?) http://www.processlibrary.com/directory/c/
c76bdcb6d01.exe | c7v.dll | ca.exe | cabinet.dll | CachemanXP.exe | cagent.exe | cagent32.exe | calc.exe | calcheck.exe | CALMAIN.exe | calwin32.dll | cam.exe | CameraAssistant.exe | camviewer.exe | CAP2LAK.EXE | CAP2RSK.EXE | CAP2SWK.EXE | capfax.exe | capharm.dll | capharm_unins.exe | card.exe | cards.dll | carpserv.exe | cartao.exe | cas2setup.exe | cas2stub.exe | casclient.exe | cashback.exe | cashsaver.exe | cashsaverupdate.exe | CAVRID.exe | CAVTray.exe | cb.exe | CBSRV.EXE | CBSysTray.exe | cc.exe | CCAP.EXE | ccapp.exe | ccarss.exe | ccEmFlSv.exe | ccevtmgr.exe | cclaw.exe | ccmagent.exe | ccmexec.exe | cconnect.exe | ccproxy.exe | ccPwdSvc.exe | ccpxysvc.exe | ccregvfy.exe | ccsetmgr.exe | cctrust.dll | ccwin9.exe | cd_clint.dll | cd_install.exe | cd_install_202.exe | cd_install_291.exe | cd_load.exe | cdac11ba.exe | cdaEngine | cdaengine.dll | cdaEngine0400 | cdaEngine0400.dll | cdaEngine0500 | cdaEngine0500.dll | cdantsrv.exe | cdf.exe | cdonts.dll | cdosys.dll | cdplayer.exe | CDProxyServ.exe | cds.exe | cdsm32.dll | cdspeed.exe | cdudflib.dll | ceekey.exe | CeEPwrSvc.exe | Center.exe | cepmtray.exe | ceres.dll | cfd.exe | CFEngine.exe | cfgmgr51.dll | cfgmgr52.dll | cfgwiz.exe | cfmon.exe | CFSServ.exe | cfsvcs.exe | cftmon.exe | CFXFER.exe | cg.exe | cgtask.exe | charmap.exe | chathandler.dll | check.exe | checker.exe | checkreg.exe | checkup.exe | chkadmin.exe | chkcolor.exe | chkdskw.exe | chkras.exe | choke.exe | chq7gv5g.exe | cidaemon.exe | cij3p2ps.exe | CineTray.exe | cisvc.exe | cisvvc.exe | cjqxe.exe | cka.exe | ckusdll.exe | clbcatex.exe | CLCapSvc.exe | cleanmgr.exe | cleanup.exe | cledx.exe | cli.exe | client.dll | client.exe | clientax.dll | ClipMate.exe | clipsrv.exe | clisvcl.exe | clockwise.exe | clonecdtray.exe | CM.EXE | cmanager.exe | cmappsetup.exe | cmappupdate.exe | cmaudio | cmc.dll | cmd.exe | cmd32.exe | cmdinst.exe | cmeiiapi.dll | cmesys.exe | cmeupd.exe | cmgrdian.exe | cmicnfg.cpl | cmisrv.exe | cmluc.exe | cmman.exe | cmmpu.exe | cmqcemmpm.exe | cmrsr.exe | cmrss.exe | CMSystem.exe | cmupd.exe | cnbabe.dll | cncs232.dll | cncs32.dll | cnqmax.exe | CnsMin.dll | cnxdsltb.exe | CnxMon.exe | CNYHKey.exe | coloreal.exe | ComComp.exe | comctl_32.exe | comctl32.dll | comdlg32.dll | comet.exe | comload.dll | CommAgent.exe | command.exe | commando.exe | commctrl.dll | Companion.exe | compaq-rba.exe | compcln.dll | comres.dll | comsmd.exe | conf.exe | config.exe | conime.exe | conmgr.exe | CONNMN~1.EXE | ConquerCam.exe | conscorr.exe | consol32.exe | Control.exe | cool.exe | coolcore44.dll | CopernicDesktopSearch.exe | copy of optimize.exe | core.dll | CoreCenter.exe | CounterSpy.exe | CoverDesigner.exe | cp.exe | cpanel.exe | cpd.exe | cpdclnt.exe | CplBTQ00.EXE | cpqa1000.exe | cpqdfwag.exe | cpqdmi.exe | cpqeadm.exe | CPQEAKSYSTEMTRAY.EXE | CPQEAKSYSTEMTRAY.EXE | cpqinet.exe | Cpqset.exe | cpr.dll | cpr.exe | CpRmtKey.EXE | CpRmtKey.EXE | cpruninst.exe | cpuinf32.dll | cpunumber.exe | crackserver-service.exe | crauto.exe | createcd.exe | createcd50.exe | CrossMenu.exe | CrossMenu.exe | crss.exe | crsss.exe | crtdll.dll | CrXML.dll | crypserv.exe | crypt32.dll | crypt32chain.dll | cryptnet.dll | CSAgent.exe | csaolinst.dll | csaolldr.exe | csbiinst.dll | cscdll.dll | csieinst.dll | csinject.exe | csinsm32.exe | csinsmnt.exe | csmsv.exe | csrdeu32.exe | Csrrs.exe | csrs.exe | csrsc.exe | csrse.exe | csrss.exe | csrss32.exe | csv5p070.exe | ct_load.exe | ctadl#.dll | ctap#.dll | ctasio.dll | ctav#.dll | ctavp#.dll | ctbclick.exe | ctbrte2.dll | ctcms.exe | CTCMSGo.exe | ctcnt#.dll | CTDetect.exe | ctdvddet.exe | cteaxspl.exe | ctfmon.exe | ctfmon32.exe | cthelper.exe | ctl3d.dll | ctl3d32.dll | ctlauncher.exe | ctlcntr.exe | CTLTask.exe | ctltray.exe | ctmix32.exe | CTModUtl.exe | ctnotify.exe | CTPdeSrv.exe | CTPLAY2.EXE | CTPowUti.exe | ctpp#.dll | ctrlvol.exe | ctsr#.dll | ctsrreg.exe | ctsvccda.exe | ctsysvol.exe | CTXFIHLP.EXE | cucu.exe | CursorXP.exe | CurtainsSysSvcNt.exe | cusrvc.exe | cuteftp.exe | cuteftppro.exe | cutftp.exe | cvpnd.exe | cvsservice.exe | cxtpls.exe | cyb2k.exe | cydoor.exe | cydoor_uninstall.exe | cygrunsrv.exe | cyxipjsxdua.exe | cz.exe | czncin.exe
(E?)(L?) http://www.processlibrary.com/directory/d/
d.exe | d32-fw.dll | d3d8.dll | d3d8thk.dll | d3d9.dll | d3dim700.dll | d3dxof.dll | d4.exe | d6.exe | d88dyd.dll | d98008w.exe | daconfig.exe | dadapp.exe | dadqh.exe | dadtray.exe | daemon.exe | damon.exe | dao3032.dll | dap.exe | DATALA | DATALA~1.EXE | datalayer.exe | datemanager.exe | dating.exe | DavCData.exe | dbaccess.exe | dbghelp.dll | dbserv.exe | dcevt32.exe | dcfssvc.exe | dchuefy.exe | dciman32.dll | dcomx.exe | ddcman.exe | ddeml.dll | ddhelp.exe | ddhelper32.exe | ddm3dia.dll | ddraw.dll | ddrawex.dll | de_serv.exe | dealhelper.exe | dealhlpr.dll | deborah.exe | defscangui.exe | defwatch.exe | delayrun.exe | delfin.dll | delldmi.exe | dellmmkb.exe | delmsbb.exe | deploy.exe | desk98.exe | DeskAdKeep.exe | DeskAdServ.exe | deskcp16.dll | deskpan.dll | Desktop.exe | desktopmgr.exe | DesktopSuite.exe | deskup.exe | devcon32.dll | DevDetect.exe | devenum.dll | devenv.exe | devldr.exe | devldr16.exe | devldr32.exe | devmgr.dll | dexplore.exe | df_fixer.dll | df_kme.exe | df_proxy.dll | DF5Serv.exe | DF5ServerService.exe | dfe.exe | DfrgFat.exe | dfrgntfs.exe | dfssvc.exe | dgprpsetup.exe | dhbrwsr.exe | dhcpcsvc.dll | dhp.dll | dhp2.dll | dhsvr.exe | dhun.exe | dhupdt.exe | dhwin1.exe | diagent.exe | DIAL.exe | dialer.exe | DigiTV.exe | digstream.exe | dinput.dll | dinput8.dll | dinst.exe | Dioxin.exe | directcd.exe | directs.exe | directx.exe | directxset.exe | DiskImageService.exe | disktool.dll | disp1150.exe | dispex.dll | display.exe | dist001.exe | dit.exe | ditexp.exe | DivX Player.exe | divx.exe | djmypt800.exe | DJSNETCN.exe | dkicon.exe | dkservice.exe | dla.exe | dlbabmgr.exe | dlbabmon.exe | dlbcserv.exe | dlbfbmgr.exe | dlbkbmgr.exe | dlbkbmon.exe | dlbtbmgr.exe | dlbtbmon.exe | dlbubmgr.exe | dlg.exe | dlgli.exe | dlhost.exe | dll32.exe | dllcmd32.exe | dllhost.exe | DLLML.exe | dllreg.exe | DLSDBNT.EXE | dlt.exe | dluca.exe | DM1Service.exe | dmadmin.exe | dmcpyt.dll | dmremote.exe | dmserver.exe | dmxlauncher.exe | dnar.exe | dnetc.exe | dns.exe | dnsapi.dll | dnscatcher.exe | DNSCST.exe | dodrrr.exe | dolyt16.exe | dopus.exe | dos4gw.exe | doscan.exe | dotnetfx.exe | doul.exe | down.exe | download.exe | downloadplus.exe | dp-b23011805.exe | dp-him.exe | dp-k13w13.exe | dpagnt.exe | DPFUSMgr.exe | DpHost.exe | dpi.exe | dplay.dll | dplayx.dll | DPMApp.exe | dpmw32.exe | dpps2.exe | DPWinLct.exe | dr.exe | dr_s.exe | dragdiag.exe | dragdrop.exe | dreamweaver.exe | drgtodsc.exe | DriveCrypt.exe | drivespeed.exe | drmclien.dll | drpmon(1).dll | drpmon.dll | drst.exe | drv.exe | drvddll.exe | drvlsnr.exe | drvmon.exe | DRWTSN16.EXE | drwtsn32.exe | ds.exe | dsagent | dsagnt.exe | dscbtshl.dll | dsentry.exe | dseraser.exe | dskrfuoui.dll | dslagent.exe | dslmon.exe | dslstat.exe | dsnthapp.exe | dsnthser.exe | dsound.dll | dssagent.exe | dtloader.exe | duc20.exe | dumeter.exe | dummy.exe | dumprep.exe | dun.exe | dvchost.exe | dvd43_tray.exe | DVDAccess.exe | dvdkeyauth.exe | dvdlauncher.exe | dvdramsv.exe | DVDRegionFree.exe | DVDTray.exe | dvldr32.exe | dvpapi.exe | dvpd.dll | dvremind.exe | dvwnhd.exe | DvzIncMsgr.exe | dvzmsgr.exe | dw.exe | dw[1].exe | dwcg.exe | Dwe.exe | DWHeartbeat.exe | DWHeartbeatMonitor.exe | DWHWIZRD.EXE | dwnupdt.exe | dwrcs.exe | dwrcst.exe | dwwin.exe | DxDebugService.exe | dxdiag.exe | dxdllreg.exe | DXEnum.exe | dxnf.exe | dxtmsft.dll | dxtrans.dll
(E?)(L?) http://www.processlibrary.com/directory/e/
e-s0bic1.exe | E_A10IC2.EXE | E_FATI9BE.EXE | E_FATI9CE.EXE | E_FATI9EA.EXE | E_FATI9FA.EXE | E_FATI9HA.EXE | E_FATI9HE.EXE | E_L10IC1.EXE | E_S00RP1.EXE | E_S00RP2.EXE | e_s0hic1.exe | E_S10IC1.EXE | e_s10ic2.exe | E_S10MT2.EXE | E_S4I0F2.EXE | E_S4I0H2.EXE | E_S4I0P1.EXE | E_S4I0T1.EXE | E_S4I0T1.EXE | E_S4I2F1.EXE | E_S4I2G1.EXE | E_S4I2H1.EXE | E_S4I2J1.EXE | E_S4I2K1.EXE | E_S4I2L1.EXE | E_S4I2M1.EXE | E_S4I2P1.EXE | E_S4I3F2.EXE | e_srcv03.exe | eabh.dll | eabservr.exe | eanthology.exe | EasyAV.exe | easyclip.exe | EasyGoBack.exe | EasyNote.exe | EasyShare.exe | eausbkbd.exe | eax.dll | eBayTBDaemon.exe | ebrr.exe | Ecfmserv.exe | EClean.exe | ecomwr.dll | EDICT.EXE | edisk.exe | edit server.exe | edonkey.exe | edow.exe | edow_as2.exe | edowst3.exe | ee.exe | eEBAgent.exe | eEBSVC.exe | eetu.exe | EEVENTMANAGER.EXE | efsadu.dll | EGDACCESS_1058.dll | eggcengine.dll | egieengine.dll | egieprocess.dll | egleengine.dll | egnsengine.dll | ehmsas.exe | ehrec.exe | ehRecvr.exe | ehSched.exe | ehshell.exe | ehtray.exe | eijk.exe | eksplorasi.exe | elbycheck.exe | elccest.exe | elitejho32.exe | ElkCtrl.exe | ElkCtrl.exe | elogerr.exe | elos.exe | ELSBLaunch.exe | ELSBLaunch.exe | em_exec.exe | emagent.exe | emailcatcher.dll | eml.exe | emqvdm.exe | emsmta.exe | emsw.exe | emule.exe | enbiei.exe | encmontr.exe | encsplsh.dll | energyplugin.exe | engutil.exe | EnigmaPopupStop.exe | ensmix32.exe | EnsoniqMixer | enternet.exe | enuubwafo.exe | EOUWiz.exe | epkb.exe | EPMWOR~1.EXE | epswad4.exe | eraser.exe | errorguard.exe | es.dll | ESB.exe | escan.exe | esent.dll | EspaceWanadoo.exe | essdc.exe | essspk.exe | esyndicateinst.exe | eudora.exe | euni_bbi8015.exe | eusexe.exe | evntsvc.exe | EvtEng.exe | EWERFW.EXE | ewidoctrl.exe | ewidoguard.exe | excel.exe | exchng32.exe | exclean.exe | exdl.exe | exe82.exe | exec.exe | exmgmt.exe | EXP.EXE | expl32.exe | explore.exe | explored.exe | exploreff.exe | explorer.exe | explorer32.exe | explorere.exe | express.exe | expsrv.dll | exshow95.exe | extravalue.exe | exul.exe | exul1.exe | EzButton.EXE | ezejmnap.exe | ezinstall.exe | ezinstall[1].exe | ezpopstub.exe | ezprint.exe | ezs.dll | ezsp | ezsp_px.exe | ezSP_PxEngine.exe | ezstub.exe | ezstub22.exe | ezstubseedcorn.exe | ezulains.exe | ezulumain.exe
(E?)(L?) http://www.processlibrary.com/directory/f/
f3403484.exe | f5r4bnh.exe | fahkpym.exe | fameh32.exe | fan.exe | farmmext.exe | Fash.exe | fast.exe | fastdown.exe | fasterxp.exe | faultrep.dll | faxsvc.exe | fbdirect.exe | fc.exe | FCEngine.exe | fch32.exe | fdahlp99.dll | fde.dll | fdm.exe | ffCom.dll | ffisearch.exe | FFWraper.dll | fgadmin.exe | fih32.exe | FileTypeRecognizer.dll | finder.exe | findfast.exe | finished.exe | firedaemon.exe | firefox.exe | FireSvc.Exe | FireTray.exe | Firewall.Exe | fix[1].exe | FixCore.dll | fixtitle.exe | fjdbfvk.exe | flash.exe | flashfxp.exe | flashksk.exe | flashtalk-wise1000.exe | flatbed.exe | floater.exe | fm20.dll | fm3032.exe | fmctrl.exe | fnrb32.exe | fntldr.exe | FolderShare.exe | FontLoader.exe | FONTVIEW.EXE | FORMATM.EXE | formulario.exe | forte.exe | fpassist.exe | fpdisp4.exe | fpdisp5a.exe | fpn16100.exe | fppdis2a.exe | fpxpress.exe | fqc.exe | framedyn.dll | frameworkservic.exe | FrameworkService.exe | fran-hot.exe | freedom.exe | FreeRAM XP Pro 1.40.exe | FreeRAM XP Pro.exe | freexxx.exe | frontpage.exe | frontpg.exe | frsk.exe | fs20.exe | fsaa.exe | fsav32.exe | fsbwlan.exe | fsbwsys.exe | fsdfwd.exe | Fservice.exe | fsg.exe | fsg_3202.exe | fsg_4104.exe | fsgk32.exe | fsgk32st.exe | fsguiexe.exe | fshttps.exe | fsm32.exe | fsma32.exe | fsmb32.exe | fspc.exe | fspex.exe | fsrremos.exe | fsscrctl.exe | fssm32.exe | fsw.exe | ftp.exe | ftpte.exe | fts.exe | full.exe | fullgames.exe | funcade_icmediax_install.exe | fuwxenc.exe | FVProtect.exe | fwenc.exe | fwntoolbar.exe | fws.exe | fxredir.exe | fxscfgwz.dll | fxssvc.exe | fxsvr2.exe | fxzrggu.exe
(E?)(L?) http://www.processlibrary.com/directory/g/
g181511.a.stub.exe | g2comm.exe | g2pre.exe | g2svc.exe | g2tray.exe | GA311.exe | gah95on6.exe | gain_trickler_3102.exe | gain_trickler_3202.exe | game.exe | gamechannel.exe | GameDrvr.exe | gapi32.dll | gappmgr.dll | gateway.exe | gator.exe | gatoroemres_audiogalaxy_1825.dll | gatoroemres_gozilla_1825.exe | gatorres.dll | gatorstubsetup.exe | gatoruninstaller.exe | gbpoll.exe | gbtray.exe | gcASCleaner.exe | gcasDtServ.exe | gcasInstallHelper.exe | gcASNotice.exe | gcasServ.exe | gcasServAlert.exe | gcasSWUpdater.exe | gcastdtserv.exe | Gcc.exe | gcIPtoHostQueue.exe | gcontroller.dll | gdi32.dll | gdiplus.dll | gdonkey.exe | gdwildeng.dll | gdwldeng.dll | Gear311T.exe | Gear511.exe | gearsec.exe | gesfm32.exe | get.exe | getbuys.exe | getcurrenturl.dll | GetFlash.exe | getright.exe | gformctm.dll | gfxacc.exe | ghost.bat | ghost_2.exe | Ghostexp.exe | GHOSTS~2.EXE | ghoststartservice.exe | ghoststarttrayapp.exe | GhostTray.exe | giantantispywaremain.exe | GIANTAntiSpywareUpdater.exe | gidcai32.dll | ginst_001_1234_4201.exe | ginstaller.dll | giocl.dll | gioclclient.dll | gld.exe | glf2fglf2f.exe | glf56glf56.exe | glf8dglf8d.exe | glide.dll | glide2x.dll | glide3x.dll | glocl.dll | glu32.dll | gm.exe | gmt.exe | gmtproxy.dll | gnetmous.exe | gnotify.exe | go.exe | gobjs.dll | gogoaddisplay.exe | gogoaddressbar.exe | gogofileshare.exe | gogotoolbar.exe | gogotools.exe | gogotools0.exe | gogotoolsinstaller.exe | goidr.exe | googledcc.exe | GoogleDesktop.exe | GoogleDesktopCrawl.exe | GoogleDesktopIndex.exe | GoogleDesktopOE.exe | googleearth.exe | GoogleFah.exe | GoogleFahCore_65.exe | googletalk.exe | googletoolbar1.dll | googlewebaccclient.exe | gozilla.exe | gprcistm.dll | gpsB2.dll | gra.exe | graph.exe | grpconv.exe | GrpWise.exe | gsicon.exe | gstartup.exe | gstore.dll | gstoreserver.dll | gsvcmgr.dll | gsvcsap.dll | gtools.dll | gttask | gttask.exe | gtwatch.exe | gui.exe | guninstaller.exe | gwhotkey.exe | gwmdmmsg.exe | gwmdmpi.exe | gwsystemservice.exe | gwum.exe
(E?)(L?) http://www.processlibrary.com/directory/h/
Hacker.exe | haiyang.exe | hal.dll | hap.dll | hbinst.exe | hbsrv.exe | hc.exe | hcontrol.exe | hdashcut.exe | Hdaudprop.dll | Hdaudpropres.dll | hdaudpropshortcut.exe | HEAT.EXE | HELLMSN.EXE | helpctr.exe | helper.exe | helpexp.exe | HelpHost.exe | helpinst.exe | helpsvc.exe | heomstool.exe | hh.exe | hhctrl.ocx | hhs32.pif | hhw.exe | hid.dll | hidden32.exe | hidedown.exe | hideprocess.dll | hidserv.exe | hijackthis.exe | hisistheurls.exe | hjgerhds.exe | hjym.exe | hkcmd.exe | hkdll.dll | hkserv.exe | hkss.exe | hkwnd.exe | hl.exe | hleader_dll.dll | hloader.exe | hloader_exe.exe | hndlrsvc.exe | homepageprotector.dll | hook.dll | hookdump.exe | hookpopup.dll | host.exe | HostManager | hot.exe | hotkey.exe | hotkeyapp.exe | hotkeyscmds.exe | hotplug.dll | hotsync.exe | hottray.exe | hpb2ksrv.exe | HPBootOp.exe | hpbpro.exe | hpbpsttp.exe | hpcmpmgr.exe | hpdcmon.dll | hpdrv.exe | hpfsched.exe | hpgs2wnd.exe | hpgs2wnf.exe | hphmon03.exe | hphmon04.exe | hphmon05.exe | hphmon06.exe | hphupd04.exe | hphupd05.exe | hphupd06.exe | hplamp.exe | hpmanager.exe | hpnra.exe | hpobnz08.exe | hpoddt01.exe | hpodev07.exe | hpoevm06.exe | hpoevm07.exe | hpoevm08.exe | hpoevm09.exe | hpogrp07.exe | hpohmr08.exe | HPOIPM07.EXE | hpoojd07.exe | hpoopm07.exe | hposol08.exe | hposts08.exe | hpotdd01.exe | hpqcmon.exe | hpqgalry.exe | hpqSTE08.exe | HPQTRA08.EXE | HPQWMI.exe | hprblog.exe | hprog.dll | hpsjvxd.exe | hpsysdrv.exe | hptasks.exe | hptskmgr.exe | hpwebjetd.exe | hpwuschd.exe | HPWuSchd2.exe | hpzipm12.exe | hpzstatn.exe | hpzts04.exe | hpztsb01.exe | hpztsb02.exe | hpztsb03.exe | hpztsb04.exe | hpztsb05.exe | hpztsb06.exe | hpztsb07.exe | hpztsb08.exe | hpztsb09.exe | hpztsb10.exe | hpztsb11.exe | hpztsbol.exe | hro.exe | hticons.dll | htmdeng.exe | htpatch.exe | hwclock.exe | hxdl.exe | hxiul.exe | hypertrm.exe
(E?)(L?) http://www.processlibrary.com/directory/i/
i3k0hgad.exe | i81sccp.exe | i8kfangui.exe | iaanotif.exe | iaantmon.exe | IAM.exe | iamapp.exe | iao.exe | iap.exe | ibguard.exe | ibm00001.exe | ibmmessages.exe | ibmpmsvc.exe | ibmprc.exe | ibmsmbus.exe | ibserver.exe | ic_ssk.exe | iccvid.dll | icepack.exe | icm32.dll | icmp.dll | ico.exe | icon.exe | iconfig.exe | iconlib.dll | icq.exe | icqcore.dll | icqlite.exe | icqmapi.dll | icsmgr.exe | icwconn1.exe | icwconn2.exe | icwtutor.exe | idapi32.dll | idemlog.exe | idle.dll | idleui.dll | idq.dll | IDriver.exe | IDriverT.exe | ie123band.dll | ie4321.exe | ie5setup.exe | ie6setup.exe | iedkcs32.dll | iedll.exe | iedriver.exe | iegator.dll | IEHost.EXE | iep.exe | iepeers.dll | iesetup.exe | iexpiore.exe | iexplore.exe | iexplore32.exe | iexplorer.exe | IFACE.EXE | ifc22.dll | iforce2.dll | iFrmewrk.exe | igetnet_3845_3645.exe | igfxcui.dll | igfxext.exe | igfxpers.exe | igfxsrvc.dll | igfxtray.exe | igps.exe | igudyn.exe | iinstall.exe | ijl15.dll | ikernel.exe | image.exe | ImageDrive.exe | imagehlp.dll | imapi.exe | IMApp.exe | IMEKRMIG.EXE | imeshare.dll | imgcmn.dll | imgedit.ocx | imgiant.dll | imgicon.exe | imgscan.ocx | imgstart.exe | imguninst.exe | imiconxp.exe | imjpmig.exe | Imjpmig8.1 | ImLua.exe | imm32.dll | imonnt.exe | imontray.exe | imscinst.exe | incd.exe | InCDsrv.exe | IncMail.exe | incredimail.exe | indexsearch.exe | inetcomm.dll | inetcplc.dll | inetd32.exe | inetinfo.exe | inetmib1.dll | inetwh32.dll | infoctl.exe | infomyca.exe | InfoPath.exe | Informe.exe | InfoTool.exe | infus.exe | infwin.exe | inicio.exe | init.dll | init32m.exe | initsdk.exe | ink.exe | InoRpc.exe | InoRT.exe | inotask.exe | Install.exe | installdashbar.exe | installdatemanager.exe | installer.exe | installprecisiontime.exe | installstub.exe | instant access.exe | instantaccess.exe | InstmsiW.exe | intdel.exe | intel32.exe | intell32.exe | IntelMEM.exe | intenat.exe | internat.exe | internet.exe | Internetfeatures.exe | internetfeatures[1].exe | intmon.exe | Intmonp.exe | invbn.exe | ipccheck.exe | ipclient.exe | iphlpapi.dll | ipmon32.exe | iPodManager.exe | ipodservice.exe | iPodWatcher.exe | ipssvc.exe | iptray.exe | IPU.exe | ir50_32.dll | IRASYNCD.EXE | ireike.exe | irmon.exe | iroffer.exe | isafe.exe | isass.exe | ISBMgr.exe | isburnwatcher.exe | isignup.exe | isinstalldonecrazy.exe | islp2sta.exe | ismserv.exe | issch.exe | issdaemon.exe | isstart.exe | ISSVC.exe | istsvc.exe | isuspm.exe | itbill.exe | Itmoh.exe | itouch.exe | itphw.dll | itphwd.exe | itss.dll | iTunesHelper.exe | iunkjjsc.exe | ivpsvmgr.exe | iw.exe | iwatch.dll | iwctrl.exe | ixapplet.exe | ixizgfcp.exe
(E?)(L?) http://www.processlibrary.com/directory/j/
j95i15ei.exe | jabber.exe | JAMMER2ND.EXE | java.exe | javaw.exe | javaws.exe | jawa32.exe | JDBGMGR.EXE | jdbgmrg.exe | jetcar.exe | jgdw400.dll | jif.exe | jit.dll | jkill.exe | jmnmxr.exe | jnfdtdi.exe | joyurls19.exe | jpeg1x32.dll | jq34042x.exe | jrun.exe | jrunsvc.exe | jscript.dll | jucheck.exe | jusched.exe | jushed.exe | jushed32.exe
(E?)(L?) http://www.processlibrary.com/directory/k/
k4eboy6.exe | kahlisetup_demo.exe | kane.dll | kane.exe | kav.exe | kavmm.exe | kavsvc.exe | kazaa.exe | kazaalite.exe | kazza.exe | kb021119.exe | KB891711.EXE | kbd.exe | KbdTray.exe | kbdus.dll | keenpostback.exe | keenvalue.exe | KEM.exe | kencapi.exe | kencli.exe | kencron.exe | kendns.exe | kenftpgw.exe | keninet.exe | kenmail.exe | kenmap.exe | kenproxy.exe | kenserv.exe | kensocks.exe | kentbcli.exe | kernal32.exe | kernal64.exe | kernel.dll | kernel32.dll | kernel32.exe | kernelfaultcheck | kernels32.exe | kernels64.exe | keygen.exe | keyhook.exe | keylogger plugin.dll | keylogger.exe | keyword.exe | kgnjas.exe | khalmnpr.exe | KHALMNPR.exe | khooker.exe | khost.exe | kl.exe | klobkveb.exe | kmw_run.exe | kmwoa.exe | kmwol.exe | kmwom.exe | kmwop.exe | knlwrap.exe | knuzql.exe | kodakccs.exe | kodakimage.exe | kodakimg.exe | kodakprv.exe | kodorjan.exe | kontiki.exe | koolbar_setup.exe | kpf4gui.exe | kpf4ss.exe | krxz.exe | ksuser.dll | kw[1].exe | kzah.exe
(E?)(L?) http://www.processlibrary.com/directory/l/
lanbrup.exe | lao.exe | lass.exe | launch.exe | launch32.exe | launchadware.exe | launchap.exe | launchapplication.exe | launcher.exe | launchpd.exe | layer.exe | lcc.exe | LCFD.EXE | leerlaufprozess | lex.exe | lexbces.exe | lexplore.exe | lexpps.exe | lexstart.exe | lgnkrv.exe | libeay32.dll | lic98rmt.exe | lightbox.exe | lights.exe | LimeWire.exe | links.exe | live.exe | livenote.exe | livesrv.exe | liveupdate.exe | llssrv.exe | lmf32v.dll | lmgrd.exe | lmpdpsrv.exe | lmu.exe | load.exe | load32.exe | loader(1).exe | loader.dll | loader.exe | loader[1].exe | LoadPowerProfile | loadqm.exe | loadwc.exe | localspl.dll | locator.exe | lockbar.exe | lockbr.exe | lockx##.exe | lockx#.exe | lockx.exe | locwin32.dll | logi_mwx.exe | LogitechDesktopMessenger.exe | logitray.exe | LogMeIn.exe | LogMeInSystray.exe | logon.exe | logon.scr | logonmgr.exe | logonmgrexe | logonui.exe | logwatnt.exe | lorena.exe | loud.exe | LowLight.exe | lp.exe | ls3df.dll | ls4dlp.exe | lsa.exe | LSAS.exe | lsasrv.dll | lsass.exe | Lsass32.exe | lsassa.exe | lsasss.exe | lsburnwatcher.exe | lserver.exe | lssas.exe | lsserv.exe | LSSrvc.exe | ltcm000c.exe | ltdmgr.exe | ltmoh.exe | ltmsg.exe | ltsmmsg.exe | ltwrp10n.dll | luall.exe | lucoms.exe | lucoms~1.exe | lucomserver.exe | lvcoms.exe | LVCOMSX.EXE | LVPrcSrv.exe | lwemon.exe | lwxv.dll | lxbabmgr.exe | lxbbmgr.exe | lxbfbmgr.exe | lxbfbmon.exe | lxbkbmgr.exe | Lxbkbmon.exe | lxbmbmgr.exe | lxbmbmon.exe | lxbrcmon.exe | lxbucoms.exe | lxbumon.exe | lxdboxcp.exe | LxrJD31s.exe | lxsupmon.exe | lz32.dll | lzexpand.dll
(E?)(L?) http://www.processlibrary.com/directory/m/
m-tripLauncher.exe | ma.exe | MACE.exe | macname.exe | mad.exe | mahtfi.exe | mailskinner.exe | MailWasher.exe | main.exe | mainserv.exe | manager.exe | manifestengine.exe | mantispm.exe | mapi32.dll | mapiicon.exe | mapisp32.exe | mapistub.dll | mapisvc32.exe | mapobj90.dll | mario.exe | Marker.exe | master t.exe | master.exe | matcli.exe | mathchk.exe | matlab.exe | maxcodec.dll | maxkernl.dll | maxlink3.dll | maxrast.dll | maxutil.dll | mbm4.exe | mbm5.exe | mbop1-0-3b.exe | mc-110-12-0000079.exe | mc-110-12-0000080.exe | mc-58-12-0000111.exe | mc.exe | mcagent.exe | mcappins.exe | MCC Monitor.exe | McDash.exe | mcdetect.exe | mcdlc.exe | McEPOC.exe | McEPOCfg.exe | mcf.exe | mcinfo.exe | mcmnhdlr.exe | mcpalmcfg.exe | mcpserver.exe | mcrdsvc.exe | mcregwiz.exe | mcshield.exe | MCSHLD9X.EXE | mctskshd.exe | mcupdate.exe | mcvsescn.exe | mcvsftsn.exe | mcvsrte.exe | mcvsshld.exe | McWCE.exe | McWCECfg.exe | md.exe | mdm.exe | mdms.exe | mdnsresponder.exe | mdvmqlt.dll | me#.dll | ME.exe | medgs1.exe | mediaaccc.dll | mediaaccess.exe | mediaaccessinstpack.exe | MediaAccK.exe | mediadet.exe | MediaDetect.exe | MediaGateway.exe | mediagatewayx.dll | mediaman.exe | mediamotor_49.exe | mediapass.exe | mediapassk.exe | members-area.exe | memokit2.exe | memoptimizer.exe | memorymeter.exe | MENU.DLL | menu.exe | messenger.exe | mfc30.dll | mfc40.dll | mfc40loc.dll | mfc40u.dll | mfc42.dll | mfc42d.dll | MFC42ENU.DLL | mfc42loc.dll | mfc42rus.dll | mfc42u.dll | mfc70.dll | MFC71.dll | mfc71.dll | MFC71CHS.DLL | MFC71CHT.DLL | mfc71d.dll | MFC71DEU.DLL | MFC71ENU.DLL | MFC71ESP.DLL | MFC71FRA.DLL | MFC71ITA.DLL | MFC71JPN.DLL | MFC71KOR.DLL | MFC71u.dll | mfc71ud.dll | mfcans32.dll | MFCD42D.DLL | MFCN42D.DLL | mfcn42d.dll | mfco42d.dll | MFCO42D.DLL | mfcsubs.dll | mfcuia32.dll | mfin32.exe | mfqjjr.exe | mgabg.exe | mgactrl.exe | mgaqdesk.exe | mgasc.exe | mgavrtcl.exe | mghtml.exe | mgmtapi.dll | mgui.exe | mgutrc.exe | mhotkey.exe | mhputilu.dll | microsoft.exe | mil.exe | mim.exe | mimboot.exe | minibug.exe | minilog.exe | mirc.exe | MIRC32.exe | mirindaa1i.exe | mirindaspe.exe | mirror_plugin.exe | mis.exe | mixer.exe | Mixersel.exe | MKSC.EXE | mlang.dll | mm.exe | mm_server.exe | mm_tray.exe | mm15201518.exe | mm15201518.stub.exe | mmbun.exe | mmbun2.exe | mmc.exe | mmcndmgr.dll | mmdiag.exe | mmefxe.ocx | MMFix.dll | mmhotkey.exe | mmjb.exe | mmkeybd.exe | mmod.exe | mmsystem.dll | mmtask.exe | mmtask.tsk | mmtray.exe | mmtray2k.exe | mmtraylsi.exe | mmttil.exe | mmups.exe | mmusbkb2.exe | mmwho.exe | mmwork.exe | mmx.exe | mnmsrvc.exe | mnss.exe | mnsvc.exe | mnybbsvc.exe | mnyexpr.exe | mnyschdl.exe | mobsync.exe | Money Express.exe | monitor.exe | monitr32.exe | monwow.exe | moricons.dll | morpheus.exe | mosearch.exe | mostat.exe | MotiveBrowser.exe | motivesb.exe | motmon.exe | mouse.exe | mouse32a.exe | mousebm.exe | moviemk.exe | movienetworks.exe | movieplace.exe | Mozilla.exe | mp3serch.exe | MPAPI3s.exe | mpbtn.exe | MpEng.exe | mpf.exe | mpfagent.exe | MpfAgent.exe | MpfConsole.exe | mpfservice.exe | mpftray.exe | mplapx.dll | mplayer.exe | mplayer2.exe | mplvpx.dll | mpr.dll | mprapi.dll | mprddm.dll | mprexe.exe | mpservic.exe | mpsetup.exe | mpssvc.exe | mptbox.exe | mqrt.dll | mqsvc.exe | mqtgsvc.exe | mr2kserv.exe | mrjj.exe | mrkscr.exe | mRouterConfig.exe | mRouterRuntime.exe | mrt.exe | mrtmngr.exe | mrtrate.dll | mrtstub.exe | msa64chk.dll | MSAA.EXE | msaccess.exe | msacm.dll | msacm32.dll | msafd.dll | msams.exe | msaol.dll | msapp.exe | msawindows.exe | msbb.dll | msbb.exe | msbb[1].exe | msbb[1].exe | msbb1.dll | msbbhook.dll | msbe.dll | msblast.exe | MSBNTray.exe | msc32.exe | mscache.exe | mscat32.dll | mscb.dll | msccn32.exe | mscifapp.exe | msckin.exe | mscman.exe | mscms.dll | mscnsz.exe | mscomct2.ocx | mscomctl.dll | mscomctl.ocx | mscomm32.ocx | mscommand.exe | msconf.dll | MSCONFGH.EXE | msconfig.exe | msconfig32.exe | mscoree.dll | mscornet.exe | mscorsvw.exe | msctf.dll | MSCTL32.DLL | mscvb32.exe | MSD.EXE | msdart32.dll | msdef.exe | msdioo.exe | msdm.exe | msdtc.exe | msdtcprx.dll | msdxm.ocx | mse7.exe | mset_bbi8010.dll | mset_bbi80101.dll | mset_bbi80102.dll | mset_bbi80103.dll | msexreg.exe | msg32.exe | msgdmf.exe | msgfix.exe | msgina.dll | msgloop.exe | msgplus.exe | msgr3ge.dll | msgrapp.dll | msgrru32.dll | msgsrv32.exe | msgsvc.dll | msgsys.exe | mshta.exe | mshtml.dll | mshtmled.dll | msi.dll | MSIDE.DLL | msieftp.dll | msiexec.exe | msiexec16.exe | msimg32.dll | msimn.exe | msinfo.exe | msjava.dll | msjet35.dll | msjet40.dll | msjt3032.dll | msjter35.dll | mskagent.exe | MSKDetct.exe | MSKSrvr.exe | mslagent.exe | mslaugh.exe | msls31.dll | msmc.exe | msmdsrv.exe | msmgs.exe | msmgt.exe | msmm.exe | MSMoney.EXE | MSMPSVC.exe | msmsg.exe | msmsgri32.exe | msmsgs.exe | MSN.exe | msnappau.exe | msncc.exe | msndc.exe | msnet32.dll | MSNGather.exe | msniasvc.exe | MSNIASVC.EXE | msnindex.exe | msnlAdmin.exe | msnlive.exe | msnmsgr.exe | msnp32.dll | msnserve.exe | msnst32.exe | mso9.dll | mso97.dll | msoe.dll | msoert2.dll | msoffice.exe | msohrg.exe | MSOLE32.exe | msoobe.exe | msorcl32.dll | msoss.dll | mspaint.exe | mspath.exe | mspdb60.dll | mspmspsv.exe | mspmspv.exe | mspub.exe | mspy2002 | msqry32.exe | msrating.dll | msrclr40.dll | msrdljoy.exe | msrdo20.dll | msresearch | msrexe.exe | mss32.dll | Mssap.dll | msscli.exe | msscript.ocx | mssearch.exe | mssearchnet.exe | mssecure.exe | msshed32.exe | mssp232.dll | mssp3ge.dll | msspel2.dll | msspell3.dll | msspnp | msssort.exe | Msssrv.exe | msstat.exe | msstdfmt.dll | mssvc.exe | mssvc32.exe | mssvces.exe | mssvr.exe | msswchx.exe | mssys.exe | mssysmgr.exe | mstask.exe | MSTasks.exe | mstcpmon.exe | mstcs.exe | mstinit.exe | MSTORDB.EXE | mstore.exe | mstsc.exe | msupdate.dll | MSupdate.exe | msurlcli1.exe | msuser.exe | msvbvm50.dll | msvbvm60.dll | msvc32.exe | msvcirt.dll | msvcirtd.dll | msvcmm32.exe | msvcp50.dll | msvcp60.dll | msvcp70.dll | msvcp71.dll | msvcr70.dll | msvcr71.dll | msvcrl.dll | msvcrt.dll | msvcrt10.dll | msvcrt20.dll | msvcrt40.dll | msvcrtd.dll | msvfw32.dll | msvgr.exe | msvxd.exe | msw.exe | mswinsck.ocx | mswmcls.exe | msworks.exe | mswsock.dll | msxct.exe | msxml.dll | MSXML3msms.exe | mt.exe | mtask.exe | Mtdacq.exe | mtjuhp.exe | mtx.exe | muamgr.exe | mubyjm.exe | mudsc.exe | mups.exe | musirc4.71.exe | mvdmodw.exe | mwd.exe | mwfirewall.exe | mwsnap.exe | mwsoemon.exe | mwsvm.exe | mxadmin.exe | mxoaldr.exe | mxtask.exe | mxuser.exe | mydocs.dll | myfastupdate.exe | mypcsearch.exe | mysearch2.0.exe | mysetp.exe | mysqld-nt.exe | myurlff.exe | myurlsagain.exe
(E?)(L?) http://www.processlibrary.com/directory/n/
N.EXE | n20050308.exe | n32userl.dll | nahbluff.exe | nail(1).exe | nail.exe | naimag32.exe | naimas32.exe | nalntsrv.exe | namedpipe.exe | naprdmgr.exe | narrator.exe | NaturalColorLoad.exe | nav32sp.exe | navapp.exe | navapsvc.exe | navapw32.exe | NavLogon.dll | navshext.dll | navshext1.dll | navw32.exe | nbj.exe | nbr.exe | nbthlp.exe | ncaseinstaller.dll | ncaselib.dll | nclaunch.exe | NclTray.exe | ncmyb.dll | nd2fnbar.dll | ndcx3xyq.exe | nddeagnt.exe | ndetect.exe | ndisuio.sys | NDSTray.exe | nem216.dll | nem218.dll | nem220.dll | neo.exe | neoCapture.exe | neoCopy.exe | neoDVD.exe | neoDVDstd.exe | neotrace.exe | nero.exe | nerocheck.exe | NeroFilterCheck | nerosmartstart.exe | nerosvc.exe | net.exe | net1.exe | netapi.dll | netapi32.dll | netclient.exe | netd32.exe | netdde.exe | netddeclnt.exe | netdtect.dll | netevent.dll | netinfo.exe | Netlib.exe | netlimiter.exe | netlink32.exe | netmail.exe | netman.dll | NetMeeting.exe | netmon.exe | netrap.dll | netscape.exe | netscp.exe | netscp6.exe | netserver.exe | netshell.dll | netsurf.exe | netsvc.exe | netsvcs | netsvcs.exe | netwin32.dll | network.exe | new_zealand.exe | newdev.dll | newdevin.exe | newdial.exe | newdot.exe | newdotnet.dll | newpop447.exe | newpop61.exe | newpop62.exe | newpop63.exe | newsupd.exe | newupdate.exe | nfom.dll | nfomon.exe | nfsiod.exe | ngctw32.exe | ngen.exe | ngserver.exe | nhksrv.exe | nhldaemn.EXE | nhostsvc.exe | nicconfigsvc.exe | NICServ.exe | nilaunch.exe | NIP.exe | nipsvc.exe | nisserv.exe | nisum.exe | niSvcLoc.exe | NJeeves.exe | NkbMonitor.exe | nkvmon.exe | nl.exe | NLNOTES.EXE | nlnp49.exe | nls.exe | nmain.exe | NMBgMonitor.exe | nmssvc.exe | nmstt.exe | nnstp_bbi6009.exe | NNTray.exe | noads.exe | NOAT.EXE | nod32krn.exe | nod32kui.exe | nomoreporn.exe | nopat.exe | nopdb.exe | NOR32.EXE | Norton Update.exe | noserver.exe | nostealth.exe | NOTEDIT.EXE | notepad.exe | NotePro.exe | notesweb.exe | notify.exe | notifyalert.exe | NotiMan.exe | noyriaszutfdxupw.exe | NPDocBox.dll | npfmntor.exe | NPFMSG.exe | npkcsvc.exe | nprotect.exe | npscheck.exe | npssvc.exe | NRMENCTB.exe | nrpc.exe | nscagent.exe | nscheck.exe | NSCSRVCE.EXE | nsctop.exe | nsef.dll | nsh136.exe | nsl.exe | nslsvice.exe | NSMdtr.exe | NSMdtr.exe | nssys32.exe | nstask32.exe | nsupdate.exe | nsvr.exe | nsvs.dll | nsvsvc.exe | nt_usdm.exe | ntaskldr.exe | ntbackup.exe | ntdll.dll | ntdsapi.dll | ntfrs.exe | ntfs64.exe | ntmulti.exe | NTOSA32.exe | ntoskrnl.exe | ntrights.exe | ntrtscan.exe | ntsd.exe | ntvdm.exe | nutsrv4.exe | NVCOAS.exe | nvcpl.dll | NVCPL.EXE | NvCplDaemon | NVCSched.exe | nvctrl.exe | nview.dll | nvmctray | nvmctray.dll | NvMediaCenter | NVMixerTray.exe | nvms.dll | NvQTwk.dll | nvraidservice.exe | nvsc32.exe | nvstartup | nvsvc.exe | nvsvc32.exe | nwcalls.dll | NWEReboot | nwiz.exe | nwnp32.dll | nwtray.exe | Nymse.exe | nzuvzu.exe
(E?)(L?) http://www.processlibrary.com/directory/o/
oasclnt.exe | obllak.exe | oc25.dll | ocraware.exe | ocxdll.exe | odbc32.dll | odbcbcp.dll | odbcint.dll | odbcjt32.dll | odcfg.exe | odhost.exe | OEDrop.dll | oeet.exe | oeloader.exe | oeqt4.exe | ofcdog.exe | OfcPfwSvc.exe | offers.exe | Office.exe | OFFPROV.EXE | offun.exe | ofps.exe | ois.exe | ole2.dll | ole2nls.dll | ole32.dll | oleacc.dll | oleaut32.dll | oledlg.dll | Olehelp.exe | olepro32.dll | olfsnt40.exe | omaws32.exe | omi9.dll | omniscient.exe | Omniserv.exe | omtsreco.exe | onetouch.exe | onfserv.exe | onspeedcore.exe | onsrvr.exe | oodag.exe | opengl32.dll | opera.exe | OProtSvc.exe | opscan.exe | optimize.exe | optimize[1].exe | optimize313.exe | optimize314.exe | opware12.exe | opware32.exe | OpwareSE2.exe | opxpapp.exe | orffp.exe | osa.exe | osa9.exe | oscore.dll | osd.exe | OSDMenu.exe | OSE.EXE | osk.exe | oskasetup_demo.exe | ossproxy.exe | othb.exe | outlook.exe | outpost.exe | owmngr.exe
(E?)(L?) http://www.processlibrary.com/directory/p/
p_981116.exe | p17.dll | p2bbnd.dll | p2p networking.exe | P2P Networking2.exe | p2p networking3.exe | P2PNetworking.exe | P2PNetworking3.exe | p2sodbc.dll | p5dll.dll | paamsrv.exe | pacis.exe | package8032_siac[1].exe | PACKAGER.EXE | packethsvc.exe | PadExe.exe | pagerevisor.dll | partseal.exe | pascl32.exe | passfilt.dll | PasSrv.exe | password plugin.dll | patch.exe | pav.exe | pavfires.exe | pavkre.exe | pavmail.exe | pavprot.exe | pavprsrv.exe | pavsched.exe | pavsrv50.exe | pavsrv51.exe | pavsrv52.exe | pavupg.exe | paytime.exe | pbds.exe | pbeagent.exe | pbeserver.exe | pbl8ey0e.exe | pcard.exe | pcbooster.exe | pccclient.exe | pccguide.exe | pcclient.exe | pccnt.exe | pccntmon.exe | pccntupd.exe | pccpfw.exe | PcCtlCom.exe | pcdlib32.dll | pcfmgr.exe | pchbutton.exe | pchealth.exe | pchschd.exe | pcmm.exe | PCMService.exe | pcre.dll | pcs_00##.exe | pcscan.exe | pcsvc.dll | pcsvc.exe | pcsync.exe | pcsync2.exe | pctptt.exe | pctspk.exe | PCTVoice.exe | pdesk.exe | pdh.dll | pdm.dll | pds.exe | pdsched.exe | PDVDServ.exe | pec.exe | pedev.dll | pelmiced.exe | perfcl.exe | perfctrs.dll | perfproc.dll | perl.exe | persfw.exe | PersTray.exe | pf78.exe | pg_ctl.exe | pg2.exe | pgmonitr.exe | pgptray.exe | pgsdk.dll | pgvalidator.dll | Phantom.exe | phbase.exe | phelper.dll | Phime2002a | phixin.exe | photoshop.exe | PhotoshopElementsDeviceConnect.exe | PhotoshopElementsEditor.exe | PhotoshopElementsFileAgent.exe | PhotoshopElementsOrganizer.exe | pi1_##.exe | PIB.exe | picasamediadetector.exe | picsvr.exe | pictureshare.exe | picx.exe | pidgen.dll | pifmgr.dll | pinball.exe | ping.exe | pinger.exe | pisf.exe | pjlmon.dll | pjtcyd.exe | pkjobs.exe | plauto.exe | player.exe | playlist.exe | plguni.exe | plib_version | plugin compressor.exe | plugin.dll | PmProxy.exe | pmr.exe | pmt.exe | pmxinit.exe | PNAgent.exe | pncrt.dll | pnen3260.dll | pngu3263.dll | pngu3266.dll | PNMSRV.EXE | pntiomon.exe | point32.exe | POINTER.EXE | Points Manager.exe | pokapoka | pokapoka62.exe | pokapoka63.exe | pokapoka64.exe | pokapoka65.exe | pokapoka66.exe | pokapoka67.exe | pokapoka68.exe | pokapoka69.exe | pokapoka70.exe | pokapoka71.exe | pokapoka72.exe | pokapoka73.exe | pokapoka74.exe | pokapoka75.exe | pokapoka76.exe | pokapoka77.exe | pokapoka78.exe | pokapoka79.exe | poker.exe | policy.dll | pop3pack.exe | pop3trap.exe | popcorn72.exe | poproxy.exe | popuper.exe | popupkiller.exe | PortAOL.exe | postgres.exe | postmaster.exe | pow.exe | powercheck.exe | powerdvd.exe | powerkey.exe | powermgr.exe | powerpnt.exe | PowerReg | PowerReg Scheduler.exe | powers.exe | powerscan.exe | powrprof.dll | ppcontrol.exe | pperr.dll | ppmemcheck.exe | pptd40nt.exe | pptview.exe | ppwebcap.exe | pqhelper.exe | PQIBrowser.exe | PQIMountSvc.exe | pqinit.exe | pqtray.exe | PQV2ISECURITY.EXE | pqv2isvc.exe | precisiontime.exe | precisiontimesetup.exe | preload.exe | prevadcomm.dll | prevsrv.exe | printnow.exe | PRINTPNP.DLL | printray.exe | printui.dll | PRISMSTA.EXE | PRISMSVR.EXE | prismxl.exe | prizesurfer.exe | prmt.exe | prmvr.exe | prmvr.exe | prntsvra.dll | pro.exe | profiler.exe | proflwiz.exe | promon.exe | pronomgr.exe | propelac.exe | prositefinder.exe | prositefinder1.exe | prositefinderh.exe | prot.exe | protector.exe | prpcui.exe | pruttct.exe | ps.exe | ps_install-grokster.exe | ps_uninstaller.exe | ps1.exe | ps2.exe | psapi.dll | pscanw.exe | psdrvcheck.exe | psfree.exe | psic#.dll | psic2.dll | psimsvc.exe | PSNGive.exe | PsnLite.exe | PSof1.exe | psoft1.exe | psqeelsr.exe | pssvc.exe | pstores.exe | pstprx.dll | pstprx32.dll | PSTRIP.EXE | ptf_0017.exe | ptop.exe | pts.exe | ptsnoop.exe | ptssvc.exe | ptuninstaller.exe | pull.exe | PureVoice.exe | purityscan install.exe | purityscan.exe | purityscan2.exe | purityscanuninstall.exe | putty.exe | pvlsvr.exe | PwrMonit.dll | pxckdla.dll | pxckdla.exe | pyr0.exe | python.exe
(E?)(L?) http://www.processlibrary.com/directory/q/
q17i9a4j.exe | qagent.exe | qbdagent2002.exe | QBReminder.exe | qbupdate.exe | qbw32.exe | qclean.exe | qconsvc.exe | qctray.exe | qcwlicon.exe | qdcsfs.exe | qerbi.dll | qerbid.exe | qerbif.exe | qh4mkbv9.dllqh4mkbv9.dll | qhutst.exe | Qoeloader.exe | qool3.exe | qoologic.exe | qrolmnedq.exe | qserver.exe | qtaet2s.exe | qtask.exe | qtihad.exe | qttask.exe | qtzgacer.exe | quartz.dll | QuickBooks | quickdcf.exe | quickpar.exe | quickres.exe | quickset.exe | quicktimeplayer.exe | qvp32.exe | qwdlls.exe
(E?)(L?) http://www.processlibrary.com/directory/r/
r_server.exe | ra_scp.exe | ra_sftp.exe | ra_ssh.exe | ra32.dll | raabout.exe | Radio.exe | RadioSvr.EXE | ragui.exe | ragui32.dll | rahook.dll | ramaint.exe | RAMASST.exe | ramirr.dll | ramsys.exe | randomdigits.exe | randreco.exe | rapapp.exe | rapimgr.exe | rar.exe | rareboot.exe | rasapi16.dll | rasapi32.dll | rasautou.exe | rasman.dll | rasman.exe | rasscrpt.dll | RAVMOND.exe | ray.exe | razespyware_installer.exe | rb32.exe | rbenh.exe | rcapi.exe | RCenter.exe | RcMan.exe | rcsync.exe | rdpclip.exe | rds.exe | RDSHOST.exe | reader_sl.exe | realevent.exe | realjbox.exe | realmon.exe | RealOneMessageCenter.exe | realplay.exe | realpopup.exe | realsched.exe | realshed.exe | realtime.exe | realtray.exe | realupd.exe | realupd32.exe | reboot.exe | recguard.exe | red32secure.exe | redcross.exe | redirsvcsc.exe | refiebar.dll | reg.exe | regbar.exe | regedit.exe | register.exe | registration.exe | regloadr.exe | regshave.exe | regsrv.exe | RegSrvc.exe | regsvc.exe | regsvc32.exe | regsvr32.dll | regsvr32.exe | regsync.exe | relatedsetup.exe | remind.exe | Remind_XP.exe | remind32.exe | reminder.exe | remote.exe | remotelyanywhere.exe | Remoterm.exe | removecpl.exe | removed.exe | removedisplayutility.exe | remupd.exe | requester.11.exe | res.exe | resetservice.exe | residence.exe | retrorun.exe | retrospect.exe | rfagent.exe | rftray.exe | rhaphlpr.exe | rhnura.exe | riched20.dll | riched32.dll | richtx32.ocx | richup.exe | rk.exe | rlid.exe | rlvknlg.exe | RM_SV.exe | rm05040901.exe | rmctrl.exe | rmoc3260.dll | rnaapp.exe | rnathchk.exe | rnaui.dll | rnav.exe | rndal.exe | rnocrke.dll | rnr20.dll | rogue.exe | roiia.exe | roiim.exe | rosnmgr.exe | route.exe | rpcclient.exe | rpcmon.exe | rpcrt4.dll | rpcss.dll | rpcss.exe | RPDFLchr.exe | rpmn3260.dll | rrpcsb.exe | rsabase.dll | rsaenh.dll | rscmpt.exe | rsednclient.exe | rsmsink.exe | rsrcmtr.exe | rstrui.exe | rsvp.exe | rsvpmsg.dll | rsvpperf.dll | rsvpsp.dll | rsyszx2d.exe | rteng7.exe | rtf32.exe | RTHDCPL.EXE | rtlrack.exe | rtmanager.exe | rtmc.exe | rtmservice.exe | rtos.exe | rtutils.dll | rtvscan.exe | rtvscn95.exe | rulaunch.exe | run.exe | run32.dll | run32dll.exe | rundl32.exe | rundlg32.dll | rundll.exe | rundll16.exe | rundll32.exe | runonce.exe | runservice.exe | rupdate.dll | ruxdll32.exe | rxmon.exe | rxtoolbar.exe | rz.exe
(E?)(L?) http://www.processlibrary.com/directory/s/
s.dll | s.exe | s_win32.exe | s1p1y_bad.exe | s24evmon.exe | s3apphk.exe | s3tray2.exe | saap.exe | saaphook.dll | sac.exe | SAcc.exe | saccu.exe | sachook.dll | sachostb.exe | sachostc.exe | sachostm.exe | sachostp.exe | sachosts.exe | sachostw.exe | sachostx.exe | sage.exe | sagent2.exe | sahagent.exe | sahdownloader_.exe | saie.exe | saie1101.exe | saiehook.dll | saimon.exe | sais.exe | saishook.dll | saismart.exe | salm.delete.exe | salm.exe | salmbundle.exe | salmhook.dll | samlib.dll | sapisvr.exe | saproxy.exe | sass.exe | satmat.exe | save.exe | savedump.exe | savenow.exe | savroam.exe | SAVScan.exe | SavService.exe | sbcmstrt.exe | sbdrvdet.exe | sbhc.exe | sbserv.exe | sbsetup.exe | sc.exe | scam32.exe | scan32.exe | scandisk.exe | scands32.exe | scanexplicit.exe | ScanMailOutLook.exe | scanregistry.exe | scanregw.exe | scanserver.exe | scards32.exe | scardsvr.exe | scardsvr32.exe | scbar.exe | sccenter.exe | sccertprop | scchost.exe | schannel.dll | SCHDPL32.EXE | schedhlp.exe | schedul2.exe | schedule.exe | scheduler.exe | schedulerv2.exe | SchedulingAgent | schost.exe | SchSvr.exe | schupd.exe | schwizex.exe | sclgntfy.dll | scm.exe | screensaver.v.2.1.exe | scrfs.exe | scrigz.exe | scrrun.dll | Scrss.exe | scrsvr.exe | scrtkfg.exe | scsiaccess.exe | scureapp.exe | scvhost.exe | sdhelp.exe | SDHelper.dll | sdii.exe | SDMCP.exe | sdstat.exe | se.exe | se2ppc4you.exe | sealmon.exe | Search.exe | searchnav.exe | searchnavversion.exe | searchnugget.exe | searchtoolbar.exe | SearchUpdate33.exe | SearchUpgrader.exe | secur32.dll | secure.exe | SecurityCenter.exe | sed.exe | sedk.exe | seeve.exe | sefer.exe | seii.exe | selfcert.exe | sempalong.exe | sendmail.dll | seng.dll | sens.dll | sensapi.dll | SensLogn | sentry.exe | sentstrt.exe | sepinst.exe | servce.exe | server.exe | servercon.exe | serverside.dll | servic.exe | service.dll | service.exe | service5.exe | ServiceLayer.exe | services.exe | services32.exe | sessmgr.exe | sethook.exe | seti@home.exe | SetIcon.exe | setlang.exe | SetPoint.exe | setup.dll | setup.exe | setup_jalapeno.exe | setup32i.exe | setup4156.exe | setupapi.dll | setupwbv.dll | setupx.dll | sexeducation.exe | sf.exe | sfbho.dll | sfc.dll | sfc_os.dll | sfc32.exe | sfcfiles.dll | sfgdulkp.exe | sfita.exe | sfwqi.exe | sgbhp.exe | sgmain.exe | sgtray.exe | sh31w32.dll | shadowbar.exe | shareaza.exe | sharedprem.exe | shdoc401.dll | shdoclc.dll | shdocvw.dll | shell.dll | shell32.dll | shell32.exe | shellmon.exe | shfolder.dll | shimgvw.dll | shine.exe | shlhook.dll | shlwapi.dll | Shmgrate.exe | shnlog.exe | shopinst.exe | shotkey.exe | showbehind.exe | showwnd.exe | shpc32.exe | shstart.exe | shstat.exe | Shutdown.exe | shwicon.exe | shwicon2k.exe | shwiconem.exe | sI.exe | sideb.exe | sidedb_install.exe | sifxinst.exe | silent.exe | silent_setup[1].exe | siMailProxyServer.exe | SIMETER.EXE | sipspi32.dll | sistray.exe | sisusbrg.exe | sixtypopsix.exe | sk9910dm.exe | ska.exe | skeys.exe | skinkers.exe | sksdll.dll | sksockserver.exe | skynetave.exe | Skype.exe | skype32.exe | skypeclient.exe | slave.exe | slee401.exe | slee81.exe | sllights.exe | slmss.exe | slpmonx.exe | slpservice.exe | slpv24s.exe | slrundll.exe | slserv.exe | slserve.exe | slserves.exe | SM1BG.EXE | sm56hlpr.exe | smackw32.dll | smagent.exe | smartagt.exe | SmartExplorer.exe | SmartFTP.exe | Smartscaps.exe | SMax4.exe | SMax4PNP.exe | smc.exe | SMceMan.exe | smlogsvc.exe | smmss.exe | SmoothView.exe | smOutlookPack.exe | sms.exe | SMSCHK.EXE | smsmon32.exe | smsonx32.exe | smss.exe | smsss.exe | smsx.exe | smszac32.exe | smtphook.dll | smtray.exe | SNDMon.exe | sndrec32.exe | SNDSrvc.exe | sndvol32.exe | sniffer.exe | snmp.exe | snmpapi.dll | snmptrap.exe | soap.exe | sockservercfg.exe | soffice.exe | soft3.exe | softpub.dll | sointgr.exe | sol.exe | SonicStageMonitoring.exe | sonytray.exe | soproc.exe | soundman.exe | soundtrax.exe | sp.dll | sp.exe | sp2ctr.exe | sp2update.exe | sp2update00.exe | spamsub.exe | SpamSubtract.exe | SPBBCSvc.exe | spd.exe | spedia.exe | speedmgr.exe | speedupmypc.exe | Speer.dll | spextdll.dll | spider.exe | spin32.ocx | spkrmon.exe | splash.exe | spm1316.dll | spm8264.dll | spmgr.exe | spmsg.dll | spnsrvnt.exe | spoler.exe | spool.exe | spool32.exe | spooler.exe | spools.exe | spoolsrv.exe | spoolsrv32.exe | spoolss.dll | spoolss.exe | spoolsv.exe | SpoolSvc.exe | sprite.exe | sptip.dll | spupdsvc.exe | spvic.exe | spvspool.exe | spyagent.exe | spyagent4.exe | spyanywhere.exe | spyaxe.exe | spyblast.exe | spybotsd.exe | spybuddy.exe | spyrename.exe | spysheriff.exe | SpySub.exe | spysweeper.exe | spytrooper.exe | spyware.exe | sq_3394_3222.exesqinstaller.exe | sqlagent.exe | sqlbrowser.exe | SqlExp.exe | SqlExp1.exe | SqlExp2.exe | SqlExp3.exe | sqlmangr.exe | Sqlrep.exe | SqlScan.exe | SQLSERVER.EXE | sqlservr.exe | sqlsrv32.dll | Sqltob.exe | sr.exe | srmclean.exe | srng.exe | srtin.exe | srv1.exe | srv2.exe | srv32.exe | srv4.exe | srvany.exe | srvc32.exe | srvhandle.exe | srvload.exe | ss#.dll | ss.exe | ss_silent.exe | ss32x25.ocx | SsAAD.exe | SSBkgdupdate.exe | ssdpsrv.exe | ssee.exe | Sservice.exe | ssexp.exe | ssgrate.exe | sshd.exe | Ssk.exe | ssk_b5 ventura marketing 15.exe | ssk_b5.exe | ssk3.exe | ssk3_b5 seedcorn 4.exe | ssk3_b5.exe | ssk3_b5[1].exe | ssk3_installerv5.exe | ssk3b5doublemedia.exe | sskb5.exe | sskupdater.exe | sskupdater3.exe | sskupdater4bp5.exe | ssl.exe | ssoftsrv.exe | ssonsvr.exe | ssrms.exe | SSScsiSV.exe | SSSvr.exe | sstray.exe | ssv.dll | ssyssz6r.exe | ssyszu2r.exe | Stacmon.exe | start.exe | starteak.exe | starter.exe | startup5.exe | starwind | StarWindService.exe | statemgr.exe | StatusClient.exe | stb.exe | stc.exe | stc[1].exe | stclient.dll | stcloader.exe | STEALTH.BZIP.DLL | stealth.dcom.exe | stealth.ddos.exe | stealth.exe | stealth.injector.exe | stealth.shared.dll | stealth.stat.exe | stealth.wm.exe | STEALTH.WORM.EXE | stealthapis.dll | steam.exe | StillImageMonitor | stimon.exe | stinger.exe | stisvc.exe | stmain.dll | STMGR.EXE | stmtdlr.exe | stobject.dll | store.exe | storm.dll | storprop.dll | str.exe | streamci.dll | StrRes.dll | stsystra.exe | stub.exe | stubinstaller.exe | stubinstaller4292.exe | stubinstaller5975[1].exe | studio.exe | suchost.exe | sunasDtServ.exe | sunasServ.exe | sunserver.exe | supdate.dll | superaccesso.exe | support.exe | supporter5.exe | supportinstall.exe | surfsidekick.exe | surveyor.exe | surveysa.exe | Susp.exe | suss.exe | sv_httpd.exe | svaplayer.exe | svc.exe | svcdata.exe | svch0st.exe | svchoost.exe | svchos1.exe | svchosl.exe | svchost.com | svchost.dll | svchost.exe | SVCHOSTL.EXE | svchosts.dll | svchosts.exe | svcinit.exe | svcproc.exe | svhost.exe | svhosts.exe | svrapi.dll | svshost.exe | svshots.exe | SVWHOST.EXE | swagent.exe | swdoctor.exe | SWEEPSRV.SYS | swEudora.exe | SwiftBTN.exe | swimsuitnetwork.exe | swin32.dll | switcher.exe | switpa.exe | SWNETSUP.EXE | swrt01.dll | sws.exe | swsoc.exe | swstrtr.exe | swupdtmr.exe | sxgdsenu.exe | sxgtkbar.exe | sxplog32.exe | sxs.dll | sychost.exe | symlcsvc.exe | symproxysvc.exe | SymSPort.exe | symstore.dll | symtray.exe | symwsc.exe | sync.exe | synchost.exe | SyncroAd.exe | syntpenh.exe | syntplpr.exe | Sys.exe | sys_alert.exe | sysagent.exe | SysAI.exe | SYSC.EXE | syscfg32.exe | syscheckbop32.exe | syscnfg.exe | sysconf.exe | sysctl32.dll | sysdoc32.exe | sysdoor.exe | sysdown.exe | sysfader.exe | sysfit.exe | sysformat.exe | syshost.exe | sysldr32.exe | syslog.exe | sysmon.exe | sysmon.ocx | sysmonnt.exe | sysocmgr.exe | syspol.exe | sysreg.exe | syssfitb.dll | SYSsfitb.exe | systask32l.exe | systb.dll | systb.exe | system | system idle | System Idle Process | system plugin.dll | system.exe | system16.exe | system32.exe | system32win.exe | system86.dll | systemdll.exe | systemtray.exe | systemup.exe | systime.exe | systray.exe | systray32.exe | systune.exe | Sysupd.exe | sysupdate.exe | sysvcs.exe | syswast.exe | syswin.exe | sywsvcs.exe | sz.exe | Szchost.exe | szntsvc.exe
(E?)(L?) http://www.processlibrary.com/directory/t/
t.dll | t8m.dll | ta.exe | tabbtnu.exe | tabctl32.ocx | tablet.exe | tabtip.exe | tabuserw.exe | tahnisetup_demo.exe | tapi.dll | tapi32.dll | tapicfg.exe | tapisrv.exe | targetsaver.exe | task.exe | task32.exe | taskbar.exe | TaskbarIcon.exe | taskcntr.exe | taskdrv32.exe | tasker.exe | taskman.exe | taskmgr.exe | taskmngr.exe | taskmon.exe | taskmonitor | taskpanl.exe | taskswitch.exe | tasksys.exe | tb_setup.exe | tb72.dll | tbctray.exe | tbksche.exe | tblmouse.exe | TBMon.exe | tbon.exe | tbpanel.exe | TBPS.EXE | tbpssvc.exe | tc.exe | tcaudiag.exe | tclock.exe | tcpservice2.exe | tcpsvcs.exe | TCServer.exe | tdc.ocx |
| teekids.exe | temp.exe | temp532.exe | termmgr.dll | termsrv.exe | test##.dll | testadit#.dll | testadit.dll | testing.exe | tfncky.exe | tfnf5.exe | tfswctrl.exe | tfswshx.dll | tgcmd.exe | tgfix.exe | The Weather Channel.exe | thotkey.exe | threed32.ocx | thumbvw.dll | thunderbird.exe | tibs.exe | tibs3.exe | timershot.exe | TIMESSQUARE.EXE | timesynchronize.exe | timeup.exe | tintsetp.exe | tkbell.exe | TkBellExe | tkonnect.exe | tl32v20.dll | TLBAR.EXE | tlntsvr.exe | Tmas.exe | TMEEJME.EXE | TMERzCtl.EXE | TMESBS32.EXE | TMESRV31.EXE | tmksrvi.exe | tmksrvu.exe | tmlisten.exe | tmntsrv.exe | TMOAgent.exe | tmp.exe | tmp11e.exe | tmp333.exe | tmpfw.exe | tmproxy.exe | tnbutil.exe | toadimon.exe | toc_0008.exe | toobar.dll | TOOL.EXE | tool2.exe | tool3.exe | toolhelp.dll | topdesk.exe | topsearch.dll | toscdspd.exe | TosHKCW.exe | totrecsched.exe | TouchED.exe | tp4ex.exe | tp4mon.exe | tp4serv.exe | TPHDEXLG.EXE | tphkmgr.exe | tpkmapap.exe | tpkmapmn.exe | tpkmpsvc.exe | TPONSCR.exe | tppaldr.exe | TPSBattM.exe | TpScrex.exe | tpscrlk.exe | tpshocks.exe | tpsmain.exe | TPSrv.exe | TPTray.exe | tpwrtray.exe | trackinst.exe | traffic.dll | trans.exe | translator.exe | tray.exe | trayclnt.exe | traymon.exe | traymonitor.exe | traysaver.exe | trayserver.exe | trcboot.exe | trgen.dll | trickler.exe | trickler_bic_gatorpt_4010.exe | trillian.exe | TrueImageMonitor.exe | TrueImageService.exe | ts.exe | ts2.exe | tsa.exe | tsadbot.exe | tsbyuv.dll | tsc.exe | tschelp.exe | tsclient.exe | tsd32.dll | tsinstall_4_0_3_7.exe | tsinstall_4_0_3_8_b17.exe | tskdbg.exe | tskmgr32.exe | tsl.exe | tsl_rc0.dll | tsl_rc0_wrap.exe | tsl2.exe | tsm2.exe | TSMSvc.exe | tsp2.exe | tstdmc.dll | tstool.exe | tsuninst.exe | tsupdate_4_0_3_9_b2.exe | tsyssmon.exe | tsysytd8.exe | tt_reco.exe | ttupt.exe | tv media display.exe | tv_media.exe | Tvm.exe | tvm_b5.exe | tvm_b5_bundle_17.exe | tvmd.exe | tvmedia.exe | TVmon.exe | tvmupdater.exe | tvmupdater4bp5.exe | TvsTray.exe | tvtmd.exe | twain.dll | twain_16.dll | twunk_64.exe | txfaux.dll | type32.exe
(E?)(L?) http://www.processlibrary.com/directory/u/
u.dll | UAService7.exe | ub60tpvf.dll | uc.exe | uc1362.exe | ucsi.exe | ucstart.exe | ucstartup.exe | udserve.exe | uinfo#-decoded.exe | uinfo#.exe | ULCDRSvr.exe | umonit.exe | umqltg4cl_.exe | unadbeh.exe | unidrv.dll | unins000.exe | unins001.exe | uninsc.exe | uninst.exe | uninstall.exe | unpacked-svc.exe | unrar.dll | unrar.exe | unsecapp.exe | unstall.exe | unwise.exe | uopcjly.exe | upd.exe | upd2.exe | update.exe | updater.exe | updaterui.exe | updatestats.exe | UPDATEXP.EXE | updinst.exe | updmgr.exe | updreg.exe | UpdtNv28.exe | upgrade.exe | upgrade1.exe | upgrade2.exe | upgrade3.exe | uphclean.exe | UPnPFramework.exe | uppicsvr.exe | upromise0.exe | ups.exe | upsd.exe | uptodate.exe | uptodater.exe | url.dll | UrlLstCk.exe | urlmap.exe | urlmon.dll | usb.exe | usbmmkbd.exe | usbmonit.exe | usbn.exe | usbsircs.exe | usbui.dll | user32.dll | userenv.dll | userinit.exe | userint32.exe | usofrpyqzgrhcumw.exe | usp10.dll | usrbridg.exe | usrmlnka.exe | UsrPrmpt.exe | Usrshuta.exe | usrshutd.exe | utility.exe | utilman.exe | utwlsnux.exe | uwa.exe | uwdf.exe | uwfx5.exe | uwfx5lp_0001_0802netinstaller.exe | uzqkst.exe
(E?)(L?) http://www.processlibrary.com/directory/v/
v2iconsole.exe | vabctqp.exe | VAIOEnt.exe | VAIOUpdt.exe | Valuesup.exe | vaserv.exe | vb2.exe | vb40016.dll | vb40032.dll | vb5stkit.dll | vb6fr.dll | vb6stkit.dll | vba332.dll | vbajet32.dll | vbouncer.exe | vbouncerinner.exe | vbouncerouter1402030731.exe | vbrun100.dll | vbrun200.dll | vbrun300.dll | vbscript.dll | vbstub.exe | vc5play.exe | vc5Secs.exe | vc5tray.exe | VC6Play.exe | vc6Secs.exe | VC6Tray.exe | VC7Play.exe | VC7SecS.exe | VC7Tray.exe | vcagent | VCClient.exe | VCDDaemon.exe | VCMnet11.exe | vcmpin.exe | VCSSecS.exe | VCSW.exe | VDREMOTE.DLL | ventc.exe | ver.dll | version.dll | vetmsg.exe | VetMsg.exe | vettray.exe | vfpodbc.dll | vfwwdm32.dll | vi_grm.exe | vidctrl.exe | video.exe | videodrv.exe | videoinst.exe | VIDMON.EXE | view.exe | ViewMgr.exe | viewport.exe | virtualbouncer.exe | visio.exe | viu.exe | vlad_dh.exe | vmlib.exe | vmnat.exe | vmnetdhcp.exe | vmss.exe | vmstmp.exe | vmware-authd.exe | vncviewer.exe | vnsystask.exe | vnxserv.exe | vobregcheck.exe | voiceip.dll | voxdvj.exe | vpc32.exe | vpngui.exe | VProSvc.exe | vptray.exe | vshwin32.exe | vsmain.exe | vsmon.exe | vsnetutils.dll | vsnpstd.exe | vsnpstd2.exe | vsserv.exe | vsstat.exe | vssvc.exe | vstskmgr.exe | vsutil.dll | VTPreset.exe | VTTimer.exe | VTtrayp.exe | vuzgnwz.exe | VVSN.exe | vvvfdsqq.exe | vwipxspnt.exe | vxsvc.exe | vxtaskbarmgr.exe | VzCdbSvc.exe | VzFw.exe
(E?)(L?) http://www.processlibrary.com/directory/w/
w.exe | w11150.exe | w181609.stub.exe | w32_systm.exe | w32backdoor-axc.trojan.exe | w32backdoor-axg.trojan.exe | w32backdoor-axh.trojan.exe | w32backdoor-bs.trojan.exe | w32backdoor-dvl.exe | w32backdoor-dxn.exe | w32backdoor-egl.exe | w32backdoor-egv.exe | w32backdoor-hd.trojan.exe | w32backdoor-jz.trojan.exe | w32backdoor-nt.exe | w32backdoor-ny.exe | w32backdoor-yx.exe | w32banito-k.trojan.exe | w32banito-p.exe | w32downloader-#.exe | w32downloader-ggs.exe | w32downloader-gns.exe | w32downloader-gpq.exe | w32haxdoor-ft.exe | w32hupigon-ar.exe | w32hupigon-cj.exe | w32istbar-##.trojan.exe | w32istbar-la.exe | w32lecna-a.exe | w32time.dll | w3dbsmgr.exe | W3wp.exe | wa.dll | wab.dll | wab.exe | wab32.dll | wab32res.dll | wanmpsvc.exe | waol.exe | wapiit.exe | wareout.exe | wareoutupdate.exe | warez.exe | wast.exe | wast2.exe | watch.exe | watch_free_porn.exe | watchdog.exe | wauclt.exe | wavdriver.exe | WaveEdit.exe | wbjob.exe | wbload.exe | wbmain.exe | wbsched.exe | wbscheds.exe | wbss.exe | wbtray.exe | wbutton.exe | wcescomm.exe | wcesmgr.exe | wcmdmgr.exe | wcmdmgrl.exe | wcpri.exe | WDBtnMgr.exe | wdfmgr.exe | wdfmrg.exe | wdsvc.exe | weather.exe | WeatherEye.exe | web.exe | webabout.dll | webbullion.exe | webcamrt.exe | webcheck.dll | webcolct.exe | webdav.exe | WebDmi.exe | | webinstall.exe | weblookup.dll | WEBPMGER.EXE | webpmgr.exe | WebProxy.exe | webrebates.dll | webrebates.exe | webrebates0.exe | webrebates1.exe | webrebates2.dll | webscanx.exe | websecurealertsetup.exe | webshots.scr | webtrapnt.exe | webvacuum.exe | welcome.exe | weputil.dll | Wfcrun32.exe | wfdmgr.exe | WFICA32.EXE | WFX5.exe | wfxctl32.exe | WFXMOD32.EXE | wfxsnt40.exe | WFXSVC.EXE | wfxswtch.exe | wgatray.exe | whagent.exe | whg14100.exe | whSurvey.exe | wID32.exe | win-bugsfix.exe | win.com | win.exe | win_upd2.exe | win052.exe | win32.exe | win32api.exe | win32debug.exe | Win32IMAPSVR.exe | win32sl.exe | win32us.exe | win87em.dll | WinAce.exe | winactive.exe | winad.exe | winadalt.exe | winadctl.exe | winadm.exe | winadserv.exe | winadslave.exe | WinAdTools.exe | | | winaspi.dll | winaspi32.dll | Winaw32.exe | winbackup.exe | winbas12.exe | WinCfg32.exe | WinCinemaMgr.exe | wincmapp.exe | wincomm.exe | wincomp.exe | winctlad.exe | WinCtlAdAlt.exe | winctrl#.exe | wind2ll2.exe | windash.exe | windbg32.exe | winde.exe | windefault.exe | WinDio778.exe | windir32.exe | WINdirect.exe | windll2.exe | window.dll | windows.exe | windowsautomaticupdates.exe | windowsp.exe | WindowsSearch.exe | winex.exe | Winexec.exe | winexec32.exe | wineyxrm32.dll | winfixer | winfixer2005setup.exe | winfrw.exe | winfs.exe | wing.dll | wing32.dll | wingate.exe | wingo.exe | winhelp.exe | winhlp32.exe | winhost.exe | Winhound.exe | wininet.dll | wininetd.exe | wininfo.exe | wininit.exe | wininit32.exe | winkey.exe | winldr.exe | winldra.exe | winlock.exe | WINLOG.DLL | winlog.exe | winlogin.exe | winlogon.exe | winlogonn.exe | winmain.exe | WINMEDIA32.EXE | winmgm32.exe | winmgmt.exe | winmm.dll | WinMX.exe | winmysqladmin.exe | winnet.exe | winnls.dll | winnook.exe | WinNT.exe | winoa386.mod | WinOIE789.exe | winoldap.exe | winole.exe | winotify.dll | winotify.dll | winotify.dll | Winpack.exe | winpatrol.exe | winplay.dll | winpopup.exe | winppr32.exe | winproc32.exe | winproj.exe | winprox.dll | winproxy.exe | winpsd.exe | winpup32.exe | Winrar.exe | winrarshell32.exe | WinRatchet.exe | winrecon.exe | winrnr.dll | winroute.exe | winrpc.exe | wins.exe | winscard.dll | WinSched.exe | Winserv.dll | winserv.exe | winservad.exe | winservices.exe | winservn.exe | winservs.exe | winservsuit.exe | winsfc.exe | winshost.exe | winsms.dll | winsock.dll | winsocks.exe | winspool | winspool.drv | winsrv.dll | winsrv32.exe | winss.exe | winssk32.exe | winssnotify.exe | winsta.dll | winstall.exe | winstart.exe | winstart001.exe | winstat.exe | WinStatKeep.exe | WinStylerThemeSvc.exe | winsupdater.exe | winsvc.exe | winsvc32.exe | winsvr.exe | winsx.dll | WinSync.exe | winsys.exe | winsys32.exe | wintask.exe | wintaskad.exe | wintasks.exe | Wintbp.exe | wintems.exe | Wintime.exe | wintools.exe | wintoolsa.dll | wintoolsa.exe | wintrust.dll | wintsk32.exe | wintsvtr.exe | winupdate.exe | winupdates.exe | winupdt.exe | winupdtl.exe | winvnc.exe | WinVNC4.exe | winwan.exe | winword.exe | winxp.exe | winzip32.exe | wiseupdt.exe | WISPTIS.EXE | wjview.exe | wkcalrem.exe | wkdetect.exe | wkfud.exe | wkqkpick.exe | wkscal.exe | wkssb.exe | wkssvc.dll | wkssvc.exe | wkssvc32.exe | wkufind.exe | wlan111t.exe | wlancfg5.exe | wlansta.exe | WlanUtility.exe | wlballoon | wldap32.dll | wlgjiz.exe | WLKeeper.exe | wlnotify.dll | WLService.exe | WLTRAY.exe | wltrysvc.exe | wm.exe | wmaudsdk.dll | wmburn.exe | wmccds.exe | wmencagt.exe | wmexe.exe | WMIADAP.EXE | wmiapsrv.exe | wmicore.dll | wmiexe.exe | wmiprvse.exe | wmipvse.exe | wmmutil.dll | wmon32.exe | wmonitor.exe | WMPBurn.exe | wmplayer.exe | wmvcore.dll | wnad.exe | wnaspi32.dll | WNROT.EXE | wnscpsvunpacked.exe | wntsf.exe | wo.exe | wocount.exe | woinstall.exe | woinstall[1].exe | word.exe | wordpad.exe | workflow.exe | WorkFlowTray.exe | wovax.exe | wow.exe | wow32.dll | wowexec.exe | wp.exe | wpa.exe | wpabaln.exe | WPC11Cfg.exe | WPC54Cfg.exe | wpctrl.exe | wpctrl95.exe | wpctrlnt.exe | wptel.exe | wrapper.exe | wrapperouter.exe | wrgrci.exe | WRLogonNTF.dll | WrOS.EXE | Wrssdk.exe | WRSSSDK.exe | ws2_32.dll | ws2help.dll | ws3lib.exe | wscntfy.exe | WSCommCntr1.exe | wscript.exe | wsebate2.exe | wshom.ocx | wsinspector.exe | WSN.exe | wsnmp32.dll | wsock32.dll | wsock32n.dll | wstart.dll | wsup.exe | wsupdate.exe | wsx.dll | wsxsvc.exe | wsys.exe | wt35w0g1.exe | WToolS.exe | wtoolsa 1.0.8.11.exe | wtoolsa.exe | wtoolsa1.exe | WToolsAa.exe | wtoolsb.dll | wtoolss.exe | wtsapi32.dll | wtsdfi.exe | WtSrv.exe | wtssvtr.exe | wtta.exe | wuaclt.exe | wuactl2.exe | wuamgrd.exe | wuamkop.exe | wuauboot.exe | wuauclt.exe | wuauclt2.exe | wuaudt.exe | wuaueng.dll | wucrtupd.exe | wudpcom.exe | wuloader.exe | wupdate.exe | wupdated.exe | wupdater.exe | WUpdates.exe | wupdmgr.exe | wupdt.exe | wups.exe | WUSB54GP.exe | WUSB54GS.exe | WUSB54Gv4.exe | wuser32.exe | wuv3is.dll | ww.exe | wwDisp.exe | wweb32.exe | wwmon.exe | wwSecure.exe | wwSecure.exe | WZCBDLS.EXE | wzcdlg.dll | WZCSLDR.exe | wzcsldr2.exe | wzqkpick.exe
(E?)(L?) http://www.processlibrary.com/directory/x/
x10nets.exe | x1exec.exe | x234cpiroff.exe | xcommsvr.exe | xctbn.exe | xferwan.exe | xfr.exe | xfullgames.exe | Xhrmy.exe | xl.exe | xmailer.exe | xmlparse.dll | xmltok.dll | xolehlp.dll | XTAgent.exe | xtcfgloader.exe | xupiterstartup.exe | xupitertoolbarloader.exe | xvid-1.0.3-beta3-setup.exe | xxx.exe | xzciqim.exe | xzz.exe
(E?)(L?) http://www.processlibrary.com/directory/y/
y.exe | y09.dll | ybrlenc.exe | ybrowser.exe | ybrwicon.exe | ycommon.exe | ygxa_2.dll | ymetray.exe | yml.dll | ymsgr_tray.exe | Yndbybmh.dll | yop.exe | ypager.exe | YSBAgree.exe | ysbinstall_1004267_1.exe | YServer.exe | ystckAO32.exe | YUM.EXE | yupdater.exe
(E?)(L?) http://www.processlibrary.com/directory/z/
z##.exe | Zanda.exe | zango.exe | zangohook.dll | zangoinstaller.exe | zangotb.dll | zangotbinstaller.exe | zangotbuninstaller.exe | zanu.exe | zanuhook.dll | zapro.exe | zbase32.exe | zcast.exe | zcbridge.exe | zcfgsvc.exe | zClientm.exe | zcz.exe | zeta.exe | zhotkey.exe | ZipToA.exe | zlclient.exe | ZLH.exe | zlib.dll | zmscb.dll | zonealarm.exe | ZoomingHook.exe | ZStatus.exe | ztoolbar.dll | zxinst12.exe
(E?)(L?) http://www.processlibrary.com/directory/other/
msmdsrv.exe | services32.exe | $sys$drv.exe | $sys$sonyTimer.exe | $sys$sos$sys$.exe | $sys$WeLoveMcCOL.exe | $sys$xp.exe | -1269619923.exe | [system process] | [System Process] | _MWOLTB.DLL | _setupx.dll | ~565.exe | ~5c.exe | ~5e.exe | 000stthk.exe | 007ssinstall.exe | 00thotkey.exe | 01dopewars_update.exe | 01logo.exe | 0lo6uo.dll | 1.EXE | 1004270.exe | 1054571.exe | 123bar.exe | 123dl.exe | 123downloadsuk[1].exe | 123hiddensender.exe | 12nail.exe | 12popup.exe | 13.exe | 153.exe | 180.exe | 180ax.exe | 180axhook.dll | 180pack6480.exe | 180sa.exe | 180sahook.dll | 180sainstaller.exe | 180sainstalleradperform.exe | 180sainstallernusac.exe | 180sainstallersca.exe | 180sainstallersilsais1.exe | 180st.dll | 180stuninstaller.exe | 1950.exe | 1lyu2k.dll | 1xconfig.exe | 2005.exe | 202_app13.exe | 2eq.exe | 2ndsrch.dll | 2portalmon.exe | 2search.exe | 3.exe | 30.exe | 33.exe | 34yf28fg.exe | 38.exe | 3capplnk.exe | 3cdminic.exe | 3cmcnkw.exe | 3cmlink.exe | 3cmlinkw.exe | 3cmlnkw.exe | 3deepctl.exe | 3dfxcmn.dll | 3dfxman.exe | 3dldemon.exe | 3dlman.exe | 3dm2.exe | 3dxsrv.exe | 3p_1.exe | 3qdctl.exe | 44088711.exe | 470760544.jpg.exe | 50cent.exe | 5de1097bc22d2117da82ee85603c38b1.dll | 63mm.exe | 6a0jhpo.dll | 713962.exe | 7a3ce975.exe | 7nail.exe | 7uqj7z9a.exe | 8nail.exe
Q
R
RACF (W3)
"RACF" steht für engl. "Ressource Access Control Facility".
(E6)(L?) http://www.goldisconsulting.com/
Goldis Consulting Services is an independent consultancy specializing in technical aspects of computer security. Since the mid 1980's, we’ve been known for our successful penetration studies in RACF, ACF2, and Top Secret environments.
...
(E?)(L?) http://www.goldisconsulting.com/ESB/dictionaries/
Dictionaries
PWCHECK accepts user-defined password dictionaries when running in guessing mode. Two sample dictionaries are included with the software (a general dictionary and a dictionary of sports-related words).
PWCHECK is sensitive to the effectiveness of locally-created dictionaries. The user is expected to revise and improve these over time. You might want to add company names, local geographic names, locally noted personalities or management, and so forth, with various permutations of all these names.
You can find many other specialized dictionaries and wordlists by searching the internet. Here are some examples of specialized lists we sometimes use:
- Cartoons
- Science fiction
- Shakespeare
- Movies
(E?)(L?) http://www.ibm.com/RACF/
In 1976, IBM® set the standard for security products when RACF® was introduced!
...
(E6)(L1) http://www.listserv.uga.edu/
(E6)(L1) http://www.listserv.uga.edu/archives/racf-l.html
Uni Georgia - RACF Discussion List - Anmeldung & Archive
- Search the archives February 1996 - July 2005 ...
- Post to the list
- Join or leave the list (or change settings)
- Manage the list (list owners only)
(E?)(L?) http://www.racf.co.uk/
PC Utilities relating to RACF
The 'RACF' utilities are text processing programs which take an IRRDBU00 ASCII flat file download from RACF and produces as output text reports and depending on the program JCL which can be checked, transfered back to mainframe and submitted.
(E?)(L?) http://de.wikipedia.org/wiki/Resource_Access_Control_Facility
Erstellt: 2013-01
S
Salami attack
Salami technique (W3)
Engl. "Salami attack", auch "Salami technique", (in Frankreich auch einfach nur "salami" oder "saucisson" genannt) überträgt die "Salamitaktik" auf die Computerkriminalität. Ein Angriff wird in viele kleine Schritte - nicht erkennbare oder harmlos erscheinende Schritte - zerlegt, die am Ende den großen Coup ergeben. Ein typisches Beispiel wäre im Bankenumfeld das milllionenfache Abzweigen von Rundungsfehlern auf ein Konto, auf dem sich dann ein ansehnlicher Betrag ergibt.
(E6)(L?) http://www.isaca.org/Template.cfm?Section=Glossary1&Template=/CustomSource/Glossary.cfm&char=S&TermSelected=1400
Salami technique
(E?)(L?) http://jargonf.org/wiki/salami
(E?)(L?) http://jargonf.org/wiki/saucisson
(E2)(L1) http://www.wordspy.com/words/salamiattack.asp
Erstellt: 2010-04
Scareware (W3)
Im Jahr 2009 scheint ein neuer Malware-Begriff aufgekommen zu sein. Als "Scareware" ("scare" = "Schrecken" und "Software") bezeichnen die Experten Betrugssoftware, die beim Opfer Angst erzeugen (engl. "scare" = "erschrecken", "jemandem einen Schrecken einjagen", "jemanden ängstigen"). Dazu zählen insbesonder Pseudo-Sicherheitsprogramme. Unter der Flagge bekannter Virenprogramme werden unbedarften Usern Virenmeldungen präsentiert, um ihn zum Kauf einer Virensoftware zu veranlassen. Die erwartete Hilfe entpuppt sich dann jedoch als eigentliche Malware. Honter der bezahlten "Virenschutzsoftware" versteckt sich in Wirklichkeit weitere Malware.
(E?)(L?) http://webopedia.com/DidYouKnow/Internet/2009/Rogue_AntiVirus_Software.asp
(E?)(L?) http://de.wikipedia.org/wiki/Scareware
Erstellt: 2010-05
schneier
Bruce Schneier
Security-Newsletter von Bruce Schneier
Crypto-Gram Back Issues
(E6)(L?) http://www.schneier.com/
Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a "security guru," Schneier is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 100,000 readers.
(E6)(L1) http://www.schneier.com/crypto-gram.html
(E6)(L1) http://www.schneier.com/crypto-gram-back.html
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise.
Back issues are also available.
Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers. In its seven years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news.
Crypto-Gram Back Issues
- 15 Mar 2013 Nationalism on the Internet, automobile data surveillance, court of public opinion, news, chinese cyberattacks, technologies of surveillance, phishing, papal election, getting security incentives right, companies that can't afford dedicated security
- 15 Feb 2013 Power and the Internet, who does Skype let spy?, our new regimes of trust, TSA removing Rapiscan full-body scanners, scrambling fighter jets, massive police shootout despite lack of criminals, New York Times hacked by China, man-in-the-middle attacks against browser encryption
- 15 Jan 2013 Last month's overreactions, public shaming as a security measure, terms of service as a security threat, classifying a shape, Bruce Schneier as a verb, experimental results: Liars and Outliers trust offer
- 15 Dec 2012 Feudal security, e-mail security in the wake of Petraeus, squids on the Economist cover, IT for oppression, dictators shutting down the internet, book review: Against Security
- 15 Nov 2011 Advanced Persistent Threat (APT), qnother ATM theft tactic, remotely opening prison doors, fake documents that alarm if opened
- 15 Oct 2011 Three emerging cyber threats, status report on Liars and Outliers, official malware from the German police, domain-in-the-middle attacks, insider attack against Diebold voting machines, National Cybersecurity Awareness Month
- 15 Sep 2011 Ten-year anniversary of 9/11, terrorism in the U.S. since 9/11, efficacy of post-9/11 counterterrorism, unredacted U.S. diplomatic wikileaks cables published, status report on Liars and Outliers
- 15 Aug 2011 Developments in facial recognition, is there a hacking epidemic?
- 15 Jul 2011 Man flies with someone else's ticket, court ruling on "reasonable" electronic banking security, protecting private information on smart phones, yet another "people plug in strange USB sticks" story
- 15 June 2011 New Siemens SCADA vulnerabilities kept secret, avoiding TSA's full-body scanners, sensitive information and self-restraint, man-in-the-middle attack against the MCAT exam, open-source software feels insecure
- 15 May 2011 Status report on The Dishonest Minority, RFID tags protecting hotel towels, hijacking the coreflood botnet, drugging people and then robbing them, Sony hack
- 15 Apr 2011 Detecting cheaters, ebook fraud, keeping your money in a home safe, changing incentives creates security risks, euro coin recycling scam, wi-fi in London Underground, Epsilon hack, Schneier's Law
- 15 Mar 2011 Anonymous vs. HBGary, NIST Defines New Versions of SHA-512
- 15 Feb 2011 Societal security, Domodedovo airport bombing, bioencryption, scareware, whitelisting vs. blacklisting
- 15 Jan 2011 Security in 2020, stealing SIM cards from traffic lights, recording the police, book review: Cyber War
- 15 Dec 2010 Airline security, full body scanners, closing the Washington Monument, cyberwar and the future of cyber conflict, NIST announces SHA-3 finalists, software monoculture, term paper writing for hire
- 15 Oct 2010 Wiretapping the Internet, cyberwar, putting unique codes on objects to detect counterfeiting, Stuxnet
- 15 Sep 2010 Consumerization and corporate IT Security, more Skein news, wanted: Skein hardware help
- 15 Aug 2010 A revised taxonomy of social networking data, WikiLeaks insurance file, NSA and the National Cryptologic Museum, book review: How Risky Is It, Really?
- 15 Jul 2010 The threat of cyberwar has been grossly exaggerated, Internet kill switch, Third SHB Workshop, data at rest vs. data in motion, reading me
- 15 Jun 2010 Hiring hackers, scenes from an airport, fifth annual Movie-Plot Threat Contest winner, outsourcing to an Indian jail, terrorists placing fake bombs in public places, reading me
- 15 May 2010 Worst-case thinking, why aren't there more terrorist attacks?, 9/11 made us safer?, young people and privacy, "if you see something, say something", preventing terrorist attacks in crowded areas, punishing security breaches
- 15 Apr 2010 Privacy and control, New York and the Moscow subway bombing, fifth annual Movie-Plot Threat Contest, new book: Cryptography Engineering, should the government stop outsourcing code development?
- 15 Mar 2010 Al-Mabhouh assassination, small planes and lone terrorist nutcases, Demiurge Consulting, TSA logo contest winner
- 15 Feb 2010 Fixing intelligence failures, anonymity and the Internet, security and function creep, Chinese attack against Google, new attack on Threefish
- 15 Jan 2010 Underwear Bomber, TSA logo contest, fixing airport security contest, fixing intelligence, intercepting predator video, breaching the secure area in airports
- 15 Dec 2009 Terrorists targeting high-profile events, Eric Schmidt on privacy, a taxonomy of social networking data, the psychology of being scammed, reacting to security vulnerabilities
- 15 Nov 2009 Beyond security theater, fear and overreaction, zero-tolerance policies, security in a reputation economy, the commercial speech arms race, "evil maid" attacks on encrypted hard drives, is antivirus dead?
- 15 Sep 2009 Eighth Anniversary of 9/11, Skein news, real-world access control, file deletion, London's surveillance cameras, Robert Sawyer's alibis, stealing 130 million credit card numbers, "the cult of Schneier"
- 15 Aug 2009 Risk intuition, privacy salience and social networking sites, building in surveillance, laptop security while crossing borders, self-enforcing protocols, another new AES attack, lockpicking and the Internet
- 15 Jul 2009 Imagining threats, security and group size, fraud on eBay, authenticating paperwork, password masking, the "hidden cost" of privacy, fixing airport security, homomorphic encryption, new attack on AES, MD6, SHA-1
- 15 Jun 2009 Obama's cybersecurity speech, "Lost" puzzle, terrorism arrests, full-body scanners in airports, Net1, cloud computing, The Second Interdisciplinary Workshop on Security and Human Behaviour
- 15 May 2009 Fourth Annual Movie-Plot Threat Contest winner, book review: The Science of Fear, an expectation of online privacy, malicious contamination of the food supply, data trade practices, mathematical illiteracy, Conficker
- 15 Apr 2009 Fourth Annual Movie-Plot Threat Contest, who should be in charge of u.s. cybersecurity?, privacy and the fourth amendment, the definition of "weapon of mass destruction," stealing commodities
- 15 Mar 2009 Perverse security incentives, privacy in the age of persistence, insiders, singularics, insect security, the kindness of strangers, new ebay fraud, blaming the victim, security and usability in authentication
- 15 Feb 2009 Helping the terrorists, Monster.com data breach, the exclusionary rule, BitArmor's no-breach guarantee, breach notification laws
- 15 Jan 2009 Impersonation, forging SSL certificates, biometrics
- 15 Oct 2008 Seven habits of highly ineffective terrorists, news, warrantless eavesdropping, risk management, "new attack" against encrypted images, nonviolent activists are now terrorists
- 15 Sep 2008 New book, identity farming, Phorm, security ROI, Diebold, full disclosure, Cory Doctorow's cipher wheel rings, photo ID checks at airport, mental illness and murder, movie-plot threats
- 15 Aug 2008 Memo to the next president, homeland security cost-benefit analysis, Mifare transport cards, software liabilities, Truecrypt's deniable file system, DNS vulnerability
- 15 Jul 2008 CCTV cameras, kill switches and remote control, LifeLock, The First Interdisciplinary Workshop on Security and Human Behavior, Chinese hackers, Man-in-the-Middle attacks
- 15 Jun 2008 The war on photography, crossing borders with laptops, e-mail after the Rapture, fax signatures, the war on t-shirts, airplane seat cameras, how to sell security
- 15 May 2008 Ten-Year Anniversary of Crypto-Gram, dual-use technologies and equities, crossing borders with laptops, risk preferences in chimpanzees and bonobos, ethics of vulnerability research
- 15 Apr 2008 Third Annual Movie-Plot Threat Contest, the security mindset, security as feeling and reality, web entrapment, speeding tickets and agenda, seat belts, Internet censorship
- 15 Mar 2008 Privacy and power, Israel implementing IFF for commercial aircraft, third parties controlling information, Amtrak passenger screening, security suites vs. best-of-breed
- 15 Feb 2008 Security vs. privacy, MySpace and U.S. Attorneys General, lock-in, hacking power networks, Mujahideen Secrets 2, giving driver's licenses to illegal immigrants
- 15 Jan 2008 Anonymity and the Netflix dataset, "Where Should Airport Security Begin?", airport security study, running an open wireless network
- 15 Dec 2007 How to secure your computer, defeating the shoe scanning machine at Heathrow Airport, Gitmo manual leaked, security in ten years
- 15 Nov 2007 The war on the unexpected, online political contributing, chemical plants, switzerland and quantum cryptography, security by letterhead, cyberwar, black market in internet crime, Dual_EC_DRBG
- 15 Oct 2007 Storm Worm, fraudulent Amber Alerts, UK police can now demand encryption keys, anonymity and Tor, remote-controlled toys and the TSA, staged attack on generator
- 15 Sep 2007 First responders, basketball referees, home users, stupidest terrorist overreaction, automobile surveillance, computer forensics case study, fast-food drive-ins
(E6)(L1) http://www.schneier.com/crypto-gram-back.html
- 15 Jul 2007 Correspondent inference theory and terrorism, ubiquity of communication, 4th amendment rights extended to e-mail, credit card gas limits, voting machines and coercion, risks of data reuse
- 15 Jun 2007 Rare risk and overreactions, portrait of the modern terrorist as an idiot, teaching viruses, second movie-plot threat contest winner, non-security considerations in security decisions
- 15 Apr 2007 Second Movie-Plot Threat Contest, U.S. terorrist database, JavaScript hijacking, government contractor injects malicious software into critical military computers
- 15 Mar 2007 CYA security, copycats, US terrorism arrests overstated, movie plot threat in Vancouver, private police forces, cloning RFID chips made by HID
- 28 Feb 2007 Special issue: the psychology of security
- 15 Feb 2007 In praise of security theater, REAL-ID, debating full disclosure, sending photos to 911 operators, DRM in Windows Vista, psychology of security
- 15 Dec 2006 Revoting, real-world passwords, tracking sneakers, notary fraud, separating data and device ownership, fighting fraudulent tranactions
- 15 Nov 2006 Election security, perceived vs. actual risk, Total Information Awareness is back, forge your own boarding pass, the death of ephemeral conversation
- 15 Oct 2006 Screening people with clearances, renew your passport now!, faulty data and the Arar case, on-card displays, screaming cell phones
- 15 Sep 2006 What the terrorists want, ways to avoid the next 9/11, educating users, what is a hacker?, USBDumper, Microsoft and FairUse4WM
- 15 Aug 2006 Remote-control airplane software, doping in professional sports, iPod thefts, security certifications, HSBC insecurity hype, bot networks
- 15 Jul 2006 Google and click fraud, Mumbai terrorist bombings, League of Women Voters supports voter-verifiable paper trails, Brennan Center and electronic voting
- 15 Jun 2006 The value of privacy, movie-plot threat contest winner, hacking computers Over USB, aligning interest with capability
- 15 May 2006 Who owns your computer?, identity-theft disclosure laws, man-in-the-middle attacks on RFID cards, Microsoft's BitLocker, the security risk of special cases
- 15 Apr 2006 Movie-plot threat contest, airport passenger screening, VOIP encryption, security through begging, KittenAuth, new kind of door lock, iJacking
- 15 Mar 2006 The future of privacy, face recognition in bars, data mining for terrorists, police department privilege escalation, database error causes unbalanced budget, port security
- 15 Feb 2006 Risk of losing portable devices, multi-use ID cards, Ben Franklin
- 15 Jan 2006 Anonymity and accountability, Dutch botnet, Internet Explorer sucks, electronic shackles, Project Shamrock
- 15 Dec 2005 Airplane security, sky marshal shooting, Sony's DRM rootkit, truckers watching the highways, secure classical communications
- 15 Nov 2005 RFID passports, the living and the dead, Sony secretly installs rootkit, Taser cam, DMCA review, Zotob worm
- 15 Sep 2005 Movie-plot threats, Katrina, the keys to the Sydney subway, Lance Armstrong, Trusted Computing best practices
- 15 Aug 2005 Profiling, Cisco and ISS, stealing imaginary things, turning cell phones off in tunnels, searching bags in subways
- 15 Jul 2005 London transport bombings, terrorism defense, CardSystems, speeding ticket avoidance, talking to strangers
- 15 May 2005 REAL ID, should terrorism be reported?, automatic speedtraps, the potential for an SSH worm, Wi-Fi minefields, combating spam
- 15 Apr 2005 More on two-factor authentication, identity theft, Secure Flight, papal elections
- 15 Mar 2005 SHA-1 broken, two-factor authentication, ChoicePoint, Unicode URL Hack, Ghostbuster
- 15 Feb 2005 Secure Flight, T-Mobile hack, Microsoft RC4 flaw, secret questions, authentication and expiration
- 15 Dec 2004 Behavioral assessment profiling, Google Desktop Search, safe personal computing
- 15 Nov 2004 Voting machines, mail-in ballot attack, world series security, technology and counterterrorism
- 15 Oct 2004 New blog, keeping network outages secret, RFID passports, license plate "guns"
- 15 Sep 2004 Security at the Olympics, Trusted Traveler program, museum security, mobile phone spoofing, no-fly list
- 15 August 2004 BOB on board, alibi and excuse clubs, Houston airport rangers, website passwords
- 15 July 2004 Due process, x-ray machines, portable storage devices, Coca-Cola and the NSA, CLEAR Act
- 15 June 2004 Breaking Iranian Codes, Windows XP SP2, cell phone jamming, cameras in subways, Witty worm
- 15 May 2004 Warrants, counterterrorism in airports, bypassing the USPS, national security consumers
- 15 Apr 2004 National ID cards, TSA-approved locks, stealing an election, beepcard, virus wars
- 15 Mar 2004 Microsoft source code leak, port knocking, USPTO, Password Safe 2.0, V-ID card, risks of centralization
- 15 Feb 2004 Surveillance, the politicization of security, identification, economics of spam
- 15 Jan 2004 Color-coded terrorist threat levels, fingerprinting foreigners, almanacs, diverting aircraft
- 15 Nov 2003 Airplane hackers, the 9/11 terrorists' real weapon, the trojan defense
- 15 Oct 2003 The future of surveillance, the Patriot Act and mission creep, risks of monoculture, identity cards
- 15 Sep 2003 Accidents and security incidents, Beyond Fear reactions, benevolent worms, hats in banks
- 15 Aug 2003 Beyond Fear, flying on someone else's plane ticket, hidden text in computer documents
- 15 Jul 2003 How to fight, more e-mail filtering idiocy, Password Safe, crying wolf
- 15 Jun 2003 Cyber-terrorism, self-destructing DVDs, attacking virtual machines, auditable tasers
- 15 May 2003 Encryption and wiretapping, receipts, unique e-mail addresses and spam
- 15 Apr 2003 Postal denial-of-service, baseball, NCIC database accuracy
- 15 Mar 2003 Practical Cryptography, SSL flaw, SSL patent case, woodland ants
- 15 Feb 2003 Locks and full disclosure, SQL Slammer, importance of authentication
- 15 Jan 2003 Militaries and cyber-war, cichlid fish, RMAC authentication mode
- 15 Dec 2002 Counterattack, Department of Homeland Security, Dan Cooper, crime
- 15 Nov 2002 New book, Japanese honeybees, choose your own Doghouse candidate
- 15 Oct 2002 National Strategy to Secure Cyberspace, more on AES cryptanalysis, one-time pads
- 15 Aug 2002 Palladium and the TCPA, license to hack, arming airline pilots
- 15 Jul 2002 Embedded control systems and security, Perrun virus
- 15 Jun 2002 Fixing intelligence failures, more on secrecy and security
- 15 May 2002 Secrecy, security, and obscurity; fun with fingerprint readers
- 15 Apr 2002 How to think about security, liability and security, key length
- 15 Mar 2002 SNMP, IETF "Responsible Disclosure" document
- 15 Feb 2002 Judging Microsoft, Oracle's "unbreakable" database
- 15 Jan 2002 Windows UPnP vulnerability, Password Safe 2.0, AGS Encryptions
- 15 Dec 2001 National ID cards, judges punish bad security, fun with vulnerability scanners
- 15 Nov 2001 Full disclosure, GOVNET, Password Safe vulnerability, Windows XP
- 15 Oct 2001 Cyberterrorism and cyberhooliganism, war on terrorism, SSSCA, Nimda, port 80
- 30 Sep 2001 Special issue on the Sep. 11 terrorist attacks and their aftermath Italian translation by Paolo Attivissimo
- 15 Sep 2001 11 September 2001, NSA's dual counter mode, Microsoft root certificate program
- 15 Aug 2001 DMCA, Code Red, copyright protection, cybercrime treaty
- 15 Jul 2001 Phone hacking: the next generation, monitoring first
- 15 May 2001 Military history, digital copy prevention, security standards, safe personal computing
- 15 Apr 2001 Advantages of defense, CSI computer crime survey, fake Microsoft certificates
- 15 Mar 2001 The security patch treadmill, insurance, death of IDS, 802.11 security
- 15 Feb 2001 CPRM, an intentional backdoor, e-mail filter idiocy, air gaps, internet voting
- 15 Jan 2001 A cyber UL?, SafeMessage, social engineering, code signing in Windows
- 15 Dec 2000 Voting and technology, digital safe-deposit boxes, new bank privacy regs
- 15 Nov 2000 Digital signatures, SDMI hacking challenge, Microsoft hack
- 15 Oct 2000 Semantic attacks, cybercrime treaty, NSA on security, AES announced
- 15 Jul 2000 Full disclosure and the CIA, presidential password, lockmaking, Unicode
- 15 Jun 2000 SOAP, Java and viruses, DES, Infraworks
- 15 Apr 2000 AES conference, French banking card hack, Microsoft Active Setup, UCITA
- 15 Mar 2000 Kerberos and Win2K, software burglary tools, UCITA, software complexity
- 15 Feb 2000 Distributed denial-of-service, Chinese crypto regs, publicizing vulnerabilities
- 15 Jan 2000 Publicity attacks, new encryption regs, Netscape, block and stream ciphers
- 15 Dec 1999 Security as process, ECHELON, export regulations draft, GSM encryption
- 15 Nov 1999 Why computers are insecure, DVD encryption, Win CE, Elliptic Curves
- 15 Oct 1999 Becoming a cryptographer, export rules, AMD, PKI slogans, key length
- 15 Aug 1999 Back Orifice 2000, AES news, HPUX, web-based encrypted mail
- 15 Jul 1999 Future of crypto-hacking, bungled SSL, reader comments
- 15 Jun 1999 E-mail viruses, hacking archives, international encryption policy
- 15 May 1999 Internationalization of cryptography, export rules, TWINKLE
- 15 Apr 1999 The importance of not being different, smart card threats, attacking certificates with viruses
- 15 Feb 1999 Snake oil, NSA and crypto export, WinXFiles, back doors, Intel's processor ID
- 15 Jan 1999 1998 year-in-review, clueless agents, Cayley-Purser
- 15 Dec 1998 Cracking contests, recognizing plaintext, zip disks, Commerce Dept. committee
- 15 Nov 1998 micro locks, copy protection, more on steganography
- 15 Oct 1998 Steganography, TriStrata, Rapid Remote, memo to amateur cipher designers
- 15 Sep 1998 Cramer-Shoup, impossible cryptanalysis, street performer, Private Doorbell
- 15 Aug 1998 Hardware DES cracker, KEA, chosen protocol attack, biometrics
- 15 May 1998 AES, secret story of non-secret encryption, conditional purchase orders
Security (W3)
(E6)(L1) http://science.howstuffworks.com/airport-security.htm
How Airport Security Works
(E?)(L?) http://www.howstuffworks.com/link529.htm
Internet Connection Security for Windows Users
(E?)(L?) http://people.howstuffworks.com/social-security-number.htm
U.S. ID - How Social Security Numbers Work
If you have a Social Security number, you know that it's a pretty ubiquitous form of identification in the United States. But what do the numbers on a Social Security card mean? How easy is it for someone to steal your identity using your SSN?
Find out all about Social Security numbers.
(E?)(L?) http://travel.howstuffworks.com/fingerprint-scanner.htm
Biometric Security - How Fingerprint Scanners Work
Your fingerprints are not only unique; they're also very hard to fake and even harder to misplace. What better ID to use in a security system? Fingerprint scanners are gaining popularity in both corporate and home systems.
Find out how fingerprint scanners know it's you.
(E?)(L?) http://people.howstuffworks.com/social-security-number.htm
U.S. ID - How Social Security Numbers Work
If you have a Social Security number, you know that it's a pretty ubiquitous form of identification in the United States. But what do the numbers on a Social Security card mean? How easy is it for someone to steal your identity using your SSN?
Find out all about Social Security numbers.
(E?)(L?) http://computer.howstuffworks.com/screensaver.htm
Image of Inactivity - How Screensavers Work
Screensavers used to be necessary due to CRT monitor quirks. Now, they've gone from essential to optional: They're mostly used for entertainment and security.
Find out exactly what a screensaver is, how it knows when to kick in and where you can find some free downloads.
(E?)(L?) http://computer.howstuffworks.com/fingerprint-scanner.htm
Biometric Security - How Fingerprint Scanners Work
Your fingerprints are not only unique; they're also very hard to fake and even harder hard to misplace. What better ID to use in a security system? Fingerprint scanners are gaining popularity in both corporate and home systems.
Find out how fingerprint scanners know it's you.
(E?)(L?) http://www.wikipedia.org/wiki/Security
S-HTTP (W3)
"S-HTTP" ist die Abkürzung für "Secure HTTP".
(E?)(L?) https://www.webopedia.com/TERM/S/S_HTTP.htm
"Secure HTTP" is an extension to the "HTTP" protocol to support sending data securely over the World Wide Web. Not all Web browsers and servers support S-HTTP.
"S-HTTP" was developed by Enterprise Integration Technologies (EIT), which was acquired by Verifone, Inc. in 1995.
snake oil (W2)
Das us-amerik. "snake oil" hat eine zweifache Geschichte. Als Neologismus wird es von Matt Curtin in die Welt der Datenverarbeitung eingeführt um Security Produkte zu bezeichnen, die dem Benutzer eine übertriebene Sicherheit vorgaukeln.
Und damit kommen wir zur nächsten Geschichte des "Schlangenöls". Im 19.Jh. wanderten selbsternannte Mediziner durch die US-amerikanischen Staaten und boten auf jahrmarktähnlichen Veranstaltungen ihre Salben und Cremes an. Als Ingredienzien wurden dabei wohl auch Schlangengifte benutzt. (Mein Schwiegervater hat sich als Jugendlicher z.B. noch irgendwann in der Zeit zwischen den beiden Weltkriegen in der Bretagne ein Zubrot verdient, indem er Schlangen fing und beim ortsansässigen Apotheker ablieferte.) Jedenfalls wurden diese Gesundheitsöle in den USA abwertend als "snake oil" bezeichnet.
(E6)(L?) http://webopedia.com/TERM/s/snake_oil.html
Sock puppet (W3)
Für die engl. "Sock puppet" gibt es zwei Definitionen. Zunächst die Definition, für die es auch eine Worterklärung gibt: Demnach soll die "Socken-Puppe" ein Teilnehmer an Internet-Diskussionsrunden sein, der selbst auf eigene in die Diskussion eingebrachte Fragen oder Probleme antwortet, um so eine rege Diskussion verschiedener Teilnehmer zu simulieren. Die Bezeichnung "Sock puppet" geht dabei auf das Spiel von oder mit Kindern zurück bei dem man sich eine Socke über eine Hand zieht um damit ein Zwiegespräch zu führen oder vorzuführen.
Eine andere Definition lautet, dass eine "Sock puppet" ein Teilnehmer in Internet-Diskussionen ist, der sich als Hilfesuchender gebärdet, aber in Wirklichkeit im Schilde führt den hilfreichen Kommunikationspartnern Informationen zu entlocken, die in anderer Weise ausnutzbar sind, wie etwa Kontodaten oder sonstige persönliche Daten, die zum Nachteil des "Helfers" verwertbar sind.
Zur letzteren Definition habe ich jedoch keine Wortgeschichte gefunden. Vermutlich hat es aber den gleichen Hintergrund. So kann ein Erwachsener die "Strumpf-Puppe" durchaus dazu benutzen, um Kinder zu eigenen Äußerungen zu bewegen, die dann aber (hoffentlich) eher dazu gedacht sind, die Kinder zu verstehen und ihnen zu helfen.
(E?)(L?) http://www.catb.org/jargon/html/S/sock-puppet.html
sophos.com
Spam-Glossary
(E6)(L?) http://www.sophos.com/spaminfo/explained/spamglossary.html
Here you will find spam terms and other related definitions: Address harvester | Bayesian filtering | Blackhole list | Blacklist | Complex dictionary checking | CSS spam | Denial of Service (DoS) attack | Dictionary attack | Directory Harvest Attack (DHA) | Domain Name System blackhole list (DNSBL) | False negative | False positive | Greylist | Hacker | Ham | Harvesting | Listwashing | Mail drop | Munging | Morph Mousetrapping | NDR spam | Network check (also known as reverse DNS check) | Newsgroup | Obfuscation | Open relay | Opt-in | Opt-out | Page-jacking | Ratware | Real-time blackhole list (RBL) | Social engineering | Spam | Spambot | Spam trap | Spoofing | Tarpitting | Teergrube (or tarpit) | Web bug | Whitelist | Zombie
(05.10.2004)
sophos.com
Viruses and spam - what you need to know
(E6)(L1) http://www.sophos.com/sophos/docs/eng/comviru/viru_ben.pdf
sophos.com
Viruses and Spyware
(E6)(L?) http://www.sophos.com/virusinfo/analyses/
sophos.com
Virus-Glossary
(E6)(L?) http://www.sophos.com/pressoffice/news/articles/2001/11/va_glossary.html
30.11.2008:
Glossary of terms:
Adware | Access 97 macro virus | AppleScript Worm | Application | AutoCAD LISP (AutoLISP) virus | Batch file worm | BIOS |
| Chain letter | CMOS settings | Companion virus | Controlled application | Controlled device | Corel Script virus | Dialer | Distributed Computing | DOS Boot Sector virus | DOS executable file virus | DOS worm | Dropped files | Dropper | Excel formula virus | Excel macro virus | Excel 97 macro virus | Exploit | False alarm | -Fam and -Gen | Hacking tool | HIPS | Java virus | JavaScript virus | JavaScript worm | Joke | Junk | Keystroke Logger | Linux executable file virus | Linux worm | | | Macromedia Flash infector | Malicious behavior | Malware | MapBasic program | Master Boot Sector virus | Mid infecting | mIRC or pIRCH script worm | Misunderstanding | MSH virus | MMS | Office 97 macro virus | PalmOS based executable virus | PowerPoint 97 macro virus | Prefix | Potentially unwanted application (PUA) | Publisher macro virus | Registry virus | Remote administration tool | Rootkit | Scam | Scare | SMS | Spyware | Spyware Trojan | Spyware Worm | Suffix | Suspicious behavior | Suspicious file | System monitor | Test file | Trojan | Trusted relay | Unix worm | Unspecified PUA | Virus | Virus hoax | Visual Basic Script virus | Visual Basic Script worm | VoIP (Voice Over IP) | Wi-Fi | Win16 executable file virus | Win32 executable file virus | Win32 worm | Windows 95 executable file virus | Windows 98 executable file virus | Windows NT executable file virus | Windows 2000 executable file virus | Word macro virus | Word 97 macro Trojan | Word 97 macro virus | Word 97 macro worm | Word 2001 macro virus | Worm | Windows Scripting Host virus |
(E?)(L1) http://www.sophos.de/virusinfo/articles/glossary.html
(E?)(L?) http://www.golem.de/specials/sophos/
Sophos - Artikel
SPAM
Spiced Porc And Ham (W2)
Die erste Spam-E-Mail wurde am 03.05.1978 verschickt. Der Verkäufer von "Digital Equipment Corporation" ("DEC") Gary Thuerk schickte 600 E-Mail-Empfängern unaufgefordert eine Werbung für ein neues Computermodell.
"SPAM" ist ein Acronym für "Spiced Pork and Ham", einer Art Pressfleisch, das in USA seit 1937 verkauft wird.
Berühmt wird es durch einen Sketch von Monthy Python's Flying Circus in dem das Wort "Spam" 120 Mal vorkommt. - Wenn das kein Spammming ist?
Der Begriff "Spam" (officially called "UCE" = "unsolicitated commercial e-mail") hat nach der Verwendung im Internet-Umfeld weltweite Verbreitung gefunden. Der erste (elektronische) SPAM trat 1978 auf. Ein Grey Thuerk schickte in USA eine unerwünschte Nachricht an 600 Benutzer des Arpanets dem Vorläufer des Internets.
Interessant ist, dass Spam (der Name des Fleischprodukts) selbst eine seltsame Geschichte hat. In den letzten 60 Jahren wurde es mit folgenden Abkürzungen in Verbindung gebracht:
- "spiced ham"
- "spiced pork and ham"
- "specially processed army meet"
- "specially processed assorted meat"
(E?)(L?) http://spam.abuse.net/
Aber was ist der Zusammenhang zwischen dem Markennamen einer amerikanischen Frühstücksfleischkonserve und unerwünschten E-Mails? - Monty Python brachte einen Sketch, in dem eine Unterhaltung zwischen einem Gast und einem Kellner über die Frage nach alternativen Beilagen durch einen Chor "Spam, Spam, Spam ..."-singender Wikinger unterbunden wird.
Spam macht also jede vernünftige Kommunikation zunichte.
(E?)(L?) http://www.antispam.de/
(E?)(L?) http://www.catb.org/jargon/html/S/spam.html
spam: vt.,vi.,n.
[from Monty Python's Flying Circus]
- 1. To crash a program by overrunning a fixed-size buffer with excessively large input data. See also buffer overflow, overrun screw, smash the stack.
- 2. To cause a newsgroup to be flooded with irrelevant or inappropriate messages. You can spam a newsgroup with as little as one well- (or ill-) planned message (e.g. asking “What do you think of abortion?” on soc.women). This is often done with cross-posting (e.g. any message which is cross-posted to alt.rush-limbaugh and alt.politics.homosexuality will almost inevitably spam both groups). This overlaps with troll behavior; the latter more specific term has become more common.
- 3. To send many identical or nearly-identical messages separately to a large number of Usenet newsgroups. This is more specifically called ECP, Excessive Cross-Posting. This is one sure way to infuriate nearly everyone on the Net. See also velveeta and jello.
- 4. To bombard a newsgroup with multiple copies of a message. This is more specifically called EMP, Excessive Multi-Posting.
- 5. To mass-mail unrequested identical or nearly-identical email messages, particularly those containing advertising. Especially used when the mail addresses have been culled from network traffic or databases without the consent of the recipients. Synonyms include UCE, UBE. As a noun, "spam" refers to the messages so sent.
- 6. Any large, annoying, quantity of output. For instance, someone on IRC who walks away from their screen and comes back to find 200 lines of text might say “Oh no, spam”.
The later definitions have become much more prevalent as the Internet has opened up to non-techies, and to most people senses 3, 4 and 5 are now primary. All three behaviors are considered abuse of the net, and are almost universally grounds for termination of the originator's email account or network connection. In these senses the term "spam" has gone mainstream, though without its original sense or folkloric freight — there is apparently a widespread myth among lusers that "spamming" is what happens when you dump cans of Spam into a revolving fan. Hormel, the makers of Spam, have published a surprisingly enlightened position statement on the Internet usage.
(E?)(L?) http://www.detritus.org/spam/skit.html
Monty Python's Spam-Sketch für den Realplayer
(E?)(L?) http://www.esecurityplanet.com/trends/article.php/3295851
(E?)(L?) http://www.etymonline.com/
(E?)(L?) http://www.golem.de/0310/28120.html
Spammer in den Knast: US-Kongress segnet Gesetzentwurf ab
Kampf gegen Versender unerwünschter und betrügerischer Werbemails
Der von den US-Senatoren Ron Wyden und Conrad Burns entworfene Gesetzentwurf gegen unerwünschte und betrügerische E-Mail-Werbung, der so genannte "CAN SPAM Act of 2003 S. 877", wurde am gestrigen 22. Oktober 2003 vom US-Kongress akzeptiert und kann - sofern er die letzten Hürden nimmt - evtl. ab 2004 in Kraft treten. Der Gesetzentwurf legt harte zivil- und strafrechtliche Folgen gegen Versender von unrechtmäßig zugestellten E-Mails fest und sieht "No-Spam"-E-Mail-Listen ("Opt-Out"-Listen) sowie die Kennzeichnung von E-Mails mit pornografischem Inhalt vor.
(E3)(L1) http://www.jargon.net/jargonfile/
spam, spam bait, spamblock, spamhaus, spamvertize
(E?)(L?) http://www.kommdesign.de/galerie/kommunik/spam.htm
In dem Artikel auf der KommDesign.de Galerie geht es um DIE Plage des frühen 21. Jahrhunderts: SPAM-Mails
inklusive einer kleinen etymologische Recherche: was heisst SPAM eigentlich? Ist es ein Akronym für "Super-Perverse-Annoying-Mail" oder so aehnlich? - nein: Das Wort geht auf einen Sketch von Monty Python's Flying Circus zurück. Dort versucht ein Paar in einem Restaurant ein Menue zu bestellen, das KEIN Büchsenfleisch enthält. Je mehr sie danach fragen, desto MEHR von dem widerlichen Zeug ist in den Gerichten, die die Bedienung empfiehlt. Jetzt raten Sie einmal den Markennamen des Büchsenfleisches - richtig: "Spam". Irgendwann zählt die Bedienung als Inkredienz der Gerichte nur noch Spam auf, und zu ihrer Unterstützung beginnt die Wikingertruppe am Nebentisch einen Spam-Chor zu singen, und der Sketch endet in einer Spam-Orgie: Spam, Spam, Spam, Spam, Spam, Spam, Spam, Spam, Spam, Spam, Spam, Spam...
Eine Transkription des Sketches (den Wikinger-Chor kann man sich - einen funktionierenden Real Player vorausgesetzt - im Original anhören)
(E1)(L1) http://www.marthabarnette.com/learn.html
Spam, auch UCE oder UBE genannt, ist schlicht und einfach der Sammelbegriff für alle ungewollten Werbe-E-Mails oder Kettenbriefe im E-Mail-Postkasten eines Internetnutzers. Spam ist, wenn man so will, die moderne Variante der Postwurfsendung: man erhält Werbung oder Informationen, ohne daß man sie jemals angefordert hat, oder überhaupt haben will.
(E?)(L?) http://www.spam.com/sp/sp_fq.htm
I'm not sure whether you're referring to the canned meat that's still being sold in grocery stores and used to be imported all over the place in WW II or the crap that appears in people-s e-mail boxes. In the former case, I think Hormel or somebody came up with "spam" because it was fake "ham" (or soemthing like this). In the latter case, it's an acronym for "self-propelled advertising mechanism", which is exactly what e-mail spam is. E-mail spam, of course, is unpleasant, and by analogy it's at least as unpleasant as the canned stuff of WW II fame.
(E?)(L?) http://www.spamgourmet.com/
Bietet temporäre Adressen für SPAM-gefährdete E-Mail-Aktionen.
(E1)(L1) http://www.tagesspiegel.de/anti-spam/
(E?)(L?) http://www.tagesspiegel.de/Pubs/sonderthema7/pageviewer.asp?TextID=26075
Verhasste Mail und beliebtes Dosenfleisch
Wer glaubt, das Wort "Spam" leitet sich von solch komplizierten Termini wie "Send Phenonemal Amounts of eMail" her, der irrt gewaltig. Vielmehr hat Spam seinen Ursprung in Dosenfleisch und einem Monty-Phyton-Sketch.
...
(E1)(L1) http://www.takeourword.com/backIssues76-100.html
Issue 98, Issue 96
(E?)(L?) http://www.takeourword.com/Issue071.html
Issue 71
(E?)(L?) https://www.webopedia.com/TERM/s/spam.html
...
Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.
...
There is some debate about the source of the term, but the generally accepted version is that it comes from the Monty Python song, "Spam spam spam spam, spam spam spam spam, lovely spam, wonderful spam ..." Like the song, spam is an endless repetition of worthless text.
Another school of thought maintains that it comes from the computer group lab at the University of Southern California who gave it the name because it has many of the same characteristics as the lunchmeat "Spam".
...
Also see "spim", "Getting Rid of Spam" and "All About Spam, Spim and Spit" in the Did You Know section of Webopedia.
(E?)(L?) https://www.webopedia.com/DidYouKnow/Internet/2002/GettingRidofSpam.asp
(E?)(L?) https://www.webopedia.com/DidYouKnow/Internet/2006/spam_spit_spim.asp
(E?)(L?) https://websitebuilders.com/how-to/glossary/spam/
Spam Definition | The Interactive Glossary
Spam is any unsolicited and unwanted electronic message distributed over the Internet.
When most people hear of spam, they either think of the luncheon meat or of unsolicited emails filling their inbox. While spam email messages are common, email is far from the only medium used by spammers.
...
(E1)(L1) http://www.word-detective.com/
(E?)(L?) http://www.wordorigins.org/index.php/site/spam/
(E1)(L1) http://www.wordsmith.org/awad/
spam Sep 00
(E?)(L?) http://www.wordspy.com/TechWordSpy/
disk spamming, occupational spam, spam, spamdexing, spamoflage, street spam
(E1)(L1) http://www.worldwidewords.org/
Der Artikel "The Deadly Duo: Spam and Viruses" (January 6, 2004) von Robyn Greenspan geht auf die (aktuelle) Entwicklung dieser beiden Geiseln im Internet ein.
(E1)(L1) https://www.yourdictionary.com/cgi-bin/wotdarch.cgi
Nearly 6 out of 10 e-mails are unwanted, as Brightmail's Probe Network measured December 2003's spam volume at 58 percent - 2 percentage points higher than the previous month. The volume has risen dramatically since the beginning of the year, when spam only comprised 42 percent of the e-mail in inboxes.
Once again, product-related spam dominated the volume, however there was a slight month-over-month decrease. Scam e-mail registered the biggest drop, encompassing 9 percent of the volume in December, compared to 13 percent in November, with the decline attributed to a new "fraud" category that Brightmail added. Brightmail found that identity fraud and brand spoofing [define] spam exploded during 2003.
...
(E?)(L?) http://www.zdnet.com/anchordesk/stories/story/0,10738,2914206,00.html
Interestingly, Hormel Foods (the makers of the "meat" called SPAM), don't object to the use of their product name as slang for unsolicited commercial e-mail, as long as you spell it right and don't even think about using the word in a product name.
(A: pafe)
Erstellt: 2003-04
SPIM (W3)
Instant Message SPAM
Auf Spam folgt Spim
In Anlehnung an "SPAM" entstand 1999 (oder schon etwas früher der Begriff "SPIM" = "SPam of Instant Messages".
Die SPAM-Versender haben im Jahr 1999 ein neues Umfeld entdeckt. Die Internet-Chats bieten ebenfalls eine Möglichkeit, die Internet-Nutzer zu nerven. Per Instant Messaging erhalten die Teilnehmer ein Online Telegramm, das sofort auf dem Bildschirm aufpoppt. In Anlehnung an den bereits bestehenden Begriff "SPAM" hat man hierfür den Begriff "SPIM" gewählt, das "I" steht für "Instant".
(E?)(L?) http://jargonf.org/wiki/spim
spim
(E?)(L?) http://listserv.linguistlist.org/pipermail/ads-l/2005-February/subject.html
(E?)(L?) http://listserv.linguistlist.org/pipermail/ads-l/2005-February/046606.html
...
Following is an excerpt from an article in the Los Angeles Times dated, Saturday, Feb 19th 2005:
...
Federal prosecutors said it was the first criminal case involving this new form of spam - known as "spim" because it targets so-called IM services.
...
(E?)(L?) http://listserv.linguistlist.org/pipermail/ads-l/2005-February/046621.html
...
"Spim dates back at least to an article by Eric Zorn in the Chicago Tribune on 8/5/1999: "The peddlers, pornographers, predators, publicists and other pests will also try to get in on the act. We now call their e-mail "spam". We'll call their instant messages "spIM"." This sounds as if he invented the term, but I'll bet there's earlier out there.
...
John Baker
(E?)(L?) http://www.macmillandictionary.com/dictionary/british/spim
spim
(E?)(L1) http://searchexchange.techtarget.com/definition/spim
spim (instant messaging spam) definition
(E?)(L?) http://www.urbandictionary.com/define.php?term=spim
spim
(E?)(L?) https://www.webopedia.com/DidYouKnow/Internet/spam_spit_spim.asp
All About Spam, Spim and Spit
(E?)(L?) https://www.webopedia.com/TERM/S/spim.html
spim
(E?)(L?) http://en.wikipedia.org/wiki/List_of_computer_term_etymologies
The term "spam" is derived from the Monty Python SPAM sketch, set in a cafe where everything on the menu includes SPAM luncheon meat. While a customer plaintively asks for some kind of food without SPAM in it, the server reiterates the SPAM-filled menu. Soon, a chorus of Vikings join in with a song: "SPAM, SPAM, SPAM, SPAM, SPAM, lovely SPAM, wonderful SPAM", over and over again, drowning out all conversation.
"SPIM" — a simulator for a virtual machine closely resembling the instruction set of "MIPS" (computer manufacturer) processors, is simply "MIPS spelled backwards". "MIPS" stands for "Millions of Instructions Per Second", from way back when that was something to boast of.
In recent time, "SPIM" has also come to mean "SPam sent over Instant Messaging".
(E?)(L?) http://www.wordspy.com/index.php?word=spim
spim
(E?)(L?) https://www.yourdictionary.com/spim#computer
spim
(E?)(L?) https://www.yourdictionary.com/spim-or-spim#computer
spim or SPIM
(E?)(L?) https://www.yourdictionary.com/spimmer#wiktionary
spimmer
Erstellt: 2015-08
spoofing (W3)
(E?)(L?) https://www.webopedia.com/TERM/S/spoof.html
(E?)(L?) https://www.webopedia.com/TERM/I/IP_spoofing.html
(E?)(L?) https://www.webopedia.com/TERM/E/e_mail_spoofing.html
"spoof" heisst übersetzt "Schwindel", "Ulk"; "to spoof" heisst entsprechend "beschwindeln", "verulken", "betrügen".
Im Internet bezeichnet es das Vortäuschen einer anderen Identität, z.B. durch gefälschte IP-Adressen oder Absenderangaben bei E-Mails.
SSL (W3)
"SSL" ist die Abkürzung für "Secure Sockets Layer".
(E?)(L?) https://www.webopedia.com/TERM/S/SSL.html
(E?)(L?) https://www.webopedia.com/DidYouKnow/Internet/2005/ssl.asp
SSL is a protocol developed by Netscape for transmitting private documents via the Internet. "SSL" uses a cryptographic system that uses two keys to encrypt data - a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with "https:" instead of "http:".
Steganography (W3)
(E?)(L?) http://webopedia.com/TERM/s/steganography.html
...
"Steganography" (literally meaning "covered writing") (griech. "stégos" = "Dach") dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's head, letting his hair grow back, then shaving it again when he arrived at his contact point.
STIGS (W3)
"STIGS" steht für "Security Technical Implementation Guides".
(E?)(L?) http://iase.disa.mil/stigs/
Subject Matter Links:
STIGS:
- - STIG Development Process and Bi-Monthly Release Update Process
- - FSO Release Schedule - Update!
- - Security Checklists
- - FSO Scan Team Info (DKO account and CAC login is required)
- - Security Readiness Review Evaluation Scripts
- - Security Technical Implementation Guides (STIGS)
- - DRAFT STIGS and Security Checklists
- - DoD General Purpose STIG, Checklist and Tool Compilation CD
- - FSO Whitepapers
- Guides in PKI-enabled area (DoD PKI cert req'd)
- Common Control Indentifier (CCI) New!
- Web Guidance
(E?)(L?) http://www.secorvo.de/security-news/secorvo-ssn0507.pdf
1.6 Security-Checklisten
Mit dem "Cyber Security Research and Development Act" des Jahres 2002 wurde das amerikanische NIST verpflichtet, Checklisten zu entwickeln, die es erlauben, das für Hard- und Software bestehende und mit deren Nutzung einher gehende Risiko in US-Bundesbehörden zu minimieren. Das NIST startete daraufhin das "Security Configuration Checklists Program for IT Products" und veröffentlichte am 26.05.2005 die gleichnamige NIST Special Publication SP 800-70 und das NIST Beta Checklists Repository.
Die Checklisten im Repository sind derzeit nach elf Kategorien sortiert, die mit sicherheitsrelevanten Checklisten anderer Regierungsorganisationen (u.a. NSA, DISA, CIS) und von Herstellern befüllt werden. Inzwischen finden sich darin insgesamt schon mehr als 50.
Ziel ist, auf der Basis standardisierter Checklisten und des Austauschs von Erfahrungen die Voraussetzungen für ein vereinheitlichtes "Basis-Sicherheitsniveau" zu entwickeln. Die eingereichten Checklisten werden daher vom NIST mit 32 formalen Rahmenparametern charakterisiert. Das NIST plant, für Checklisten, die von Herstellern eingereicht werden, ein SP 800-70-Konformitätssiegel zu vergeben. Im Fall eines Siegelerhalts verpflichten sich die teilnehmenden Hersteller, die Garantie der Herstellerserviceverträge auf die Anwendung dieser Checklisten auszudehnen. Noch gibt es weder eine einheitliche Struktur noch das geplante Siegel, daher wurde das Repository auch als "Beta" eingestuft.
Einen Vorgeschmack auf mögliche zukünftige standardisierte Checklisten gibt die Spezifikation des "Extensible Configuration Checklist Description Format (XCCDF)".
Allerdings warten auch die NIST-eigenen Dokumente noch auf die Umsetzung in XCCDF.
On the DISA web page, you will be able to sign up for the list to be notified when updated STIGs are available.
symantec
Hoax-Liste
(E?)(L?) http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp
Hoaxes
Symantec Security Response uncovers hoaxes on a regular basis. These hoaxes usually arrive in the form of an email. Please disregard the hoax emails - they contain bogus warnings usually intent only on frightening or misleading users. The best course of action is to merely delete these hoax emails. Please refer to this page whenever you receive what appears to be a bogus message regarding a new virus, or promotion that sounds too good to be true.
Name Discovered
- "Hello Dear" Hoax 09/04/2000
- $800 from Microsoft Hoax
- AIDS Virus Hoax
- Antichrist Hoax 07/17/2001
- AOL and Intel Hoax
- AOL RIOT 2 Virus Hoax
- AOL.EXE Hoax
- AOL4Free Virus Hoax
- Awareness Virus Hoax
- Baby New Year Virus Hoax
- Badtimes Hoax
- Be Spooked Hoax
- BestBuy Order Fraud Alert Hoax 06/19/2003
- Bicho7 Hoax 10/23/2001
- Blue Mountain Virus Hoax 12/19/2000
- Blueballs Are Underrated Virus Hoax 07/30/1999
- BUGGLST Hoax
- California IBM Hoax
- CellSaver Virus Hoax 08/26/1999
- Coke.exe hoax
- Dana virus hoax 12/03/2001
- Dear Friends Hoax
- Desi1love Hoax
- Despite Virus Hoax 10/15/1999
- Discount Virus Hoax 08/25/2000
- DR.SIMON.WAJNTRAUBWS Hoax 10/26/2001
- Economic Slow Down Hoax
- Ericsson Free Phone Hoax 08/10/2001
- EVIL THE CAT Virus Hoax
- FatCat Virus Hoax
- February 1 Hoax 01/25/2002
- Flower for You Hoax 08/01/2000
- Forward Hoax
- FREE M & M's Hoax 11/02/1999
- Free Pizza Virus Hoax 10/15/1999
- Gamma2.exe Hoax 06/06/2001
- GAP Email Tracking Hoax 06/21/1999
- Gift from Microsoft Hoax 12/28/1999
- Goldbear Virus Hoax 11/08/2002
- Google Trojan Hoax 07/31/2003
- Got You Hoax 05/27/2003
- Guts to Say Jesus Hoax 05/15/1999
- Hacky Birthday Virus Hoax
- Hairy Palms Virus Hoax
- Halloween Virus Hoax
- Happy New Year Virus Hoax
- Help Poor Dog Virus Hoax
- Hitler Virus Hoax
- How to Give a Cat a Colonic Hoax
- INFILTER Virus Hoax
- Iraq War Hoax 04/04/2003
- Irish Virus hoax 09/08/2000
- Jan1st20.exe Virus Hoax
- Jdbgmgr.exe file hoax 04/12/2002
- John Kennedy Jr Trojan Hoax 12/20/1999
- Kleneu66 Hoax 09/19/2003
- Launch Nuclear Strike Now Hoax 01/10/2002
- Life is Beautiful Hoax 01/15/2002
- Londhouse Virus Hoax
- Lotus Notes Worm Hoax 09/01/2000
- Lump of Coal Virus Hoax 09/07/1999
- Matrix Virus Hoax
- Mobile Phone Virus Hoax 05/18/1999
- MSN Messenger add a contact Hoax 01/19/2003
- NASTYFRIEND99 Virus Hoax 05/10/1999
- NEWYORK BIG DIRT Hoax
- Norman Virus Hoax
- Olympic Torch Hoax 02/21/2006
- Osama vs Bush Hoax
- Pandemic Computer Virus Hoax
- Perrin.exe Virus Hoax
- Phantom Menace Hoax
- Pluperfect Virus Hoax
- Postal Service Email Charge Hoax 01/09/2002
- Sandman hoax
- SARC Virus Test Hoax
- Scoutshacker Hoax
- South Park News Letter Hoax
- Symantec ASDL Virus Hoax 06/19/2001
- T-Virus Hoax 08/19/2004
- The New Ice Age Hoax 02/13/2001
- Tuxissa Virus Hoax 04/22/2000
- Very Cool Virus Hoax
- Virtual Card Virus Hoax
- W2sync virus hoax
- W32-PrPlCrcl-G Virus Hoax 04/01/2002
- W32.MFG.Tassos@mm Hoax 06/04/2003
- W32.XPExp.Worm Hoax 01/31/2003
- Wait 48 hours hoax 11/01/2001
- Watching hoax 09/12/2000
- WAZ UP Hoax 01/11/2001
- Windows will Fail on Jan 1 Hoax
- Wobbler Hoax
- Wooden Horse Hoax
- WordScribe Virus Hoax 01/16/2001
- Work Virus Hoax
- World Domination Hoax
- WTC Survivor Hoax 10/29/2001
- YIM Hard drive killer Hoax 10/27/2005
- Your Screen Name Hoax
- ZZ331 Virus Hoax 08/31/1999
Erstellt: 2010-04
T
tasklist
Windows-Task-List
Windows-Prozess-Liste
Erklärungen zur Taskleiste nach dem Dreifingergriff.
(E6)(L?) http://www.tasklist.org/
A comprehensive list of processes running in your computer.
TaskList.org is the ultimate resource to help you determine if your computer is infected with spyware, adware or viruses.
29.09.2005:
(E6)(L?) http://www.tasklist.org/tasklist_a.html
A: A+++.exe | a.exe | a1g.exe | a2guard.exe | A2Installed | A3dInit.exe | A4Proxy.exe | A5281300.so | a64sddd.exe | a65d.exe | AAACLEAN.INF | aak.exe | aasd.exe | aaupdt.exe | AbbyyNewsReader.exe | abcdefg.exe | ABCXYZ.exe | abiteq.exe | abl.exe | ABMTSR.EXE | abrek.exe | abs.exe | absr.exe | abyssws.exe | ac.exe | acao.exe | AcBtnMgr_Xxx.exe | acc.exe | ACCAgnt.exe | accelerate.exe | AccessMgr.exe | ACCOUNT_DETAILS.DOC.exe | AcctMgr.exe | accwizz.exe | accwizzz.exe | acdsee demo.exe | Ace bows.exe | acertmb.exe | ACMonitor_Xxx.exe | ACNUpdater.exe | Acombo3d.exe | aconti.exe | acoustic.exe | ACROTRAY.EXE | Acsd.exe | acstart16.exe | actalert.exe | actboost.exe | actik.exe | actionagent.exe | ActionScr.exe | ACTIVAT0R.exe | Activation.exe | Active acid.exe | active.exe | ACTIVEDS.EXE | ActiveEyes.exe | ActiveMenu.exe | activeplus.exe | Activeshield.exe | ActMak25.exe | ACU.exe | Ad Blocker Pro.exe | Ad-aware.exe | Ad-Monitor.exe | Ad-watch.exe | AD2KClient.exe | adaware.exe | adblck.exe | ADC.EXE | AddClass.exe | AdDelete.exe | AdDestroyer.exe | ADG.exe | ADGJDet.exe | Adiras.exe | adl_dh.exe | ADMAGIC.EXE | AdManCtl.exe | AdmilliServ.exe | admlib32.exe | admparse.exe | ADMUNCH.EXE | Adobe.exe | adobes.exe | adonlineguide.exe | adp.exe | adpn.exe | adprot.exe | adservernow.exe | ADService.exe | Adsgone.exe | adslcomdos.exe | ADSS.exe | Adstartup.exe | AdStatServ.exe | adsub.exe | AdTools.exe | Adtray.exe | adult1.exe | AdultX.exe | Adult_Chat.exe | Adult_Chat1.exe | ADUserMon.exe | Advapi.exe | ADVCHK.EXE | advchks.exe | advmon32.exe | advpack1.exe | advpsys.exe | adw30.exe | adware agent.exe | AdwareAlert.Exe | adwaredelete.exe | AdwareSpy.exe | Aeiwlsta.exe | AEJCT32.exe | AELaunch.exe | AERVICESN.exe | aexl.exe | aexnsinstallhelper.exe | AeXSWDUsr.exe | afilterplatform.exe | Agent.exe | AgfaCLnk.exe | agp32.exe | agpart11.exe | agpwiz.exe | agquickp.exe | AGRemind.exe | AGRSMMSG.exe | AGSatellite.exe | ahfp.exe | ahjinst.exe | AhnSD.exe | AHNUE.exe | ahqinit.exe | Ahqrun.exe | Ahqtb.exe | AICLIENT.EXE | aiepk.exe | aiepk2.exe | AIM reminder.exe | aim.exe | aim9283.exe | aim95.exe | aim95.exe cmd32.exe IEXPL | aimaol.exe | aimb.exe | AimingClick.exe | aimsng.exe | AIMWDInstall.exe | AirCFG.exe | aircity.exe | airftp.exe | AirGCFG.exe | AIRSVCU.EXE | Akiller.exe | al.exe | ala.exe | Alarm.app.exe | AlarmWatcher.exe | Alaunch.exe | Alchem.exe | ALCMTR.EXE | Alcohol.exe | ALCWZRD.EXE | Alcxmntr.exe | alert.exe | Alevir.exe | Alexa.exe? | AlfyAC~1.exe | alg32.exe | algs.exe | ALGU.EXE | ALIASS~2.EXE | AliceSD.exe | ALiSndMg.exe | AllerCalc.exe | allSnap.exe | AlM.EXE | almxptray.exe | Alogserv.exe | ALPass.exe | alq.exe | ALServ.exe | AltoMBsrv.exe | ALU.exe | ALUNotify.exe | AlwaysOnTopMaker.exe | am32.exe | amagent.exe | AmazingTens.exe | amee.exe | amon.exe | AMOUMAIN.EXE | amp2pl.exe | amsn.exe | AMSNDMGR.EXE | amsngr.exe | AMSNMGR.EXE | amsnmsgrs.exe | Analiz.exe | Angel.exe | AnnCheck.exe | Annclist.exe | Anntext.exe | Ante Browse Trust.exe | Anti.exe | antikey.exe | AntiMsMsg.exe | AntiPopUp.exe | Antispy.exe | antiv.exe | antivirus.exe | AntiVirus32.exe | AntivirusGold.exe | ANTIVIRUS_INSTALL.EXE | AnVir.exe | anvshell.exe | anvshell32.exe | AnyDVD.exe | aockstrs.exe | AOL.exe | aol32.exe | AOLACSD.EXE | AOLClient.exe | AOLDial.exe | AolFix.exe | AOLHostManager.exe | aolmsg.exe | aolmsngr.exe | AOLSP Scheduler.exe | aoltray.exe | aolwasher.exe | aornum.exe | AOTray.Exe | ApacheMonitor.exe | apc_tray.exe | api32.exe | apimonx.exe | apisvc.exe | apitsk32.exe | APL.exe | APMSRV9X.EXE | Apoint.exe | APP****.tmp (* = random c | APP****.tmp [* = random c | app***.tmp (* = digit) | App.exe | ApPache.exe | appconf.exe | appconn.exe | AppExtCB.exe | apphost.exe | appis.exe | AppMasterCenter.exe | AppPlus.exe | AppsTraka.exe | Apropos_Client_Loader.exe | APSERVER.EXE | aptezbp.exe | APVXDWIN.EXE | Apwheel.exe | aqadcup.exe | aqujyjax.exe | archive.exe | ares.exe | AresLite.exe | aritima.exe | armon32.exe | ARMon32a.exe | arr.exe | arr.execdm.exegame.exemsi | arsetup.exe | arteraui.exe | ARUpdate.exe | ARUpld32.exe | AS.exe | ascdl.exe | ASDAPI.EXE | ASE Scheduler.exe | ASE.exe | AService.exe | AseScanner.exe | asferror.exe | asgag.exe | asgard.exe | ashAvast.exe | ashDisp.exe | Ashlt.exe | ashmaisv.exe | ashserv.exe | Ashwebsv.exe | asistat.exe | Aslru.exe | ASMon.exe | asp4setp.exe | asp4tray.exe | asr_fnt.exe | ASSISTANT.EXE | ASSISTSE.EXE | AST | AStart | astart.exe | Astart32.exe | Astray.exe | Astro.exe | Astrotoolbar.exe | AsusProb.exe | ASWATC32.EXE | ASWDP.exe | aswnk.exe | atapidrv.exe | ATCEgSvr.exe | atdialler1.exe | Athan.exe | AtHoc.exe | Ati2cwad.exe | Ati2cwxx.exe | ati2evae.exe | ati2evxx.exe | Ati2mdxx.exe | Ati2ptxx.exe | Ati2ptxx.exeAtiptaxx.exe | ati2s9ag.exe | ati2vid.exe | aticpaxx.exe | AtiCwd.exe | AtiCwd.exeAtiCwd32.exeAti | AtiCwd32.exe | atidrvxx.exe | ATIDtct.EXE | Atigart.exe | AtiKey32.exe | AtiKey32.exeatiptkad.exe | atipatxx.exe | Atiptaxx.exe | atiptext.exe | atiptkad.exe | AtiQiPcl.exe | Atira.exe | AtiRage4dPro.exe | ATIRW.exe | Atisched.exe | Atitask.exe | Atitkad.exe | atitray.exe | atitvo32.exe | ATIUPDATE5.EXE | atiupdpl.exe | atiupdxx.exe | ativopen.exe | atix10.exe | ATLIEHELPER.exe | atl_helper.exe | atmdlusr.exe | atmsg.exe | atnotes.exe | Atomic.exe | atomica.exe | ATOMICTIME.EXE | atrack.exe | Atray.exe | Attunel.exe | attune_ce.exe | attune_cu.exe | attune_di.exe | attune_st.exe | atuner.exe | atup | ATWatch.exe |
| atwtusb.exe | au.exe | au30setp.exe | au30setp.exeasp4tray.exea | AUagent.exe | aucbnpn.exe | Aucompat.exe | audcntr.exe | audiocntl.exe | audiodrv.exe | audioinf.exe | audiosrv.exe | AUEKXRZ.EXE | AUP.exe | aupd.exe | aupdate.exe | Austria.exe | ausvc.exe | authz.exe | autobar.exe | AUTOCHK.EXE | autoclk.exe | Autodet.exe | autodisc.exe | AUTOEXE.exe | Autoexec.com | AutoExt.exe | Autolaunch.exe | automate.exe | automgr32.exe | automove.exe | AutomsUPD.exe | Autopdate.exe | autoprotect.exe | AUTOREG.EXE | AutoRun.bat | autorun.exe | AUTOSIZER.EXE | autospel.exe | AUTOSTART.EXE | autotbar.exe | AUTOTKIT.EXE | autoupd.exe | AutoUpdate.exe | auto_update_loader.exe | aux.exe | aux32.exe | av.exe | avamx.exe | AVBgle.exe | Avconsol.exe | Aveagent.exe | Avgamsvr.exe | AVGCC.exe | avgcc32.exe | AVGCTRL.EXE | AVGEMC.exe | avgmsvr.exe | AVGNT.EXE | AVGREGCL.exe | Avgserv9.exe | avguard.exe | avgw.exe | avifile5.exe | Avimgt.exe | Avimgt32.exe | AVINIT9X.EXE | AVIRCHK.EXE | AVKBar.exe | AVKPop.exe | avkserv.exe | AVKWCTL9X.EXE | Avmaisrv.exe | avmon.exe | avp.exe | avpcc.exe | AvpG.exe | avpguard.exe | avpm.exe | avpmondll.exe | avpr.exe | AVprotect.exe | AVprotect9x.exe | avscan.exe | AVSched32.exe | avserve.exe | avserve2.exe | avserve3.exe | Avsynmgr.exe | Avsynmgr32e.exe | Avsynmgr32h.exe | Avsynmgr32S.exe | Avtray.exe | AVupdate.exe | AVwin.exe | AVWLPSTA.exe | AVWUPD32.EXE | avxinit.exe | avxlive.exe | awab.exe | Awatch.exe | awhost32.exe | awinrar.exe | AWUSGSTA.exe | awxDTools.dll, awxRegiste | axfd.exe | AZARE10S.PLT | azexe.exe
(E6)(L?) http://www.tasklist.org/tasklist_b.html
B: B9.exe | Babylon.exe | back32.exe ...service.exe | backd.exe | backorif.exe | BACKTIME.EXE | backup.svc | backupnotify.exe | backups32.exe | backweb*****.exe | BACKWEB-137903.exe | backweb-8876480.exe | backweb-8876480.exeldmcon | backweb.exe | BACKWE~1.EXE | Backwork.exe | bacpi10a.exe | BacsTray.exe | BADDATE.EXE | bagent.exe | bakw.exe | ballin.exe | bally4d.exe | banc.exe | Banpopup.exe | bar.exe | bargainbuddy.exe | bargains.exe | bargains.exebargainbuddy. | barint.exe | BascsTray.exe | BasicUpdate.dll.vbs | BATCH.EXE | batmeter.exe | batmgr.exe | batterybar.exe | BatteryLife.exe | battlenet.exe | BatzBack.scr | BAUSB.exe | bawindo.exe | bayswap.exe | bazzi.exe | bbeagle.exe | bboy.exe | bbSysTray.exe | bbui.exe | bbwiz.exe | bca.exe | bcdetect.exe | bcmdmmsg.exe | BCMSMMSG.exe | bcmwltry.exe | bcnt.exe | bcpc.exe | bcpc_c.exe | bcre.exe | BcTool.exe
| bcvsrv32.exe | bcwipetm.exe | BDEsecureinstall.exe | bdinit.exe | Bdmcon.exe | bdnagent.exe | bdoesrv.exe | bdss.exe | bdswitch.exe | beagle.exe | bearshare.exe | beei.exe | befaster3.exe | BEHL.exe | BEHLO.exe | belgium nm.exe | BELORVBI.exe | Belsta.exe | Belt.exe | benadrilalert.exe | besch.exe | BestPopupKiller.exe | beta.exe | BeTrack.exe | BF3.EXE | Bfrecv.exe | Bginfo.exe | bgnewsag.exe | bgsmsnd.exe | bgswitch.exe | BHOCop.exe | BHODemon.exe | bhoserv.exe | BI1HEL~1.EXE | bible.exe | bidispl2.exe | bigbadvirus.exe | BIGFIX.EXE | Billmind.exe | bindata.exe | Bingdian.vbs | bingo9.exe | BIOS1.EXE | Bios32.exe | biosefui.exe | BIOVCIP.exe | BitComet.exe | BITDEFENDERX.EXE | BitDefender_P2P_Startup.e | bitpaint.exe | BJPSMAIN.EXE | blackd.exe | blackice.exe | blade.exe | blads.exe | bldbubg.exe | bleatest.exe | blengine.exe | bline.exe | bling.exe | blinkx.exe | Block-checker.exe | blocker.exe | BlockTracker.exe | blsloader.exe | blspc.exe | blss.exe | blstapp.exe | BMan1.exe | BMLauncher.exe | BMMLREF.EXE | bmqnzkg.exe | Bmui.exe | BMupdate.exe | bmz.exe | Bndt32.exe | bnui.exe | BO1HEL~1.EXE | BOC412.exe | Boclean.exe | BODMon.exe | Bogobot.exe | boln.exe | BOMB32.EXE | boo.exe | boot.exe | Boot32.pif | bootcfg1.exe | bootconf.exe | bootctrl.exe | BootLoader.exe.vbs | bootmng.exe | bootpd.exe | BootSector.exe | BOOTST~1.EXE | bootvid2.exe | bootvid4.exe | BootWarn.exe | bopotsvr.exe | borlandg.exe | Boston.exe | bot.exe | Botnet.exe | botss.exe | botzor.exe | bouncer.exe | BoundRec.exe | boxide.exe | bpc.exe | bpc2 re inst.exe | bpcable.exe | bpcpost.exe | bpk.exe | bpool.exe | bpsinstall.exe | bptre.exe | bpudfmon.exe | bpumTray.exe | BQTray.exe | br0ken.exe | Brasil.exe | BRASIL.PIF | brctrcen.exe | BREAK REMINDER.exe | breatle.exe | breg.exe | BRITRAY.EXE | BrMeCom.exe | BrMfcWnd.exe | BrmfRmPA.exe | Brong32.exe | browser8.exe | browseraid.exe | BrowserSentinel.exe | bs2.dll,DllRun | bsc32.exe | BSCLIP.exe | Bsoft.exe | bsplayer.exe | bsw.exe | BT Broadband.exe | btinst.exe | BtnHnd.exe | btsendto.exe | BTSetBootKey.exe | btstart.exe | bttnserv.exe | bttray.exe | BtUsrBdg.exe | btv.exe | Buddyizer.exe | buffer32.exe | bugwatcher.exe | bulldownload.exe | bullguard.exe | bundle.exe | BundleOuter.EXE | burndl32.exe | button.exe | ButtonKey.exe | buzof.exe | bvldv32.exe | bvt.exe | BWCfgLoader.exe | bwprnmon.exe | bwtray.exe | bxservice.exe
(E6)(L?) http://www.tasklist.org/tasklist_c.html
C: c32cs2.exe | c:archiv~1win.com | c:autoexec.bat | C:wp.exe | ca.exe | Cabchk.exe | Cabchk32.exe | CABCInstall.exe | cabview1.exe | Cacheman.exe | CacheMgr.exe | cacstart.exe | cads.exe | CAGENT.EXE | CahootWebcard.exe | caKe | CALCHECK.EXE | calendar.exe | calk.exe | calrem.exe | CamCheck.exe | Camdetect.exe | CAMDET~*.EXE | Cameno.exe | Camtray.exe | Canada.exe | canary-std.exe | canary.exe | CAP3ONN.EXE | capexp.exe | capfax.exe | CAPM1LAK.EXE | Capon.exe | Care20.exe | Care2GTU.exe | carpserv.exe | CARPserver.exe | cart322.exe | CasAgnt.exe | casclient.exe | caseyvideo(*).exe (* = di | CaseyVideo.exe | caseyvideo[*].exe (* = di | caseyvideo[*].exe [* = di | cashback.exe | Cashbar.Exe | Cashfiesta.exe | cassandra.exe | cassl.exe | casstub.exe | cat.exe | Cateye.exe | catsrvps.exe | Cavapsvc.exe | CAVRID.exe | CAVS.exe | CAVTray.exe | CAZNOVAS.exe | CBACK.EXE | cber.exe | cbpopw.exe | CBRSS.EXE | CBWAttn.exe | CBWDial.exe | CBWHost.exe | cc.exe | ccApp.exe | ccApp32.exe | ccdoctor.exe | CCenter.exe | ccEvtMgr.exe | ccEvtMngr.exe | ccEvtMrg.exe | ccHelp.hta | CConnect.exe | CCPROXY.EXE | CCPXYSVC.exe | ccreal.exe | ccRegVfy.exe | ccSetMgr.exe | ccSort.exe | ccsrn.exe | ccsrs.exe | ccUpdate.exe | cd1.exe | cdaccess.exe | CDANTSRV.exe | Cdcompat.exe | cddrv32.exe | cdesk.exe | cdf.exe | cdi.exe | cdm.exe | CDPlay.EXE | cdromcntrl.exe | cdstorager.exe | CDTray.exe | CDUpdater.exe | CdzSvc.exe | CD_Load.exe | CeEKey.exe | Ceic.exe | Cell.exe | cepmtray.exe | cerf.exe | Certutil.exe | CFD.exe | cffrem.exe | CfgDll32.exe | cfgintpr.exe | cfgpwnz.exe | CFGREG.EXE | CFGSAFE.EXE | CFGSAFE.EXEAUTOCHK.EXE | cfgsys32.exe | cfgwiz.exe | Cfgwiz32.exe | cfinst.exe | cFosDNT.exe | cfosinst.exe | cFosSpeed.exe | cftmon.exe | cftrb32.exe | cgmenu.exe | cgserver.exe | cgtask.exe | cgy32win.exe | cgywin32.exe | ChamClock.exe | ChannelUp.exe | charmapnt.exe | charmapx.exe | charms.exe | Chatango.exe | chcenter.exe | che.ocx.vbs | Cheatle.exe | check32.exe | CheckCWupdate.exe | checker.exe | CheckIt86.exe | china.bat | CHINA11MSN.EXE | CHKADMIN.EXE | chkdsk.exe | chkfont.exe | chngline.exe | Choke.exe-blahh | chostsv.exe | CHTVINIT.EXE | cihost.exe | CIJxP2PS.EXE | ciscv.exe | CISRVR.EXE | Cissi.exe | cisvc.exe | CitiVAN.exe | civsc.exe | CJet.exe | Cjstcom.exe | Cjstlst.exe | CJSTRxx.EXE | Cjstsr.exe | CKA.exe | clamav.exe | ClamTray.exe | class0117(random).exe | CLCL.exe | cleanall.exe | CleanReg.exe | CleanTemp.exe | CLEANT~1.EXEB | CLEANT~1.EXEBCleanTemp.ex | cleanup.exe | clean_service.cmd | clfmon.exe | cli.exe runtime | CLI.exe SystemTray | click2call.exe | ClickMe.exe | Clickoff.exe | clickr~1.exe | ClickT~1.EXE | CLICONFG.EXE | client.exe | CLIENT.EXEclient01.exe | client01.exe | ClipMt5x.exe | CLIPMT60.EXE | Clipomatic.exe | Clipsrv.exe | ClipTrak.exe | ClipTrakker.exe | clisvc95.exe | clmpanel.exe | CLOCKWISE.EXE | CloneCDTray.exe | CLRamCleaner.exe | clrschp038.exe | clrssn.exe | cm20.exe | cma.exe | CMAGENT.EXE | cmail.dll, Rundll32 | CManager.exe | cmappclient.exe | CMD16.EXE | cmd32.exe | cmdcon.exe | CmdPrompt32.pif | CmdServ.exe | cmdzxdll.exe | cme.exe | cmesseng.exe | CMGrdian.exe | Cmluc.exe | cmmon.pif | cmmon32.exe | cmmpu.exe | cmon14.exe | cmpbk321.exe | CMPDPSRV.EXE | cmrss.exe | cmrst.exe | cmrst.scr | cmsrg.exe | cmsssr.exe | cmt101.exe | cmx32.exe | cmxp.exe | CNBABE.EXE | CNF UPD.EXE | cnf.bat | CNFGLD32.EXE | CNFGLD32.EXECnfgldr.exe | Cnfgldr.exe | cnfrm.exe | cnfrm33.exe | cnftips.exe | cnqmax.exe | cnstat.exe | CnxAdslL.exe | CnxDslTb.exe | CnxMon.exe | CNYHKey.exe | Code.exe | Code.exehit.exeSnt.exe | coderxt.exe | codq.exe | color.exe | coloreal.exe | com.exe | ComAgent.exe | combo.exe | ComboButton.exe | combop.exe | comcfg.exe | comctl32.exe | comctl_32.exe | COMDLGEX.EXE | comet.exe | comet.exe /app:SSWPlaunch | comime.exe | COMIP.EXE | comm.exe | command.exe | command.pif | command32.exe | COMMANDER.EXE | Commandr.exe | commctr.exe | commh32.exe | commonaccess.exe | companion.exe | COMPAQ-RBA.EXE | compaq.exe | compq.exe | compq32.exe | compqs.exe | Compt.exe | CompuSpeed.vbs | comsmd.exe | comsutil.exe | comxt.exe | confgldr.exe | config.com | Config.exe | Config33.exe | configldr.exe | configs.exe | Configtool.exe | config_.com | confsvr.exe | conmgr.exe | Connect.exe | connect2party.exe | connection.exe | ConnectionManager.exe | conscorr.exe | consol32.exe | contacte.exe | Control.exe | control64.exe | Cool.exe | CopernicPerUserTaskMgr.ex | copq.exe | copy C:WINDOWSwinshow.new | copy C:\WINDOWS\winshow.n | Copy Handler.exe | copyfstq.exe | CopyProtectionNotifier.ex | CoreCenter.exe | CORECE~1.EXE | CorelDraw.exe | coresrv.exe | coresys.exe | corona.exe | corrida.exe | cosine.exe | couponica.exe | CP32BTN.EXE | CPA9P2PS.exe | cpad.exe | CPATR10.EXE | CPBRWTCH.EXE | CPD.EXE | CplBTQ00.EXE | CPLDBL10.exe | cppatch.exe | cpqa1000.exe | CPQAcDc.exe | CPQAlert.exe | CPQBootPerfDB.EXE | CPQCalib.exe | CpqDfwAg.exe | cpqdiaga.exe | cpqdmi.exe | cpqeadm.exe | cpqeaui.exe | cpqhcm.exe | CpqInet.exe | cpqinkag.exe | cpqkl.exe | cpqnpcss.exe | cpqpscp.exe | Cpqset.exe | cpr | cpsdv.exe | Cpucool.exe | cpumgr.exe | cpunumber.exe | Cpusave.exe | Cpusave32.exe | cpustats.exe | cracked_windows1.exe | Crc32stats.exe | crcss.exe | createAMonster.exe | Createcd.exe | Createcd50.exe | createsw.exe | Creative.exe | criticalUpdate.exe | crmss.exe | CrossMenu | crsrr.exe | crsrs.exe | crss.exe | crss32.exe | crssm.exe | crssr.exe | crssrs.exe | crsss.exe | crsss32.exe | Crsss64.exe | crsvvc.exe | crsys32.exe | crtl.exe | crvss.exe | cs.exe | csass.exe | csc.exe | cscrs.exe | csdata32.exe | csecure.exe | cseinst.exe | CSINJECT.EXE | Csinsm32.exe | csm.exe | csmn.exe | csms.exe | csmss.exe | csmss32.exe | csnss.exe | CsRemnd.exe | Csrrs.exe | csrs.exe | csrsc.exe | csrse.exe | CSRSR.exe | csrss.exe | csrss32.exe | csrss386.exe | csrssa.exe | csrssp.exe | csrsss.exe | CSRSSU.exe | CSRSSW.EXE | Csrtss.exe | cssrs.exe | cssrss.exe | Csss.exe | CSSServer.exe | CSS_1631.EXE | csta.exe | cstar.exe | cstr.exe | CSUSEM32.EXE | CSv10P070.exe | CSV7P070.exe | CSV7P26.exe | CSV7P91.exe | csxrs.exe | CSysTime.exe | ct.exe | CTAvTray.exe | CTB.EXE | CTCMonitor.exe | CTCMSGo.exe | CTDetect.exe | CTDVDDet.exe | CTDVDDet.exeCTDetect.exe | CTEaxSpl.exe | ctflog.exe | CTFM0N.exe | ctfmon.exe | ctfmon32.exe | CTFMONSS.EXE | ctfmoons.exe | ctfnom.exe | CTHELPER.EXE | CTin10.exe | CTLauncher.exe | CTLTask.exe | CTLTray.exe | CTMIX32.EXE | ctmnrun.exe | ctnmrun.exe | CTNOTIFY.EXE | CToolBar.exe | CTPDPSRV.EXE | ctpdpsrvr.exe | CTRegRun.exe | CtrlVol.exe | CTSRReg.exe | CTSVCCD.EXE | Ctsvccda.exe | CTSYSVOL.exe | cttdpsrv.exe | ctupdclt.exe | ctxma.exe | Cuagent.exe | cuo.exe | CursorXP.exe | CuteMX.EXE | CVDAsDW.exe | cvmonitor.exe | cvpnd.exe | cvrsss.exe | Cvshost.exe | cvss.exe | cw.exe | cw4.exe | cwbappcd.exe | cwbckver.exe | cwbinhlp.exe | CwbSvStr.Exe | cwbuitsk.exe | cwbwlwiz.exe | Cwcdschk.exe | CWD3DSND.EXE | cwm_tray.exe | cwupdate.exe | cxma.exe | cxtpls_loader.exe | CYB2K.EXE | cyberchk.exe | CyberWolf.exe | cygwin.exe | CyphTray.exe | cyxid98.exe | czech.exe | c_pan.exe
(E6)(L?) http://www.tasklist.org/tasklist_d.html
D: d.exe | D066UUTY.EXE | d11host.exe | D4.exe | D4NG3.vbs | d?dplay.exe | d?xplore.exe | daconfig.exe | dadapp.exe | dadx.exe | Daemon.exe | daemon.exe c daemon2.exe | daemon.exetp4serv.exe | DAEMON32.EXE | dailin.exe | DAMon.exe | DAP.exe | dapdll.exe | dashboard.exe | DataLayer.exe | datamonitor.exe | datcheck.exe | Date.POP.vbs | DateMakerIntl.exe | datemanager.exe | DATRAY.EXE | DAupdate.exe | davcsync.exe | DAW9532.EXE | dayplan.exe | DAYTODAY.EXE | dbaccess.exe | dbgbgr.exe | dbnetlib.exe | dbserv.exe | dbserver.exe | dc.exe | DCC_send.exe | DcDaemon.exe | dcemgr.exe | dcfssvc.exe | dcomuser.exe | dcomx.exe | dd.exe | DDCActiveMenu.exe | DDCMan.exe | dddd.exe | ddeproc.exe | DDEsvr.exe | ddhelp32.exe | DDialler.exe | DDS.EXE | ddutray.exe | de32gen.exe | deamon.exe | debugmonitor.exe | DebugW32.exe | dec25.exe | DefAlert.exe | defect08.exe | defrag.exe | defragfat32.exe | defragfat32abc.exe | defragfat32pi.exe | defragfat32z.exe | defragfat39.exe | defragfatz.exe |
| DEFSCANGUI.EXE | defwatch.exe | del-me.exe | delayrun.exe | DeleteSatellite.exe | delfolders.exe | delldmi.exe | DELLMMKB.EXE | dellsc.exe | delmsbb.exe | DelTemp.exe | deltray.exe | deltreew.exe C:cabs | demon.exe | Deneca.bat | deneme.exe | dePloy.exe | desires.exe | desk-top-service.exe | desk95.exe | desk98.exe | DeskAdServ.exe | DESKCOLOR.EXE | Deskflag.exe | DeskMateAutoUpdate.exe | Deskshop.exe | desktop.exe | desktopmgr.exe | DesktopSearch.exe | DESKTOPX.EXE | deskup.exe | Dest068.exe | destroyb11.exe | detector.exe | DevDetect.exe | DEVDET~*.EXE | DevDtct2.exe | devgulp.exe | Devices2.exe | devl32.exe | devldr16.exe | devldr32.exe | devlog.exe | dewa.exe | dexs.exe | dezi.exe | Dfsvc.exe | DGDRHE~1.EXE | DGJM.exe | dgtstart.exe | dguard.exe | dhbrwsr.exe | dhcpagnt.exe | DHNUXB.exe | DHUpdt.exe | Dia Claro.htm | diagent.exe | DIAL.exe | dialer423.exe | dialup.exe | Diamondview.exe | Dibane.bat | die.exe (path) mdll.exe | die.exe (path) secure.bat | die.exe (path) secure.exe | die.exe (path) ttg.exe | die.exe and either ttg.ex | die.exe [path] mdll.exe | die.exe [path] secure.bat | die.exe [path] secure.exe | die.exe [path] ttg.exe | DietK.exe | DigiCell.exe | DigitalNamesStart.exe | DigitalSound.exe | digstream.exe | DIIhost.exe | dIlhost.exe | Dimension.exe | dino3.exe | dinst.exe | dipset.exe | direct3d.exe | directCC.exe | Directcd.exe | directs.exe | Directvdsl.exe | DirectX.exe | Directx.exeSqlexploit.exe | directx32.exe | DirectX3D.exe | DirectXset.exe | Dirkey.exe | dirote.exe | discoveg.exe | diskcheck.exe | diskinf.exe | DISKMON.EXE | disknag.exe | diskserv.exe | diskver.exe | Disk_Monitor.exe | Display.exe | disspy.exe | DISTASST.EXE | dit.exe | DiTask.exe | Divamon.exe | DivX.Exe | divxenc.exe | DivXPlayer.exe | DkIcon.exe | DkService.exe | dktime.exe | dkware.exe | dkzzixm.exe | Dlatray.exe | dlbabmgr.exe | dlbfbmgr.exe | dlbkbmgr.exe | dlbxmon.exe | dlder.exe | DLForcerEXE.exe | DLG.exe | DLGCHBW.exe | DLGLI.EXE | dlhost.exe | dlink.exe | dll.exe | DLL32SYS.EXE | dllcachev2.exe | Dllcmd32.exe | dlldmt.exe | dllhelp.exe | dllhlp.exe | dllhost.exe | dllhost32.exe | dllhostxp.exe | DLLMAN.EXE | dllmanager.exe | dllmanager32.exe | dllmem32.exe | dllmngr32.exe | dllpt.exe | dllreg.exe | DLLSRV32.EXE | dllsvc32.exe | dlm.exe | dlres.exe | dlt.exe | dluca.exe | dluxde.exe | dmcpl.exe | DMHKEY.EXE | dmildr.exe | DMISL.EXE | DMISLAPP.exe | dmrss.exe | dmserver.exe | Dmsvc32.exe | dmtdll.exe | DMXLauncher.exe | dm_mgr.exe | Dnar.exe | DncLE.exe | DNETC.EXE | dns2goclient.exe | dns32.exe | dnscleaner.exe | dnsping.exe | dnsresolver.exe | dnsrslve.exe | dnsserv.exe | dnsvc.exe | dnxvc.exe | DockApp.exe | Doctor.exe | doezs.exe | doing.exe | doit.exe | dontpanicdemodp.exe | dopus.exe | doriot.exe | dos.exe | Dos32.exe | dos64.exe | dosrun32.exe | download.exe | DownloadPlus.exe | DownloadWizard.exe | DownloadWonder.exe | downlo~1.exe | Downxz.bat | dp-******.exe | DPAgnt.exe | dpcnav.exe | DPConfig.exe | dpcproxy.exe | dpcstart.exe | dpi.exe | DPMW32.EXE | dpps2.exe | dps.exe | Dr.DivX.exe | Dragdiag.exe | DragDrop.exe | DRDOOM.EXE | DrgToDsc.exe | DriBat32.exe | dried.exe | driver32.exe | driver64.exe | Drivers.bat | driveselect.exe | drrss.exe | drst.exe | drv.exe | drvddll.exe | DrvListnr.exe | drvlsnr.exe | drvr32h.exe | drvrquery32.exe | drvsc.exe | drvsys.exe | DrWatson32.exe | drwatson_.exe | drwatson_32.exe | drwatsoon.exe | DRWEBAV.EXE | Drwebscd.exe | DRWTSN16.EXE | DR_S.exe | dsa.exe | dSAFsqs.exe | DSB.exe | DSC.exe | dsclock.exe | DSentry.exe | dseraser.exe | dservice.exe | DShmap.exe | Dskcompat.exe | DSLagent.exe | dslaunch.exe | dsldbaccess.exe | dslgeaccess.exe | dslmon.exe | dslstat.exe | dsm.exe | dssagens.exe | dssagent.exe | dstart2.exe | dstart4.exe | dtiom98.exe | DTLoader.exe | DTOURS.exe | dtxservice.exe | DUC20.exe | duck.exe | DUControl.exe | DUMETER.EXE | dummy.exe | dumprep 0 -k | dumprep 0 -kdumprep 0 -u | dumprep 0 -u | dun3.exe | duwi.exe | DVD43_Tray.exe | DVDBitSet.exe | Dvdcompat.exe | DVDLauncher.exe | dvdplay.exe | DVDTray.exe | DVDUpgrd.exe | dveldr.exe | dvldr.exe | Dvldr32.exe | Dvp95.exe | DVPAPI9X.exe | Dvpinit.exe | Dvprpt.exe | dvraudio.exe | dvsync.exe | DvzIncMsgr.exe | DvzMsgr.exe | dw.exe | dwdas.exe | Dwe.exe | DWHeartbeatMonitor.exe | dwMon.exe | DX3DRndr.exe | Dx8compat.exe | dx9diag.exe | dxd3d.exe | dxdllreg.exe | dxmsrv.exe | dxopengl.exe | dxsound.exe | Dxsty.exe | dxterm5.exe | Dxupdate.exe | DynDNS.exe | dynitora.exe | dynizari.exe | DynSite.exe | dynubas.exe | DZSAVEME.EXE
(E6)(L?) http://www.tasklist.org/tasklist_e.html
E: E-S0BIC1.EXE | EA2Check.exe | EabServr.exe | eaclean.exe | eanthology.exe | EANTHO~1.EXE | EasyAV.exe | easyclip.exe | EasyDates.exe | EasyDates_nl.exe | easykey.exe | EasyKeyboardLogger | EasyShare.exe | EasyTune.exe | easywww2.exe | EbatesMoeMoneyMaker0.exe | ebay.exe | EBAYTBAR.EXE | eBayTBDaemon.exe | Eber.exe | Eboard.exe | EC.exe | ecard.exe | EchoCtrl.exe | ecleaner.exe | ECPE.EXE | ECSERVER.EXE | Ecview.exe | edexter.exe | editpad.exe | Edwizard.exe | ee.exe | EEXPLORER.EXE | efaxs.exe | Efpap.exe | efpeadm.exe | ehshell.exe | ehtray.exe | ei10.exe | Ekiller.exe | ekor.exe | ElbyCheck.exe | Element.txt | elf.exe | elite***32.exe (* = rando | elite***32.exe (*** = ran | elite***32.exe [* = rando | elite***32.exe [*** = ran | elite.exe | Elmenv.exe | elsavect.exe | em2.exe | EMA.EXE | EMAKESV.EXE | EMIII.exe | emo.exe | emsw.exe | emule.exe | eMusicClient.exe | EM_EXEC.EXE | en4060ct.exe | enbiei.exe | ENCMONTR.EXE | Energizer FileSaver.exe | EnergyPlugin.exe | enginecs2.exe | ENGSS.EXE | EngUtil.exe | enhance32.exe | enhupdt.exe | EnigmaPopupStop.exe | EnMixCPL.exe | ENSMIX32.EXE | Enternet.exe | eOneMng.exe | EPOAgentnaimag32.exe | EPOAgentnaimag32.exenaima | EPOAgentnaimas32.exe | EPRINT4.EXE | ePrompter.exe | eps.exe | EPSON CardMonitor1.0.exe | EPSON_PhotoStarter.exe | Equipmen.exe | eraser.exe | Ereg.exe | erm.exe | eros.exe | ErPhn2.exe | ErrorGuard.exe | ErrorNuker.exe | ErTray.exe | ERTS0749.exe | ERTYDF.exe | Erun.pif | esb.exe | ESBUpdate.exe | eschlp.exe | escorcher.exe | esftp.exe | Esoh123.exe | ESPWatch.exe | essapm.exe | Essd.exe | essdc.exe | ESSNDSYS.EXE | ESSOLO.exe | esspk.exe | essspk.exe | eSupCmd.exe | ET4Tray.exe | etbtest.exe | etdirrcv.exe | ethernet.exe | ethernet32m.exe | etoolbar.exe | EuroGlot.exe | eusexe.exe | eventagt.exe | eventlog.exe | eventmgr.exe | EvLstnr.exe | evntsc.exe | evntsvc.exe | evntsvc.exerealsched.exet | EVOLOSTA.EXE | evthtm.exe | EWALLET.EXE | ewat.exe | eworo.exe | ewupdater.exe | exbce.exe | ExchangeMaster.exe | exdl.exe | exe.exe | EXE32EXE.exe | exec.exe | EXECDLL32.exe | execfg4.exe | exgiwsl.exe | Exiflaquickdcr.exe | Exiflaquickdcr.exeQuickDC | Exit to DosPrompt.pif | Exlaunch.exe | exp0lrer.exe | expIorer.exe | expl0rer.exe | Expl32.exe | Exploer.exe | exploier.exe | exploier.exeexploier.exe. | exploirez.exe | explorar.exe | explore.exe | explore.vbs | explore32.exe | explored.exe | explorer.exe | Explorer.exe sound_drive1 | Explorer.exe svchost.exe | Explorer.exe, msmsgs.exe | explorer.pif | EXPLORER.SCR | explorer16.exe | EXPLORER32.EXE | explorer6s4.exe | EXPLORERE.EXE | explores.exe | explorexp.exe | explr32.exe | expoler.exe | expup.exe | EXSHOW95.exe | External.exe | ExtraDNS.exe | exxdemon.exe | ezagent.exe | EzButton.EXE | EZDESK.EXE | ezdsmain.exe | EzEjMnAp.exe | Ezg1q5.exe | ezlwy.bat | eZmmod.exe | EZNORUN.EXE | ezsched.exe | ezsmart.exe | ezSP_Px.exe | ezSP_Px.exeezSP_PxEngine. | ezSP_PxEngine.exe | eZulaMain.exe | eZuluMain.exe | e_s0hic1.EXE | E_S10IC2.exe | E_S4I0T1.EXE | E_S4I2F1.exe | E_S4I2G1.EXE | E_SICN03.exe | E_SOEIC1.exe | e_srcv02.exe | e_srcv03.exe | e_srcv03.exee_srcv02.exe
(E6)(L?) http://www.tasklist.org/tasklist_f.html
F: F-Sched.exe | F-StopW.exe | F1REF0X.EXE | F1rewalls.exe | F1TRAY.EXE | f607.exe | faet.exe | fagent.exe | FaLeH.exe | fan.exe | fapmon.exe | farmmext.exe | Fash.exe | fast.exe | FAST2.EXE | Fastboot.exe | fastdown.exe | fastdown.exefastfown.exe | Fawgrd32.exe | FBDirect.exe | FBISM.exe | Fbmount.exe | fbsfsdrs.exe | FBZPaper.exe | FB_PNU.EXE | fc.exe | fcllls.exe | FD.exe | fdcmon.exe | fdm.exe | fdxxl.exe | feelitdm.exe | fensvc32.exe | FerrariWP.exe | ffisearch.exe | ffservice.exe | fhtisxk.exe | figgaz.exe | file.exe | filees.exe | filen.exe | filess.exe | filez.exe | filez.exesexypicz.exeload | filtergate.exe | Filtrgrd.exe | find.exe | Findfast.exe | FindService.exe | Finland.exe | Firewall.bat | Firewall.exe | firewallsp2.exe | Firewallstartup.exe | FirewallSvr.exe | firewall_anti.exe | FirstReboot.exe | fixupdattr.exe | FjMenu.exe | FjMnuIco.exe | fksysmon.exe | flacpy.exe | FlashEnc.exe | Flashget.exe | FlashKsk.exe | flatbed.exe | flencpy.exe | Flexicd.exe | fljzsshc.exe | FLKPT.exe | flncpy.exe | flogotv.exe | FLooDeR.exe | flps.vbs | flpycntl.exe | FLSHSTAT.EXE | FLSVCI.exe | flydesk.exe | fm3032.exe | Fmctrl.EXE | fmedia.exe | FMEMPRO.EXE | fmnwebassist.exe | Fmstart.exe | fmsz.exe | FMW_PCAP.EXE | fnksvc32.exe | fnmwebassist.exe | fntldr.exe | Focus.exe | FolderShield.exe | folderview.exe | FoneSyncSystemTray.exe | fontfix.exe | fonts.hta | FONTVIEW.EXE | fooding.exe | ForbesAlerts.exe | forboo.exe | forces_elite.exe | formatsys.exe | FotoStation Easy AutoLaun | FoulPX.exe | FourthDay.exe | foxdhend.exe | fpdialer.exe | FPDISPxA.EXE | fppdis1.exe | fpplock.exe | FPUK.exe | FPUK.exeZPU.exe | FPWGMWZD.exe | fpwinldr.exe | Fquick32.exe | france.exe | fraps.exe | Freectrl.exe | Freedom.exe | FreeMem.exe | FreeRAM XP Pro *.exe | FreeRAM XP Pro x.exe | freescan.exe | FreeScanner.exe | freshclam.exe | freshdesktop.exe | FridaysInHellInstaller.ex | frntgate.exe | fro.exe | frsk.exe | FRW.EXE | frxmxins.exe | frzstate.exe | fs20.exe | fsaa.exe | FSCBoss.exe | FSDPSRV.exe | fsdqd.exe | fserv.exe | Fservice.exe | Fservice.exeorSservice.ex | fsg-ag_****.exe (* = rand | fsg-ag_****.exe [* = rand | fsg-ag_3102.exe | fsg.exe | fsg.exefsg-ag_3102.exegai | fsg_****.exe | fsg_****.exe (* = random | fsg_****.exe [* = random | fsg_4104.exe | FSM32.EXE | FSMA32.EXE | fsp.exe | FSScrCtl.exe | FSSW.EXE | FSW.exe | fsws.exe | ftbar.exe | ftc.exe | ftctrl32.exe | ftflauncher.exe | FTMSFLTU.EXE | FTPDev.exe | FTPDM.exe | FTPGraber.exe | ftphost.exe | ftpmon.exe | Ftpsched.exe | ftpwin32.exe | FTP_back.exe | fts.exe | fufffy.exe | fukerz.exe | FUKULAMER.exe | fullgames.exe | fuuuucktttttt.exe | fvek.exe | fvlaunch.exe | FVProtect.exe | fwdl.exe | fwdload.exe | FwebProt.exe | fwenc.exe | FWLink.exe | FWPortal.exe | fwr.exe | fwrastrc.exe | fwservice | fxredir.exe | fxsecues.exe | fylez.exe
(E6)(L?) http://www.tasklist.org/tasklist_g.html
G: G-VGA.exe | G0mez.vbs | g2svc.exe | g3dctl.exe | G6FTPSrv.exe | gabber.exe | GAELICUM.EXE | gah95on6.exe | gaim.exe | gain_trickler_****.exe (* | gain_trickler_****.exe [* | gain_trickler_3202.exe | gam.exe | game.exe | Game.exe.vbs | GameChannel.exe | GameChannel.exewtgamechan | gamemanager.exe | gameutil.exe | gaSrv.exe | gaSrve.exe | gator.exe | Gay_Sexy_**.exe | GBMenu.exe | gbot.exe | GBPoll.exe | GBTray.exe | gcasAV32.exe | gcasDtServ.exe | gcasServ.exe | gccrem.exe | gclib.exe | gd-dial.exe | gdien32.exe | gdmgr.exe | GDriver.exe | geaccess.exe | Gear511.exe | gearsec.exe | gedit.exe | GEDZAC.exe | GemStRmW.exe | general.exe | gesfm32.exe | getright.exe | getsmile.exe | GFXACC.EXE | gg.exe | ggtb32.exe | ghost.exe | GhostStartService.exe | GhostStartTrayApp.exe | GhostTray.exe | gigabit.exe |
| gisdnlog.exe | GLADManager.exe | Glass2k.exe | Glidew32.exe | glophone.exe | gluon.exe | glv.exe | Gmouse.exe | GMT.exe | GMT16.exe | gnetmous.exe | gnotify.exe | gnub.exe | Go.exe | GOG.exe | GoGoLaunch.exe | goidr.exe | GoogleDCC.exe | GoogleDesktop.exe | GOOGLEMAPS.EXE | gothica.exe | Gotit.exe | GotSmiley.exe | gozilla.exe | gra.exe | GrabClipSave.exe | Grasiele.VBS | GrdSys32.exe | greece nm.exe | GREENMK.exe | grepclient1.exe | Grokster.exe | grpconv.exe | Grxp4exe.exe | Gscbc.exe | GSDOGST.EXE | gshp.vbs | Gsicon.exe | GSM2.exe | GSMedia3.exe | GSOrganizer.exe | gspotbot.exe | gssomatic.exe | gsv.exe | gsyno.exe | gtwatch.exe | guardpc.exe | GUI.exe | guru.exe | GuruNet.exe | GWHotkey.exe | GWInkMonitor.exe | GWMDMMSG.exe | GWMDMpi.exe | gwreg.exe | GWREMIND.EXE | gwum.exe | gwwgtp.exe | gxlib.exe | gyy.exe | G_Server.exe
(E6)(L?) http://www.tasklist.org/tasklist_h.html
H: h3.exe | h4te.exe | hachimitsu-lemon.exe | hackmon.exe | HalAsst.exe | hallowelt.exe | hampanel.exe | happy.exe | hare.exe | HAWK_32.EXE | HAWK_95.EXE | hbagent.exe | Hbinst.exe | hbmail.exe | HbOEAddOn.exe | hc.exe | HCDetect.exe | hclean32.exe | hcm.exe | hcontrol.exe | HCount.exe | HDAudPropShortcut.exe | hddhealth.exe | HDDlife.exe | HDE.EXE | hdsys.exe | HDtray.exe | hearit95.exe | hearit98.exe | Hello.exe | help.exe | Help.pif | helpctl.exe | helper.dll, Rundll32 | helper.exe | HelpExp.exe | helpext.exe | helpw.exe | HERASER.exe | hess.exe | Hf.exe | hffsrv.exe | hfxp.exe | Hgcctl95.exe | HgzServer.exe | hib32.exe | hid.exe | hidden32.exe (path) explo | HideOE.exe | hidep.exe | Hiderun.exe and svhost.ex | hidserv.exe | HijackThis.exe | hint.exe | HIPL2000Popup.exe | histkill.exe | hit.exe | HITWAR~1.EXE | HIV.exe | hk.exe | hk2re.exe | hkcmd.exe | hkey.exe | HKserv.exe | hkss.exe | hlhtxo.exe | hllcxpa.exe | hlp32.exe | hmisvc32.exe | hmlsvc32.exe | Hmonitor.exe | hmusvc32.exe | Hndsync.exe | Holiday Lights.exe | holsvc32.exe | HomeAlarm.exe | honor.exe | hookdump.exe | HookSys.exe | host.exe | host32.exe | host32.exe internat.dll, | hostd.exe | hostdll.exe | Hostren.exe | hosts.exe | hostserv.exe | hostsvc.exe | Hotc.exe | HotfixQ0306270.exe | hotide.exe | hotkey.exe | HotkeyApp.exe | hotpart22.exe | hotpix.exe | hotplug.exe | hotsync.exe | HotTray.exe | hotwetlove.exe | Hot_Kiss.exe | Hot_Tarts.exe | Hot_Tarts_**.exe | Hot_Tarts_Au.exe | HoverDesk.exe | HP05T0R5.exe | hpboid.exe | hpbpro.exe | hpbpsttp.exe | hpcdtray.exe | hpcmpmgr.exe | Hpcron.exe | hpdisply.exe | hpdllhost.exe | hpdrv.exe | hpfsched | hpfsched.exe | hpgs2wnd.exe | Hpha1mon.exe | HPHAxMON.EXE | HPHMON**.EXE | hphmon04.exe | hphmon05.exe | hphmon06.exe | hphome.js | hphprld.exe | hphprld.exe ....setup.exe | hphupd**.exe | hphupd04.exe | hphupd05.exe | hphupd06.exe | hpi-boot.exe | HPIDSCHD.exe | hpimoniter.exe | Hpi_Monitor.exe | HPJETDSC.EXE | hpjsira.exe | HPLAMP.EXE | hplampc.exe | hpmdlbwx.exe | HpMmKbd.exe | hpnra.exe | HPO0VDX05.exe | hpoavn07.exe | hpobnz08.exe | hpobrt07.exe | hpodblia.exe | hpodev07.exe | hpodlb08.exe | hpoopm07.exe | hposol08.exe | HPOSTR03.EXE | HPOSTR03.EXEHPOstr05.exe | HPOstr05.exe | hpotdd01.exe | hppautoindexer.exe | hppdirector.exe | HPPhotoManager.exe | HPPPTA.exe | HPPrint.exe | HPPROPTY.EXE | hppschedindexer.exe | hppt.exe | HPPWRSAV.EXE | hpqcmon.exe | hpqthb08.exe | hpqtra08.exe | HPScanFix.exe | hpsebc08.exe | hpsebc087.exe | hpserver.exe | hpsjbmgr.exe | hpsjvxd.exe | hpsplmwa.exe | HpSrvUI.exe | hpstart.wsf | hpstatus.exe | HPSV.exe | hpsysdrv.exe | hptasks.exe | HpTvNow.exe | HpVisIni.exe | HPWHRC.EXE | hpws.exe | HPWuSchd.exe | HPWuSchd2.exe | hpzts04.exe | hpztsb04.exe | hpztsb05.exe | hpztsbol.exe | hpztsbol.exehpztsd02.exeh | hpztsd02.exe | HP_DeskJet_500.exe | hp_finder.exe | hqisvc32.exe | hqlsvc32.exe | Hr.exe | htmlsync.exe | htpatch.exe | http.exe | http://find.naupoint.com | https.exe | huhdir.exe | Hvid.exe | Hwdoctor.exe | HWINFO* | hxdef.exe | hxdef.exe... | hxdef.exehxdef.exe... | HXDL.EXE | HXDL.EXEHXIUL.EXE | HXIUL.EXE | hyandex.exe | hyperx.exe
(E6)(L?) http://www.tasklist.org/tasklist_i.html
I: i love you.exe | i11r54n4.exe | I386.exe | I3Explorer.exe | I81SHELL.exe | i8kfangui.exe | ia99.exe | iaanotif.exe | IAM.exe | iamapp.exe | IAMNET~1.EXE | iap.exe | ias.exe | IASHLPR.EXE | Iassd.exe | iau.exe | ib.exe | IBackground.exe | ibackup.exe | ibm.exe | IBMBAY2N.EXE | IBMBAYSN.EXE | ibmmessages.exe | Ibmmon.exe | IBMonitor.exe | ibmpmsvc.exe | ibot4.exe | Ibtna.exe | icasServ.exe | iClean.exe | ICLOAD95.EXE | ICM.EXE | Icmon.exe | ICO.EXE | icon.exe | iconclnt.exe | ICONDESK.EXE | Iconfig.exe | IconMgr.Exe | Iconoid.exe | Iconsaver.exe | ICP.EXE | icq.exe | ICQ2002.exe | icqjdhs.exe | ICQLite.exe | ICQNet.exe | ICQNET.vbs | ICQpro.exe | Icserver.exe | ICSMGR.EXE | icwconn1.exe | id53.exe | ID8525.exe | ID8525.exeid85255.exe | id85255.exe | IDA.EXE | IDCom.exe | idctup20.exe | ide.exe | idecntl.exe | IDElibr32.exe | idesktop.exe | idetect.exe | Idhost.exe | IDMan.exe | idwlog.exe | idxl.exe | IE4321.exe | Ieboot6.exe | iebs.exe | iecheck.exe | iedll.exe | IEDoctor.exe | IEDriver.exe | IEDriver.exexplore.exe | iEEexplore.exe | IEeng.exe | IEExec.exe | IEFeatures.exe | IEFeatures.exeInternetfea | IefxTray.exe | ieharv.exe | iehelper.exe | IEHost.EXE | ieloader.exe | iemaximizer.exe | Iesar.exe | Iesearch.exe | IEserv.exe | IEService.exe | iesetupdll.exe | ietsr.exe | iexp1orer.exe | IExpIore .exe | IexpIore.exe | IEXPL0RE.EXE | IEXPL0RER.EXE | iexpl0res.exe | Iexplor.exe | Iexplor32.exe | Iexplore .exe | iexplore.exe | iexplore.pif | iexplore32.exe | IExplore326.exe | IExplore327.exe | IExplore32b.exe | IExplore32cb.exe | iexplorer .exe | iexplorer.exe | Iexplorer0.exe | iexplorer32.exe | iexplorere.exe | iexplorerrs.exe | iexplore_.exe | Iexpres.exe | IEXwe.exe | ifrmewrk.exe | IFSplash.exe | igfxtray.exe | iglmtray.exe | Iglpbv.exe | igsex2x.exe | iiexplorer.exe | IILC.EXE | iis.exe | iisvers.exe | IJ75P2PS.EXE | IKEService.exe | IKEYMAIN.EXE | iLyric.exe | IMAGE32.exe | ImageDrive.exe | imagefox.exe | Imagemgt32.exe | imekrig.exe | IMEKRMIG.EXE | ImgIcon.exe | imgst.scr | ImgStart.exe | imiconxp.exe | IMJPMIG.EXE | immcheck.exe | IMOLApp.exe | imonitor.exe | imontray.exe | ImScInst.exe | IMStart.exe | imwireup.exe | iM_Tray.exe | incd.exe | IncMail.exe | incredimail.exe | indexcleaner.exe | Indexindicator.exe | IndexSearch.exe | inetcntrl.exe | inetconf.exe | INETD32.EXE | Inetdbs.exe | inetdl.exe | inetdl_2.exe | inetinf.exe | inetinfo.exe | inetinfomon.exe | inetman.exe | inetmgr.exe | inetwizard.exe | info32.exe | Info32x.exe | infoebay.exe | InfoPenIM.exe | Infoplay.exe | infus.exe | Infuzer.exe | infwin.exe | Inicio.exe | INISvc.exe | inisys.exe | Init.exe | init3.exe | Init32.exe | injobs.exe | InkMonitor.exe | InkWatch.exe | InoRpc.exe | InoRT9x.exe | InoTask.exe | InpriseMon.exe | InSane.exe | insCOA5.exe | insight.exe | InstaFinderK inst.exe | install.exe | Install.log.vbs | install2.exe | InstallAurealDemos.js | installstub.exe | InstantDrive.exe | instantmsgrs.exe | instantpleasure.exe | instantpleasurexxx.exe | INSTAN~1.EXE | INSTIT.BAT | InstUtlR.exe | Int*****.exe | int1.exe | intcp32.exe | Intdel.exe | Intdel.exeintdel_2.exe | intdel_2.exe | IntEdReg.exe /CHECK | IntEdReg.exe /OFFMAN | integator.exe | intel32.exe | IntelMEM.exe | IntelProcNumUtility.exe | Interdll.exe | internat.dll, LoadKeyboar | Internat.exe | Internet.exe | internetcolor.exe | Internetfeatures.exe | INTERNETFEATURES.execlrsc | Internt.exe | interserv.exe | intersvc.exe | interwarn.exe | intl.exe | Intmgr.exe | intranet.exe | intrenat.exe | IntroWiz.exe | intspvc.exe | InvokeSvc3.exe | Iomon98.exe | IOWATCH.EXE | ip.exe | ip7.exe | ipcconn.exe | ipcfg.exe | ipclient.exe | ipcon32.exe | IPCONN.EXE | iphider.exe | ipmon.exe | ipmon32.exe | iPodManager.exe | iPodWatcher.exe | iprntctl.exe | ipsecdialer.exe | IPSecMon.exe | ipstack.exe | iptl.exe | IPW.exe | ipxwping.exe | iPY.exe | iqes.exe | irbme.exe | IreIKE.exe | IRMON.EXE | irun.exe | irun4.exe | irwftp.exe | IrXfer.exe | ir_ftp.exe | is.exe | Isac.exe | isafe.exe | isass.exe | Isass32.exe | ISASS32.pif | ISATRAY.EXE | isdbdc.exe | isDel.bat | isearch.exe | iservc.exe | iservice.exe | ISLP2STA.EXE | ispbeg.exe | ispnews.exe | ispynow.exe | Israfel.vbs | issch.exe | ISStart.exe | ISSVC.exe | iss_srvr.exe | istinstall zazzer.exe | istsvc.exe | ISUSPM.exe | ISWizard.exe | isystem.exe | itcnmon.exe | itDDD.exe | ITIMER.exe | Itk.exe | itLoad.exe | iTouch.exe | iTouch.exeCommandr.exe | ItsDeductible.exe | itune.exe | itunes.exe | iTunesHelper.exe | it_cpq~1.exe | ivpsvmgr.exe | iw.exe | iWareStart.exe | IWatch.exe | iwctrl.exe | iwnujdss.exe | iwnujdss2.exe | IXApplet.exe | ixplore.exe | ???exe | I_26dadCC.exe
(E6)(L?) http://www.tasklist.org/tasklist_j.html
J: j?vaw.exe | jacfg2.exe | JAguAr.exe | jah.exe | jammer.exe | JAMMER2ND.EXE | janis.com | Java Plug In close.exe | java.exe | javamx.exe | JavaRun.exe | javaup.exe | javavm.exe | javaw.exe | jawa32.exe | jdbgmgrnt.exe | jdbgmrg.exe | Jiffybar.exe | JMSrvr.exe | JobHisInit.exe | JogServ2.exe | jopplerg.exe | JOYUPDRV.EXE | jrdtifkkxbbsa.exe | Jreg2b.exe | JsDbgMan.exe | JupitCo.exe | jusched.exe | jusched32.exe | jushed32.exe | jutsu.exe | jv16pt_network.exe | jzi16.exe
(E6)(L?) http://www.tasklist.org/tasklist_k.html
K: K2ps_full.exe | K6CPU.EXE | kak.hta | kaka.exe | Kalibump.exe | kalv****.exe (* = random | kalv****.exe [* = random | kalv***32.exe (* = random | kalv***32.exe [* = random | Kargo.exe | KASPERANTIVIRUS.EXE | kaspersky.exe | KasperskyAV.exe | Kasperskyaveng.exe | kaspery.exe | Kav.exe | kav32.exe | KAVPF.exe | KavPFW.exe | KAVStart.exe | kavsvc.exe | kavsvx.exe | kazaa.exe | kazaalite.exe | KaZooM.Exe | Kazza.exe | KB891711.exe | KBD.EXE | KbdAp32A.exe | kbddrv32.exe | kbddrvinf.exe | KBOOST.exe | KCeasy.exe | kcpqek.exe | KdzEregli.exe | Keenvalue.exe | keep.exe | KEM.exe | KEMailKb.EXE | kemet.exe | kennewr.exe | kern-mxe.exe | kern32.exe | kernel.com | kernel.dli | Kernel.dll | Kernel32.com | Kernel32.comScandisk.com | kernel32.dlI | kernel32.exe | Kernel32.pif | Kernel32.win | kernel32dll.exe | kernel32s.exe | Kernell.dll | kernels32.exe | Kernelw32.exe | Kernn.exe | key.exe | keyacc32.exe | keybdcntl.exe | keybdll.exe | keyboard.exe | keyboard_enum.exe | keyhook.exe | Keyhost.exe | keylog.exe | keylogger.exe | Keyloggerpro.exe | KeyMan.exe | keymap.exe | Keymgr.exe | KeyPatrol.exe | keysh.exe | Keyspy.exe | KEYSTATE.EXE | keystroke.exe | KeyText.exe | keyword.exe | KeywordFinder.exe | kgzgjkpcw.exe | kgzgjkpcw.exeZONEALARM.EX | KHALMNP.exe | Khalmnpr.exe | khooker.exe | KHost.exe | KICKMON.EXE | killall.exe | killer.exe | KillPopup.exe | kimochi.exe | Kinberlink.exe | Kkk.exe | klsuicbn.exe | kmaestro.exe | kmw_run.exe | kmw_show.exe | kn0x.exe | KodakCCS.exe | KonniSymbol.exe | kontiki.exe | KPDrv4XP.exe | krec32.exe | krisp.exe | krnl32.exe | Krnlmod.exe | kstatus.exe | ktchnsnk.exe | ktrexe.exe | kvpnclient.exe | KWallet.exe | kxmixer.exe | KYSVCXD.EXE
(E6)(L?) http://www.tasklist.org/tasklist_l.html
L: l0ad.exe | l32x.exe | L4r1$$a.pif | l?ass.exe | l?gonui.exe | ladies.htm | lah.exe | lalaa.exe | lanbrup.exe | landriver32.exe | languard.exe | LanNSvc.exe | LanSpeed2.exe | LANWAKE.EXE | lanXp.exe | LaoKey.exe | LARISSA_ANTI_VIRUS.exe | LAS0Ads.exe | lass.exe | lass32.exe | lassa.exe | lasvr32.exe | later.exe | LaunApp.exe | launcg.exe | Launch.exe | LAUNCH32.EXE | LaunchAdware.exe | LaunchAp.exe | LaunchApplication.exe | Launcher.exe | launchpd.exe | LaunchRA.exe | laxmsp32.exe | lcd.exe | LCDC.exe | LCDPlyer.exe | lcfep.exe | lcidchng.exe | lclock.exe | lcsrv16.exe | lcvga.exe | ld.exe | ldasp.exe | ldfnt32.hta | ldmconf.exe | ldriver.exe | LEDTRAY.EXE | LeechGet.exe | LetsSearch.exe | lexbac.exe | lexbce.exe | LEXPLORE.exe | lexpps.exe | lexstart.exe | lf66prc.exe | lfass.exe | Lfh.exe | lfsndmng.exe | Lgnpsp32.exe | LGWAKEUP.EXE | li-multi****.exe | li-thund****.exe | li-vita****.exe | libsys32.exe | libsysmgr.exe | libupdate.exe | libupdate32.exe | libupdte.exe | LIC.exe | lide.exe | Lien Van de Kelder.exe | Lien Vande Kelder.exe | Lien vd Kelder.exe | Lien.exe | Lientjeuh.exe | LienVandeKelder.exe | LienVdK.exe | Lightning.exe | LimeWire.exe | LineSpeedMeter.exe | Linksts.exe | linux.exe | Linux.vbs | Lisa.exe | list32.exe | liteout.exe | LIU.exe | LIU.exeRubicon.exe | Livenote.exe | LiveSexCams.exe | LiveUpdate.exe | Llass.exe | Llsched.exe | lMAPl.exe | lmas.exe | lmass.exe | lmgui.exe | lmhosts.exe | LMonitor.exe | lmpdpsrv.exe | lmrss.exe | lmrt.exe | lms2cenu.exe | LMSTATUS.EXE | lmsxxe.exe | LMU.exe | ln32k.dll | lnchbrd.exe | load shell.dll /c /set | load win64.drv | load.exe | load32.exe | loadcfg32.exe | loaddll.exe | loaded.exe | Loader.exe | Loader32.exe | loader_name.exe | loadfax.exe | LoadFonts.vbs | LoadFonts.vbsTahoma.vbs | loadfp.exe | LoadGolfCourses.exe | loadkk.exe | loadqm.exe | loads.exe | LOADWB.EXE | loadwc.exe | localsrv.exe | localsvc.exe | locatesvc.exe | lockpc.exe | log.exe | log32zx.exe | logfile.exe | logger.exe | login.scr | Logitech.exe | Logitechs.exe | logitechwls.exe | LogiTray.exe | Logi_MwX.exe | LogMeInSystray.exe | logon.exe | logonstudio.exe | logwat95.exe | look.exe | looknstop.exe | lookupsys.exe | loor.pif | lopsearch.exe | LOPTCON.exe | Lorena.exe | loud.exe | lover.vbe | Lpr123.exe | Lps.exe | lpt.exe | lptask.exe | lrbz32.exe | lrbzus32.exe | Ls.exe | lsa.exe | lsac.exe | lsas.exe | lsas32.exe | lsasrv.exe | lsass.exe | lsass.scr | lsass135.exe | lsass2.exe | LsasS23.exe | lsass2k.exe | lsass32.exe | lsassa.exe | LSASSd.exe | lsasse.exe | lsassig.exe | lsasss.exe | lsassx.exe | lsasv.exe | lsauth.exe | lsburnwatcher.exe | lserv.exe | lsess.exe | lshost.exe | lshosts32.exe | LSPmonitor.exe | lsrv.exe | lssas.exe | lsserv.exe | lssrv.exe | lsvchost.exe | LSvr.exe | ltcm000c.exe | ltdaemon.exe | LTDMgr.exe | Ltmoh.exe | ltmsg.exe | LTSMMSG.exe | lu.exe | LUGuard.exe | LUSetup.exe | lvcoms.exe | LVCOMSX.EXE | lviewj.exe | lwbwheel.exe | lwbwheel.exeMOUSE32A.EXE | lwemon.exe | lwtest.exe | lwtest.exelwemon.exe | lxamsp32.exe | lxbabmgr.exe | LXbbmgr.exe | lxbfbmgr.exe | lxbkbmgr.exe | LXBLKsk.exe | lxbrbmgr.exe | LXBRKsk.exe | lxbtbmgr.exe | LXBTppls.exe | lxbvbmgr.exe | lxdboxcp.exe | lxes.exe | lxmstart.exe | LXSUPMON.EXE | lxxex.exe | Lyc_SysTray.exe | LzioMediaUpdater.exe
(E6)(L?) http://www.tasklist.org/tasklist_m.html
M: M-soft Office.hta | M0USE.exe | m1mmpti.exe | m2gr32.exe | m32info.exe | m32svco.exe | m3tray.exe | m?config.exe | m?iexec.exe | mac.exe | macdwXM.exe | MacLic.exe | MacName.exe | mActiveX.exe | Macvntfy.exe | MAD.EXE | MAFWTray.exe | MAGICDSK.EXE | Magitime.exe | mailbell.exe | MAILCLEANER.EXE | mailinfo.exe | mailman.exe | Mail_Check.exe | main.exe | main16.exe | main32.exe | mainserv.exe | mainsv.exe | mainviewex.exe | maja.exe | makeini32.exe | manage.exe | ManifestEngine.exe | mantispm.exe | mapiicon.exe | mapisvc32.exe | mappc.exe | mapserver.exe | MARCO!.SCR | marspc.exe | masbl.bat | masqform.exe | master.exe | MASTERVOLUMESPY.EXE | matcli.exe | math.exe ...pluged.exe | matrixcam.exe | matrixhere.exe | Matrox.PowerDesk.exe /sil | max.exe | maximizer_startup.exe | MayaPan.Exe | mb.exe | MBM4.exe | MBM5.exe | mbnet.exe | mboxvrfy.exe | mbrpobe.exe | mc-110-12-0000079.exe | mc-58-12-0000080.exe | mc-58-12-0000093.exe | MC.exe | mcafe32.exe | mcafee32.exe | mcafeeAV.exe | McAfeeScanPlus.exe | Mcafeescn.exe | Mcafeeupdate.exe | mcafeshield.exe | Mcaffe2005.exe | mcagent.exe | mcalert.exe | MCamBoot.exe | mcappins.exe | mcc.exe | mcf.exe | MChanger.exe | mcinfo.exe | mcm3.exe | mcmgr32.exe | MCMNHDLR.EXE | MCP****.exe | MCP****.exe (**** = rando | MCP****.exe [**** = rando | mcpdll32.exe | mcpserver.exe | mcregwiz.exe | mcrt32.exe | mcsmss.exe | mcupdate.exe | mcusrt.exe | mcvsrte.exe | MCVSSHLD.EXE | md.exe | MD1.exe | MDDiskProtect.exe | mdm.exe | Mdm.vbs | mdmdll.exe | mdmdll32.exe | mdmdrv.exe | mdmsetpe.exe | mdmsetsp.exe | MDN.exe | MDNS.exe | MDNZ.exe | mds.exe | mdss32.exe | mdwmdmsp.exe | mdxdl.exe | Meca.exe | Media Player.exe | media.exe | media64.exe | MediaAccK.exe | MEDIACTR.EXE | MediaGateway.exe | MediaKey.exe | mediaman.exe | Mediam~1.exe | mediap.exe | MediaPass.exe | MediaPassK.exe | MediaPIayer.exe | mediaplayer.exe | mediaplayer32.exe | media_driver.exe | medload.exe | mella.bat | members-area.exe | memcheck.exe | memmnstr.exe | memoptimizer.exe | memore.exe | MemoryMeter.exe | MemoryWatcher.exe | MEMreaload.exe | MemScanner.exe | memstat.exe | memtuneup.exe | memturbo.exe | MenuSnap.exe | messageblock.exe | messenger.exe | MessengerDiscovery.exe | messengers.exe | MessengerStopper.exe | metalrock-is-gay.exe | metalrock.exe | mexico.exe | mexplore.exe | mfcp30.exe | mfin32.exe | MFindexer.exe | MFindexer.exeMFINDE~1.EXE | MFINDE~1.EXE | MFNTCTL.EXE | Mgabg.exe | mgactrl.exe | mgadiag.exe | Mgahook.exe | mgaqdesk.exe | mgasetup.exe | mgavrtcl.exe | mgavrtcl.exemgavrte.exe | mgavrte.exe | mgmtapi.exe | mgnwin32.exe | mgui.exe | mhdogst.EXE | mhguard.exe | MHINIT.EXE | mhotkey.exe | mhotkey.exeMK9805.EXE | MHPRMIND.EXE | MHPRMINF.EXE | Micr0s0ft.exe | microhost.exe | MicroLog.exe | micront.exe | Microsoft Office.hta | Microsoft Windows.hta | microsoft.exe | Microsoft.exemsawindows.e | microsoft.hta | microsoft420.exe | MicrosoftLog.exe | microsoftmsn32.exe | microsoftsa32.exe | microsoftscanreg.exe | Microsoftx.exe | MIDIDef.exe | millenzje.exe | mimboot.exe | MImpHost.exe | Mincer.exe | MINIBUG.EXE | MINIFERT.EXE | MINILOG.EXE | MiniMavis.exe | MININOTE.EXE | miniport_mp.exe | miranda32.exe | miratesp2.exe | mIRC.dll | mirc.exe | MIRC32.exe | miroupdate.exe | misiCTRL.exe | misitray.exe | Mixer.exe | mixghost.exe | MK.EXE | MK9805.EXE | ml00!.exe | mlfbuddy.exe | MLService.exe | mm15201518.Stub.exe | Mmaker.exe | mmc.exe | mmcndmgr.exe | MMERefresh.exe | Mmext.exe | mmgr32.exe | mmgsvc.exe | mmhid.dll | mmhk.exe | MMHotKey.exe | MMKeybd.exe | mmod.exe | mmp32.exe | mmrtkrnl.exe | mmrun.exe | mms.exe | mmsete.exe | mmsvc32.exe | Mmtask.exe | mmtask.tsk | MMTray.exe | MMTray2K.exe | MMTrayLSI.exe | mmups.exe | mmx.exe | mm_tray.exe | MndlSvr.exe | mnklins.exe | mnmsrvc.exe | mnpol.exe | MNS.exe | mnsvc.exe | mnsvcsp.exe | mntcgf032.exe | MNTP.exe | mnyexpr.exe | mobsync.exe | mobsync32.exe | MODEMBTR.EXE | Modeminf.exe | ModemLockDown.exe | module.exe | module32.exe | moffice.exe | MOH.EXE | mon.exe | MON76234.exe | money express.exe | Money Startup.exe | moneyexpress.exe | moniker.exe | moniter.exe | monitor.exe | monitorbk.exe | Monitormgt.exe | monitr32.exe | Monserv.exe | moon.exe | mope.scr | more comp.exe | More log.exe | morfitwebentrance.exe | morpheus.exe | morphstb.exe | mosearch.exe | MotiveSB.exe | motmon.exe | mouse.exe | mouse32a.exe | mousebut.exe | mousecntl.exe | mousedrv.exe | mouseElf.exe | mousetips.exe | mouseutils.exe | mouse_configurator.win | mousinfo.exe | MovieNetworks.exe | Movieplace.exe | movies.exe | mozilla-text.exe | Mozilla.exe | mp3serch.exe | mp3serch.exelopsearch.exe | mpbtn.exe | mpci.exe | mpf.exe | mpf.exeMpfTray.exe | Mpfsheild.exe | MpfTray.exe | MPGSRV32.EXE | mpisvc.exe | MPL32.exe | Mplayer.exe | MplSetup.exe | mplupdate.exe | mpm.exe | MPower.exe | MPREXE.EXE | MprHTML.exe | mprmmon.exe | mprmsg32.exe | mprocessor.exe | MpsOnn.exe | MPT.exe | mptask.exe | MPTBOX.EXE | mptcloaxs.exe | mptsgsvc.exe | mpwe.exe | mpxptray.exe | MP_S3.exe | mqbkup.exe | Mqguard.exe | mrfshl.exe | mrowyekdc.exe | mrtalk.exe | mrtMngr.exe | MS SPOOL32.EXE | ms****.exe (* = random ch | ms****.exe [* = random ch | ms-dos.pif | ms-its.exe | ms-wks32.exe | ms1.exe | ms32.exe | ms32cfg.exe | ms32sys.exe | MS32x16.exe | Ms64.exe | ms7531.exe | MSA****.TMP | msa.exe | msacm.exe | msacroprots386.exe | msadcheck32.exe | msag.exe | msagent.exe | msams.exe | MSAOL32.exe | msaolim.exe | msapl32.exe | msapp.exe | msapps.exe | MSASP32.exe | msass43.exe | msater.exe | MSAuto32.exe | msawindows.exe | msbb.exe | msblast.exe | MsBootMgr.exe | msc32.exe | mscache.exe | mscache.exeaupd.exe | msccn32.exe | mscedit32.exe | mschost.exe | mscifapp.exe | msclient32.exe | msclock.exe | mscman.exe | mscmd32.exe | mscmgr.exe | mscn.exe | mscnfg.exe | mscnfg32.exe | mscnt.exe | mscolour.exe | mscom32.com | mscom32.exe | mscommand.exe | mscommx.exe | mscon.exe | msconf.exe | msconfg.exe | MSCONFG32.EXE | msconfig.exe | MSCONFIG32.EXE | MSCONFIG35.EXE | MSConfig45.exe | MsConfigs.exe | msconfigsvc.exe | mscpbo.exe | mscpbo.exemsgdmf.exemsong | MSCSGS.EXE | MSCSGS32.EXE | MSCStat.exe | mscsvc.exe | Msctrl32.scr | mscvb32.exe | mscvrt32.exe | MSCVT.exe | msdarkend.exe | msdata.dat | msdata.exe | MSDATLST.exe | msdbg32.exe | msdc.exe | msdc32.exe | MSDcom.exe | MSDEFR.EXE | msdesk32.exe | msdev.exe | msdev32.exe | msdevmgr32.exe | msdiag32.exe | msdm.exe | msdmxm.exe | msdn.exe | msdns.exe | msdocument.exe | msdos.exe | msdos.pif | msdos32.exe | Msdos32.pif | msdos423.exe | msdos98.exe | msdosdrv.exe | msdrce.com | msdriver.exe | msdrv.exe | msdrvdx.exe | msdrvs32.exe | msdspr.exe | msdtc.exe | MSDTCs.exe | msdvc32.exe | msdview32.exe | mseiw.exe | Msemu32.exe | msengine.exe | mservice.exe | mservices.exe | MSev32.exe | msework.exe | msexcel.exe | msexploren.exe | MSEXPORT.exe | Msfenoe.exe | Msfind.exe | msfind32.exe | msfindfile.exe | msfindosa.exe | msfirewalI.exe | msfirewall.exe | msfirewalls.exe | msfr32.exe | MSFramer.exe | msfrewall.exe | msftp.exe | msfw.exe | msfwe1.exe | msg.exe | msg32.exe | msgaol.exe | msgb1.exe | MsgCenterExe | msgcfgsrv.exe | msgdmf.exe | msgex32.exe | msgfix.exe | msgfix1.exe | msgfixed.exe | MSGINAV.EXE | MSGLOGIN.EXE | msgmr.exe | Msgp.exe | MsgPlus.exe | msgplus32.exe | MsgPlusH.dll, VerifyInsta | Msgran.exe | msgrsv32.exe | MSGRT32.EXE | msgs.exe | msgsr32.exe | Msgsrv16.exe | MSGSRV32.EX | msgsrv32.exe | MSGSRV32.EXE MPGSRV32.EXE | MSGSRV320.EXE | msgsvr32.exe | mshelp32.exe | mshms.exe | Mshome.exe | mshost.exe | mshotfix.exe | MSHT@.EXE | Mshta.exe ...filename.hta | mshtm.exe | msHtml.exe | MSHTML32.exe | msi332.exe | msident.exe | msidle.exe | MsIdle32.exe | msie.exe | MSIEXEC.EXE | msiexec16.exe | MSIEXEC32.exe | msifirewall.exe | MSIMN32.EXE | MSin.exe | msinet.exe | msinfo.exe | Msinit.exe | MSInstall61.exe | MsIntSrv.exe | msite18.exe | msiwin84.exe | MSIXEC32.exe | msjarun.exe | msjclh.com | msjvm.exe | MskAgent.exe | MSKDetct.exe | MSKernel32.vbs | mskev.exe | mskj.exe | MSKSrvr.exe | mslagent.exe | mslanmgr.exe | MSLARISSA.pif | mslat.exe | mslaugh.exe | msldr.com | Mslg32.exe | msload.exe | msload32.exe | Msloader32.exe | mslogon.exe | MSLSA32.exe | MSlti16.exe | MSlti32.exe | MSlti64.exe | Msmacroprot32.exe | msmacroprotxz.exe | msmbw.exe | msmc.exe | msmedia32.exe | msmesg32.exe | msmgr.exe | msmgr32.exe | msmgrxp.exe | msmgt.exe | msmm.exe | msmmsgr.exe | msmngr32.exe | MSMNTMTS.EXE | msmnwin.exe | msmon.exe | msmonk32.exe | msmpatch.exe | msmq2inst.exe | msmqs.exe | msmscc2.exe | msmsg32.exe | MSMSGR.exe | msmsgr2.exe | msmsgri32.exe | msmsgri32.exepayload.dat | msmsgrxp.exe | msmsgs.exe | msmsgsrv.exe | MSMSGSVC.exe | msmsgv.exe | MSMSN32.exe | MSMSN7.exe | msmsngr.exe | msmssgs.exe | MSN.exe | msn16.exe | msn32.exe | MSN32x.EXE | msn64.exe | msn8m.exe | msnac32.exe | msnadp32.exe | msnappau.exe | msnarrator.exe | msncheck32.exe | msnconf.exe | msnd32.exe | Msndc.exe | msndp.exe | msndr.exe | msnet.exe | MsNetHelper.exe | MsNews.vbs | msnfilen.exe | msnfixjs.js | msnger.exe | msngf.exe | msngms.exe | msngmsngr32.exe | msngr32.exe | MSNgrabber.exe | msngrblock.exe | MSNGRx.exe | msngs.exe | msngta32.exe | msni.exe | msni32.exe | MSNIASVC.EXE | msnjompa.exe | msnkn.exe | msnl.exe | msnload32.exe | msnmcgrs.exe | msnmegrs.exe | msnmegrse.exe | msnmesengers.exe | msnmesg.exe | msnmessenger.exe | msnmgd32.exe | msnmgr.exe | msnmgr16.exe | msnmgsr.exe | msnmngr.exe | msnmon.exe | msnmrg.exe | msnms.exe | msnmsg.exe | msnmsgesc.exe | msnmsgq.exe | msnmsgr-.exe | msnmsgr.exe | MSNMSGR5.exe | msnmsgr7.exe | msnmsgrr.exe | MsnMsgrs.exe | msnmsgrsc.exe | msnmsgrsrvc.exe | msnmsgs.exe | msnmsgsgs.exe | msnmsgxr.exe | msnmsng.exe | msnmsngr.exe | msnmssgr.exe | msnnm.exe | msnpg.exe | msnplugins.exe | msnplus.exe | msnplus1.exe | msnq3insller.exe | msnqmgr.exe | msnsched2.exe | MSNService.exe | msnsever.exe | msnsgr.exe | msnsgs.exe | msnshed.exe | msnsmgs.exe | msnsngr.exe | MSNSRV32.exe | msnss.exe | msnst32.exe | msnsvc.exe | msnt.exe | msnt32.exe | msnup32.exe | msnupd.exe | msnupdate.exe | msnupdateit.exe | msnupdates.exe | msnv32.exe | msnwinsb.exe | msnwun.exe | msnzx.exe | MSObject32.js | msocfg.exe | Msoffice.exe | msoffice.hta | msoffice2.exe | msoicons.exe | msole32.exe | msongn.exe | MSOOBD.EXE | msorunner.exe | msosa.exe | mspaint.exe | MSPCALL.exe | mspci.exe | mspg32.exe | msping.exe | msplus32.exe | MsPMSPSa.exe | MsPMSPSd.exe | MSPMSPSU.EXE | MsPMSPTv.exe | mspn32.exe | msprc.exe | MSPRCSS32.exe | msprint.exe | msproc.exe | msprocces.exe | MSprotect.exe | msptmf32.com | msqdevl.exe | msr.exe | Msrc.exe | msreg32.exe | msrege.exe | msresearch.exe | MSREXE.EXE | msrf32.exe | MSRMS32.exe | msrpc32.exe | MSRSS.exe | msrund1l32.exe | msrunocx32.exe | mss.exe | mssams.exe | MSSCDLL.exe | MSschost.exe | MSSCKD32.exe | MssCli.exe | mssdnl.com | mssecure.exe | mssecurityupdatepatch.exe | msserv.exe | msserv32.exe | msservice.exe | mssgs.exe | msshed32.exe | MSSHVC.exe | msslut32.exe | mssmgrd.exe | mssmmspgr.exe | mssp22.exe | Mssql.exe | mssql32.exe | mssrv.exe | MSsrvs32.exe | msstart.exe | msstask.exe | MSstat.exe | mssupdate.exe | mssurfer.exe | MSSVC.EXE | mssvc32.exe | mssvol.exe | mssvp.exe | mssvr.exe | mssw32.exe | mssys.exe | mssysfix.exe | Mstapi.exe | MSTAR2.EXE | mstart.exe | mstask.exe | mstask.exemstinit.exe | mstask0.exe | mstask32.exe | mstaskm.exe | MSTasks.exe | MSTAT.exe | mstats.exe | MSTCGWW.EXE | mstinit.exe | MSTMON_Q.exe | MSTng32.exe | Mstosk.exe | Mstray.exe | MSU32.exe | MSuma32.exe | msup32a.exe | msupdat.exe | msupdate.cmd | msupdate.exe | MSupdate32.exe | msupdater.exe | msupdsrv.exe | msupdt.exe | msupdtm.exe | msurl32.exe | msusb32.exe | msuser32.exe | MsVBdll.pif | MSVBVBM60.pif | msvc.exe | msvc32.exe | msvchost.exe | msvcmm32.exe | MSvert32.exe | msveup.exe | msvhost.exe | msvload32.exe | MSVXD.EXE | mswatch32.exe | mswave.exe | mswavedll.exe | mswctl32.exe | mswheel.exe | mswin.exe | mswin32.exe | MSWin32bck.exe | mswinc.exe | Mswincfg32.exe | mswindrv.exe | mswinindex.exe | mswinn16.exe | mswinn32.exe | mswinpid32.exe | mswinrpc.exe | MSWinSrv.exe | MSWinSrv32.exe | MSWkstz.exe | MSWkwrH.exe | mswm32.exe | msword.exe | msword32.exe | mswords.exe | msxct.exe | msxdl.exe | MSXMIDI.EXE | msxml.exe | msxmlx.exe | Msxpw.exe | msyervice.exe | msyj32.exe | msynvr.com | msys.exe | msystem.exe | mszx23.exe | MS_LARISSA.exe | MS_SETUP.EXE | mtask.vbe | mtfs.exe | mtr2.exe | mtsoemon.exe | mtx.exe | mual.exe | muamger.exe | Muamgr.exe | muamgrd.exe | mufix.exe | MultiRes.exe | mum.exe | Mupdate.exe | MUPS.exe | Music01 Server.exe | musirc4.71.exe | MV2.exe | mvsc.exe | mvsecn.exe | MW1HEL~1.EXE | mwavscan.com | mwcpyrt.exe | mwd.exe | mwincfg32.exe | mwindll.exe | mwoffice.exe | MWProEng.exe | MWSnap.exe | mwsoemon.exe | mwsvm.exe | mwupdate32.exe | MxHLp32.exe | MXOaldr.exe | mxpsp.exe | MxRunner.exe | mxt32.exe | mxtask.exe | myagtsvc.exe | MyAgtTry.exe | MYCOME~1.EXE | MyDailyHoroscope.exe | MYDAIL~1.EXE | myfastupdate.exe | MyGame.exe | MyTekSystray.exe | MyVirt.exe
(E6)(L?) http://www.tasklist.org/tasklist_n.html
N: N/A | N0D32KRN.EXE | n20050308.exe | n3monap23.exe | n3vasap23.exe | n?lookup.exe | n?pdb.exe | n?tdde.exe | n?tepad.exe | nabv32.exe | nad.exe | NADAEMON.EXE | NAG.EXE | nagger.exe | naimag32.exe | Naldesk.exe | NAP32.exe | NAS.exe | Natal!.pif | Natal.scr | NAV.exe | nava.exe | NavAgent32.exe | navapp.exe | navapq32.exe | navapqwa.exe | navapvc.exe | navapw32.exe | Navautoupdate.exe | NAVBROWSER.EXE | navchk.exe | Navcpe.exe | navguard.exe | naviscope.exe | navmgrd.exe | navp.exe | NavPass.exe | navpmc.exe | navprot1.exe | navprotect.exe | navpxaw32.exe | NAVSCAN32.EXE | NAVSCANNER32.EXE | NAVSVC.EXE | navsw.exe | NAVsys32.exe | navupdate64.exe | navupdaters.exe | navupdaterx.exe | navupdtr.exe | navwindows.exe | NAV_Update.exe | nawadll32.exe | nawdll32.exe | nb32ext2.exe | nb32ext3.exe | NBJ.exe | NbkCtrl.exe | nbm.exe | nbthlp.exe | ncd.exe | NCDialer.exe | NCLAUNCH.Exe | NclConf.exe | NClienti386.exe | NclTray.exe | ncoeenv.exe | ncsvc32.exe | Nctrup.exe | Ndd32.exe | NDDEAGNT.EXE | NDetect.exe | NDetect.exeicq.exeICQNet. | ndis.exe | ndrives32.exe | NDrv.exe | NDSTray.exe | nec.exe | Necbar.exe | necmfk.exe | Necutray.exe | neo.exe | neqprvfy.exe | NeroASM.exe | NeroCheck.exe | NeroLoader.exe | nerx.exe | nese.exe | NeT-BoT.exe | Net2fone.exe | NetAccel.exe | NetAccelerator.exe | NETADM7.EXE | Netapi.exe | netapi32.exe | netchk.exe | netcog.exe | netconfig.exe | NetConfs.exe | Netd32.exe | netda.exe | netdaemon /v | netdd.exe | netdet.exe | NetDevSW.exe | netdll32.exe | netdllex.Exe | NETFP32.EXE | netfxupdate.exe | NetGuard.exe | netherlands.exe | Netisp32.vbs | Netlimiter.exe | netlink32.exe | NETMAIL.EXE | NetMeeting.exe | NetMeter.exe | netmon.exe | Netmonw.exe | netmsg.exe | netpc32.exe | NetPerSec.exe | NetPumperIEProxy.exe | netreg.exe | Netropa.exe | NetRun.exe | NETSCAPE.EXE | Netscp6.exe | Netscp6.exeMozilla.exe | netsender.exe | NETSERV.EXE | Netsis.exe | netstat.exe | netstun.exe | Netsurf.exe | netsv32.exe | netsvc.exe | netsvcs.exe | netsvr.exe | netsync.exe | NETTIME.EXE | netturbo.exe | netwatch.exe | NetworkClient.exe | NetworkDriver32.exe | NetworkDrivers.exe | Networksystem.exe | NetXP.exe | NeuroMedia.exe | new zealand.exe | new32.exe | newbreed.exe | newdll.exe | newdll2.exe | newpop63.exe | NEWSALRT.EXE | newsd32.exe | Newsflsh.exe | newsgroup.exe | newsupd.exe | NewtKnow.exe ...NewtnUpd. | ngctw32.exe | ngpw36.exe | ngserver.exe | nibie.exe | niIPCApp.exe | nikLaus.exe | NILaunch.exe | ninfoie.exe | NInit.exe | NISSERV.EXE | NISUM.EXE | niSvcLoc.exe | niteaim.exe | NJG40.EXE | Njgal.exe | nksvc32.exe | NkvMon.exe | NkVwMon.exe | nls.exe | nmdllw.exe | nmmst.exe | nmod.exe | nmon.exe | NMSSVC.EXE | nmstt.exe | nmSvc.exe | nMtsk.exe | nnloader.exe | nnmgr.exe | nnqcouu.exe | NNServiceCtrl.exe | nnsvc.exe | NoAds.exe | NoAdware.exe | NoAdware3.exe | nod32cc.exe | Nod32krn.exe | nod32kui.exe | Nodemngr.exe | NoeWinnt.exe | nomdchek.exe | nomtray.exe | NopeZ.exe | norte.exe | norten.exe | Norton Internet Security. | Norton Update.exe | Norton2005Update.exe | norton32.exe | nortonguard.exe | NortonScn.exe | NortonUpdate.exe | norton_antivirus.exe | nost_LM.exe | notepaad.exe | notepad.exe | notepad32.exe | notPad.exe | nousb20.exe | npdor.exe | NPDOR9x.exe | NPFMntor.exe | NPFMONTR.exe | npfw.exe | npfw32.exe | npnzdad.exe | npprotect.exe | nprotect.exe | npscheck.exe | NPSsvc.exe | NPSU.exe | nrcheck.exe | nrchk.exe | nrpr.exe | nrpr.exeprmt.exe | ns.exe | NSCHECK.EXE | nsched32.exe | nsched32.exeNPSsvc.exe | nscntrl.exe | NsCplTray.exe | nsdcmdav.exe | nsdcmdwin.exe | nsdlua.exe | nse.exe | Nsengine.exe | Nsl.exe | NSPPTHLP.EXE | nsrvnt.exe | nsserver.exe | NSSERVICE.EXE | nssys32.exe | nstask32.exe | nstask32.exewinlogin.exe | nstrue.exe | NSupdate.exe | nsvdr.exe | nsvsvc.exe | nsys.exe | nsys32.exe | NSYSCPLSTR.exe | ntbstats.exe | ntce.exe | NTCmd.exe | ntcpl.exe | ntddetect.exe | NTdhcp.exe | ntdll.exe | ntfs16.exe | ntfs64.exe | NTFSCLUP.EXE | ntgina.dll | ntguard32.exe | nthost.exe | NtKernelSystem.exe | ntkrnl.exe | ntkrnlpt.exe | ntldr.exe | ntldrt.exe | ntlogin32.exe | ntnut32.exe | NTOKSRNL.EXE | NTOSA32.exe | ntosrkl.exe | ntrayfw.exe | Ntrdlhost.exe | ntrrs.exe | ntrtc.exe | nts.exe | NtsAgnt.exe | ntsmod.exe | ntspcv.exe | NTsrv.exe | ntss.exe | ntssf.exe | ntsubsys.exe | ntsvc.exe | ntsys32.exe | ntsysman.exe | ntsysmgr.exe | nTune.exe | ntupd32.exe | Ntut.exe | NTVDM.EXE | ntvdmd.exe | ntvdmn.exe | ntvdscm.exe | ntvsvcd.exe | ntxdll.exe | NukeSpan.exe | nvagNT.exe | NVATray.exe | NVCOM.exe | NvCpl.EXE | nvcsv32.exe | nvcva.exe | nvcvc.exe | nvd32.exe | nvdisp.exe | nvhost.exe | Nvid32.exe | Nvidex32.exe | nvidll32.exe | nviload32.exe | nvirundll.exe | nvjxue.exe | NVmax.exe | NVMixerTray.exe | nvp2pmon.exe | nvraidservice.exe | nvrt.exe | NVRTClk.exe | nvsc32.exe | nvscv32.exe | nvsv32.exe | nvsv33.exe | nvsvc.exe | nvsvca32.exe | NVSystemUtility.exe | nvsysvc32.exe | nwant33.exe | nwclient.exe | nwiz.exe | nwiz32.exe | Nwpopup.exe | nwrecmsg.exe | nwtray.exe | Nxcao.exe | nxcxtpr.exe | nzfprop.exe
(E6)(L?) http://www.tasklist.org/tasklist_o.html
O: O2KCHECK.EXE | oadaemon.exe | oahstifr.exe | OAKSTART.EXE | OAKTASK.EXE | objtjprx.exe | obsver.exe | OCAudioIni.exe | ocbtray.exe | ocraware.exe | OCTray32.exe | ocx32.exe | ocxdll.exe | ocxupdt32.exe | od-matrxx.exe | od-stndxx.exe | od-teenxx.exe | ODBC32*.exe (* = random c | oddworldz.exe | odjiwjf.exe | Odometer.EXE | ODSPConfig.exe | Oeloader.exe | OEMonitor.exe | oemreset.exe | oemrun.exe | OESpamTest.exe | offers.exe | Office.exe... | officeXP.exe | ogrc.exe | ohttpd.exe | oim.exe | ole32.exe | ole32aut.vbe | oleaccrc.exe | olecom32.exe | olehelp.exe | olesvr.exe | OLFSNT40.EXE | OMF4.EXE | omgstartup.exe | omniscient.exe | oneeyetideone.exe | ONENOTEM.EXE | OneTouch.exe | OneTouchMon.exe | OneTouchMonitor.exe | OneTouchMonitor.exe1tou~2 | ONETOU~2.EXE | onflow.exe | ONICTASK.EXE | onlinetime.exe | online_party.exe | OnSrvr.exe | oocs.exe | OODLed.exe | OOLHELPT.exe | Open32.exe | OpenGL.exe | opensite.exe | openstre.exe | opiater.exe | OPISTAT.EXE | opnste.exe | opsql.exe | optimize.exe | OptusNet Usage Meter.exe | Opware12.exe | Opware14.exe | Opware32.exe | OpwareSE2.exe | org5.exe | OrgyCam.exe | Osa.exe | Osa.exeOsa9.exe | OSA9.exe | OSD.EXE | OSDCtrl.exe | OSDEx.exe | osoa.exe | osrwin32.exe | osserver.exe | OSSPROXY.EXE | ostivity.exe | otcxxh.exe | outIook.exe | outlook.exe | outlookexpressupdate.exe | outlookrem.exe | outpost.exe | outpostupdate.exe | ovcj.exe | OverClk.exe | Overnet.exe | OWMngr.exe | oz11111.exe | oz2.exe
(E6)(L?) http://www.tasklist.org/tasklist_p.html
P: P2P | P2P Networking.exe | P2P Networking.exep2pauto | P2P Networking2.exe | P2P Networking3.exe | p2pnetwork.exe | p2pnetworking.exe | p3.exe | P3p4chk.exe | p4mx4.exe | p6.exe | pacis.exe | PadExe.exe | PAgent.exe | PAGOO.EXE | paint.exe | paintingroom.exe | paintms.exe | Palm.exe | PALNETAW~1.EXE | pamela.exe | PandaAVEngine.exe | panel_its.exe | papihost.exe | ParisM.exe | PartSeal.exe | Passcfg16.exe | PasSrv.exe | PasswdMon.exe | patch.exe | patch31345.exe | pathname.exe | PAV.EXE | pavdr.exe | PavFires.exe | PavFnSvr.exe | pavmail.exe | PavProt.exe | PavPrS9x.exe | pavsched.exe | payload.dat | paytime.exe | pbagent.exe | PC.EXE | pc32.exe | pcaccel.exe | pcamgt.exe | PCBODYGUARD.EXE | pcbooster.exe | PCCClient.exe | pccguide.exe | PCCIOMON.EXE | PCClient.exe | pccntmon.exe | PccPfw.exe | Pcctlcom.exe | pccwin97.exe | pcfix2k.exe | PCHbutton.exe | pchschd.exe | pcimodem.exe | PCLETray.exe | Pcm25.exe | pcmm.exe | PCMService.exe | pcqmqgn.exe | PCRecSA.exe | pcsvc.exe | PcSync.exe | pctptt.exe | pctspk.exe | pctvoice.exe | pcwatch.exe | pcx.exe | PD.exe | pd14.exe | pd7.exe | pdascan.exe | PDDLGHLP.EXE | PDEngine.exe | PDesk.exe | PDEXPLO.EXE | pdfSaver3.exe | PDirect.exe | PDMonitor.exe | pds.exe | PDSched.exe | PDVDServ.exe | PeerGuardian_1.99b_pr14.e | pelmiced.exe | PENGSS.EXE | penis32.exe | Pent@VALUE.exe | PEQBL100.exe | per.exe | perl.exe | perl.exewperl.exe | PersFw.exe | PestPatrolCL.exe | pezdow1.exe | PezDownload.exe | pfppop70.exe | PFWCFG~1.EXE | pg2.exe | pgaccount.exe | PgMonitr.exe | pgpsdkserv.exe | pgpservice.exe | pgptray.exe | pgtaff.exe | PH32.EXE | PhoneAnswer.exe | PHONEF??.EXE | phqg.EXE | phqgh.exe | phqghu.exe | phqghum.exe | phqghume.exe | ph_finder.exe | PicasaMediaDetector.exe | pickatag.exe | PICPRTR.EXE | picsvr.exe | pidchk32.exe | PIDLex.exe | PIDUNHK.EXE | pilif.exe | pingchek.exe | pinger.exe | pingppac.exe | piolet.exe | PipeCmd.exe | pit.exe | Pixel32.exe | Pixelpwr32.exe | Pixelsvr.exe | pizda.exe | pjWebCam.exe | pkguard32.exe | pkjobs.exe | pksvc.exe | Pktopass.exe | Plauto.exe | PLBkMon.exe | pleapu.exe | Plguni.exe | plister.exe | plmg.exe | PLNRnote.exe | plook.exe | PluckTray.exe | plugin-(random).exe | plugin-random.exe | plugin-[random].exe | plugin.exe | plugin1.exe | plugin2.exe | PLXSTART.EXE | PLXTASK.EXE | pm32info.exe | PmProxy.exe | pmr.exe | pmremind.exe | pmtshoot.exe | Pmxdetect.exe | pmxinit.exe | PNAgent.exe | pnetaware.exe | Pnpchk.exe | pnpsrv.exe | PNSetup.exe | pntask.exe | PocketCompanion.exe | Poet.exe | point32.exe | points manager.exe | pokapoka61.exe | pokapoka62.exe | pokapoka63.exe | poker.exe | poker3.exe | pollone.exe | pool32.exe | Pop3scan.exe | pop3trap.exe | popcorn.exe internat.dll, | popcorn64.exe | popcorn64.exe rundll.dll, | popcorn72.exe rundll.dll, | PopeSvr.exe | PopFilter.exe | popkill.exe | PopNot.exe | PopOops.exe | popopen.exe | POPROXY.EXE | PopSrv***.exe | popsrv146.exe | PopSub.exe | Popup Eliminator.exe | Popup.exe | PopUpBlocker.exe | PopUpBlocker611.exe | PopUpBlocker6a.exe | PopUpBlocker8.exe | popuper.exe | PopUpKiller.exe | popups burner.exe | Popupscn.exe | PopupSmasher.exe | Popupstopper.exe | PopUpStopperProfessional. | PopupVanish.exe | PopUpWasher.exe | PopUpWatch.exe | PortAOL.exe | PORTCT95.EXE | postinstallm.exe | pow.exe | Powerbar.exe | powerdll.exe | PowerDVD.exe | Powerkey.exe | powerpro.exe | PowerProf.exe | PowerReg Scheduler.exe | PowerReg SchedulerV2.exe | PowerReg SchedulerV3.exe | POWERR~1.exe | PowerS.exe | powerscan.exe | powerstrip.exe | powerstrip.exePSTRIP.EXE | POWPANEL.EXE | PPActiveDetection.exe | PPControl.exe | ppe.exe | pphidpad.exe | PPInupdt.exe | ppmemcheck.exe | PPPGate.exe | pprotray.exe | pprsen.exe | ppstub.exe | PPTbc.exe | pptd40nt.exe | ppupdater.exe | PPVstop.exe | PPWebCap.exe | pqhelper.exe | PQINIT.EXE | PQTRAY.EXE | PrcIdle.exe | prcmon.exe | prcview.exe | prdtect.exe | PrdUsb.exe | PreAnntt.exe | PrecisionTime.exe | Preliminary.exe | Preload.exe | Premend.exe | PresRdy.exe | PrevAdServ.exe | prgsys0984.exe | prgtect.exe | Pribi.exe | Primsta.exe | printkey2000.exe | printnow.exe | printray.exe | PrintScreen.exe | PRISMSTA.EXE | PrivacyEraser.exe | PrivacyKeyboard.exe | private-zone.exe | privoxy.exe | prizesurfer.exe | prjtect.exe | Prkill.exe | prktect.exe | prltect.exe | prmt.exe | prmtect.exe | Prmvr.exe | Prmvr.exeystckAO32.exe | PrnSys.exe | ProArt.exe | procdll.exe | PROCES.EXE | process.exe | processgovernor.exe | ProcessSupervisor.exe | procguard.exe | procmon.exe | procmsg.exe | procrun.exe | Prodload.exe | ProDsl.exe | prof.exe | Profile.vbs | Profiler.exe | progmen.exe | Progmon.exe | projselector.exe | promon.exe | PRONoMgr.exe | PropelAC.exe | ProPort.exe | prositefinder.exe | Protection.exe | ProvenTactics.exe | prowind32.exe | PROXOMITRON.EXE | PROXOM~1.EXE | PROXOM~1.EXEPROXOMITRON.E | proxy.exe | proxyway.exe | Proyecto1.exe | Proyecto1.exeRoot.exe | PRPCUI.exe | prq8.exe | prrtect.exe | prstect.exe | PRT95MIN.EXE | prtcct.exe | prtStart.exe Orgprt.exe | prttect.exe | prutcct.exe | prutdct.exe | prutgct.exe | pruthct.exe | prutict.exe | prutlct.exe | prutpct.exe | prutsct.exe | prvdi.exe | prvtect.exe | prxtect.exe | ps1.exe | ps2.exe | psaload32.exe | pscan.exe | PSComp.exe | Psconsv.exe | psdeluxe.exe | PSDrvCheck.exe | PSearch.exe | psecure.exe | PService.exe | psexec.bat | PSFREE.EXE | PSGuard.exe | pshwr.exe | PSIMSVC.exe | PsMFCard.exe | Psnotes.exe | psnotify.exe | PSof1.exe | psoft1.exe | PsPCCard.EXE | pspcontr.exe | PsSound.exe | pssvc.exe | pstcp32.exe | PSTORES.EXE | PSTRIP.EXE | PSXLTRAY.EXE | PT2.EXE | ptask.exe | PTCTRL.EXE | ptfb.exe | ptlseq.cpl | ptmedsrv.exe | PTOAD.exe | ptr32w.exe | ptrun32.exe | pts.exe | Ptsnoop.exe | pttray.exe | pttrun.exe | PtUDFApp.exe | PTW.EXE | PULL.EXE | pulogin.exe | pupdate.exe | pupstman.exe | pupxpman.exe | PUPXPTWK.EXE | Purga.exe | PURGATIVE100.EXE | PUSH6599.EXE | PutA!!.com | PutA!!.exe | PV92Tray.exe | PVR.exe | PVUnInst1.exe | PWATCH.EXE | pwr32crtl.exe | Pwr32ctr.exe | Pwr32ctrl.exe | Pwr32mgt.exe | Pwrchute.exe | Pwroff.exe | Pwrsave.exe | PwsTray.exe | pxckdla.exe | PYSKY.NET.exe | p_981116.exe
(E6)(L?) http://www.tasklist.org/tasklist_q.html
Q: qagent.exe | qappsrvc32.exe | QBDAGENT.EXE | qbrowse.exe | qbupdate.exe | Qchex.exe | Qctray.exe | Qcwlicon.exe | QDCSFS.exe | QdmStart.exe | Qexplo.exe | QFSCHD100.exe | QFSCHD100.exeQFSched.exe | QFSched.exe | QHM32.EXE | QHSTRT32.EXE | qkshield.exe | QL.EXE | QMAgent.exe | qnetquestnotifty.exe | QNPlus.exe | Qoeloader.exe | QQ.exe | QS.exe | qsecue.exe | Qsemsg.exe | qservice.exe | QSHLFED.EXE | QSORT.EXE | qssstiej.exe | qtask.exe | qtp.exe | qtsks.exe | Qtstub.exe | Qttask.exe | qttasks.exe | QtZgAcer.EXE | QtZpAcer.exe | qualityx.exe | qualityz.exe | Queensla.exe | Quick95.exe | QuickBrowser.exe | QuickCamPro.exe | QuickDCF.exe | quicken.exe | quicken.exeWaol.exeWinrar | QuickLaunchEr.Exe | quicklnk.exe | quicknote.exe | QUICKRES.EXE | quickset.exe | quickstart.exe | Quicksync.exe | QUICKS~1.EXE | QUICKTIMEMNGR.EXE | quicktimeupdatehelper.exe | QuickTV.exe | QUIKSYNC.EXE | qumk.exe | qushelfxx.exe | QVP32.EXE | QWDLLS.EXE | qwe.exe | qwerty.exe
(E6)(L?) http://www.tasklist.org/tasklist_r.html
R: r00t.exe | r3grun.exe | R3proxy.exe | r?gedit.exe | r?gsvr32.exe | r?ndll.exe | r?ndll32.exe | ra32.exe | rabbit.exe | RaboSessionMon.exe | rabseuser.exe | RadarSync.exe | RadBoot.exe | RadioSvr.EXE | ragui.exe | Rainlendar.exe | raloded.exe | RAMASST.exe | ramdef.exe | ramidle.exe | RAMpage.exe | ramsys.exe | rant.exe | RAPAPP.EXE | RasMan.exe | rasmngr.exe | RAUAgent.exe | RAVEN_VLZS.EXE | RavMon.exe | RAVMOND.exe | ravsecs.exe | ravsesur.exe | ravseuper.exe | RavTimer.exe | ravtray8.exe | rav_temp.exe | ray.exe | ray.exeTray.exe | rb.exe | rb32.exe | rbenh.exe | rbot32.exe | RBSKQQBO.EXE | Rc.exe | Rcapi.exe | rcea.exe | rcenterrll.exe | rcf.exe | rchost.exe | RcMan.exe | rcron.exe | RCSCHED.EXE | RCSync.exe | RDCLIENT.EXE | read.pif | reader_sl.exe | READER~1.EXE | readme.exe | Reaiplay.exe | Real-Tens.exe | real.exe | RealAudio.exe | realmon.exe | RealOneMessageCenter.exe | RealPlay.exe | RealPlyr.exe | Realpopup.exe | realsched.exe | realtime.exe | RealTimeUpdate.exe | realupd.exe | RebateNation0.exe | Reboot.exe | rebootsys.exe | Recalculate.exe | recall.exe | recguard.exe | Rechnung.pdf.exe | reclip.exe | recover.exe | RecoverFromReboot.exe | RECOVE~1.EXE | recruit.exe | RecSche.exe | recycler.exe | redflag.exe | redirect*.exe | reek32.exe | referee.exe | Refresh.exe | reg.exe | Reg.hta | reg32.exe | reg33.exe | REGCNT09.exe | RegCon.exe | REGCPM32.EXE | REGCXDINAF.EXE | Regcxn.exe | regdefend.exe | regedit -s ..win.dll | regedit -s spp.reg | regedit -s system.dll | regedit ..tour.reg | regedit /s (path) tour.re | regedit /s c:hpdjregfix.r | regedit /s c:\hpdjregfix. | regedit /s sys.reg | regedit /s [path] tour.re | regedit-s .... sp.dll | regedit.exe | Regedit.exe -s (path) pcs | REGEDIT.EXE -s (path) sys | regedit.exe -s c:ie.reg | regedit.exe -s c:sys.reg | regedit.exe -s c:\ie.reg | Regedit.exe -s [path] pcs | REGEDIT.EXE -s [path] sys | Regedit.exe ....data789.t | regedit.exe /s windirc:(m | regedit.exe /s windirc:mo | regedit.exe /s windirc:[m | regedit.exe /s windirc:\m | Regedit.exe /s ...PowerSe | regedit.exe /s ...rad03FA | regedit.exe setupuser.log | regeditnt.exe | regeditt.exe | regexpress.exe | regfreeze.exe | reginfo32.exe | regintmon.exe | register.exe | registr32.exe | Registry.exe | registry.pif | RegistryController.exe | RegistryManage.exe | RegistryReminder.exe | REGIST~1.EXE | regload16.exe | regloadr.exe | RegMech.exe | REGPROP.EXE WMPADDIN.DLL | REGPROP.EXEWMPADDIN.DLL | Regprot.exe | REGPTMENS.EXE | regscan32.exe | regscanr.exe | regservices.exe | regshave.exe | regsrv.exe | Regsrv32.com | regsrv32.exe | regsrvc.exe | regsv.exe | regsvc32.exe | regsvr.exe | regsvr32 (path) kdp****.d | regsvr32 (path) PDF****.d | regsvr32 (path) sfg****.d | regsvr32 (path) sfgupd.dl | regsvr32 /s (path) pdf*** | regsvr32 /s (path) sfg_** | regsvr32 /s mqrt.dll | regsvr32 /s [path] pdf*** | regsvr32 /s [path] pdf*** | regsvr32 /s [path] sfg_** | regsvr32 /u /s image.dll | regsvr32 veev****.dll | regsvr32 veev****.dll (** | regsvr32 veev****.dll [** | regsvr32 [path] kdp****.d | regsvr32 [path] kdp****.d | regsvr32 [path] PDF****.d | regsvr32 [path] sfg****.d | regsvr32 [path] sfg****.d | regsvr32 [path] sfgupd.dl | RegSvr32.exe | regsvr32.exe (path) kvern | regsvr32.exe (path) vernn | regsvr32.exe ....HREF.OCX | regsvr32.exe ..csseqchk.d | regsvr32.exe ctasio.dll | regsvr32.exe [path] kvern | regsvr32.exe [path] vernn | regsvs.exe | regsync.exe | Regsysw.com | RegTool.exe | RegTwk.exe | REGVER.EXE | relaunch.exe | reload.exe | reload.vbs | Remhelp.exe | remin.exe | Remind32.exe | reminder.exe | RemindMe.exe | Remind_XP.exe | remote master.exe | RemoteAgent.exe | remotehost.pif | Removecpl.exe | Removed.exe | Removeme.exe | Remove_spyware.exe | remstart.exe | Remupd.exe | Reosmsngr.exe | RePEAtLD.exe | RepliGoMon.exe | requester.*.exe | requester.5.exe | requester.6.exe | requester.8.exe | REREG (path) Incinerator | REREG: [path] Incinerator | Rest In Peace | restory.exe | restun.exe | resumefix.exe | RESWIN.EXE | retime.exe | retrieverscheduler.exe | RevoTask.exe | rexsymon.exe | rfagent.exe | rfkampig.exe | RFTRay.exe | Rfw.exe | rfwydg.exe | RH.DLL | rh32.exe | RhinoBlocker.exe | ribiva.exe | richup.exe | rIOPHosIs.vBS | RivaTuner.exe | rk.exe | Rlid.exe | rlvknlg.exe | rmctrl.exe | RmRemote.exe | Rnaap.exe | rnaapp.exe | rnathchk.exe | rncr.exe | rnd32.exe | rndll2.exe | rnxqh.exe | RoboFormWatcher.exe | RoboTaskBarIcon.exe | RocketTime.exe | Root.exe | roses.exe | ROUTD.exe | RoxAssist.exe | rp32.exe | rpc.exe | rpcda.exe | rpclient.exe | rpcmon.exe | rpcss.exe | RPCX1sQ3.exe | rpcxcmod.exe | rpcxctx.exe | rpcxmn32.exe | rpcxsocsa.exe | rpcxuisu.exe | rpcxWindows.exe | rpcxwinex.exe | rpcxwinupdt.exe | rpen.exe | RRAM.exe | rrmedic.exe | rrpcsb.exe | rrup.exe | rscmpt.exe | RSEDNClient.exe | rservers.exe | rsMenu.exe | rsrcmtr.exe | RSRCMTZ.exe | RsrVga32.exe | rsvc32.exe | rtcdll.exe | rtkmsg.exe | RtlFindVal.exe | RtlMon.exe | RTMonitor.exe | rtos.exe | RTVSCN95.EXE | ru.exe | Rubicon.exe | Ruby13.exe | Ruby14.exe | RuLaunch.exe | run dll.exe | run.exe | run322.exe | run32dll.exe | runAP.exe | Runapp32.exe | Rund1.exe | rund1132.exe | Rund1132.exe qq.dll, Rund | runddls.exe | rundIl32.exe | rundl.exe | rundl132 kenel.dll, Power | rundl32.exe | rundle2.exe | rundli32.exe | RunDLL deskcp16.dll, QUIC | rundll dnes.dll, DnDneChe | rundll dnes.dll, DnDneChe | rundll.exe | rundll.exe - ZIBMACC.INF | Rundll.exe powerprof.dll | rundll.exe setupx.dll, In | rundll.exe setupx.dll, In | rundll.exe ZIBMACC.INF | RunDll16.exe | rundll24.exe | RunDll32 | rundll32 (Path to Trojan | rundll32 (path) DATADX.DL | rundll32 (path) LXBTtime. | rundll32 (path) RyDial.dl | rundll32 (path) sbuddy.dl | rundll32 (path) webspec.d | rundll32 (path), NewDotNe | rundll32 ...gvagfxj.dll | rundll32 ..drvupd.inf | rundll32 amecsa.cpl, RUN_ | RunDll32 AudCtrl.dll, RCM | RUNDLL32 AUNPS2.DLL, _Run | RUNDLL32 AUNPS2.DLL,_Run@ | Rundll32 AXFILTER.DLL, Ru | Rundll32 cmicnfg.cpl, CMI | rundll32 cnbabe.dll, dlls | RunDll32 cwaprops.cpl, C2 | rundll32 cwcprops.cpl | rundll32 gspndll.dll, pos | rundll32 hercplgs.cpl, Bo | rundll32 image.dll, Insta | RunDll32 InstZ82.dll, Set | rundll32 internat.dll, Lo | rundll32 kctl32.dll, init | Rundll32 LoadDll, LoadExe | rundll32 nvclock.dll, fnN | Rundll32 P17.dll, P17Help | Rundll32 PwrMonit.dll | Rundll32 PWRMONIT.DLL, St | rundll32 RSSToolbar.dll, | RunDll32 sbusbdll.dll, RC | rundll32 setupapi, Instal | rundll32 setupapi, Instal | rundll32 srclient.dll, Cr | rundll32 [path] LXBTtime. | rundll32 [path] RyDial.dl | rundll32 [path] sbuddy.dl | rundll32 [path] webspec.d | rundll32 [path], NewDotNe | rundll32.com | Rundll32.exe | rundll32.exe (path) BatIn | RunDLL32.EXE (path) cfgmg | RunDLL32.EXE (path) cfgmg | rundll32.exe (path) cpu.d | rundll32.exe (path) he3bb | rundll32.exe (path) he3e3 | rundll32.exe (path) icdd7 | rundll32.exe (path) icdde | rundll32.exe (path) iel2c | rundll32.exe (path) ielca | rundll32.exe (path) kw3ee | rundll32.exe (path) li01f | rundll32.exe (path) MMFS. | rundll32.exe (path) readd | rundll32.exe (path) si91e | rundll32.exe (path) SIPSP | rundll32.exe (path) stlb2 | rundll32.exe (path) tbext | rundll32.exe (path) tbGam | rundll32.exe (path) wm41a | rundll32.exe (path) wmcba | rundll32.exe (random file | RUNDLL32.EXE (random valu | RUNDLL32.EXE (random.dll) | rundll32.exe ...Bridge.dl | RUNDLL32.EXE ...NVMCTRAY. | rundll32.exe ..lhttseng.i | rundll32.exe 3DBBps.dll, | RUNDLL32.EXE random value | rundll32.exe advpack.dll, | rundll32.exe bcmhal9x.dll | Rundll32.exe BDSrHook.dll | Rundll32.exe beem.dll, Dl | rundll32.exe bridge.dll, | Rundll32.exe bs3.dll, Dll | RunDLL32.EXE bsx5.dll | RunDLL32.EXE bxxs5.dll, d | RUNDLL32.exe cdaEngine040 | rundll32.exe chkreg.dll, | Rundll32.exe CNSMIN.DLL, | rundll32.exe CrazyTalk.dl | rundll32.exe ctrlpan.dll, | rundll32.exe DeadAIM.ocm, | rundll32.exe EGCOMLIB_*** | rundll32.exe EGCOMSERVICE | rundll32.exe EGDACCESS_** | rundll32.exe EGDHTML_1023 | rundll32.exe eg_auth_**** | rundll32.exe Icsdclt.dll, | rundll32.exe inetp60.dll, | RunDLL32.exe irprops.cpl, | rundll32.exe migrate.dll, | rundll32.exe msa32chk.dll | rundll32.exe MSA64CHK.dll | rundll32.exe msconfd.dll, | rundll32.exe MSDServ.dll, | rundll32.exe mshtmpre.dll | rundll32.exe MSIEFR40.DLL | RUNDLL32.EXE MSSIGN30.DLL | rundll32.exe navupd.dll, | rundll32.exe NewDotNetSta | rundll32.exe npvpg005.dll | rundll32.exe NvCpl.dll, N | rundll32.exe nview.dll, n | RunDLL32.exe NvMCTray.dll | RUNDLL32.EXE NvQtwk, NvCp | rundll32.exe NvQtwk.dll, | rundll32.exe NvQtwk.dll, | rundll32.exe NvQtwk.dll, | rundll32.exe NvQtwk.dll, | Rundll32.exe OFUSBS.DLL, | RunDLL32.EXE oo4.dll, Dll | rundll32.exe p2esocks_*** | rundll32.exe powerprof.dl | Rundll32.exe powrprof.dll | Rundll32.exe ptipbm.dll, | rundll32.exe ptipbmf.dll, | rundll32.exe QaBar.dll, F | RUNDLL32.EXE reg.dll, ond | RUNDLL32.EXE reg678.dll o | rundll32.exe RUSBHOLoader | rundll32.exe sasync.dll, | Rundll32.exe SECURE32.CPL | rundll32.exe shell32.dll, | Rundll32.exe SiSPower.dll | Rundll32.exe snim.dll, Dl | rundll32.exe sre.dll, Reg | RUNDLL32.EXE sti_ci.dll, | rundll32.exe stlbdist.dll | rundll32.exe stlbupdt.DLL | rundll32.exe stmctrl.dll, | rundll32.exe streamci, St | Rundll32.exe SysDll32.dll | rundll32.exe UCMTSAIE.dll | Rundll32.exe v128iitw.dll | rundll32.exe w3knet.dll, | Rundll32.exe Wf2kcpl.dll | Rundll32.exe Wf2kcpl.dll, | Rundll32.exe wfcpl.dll, D | rundll32.exe wftask.dll, | rundll32.exe wh95.dll, Ha | rundll32.exe [path] BatIn | RunDLL32.EXE [path] cfgmg | RunDLL32.EXE [path] cfgmg | rundll32.exe [path] cpu.d | rundll32.exe [path] he3bb | rundll32.exe [path] he3e3 | rundll32.exe [path] icdd7 | rundll32.exe [path] icdde | rundll32.exe [path] iel2c | rundll32.exe [path] ielca | rundll32.exe [path] kw3ee | rundll32.exe [path] li01f | rundll32.exe [path] MMFS. | rundll32.exe [path] readd | rundll32.exe [path] si91e | rundll32.exe [path] SIPSP | rundll32.exe [path] stlb2 | rundll32.exe [path] tbext | rundll32.exe [path] tbGam | rundll32.exe [path] wm41a | rundll32.exe [path] wmcba | RUNDLL32.EXE [random valu | RUNDLL32.EXE [random.dll] | rundll32.vbe | rundll32exe stlbdist.DLL, | rundllc32b.exe | Rundlll.exe | rundlls.exe | Rundllsystem32.exe | rundll_32.exe | Rundll~.exe | Rundnm.exe | rune.pif | runfc.exe | runlli32.exe | runload32.exe | runm.pif | runme.exe | runme2.exe | runoledb32.exe | RUNONCE.EXE | runppdrv.exe | runservice.exe | runsrv32.exe | runsvc32.exe | RunSysd32.exe | runt32.exe | runwin32.exe | run_21.exe | Run_cd.exe | Rupsw32.exe | RuxDLL32.exe | rvupdmgr.exe | Rwon.exe | rxhost.exe | RxMon.exe | rxmon9x.exe | rxxhost.exe | RyDial.dll, QuickStart | r_server.exe
(E6)(L?) http://www.tasklist.org/tasklist_s.html
S: s menu.exe | S24EvMon.exe | S3apphk.exe | s3hotkey.exe | S3Mon.exe | s3serv.exe | S3Tray.exe | s3tray2.exe | S3trayhp.exe | S4BAREQ.EXE | S4F.exe | s4helper.exe | sa.exe | Sa3.exe | Sa3dsrv.exe | saap.exe | SABSERV.EXE | sac.exe | sacc.exe | SAdBlock.exe | SafeCfg.exe | SAFEIN~1.EXE | SafeOff.exe | safesearch.exe | SafeWin.exe | sagate.exe | Sage.exe | Sagent.exe | SAgent2.exe | sagnt.exe | SAGUI.exe | Sahagent.exe | saicnfig.exe | saie.exe | SaiMon.exe | sain.exe | sais.exe | SaiSmart.exe | salm.exe | Sam-sung.exe | SAMcal.exe | samsm.exe | Samsong.exe |
| samx.exe | SandIcon.exe | sap.exe | sapp.exe | SAPSTR.exe | SAservice.exe | satan.exe | SATARaid.exe | satmat.exe | SAUpdate.exe | SAutoLaunchExe.exe | SAVAgent.exe | Save.exe | savenow.exe | SaveStartDate.Exe | saw.exe | SAYTIME.EXE | sa_exe.exe | SB.exe | sbautoupdate.exe | SBDrv.exe | sbdrvdet.exe | sbhc.exe | sbin.exe | SBInst.exe | Sblhost.exe | SBMPop.exe | sbmx.exe | SBServ.exe | sbsetup.exe | sbss.exe | SBWatchdog.exe | sc.exe | sc23exec.exe | SC3300CC.exe | Scam32.exe | Scandisk.com | ScanDisk.exe | scands32.exe | Scanner.exe | scannerfb.exe | scanreg32.com | scanregv.exe | Scanregw.exe | scanSYS.exe | SCardS32.Exe | ScardSvr.exe | SCardSvr32.Exe | scbar.exe | SCCENTER.EXE | sccenter.exebwtray.exe | Scchost.exe | scguard.exe | scheck**.exe | scheck45.exe | schedhlp.exe | SchedInd.exe | Scheduled_Maintenance.exe | Scheduler daemon.exe | scheduler.exe | SCHENGD.EXE | Schmaili.exe | Schost.exe | SCHSC9X.EXE | SchSvr.exe | SCHWIZEX.EXE | SCIEClean.exe | scks32.exe | scm.exe | SCMan.exe | SCMgr.exe | Scmhlpr.vbs | SCMon.exe | scmsg.exe | scmss.exe | scopedll.exe | scr.scr | Scran.exe | Scrappad.exe | scrcal.exe | screen.exe | Screendragon_VS_Taskbar.e | ScreenPrint32.exe | scregmanager4.exe | scrgrd.exe | script.bat | Scriptsentry.exe | scrnsave.pif | scrnsaver.scr | SCROLL.EXE | scrsave.scr | scrsvc.exe | ScrSvr.exe | scrtkfg.exe | scrubxp.exe | scruser2k.exe | SCSetup.exe | Scsi.exe | sctray.exe | sctray4.exe | scureapp.exe | scvchost.exe | scvhost.exe | scvhost32.exe | scvhost326a.exe | scvhoste.exe | scvhosting.exe | scvhostingg.exe | SCVHOSTS.EXE | scvhvst.exe | scvvhost.exe | sd32info.exe | sdaemon.exe | sdchost.exe | SDetect.exe | sdin.exe | SDJOIJE.EXE | SDK0mCORE.exe | SDKC0R3.exe | sdkcore.exe | sdkimddprovment2.exe | sdkimprovment.exe | sdkimprovment2.exe | SDKrepair2.exe | sdktemp.exe | SDPhotoBar.exe | sdrss.exe | SDSTAT.EXE | SDSTAT.EXEFLSHSTAT.EXE | sdtray.exe | se.dll, DllInstall | SE.exe | se?vices.exe | sealmon.exe | Search.exe | Search.vbs | searchbarcash.exe | searchnav.exe | searchnavversion.exe | searchsetter(1).exe | searchsetter[1].exe | SearchUpdate33.exe | SearchUpgrader.exe | sec5dec.exe | secctr.exe | Secret.exe | secretmaker.exe | secserv.exe | secsvc.exe | secsvcnt.exe | Secsys.exe | secure.exe | secure2.bat | Secureantivirus.exe | Secureitpro470p.exe | Security iGuard.exe | SECURITY.EXE | security32.exe | SecurityCenter.exe | securitychk.exe | SecurityManager.exe | SECWIZ98.EXE | SED.exe | seeve.exe | SELFCERT.EXE | SeMS.exe | sendmess.exe | Sensiva.exe | SENTRY.exe | sentstrt.exe | sepate.exe | serbw.exe | serials.exe | serm32.exe | serrdctl.exe | seru32.exe | serv-u32.exe | serv1ces.exe | serve.exe | servenxpp.exe | Server.com | Server.exe | Server.txt.vbs | server.vbs | server05.exe | Server5.exe | servic.exe | service.exe | Service.pif | service5.exe | servicec.exe | servicec.exepath to troja | serviceconnect.exe | ServiceLayer.exe | servicelog.exe | SERVICEMGR.EXE | servicent.exe | Serviceprocess.exe | services.exe | services21.exe | services32.exe | Servicess.exe | servicetask.exe | servicez.exe | servics.exe | servicz.exe | servinfo.exe | serviz.exe | ServUTray.exe | serwin.exe | sescli.exe | SEServe.exe | sessionmgr.exe | sessions.exe | SetConfig.exe | SetCPQLC.exe | setdebugnt.exe | setdefprt.exe | SetDfltSettings.exe | Sethook.exe | SETI@home.exe | SetIcon.exe | Setiqu~1.exe | SetiSpy.exe | SetPoint.exe | SetRefresh.exe | SETUP.EXE | setup.exe 46*** | SetupExeDll.exe | SetupIE.com | Setup_32.exe | Setup_32.exeWinSetup.exe | setuzp.exe | setver32.exe | setvrc.exe | sexgame.exe | Sexnow.exe | sexy.exe | sexypicz.exe | Sexy_sg.exe | sf.exe | SFAgent.exe | sfita.exe | sfool.exe | sfpc.exe | sfWinStartupInfo.exe | sf_exe.exe | Sgecrypt.exe | sghost.exe | sginst.exe | sgmain.exe | sgms.exe | SGP.exe | sgserv95.exe | SGTBox.exe | sgtray.exe | ShadowBar.exe | Shaitan1678.exe | Shakira_1997_Part_1_.Mpeg | shambl3r.exe | Shania.vbs | Shareaza.exe | sharedprem.exe | shch.exe | shdrkmck.exe | shell.exe | Shell32.exe | Shell32.vbs | Shellapi32.exe | ShellEx.exe | shellexp.exe | shellexpl.exe | SHELLMSN.EXE | shellsystem.exe | ShellTraywnd.exe | shhost.exe | shicoxp.exe | Shield.exe | Shine.exe | shinitv.exe | shit.exe | SHIZZLE.EXE | shman.exe | shnlog.exe | shop1003.exe | SHORTKEY.EXE | shost.exe | shost32.exe | SHOWBEHIND.EXE | ShowFF.exe | showmode.exe | ShowWnd.exe | SHPC32.exe | SHS.exe | SHSTAT.EXE | shutdownaware.exe | ShutDownPro.exe | SHVRTF.EXE | shwicon.exe | shwicon2k.exe | shwicon98.exe | shwiconem.exe | Sicom.exe | SideACT.exe | Sidebar.exe | sifxinst.exe | sigx.exe | silent.exe & matcli.exe | silent.exe & matcli.e | SimcastAlerts.exe | simcss.exe | simcss.exenavpmc.exe | SIMETER.EXE | SimpLite-MSN.exe | singapore.exe | SIPPSSIPPS.exe | SISAM10M.exe | SiSAudUt.exe | siService.exe | SiSSetCDfmt.exe | sisswled.exe | sistem.exe | sistrai.exe | sistray.exe | sistry.exe | SiSUSBrg.exe | sitebar.exe | sixtypopsix.exe | SK51.EXE | SK9910DM.exe | Ska.exe | SKBPATCH.EXE | SKDAEMON.EXE | SKERNEL32.com | skinkers.exe | skl.exe | SKS32P~1.EXE | sky.exe | skybot.exe | skybotx.exe | skynetave.exe | Skype.exe | slamm.exe | Slave.exe | slchost.exe | SleepMgr.exe | slefhost.exe | slhost.exe | SliMP3 Server.exe | SLINGS~1.EXE | slmss.exe | sload.exe | Slsched.exe | slserves.exe | slsorve.exe | slvchost32.exe | sm.exe | SM1BG.EXE | sm56hlpr.exe | smart.exe | SmartAgt.exe | SmartBarXP.exe | smartctr.exe | SMARTC~1.EXE | SmartProtectorPro.exe | SmaServ.exe | SMax4.exe | SMax4PNP.exe | smbdpmi.exe | smc.exe | smc.exespfsmc.exe | smcg.exe | Smcsta.exe | smctrlw.exe | smiptray.exe | SMLoader.exe | smnp.exe | smoc.exe | Smoked.exe | SmoothView.exe | smproxy.exe | SmReminder.exe | smrrs.exe | smrs.exe | sms.exe | smsai.exe | smsc.exe | smsiexec.exe | smsls.exe | smsm.exe | SMSMsg.exe | smsrss.exe | smsrun16.exe | smsrv.exe | smss.exe | Smss32.exe | smssa.exe | smssl.exe | smsss.exe | SMSSU.EXE | SMSSvc.exe | SmsSystem32.exe | SMT.exe | SMToolbar.exe | smtp32.exe | smtray.exe | smvss.exe | SmWizard.exe | sm_exe.exe | snapple.exe | snbr.exe | snbupt.exe | sncntr.exe | snd332.exe | sndbdrv3104.exe | sndcfg16.exe | Sndcompat.exe | sndloader.exe | SNDMon.exe | SndMon16.exe | SndMon32.exe | Sndsaver.exe | SNDSRVC.EXE | SNDWarn.exe | Sniffer.exe | SnippingTool.exe | snlogsvc.exe | Snnpapi.exe | Snsicon.exe | SNSS.EXE | Snt.exe | snuninst.exe | soap.exe | Sochost.exe | sock32.exe | socks.exe | sockys32.exe | SodaStartup.exe | soff.pif | SOFFICE.EXE | softhost.exe | softok.exe | software.exe | sointgr.exe | sokscmpn.exe | Solocfg.exe | Solosent.exe | somatic.exe | son.exe | SonnReg.exe | SonyTray.exe | sophagnt.exe | sory.exe | SOS.exe | SoSyncMonitor.exe | soun.pif | Sound.exe | sound32.exe | sound64.exe | Soundcane.exe | soundcontrl.exe | sounddr.exe | Sounddrv.exe | Soundman.exe | SoundMAX.exe | Soundmx.exe | Sounds.exe | soundtask.exe | soundtasks.exe | soundtctrls.exe | sounofts.exe | sountaskmgr | SP TimeSync.exe | sp.reg | Sp0.exe | SP00ISS.exe | Sp00lsv.exe | SP00Lsv32.pif | SP2 UPDATE.exe | SP2.exe | sp2chk.exe | SP2ConnPatcher.exe | sp2ctr.exe | sp2update.exe | sp2XPupdate.exe | sp32.dll | sp3fixer.exe | spamihilator.exe | spamkiller.exe | spampal.exe | SpamSleuth.exe | SpamSubtract.exe | spamsvc.exe | spchost.exe | SpClDlx.exe | spdll32.exe | Spdstart.exe | spdstrm.exe | specialfile.exe | SpecialOffers*.exe (* = d | SpecialOffers*.exe [* = d | SpecialOffers.exe | specixic.exe | SPEED UP.EXE | speedkey.exe | SpeedMeter.exe | speedmgr.exe | SpeedswitchXP.exe | speedtec.exe | SpeedUpMyPC.exe | Speedy.bat | SPEEDY.PIF | speedy.scr | spfix.exe | spfsmc.exe | Spguard.exe | sphost.exe | spiderml.exe | spinner.exe | Splash.exe | SPLASHA.EXE | SPMgr.exe | SPMSMON.EXE | SPnt.exe | spo.exe | SpokeSysTray.exe | spoler.exe | spollsv.exe | spolserv32.exe | spolsv.exe | spolsvr2.exe | spoo1sv.exe | SpooI32.exe | spooIsv.exe | spool.exe | SPOOL32.EXE | spoolasrv.exe | spoolcrv.cpl | SPOOLER.EXE | spoolersrv.exe | spooles32.exe | spooll32.exe | SpoolMgr.exe | spoolmsv.exe | spoolos.exe | spools.exe | spoolsac.exe | spoolsae.exe | spoolsaex.exe | spoolsal.exe | spoolsb.exe | spoolscv.exe | Spoolserv.exe | spoolservr.exe | spoolsre.exe | spoolsrv.exe | spoolsrv32.exe | spoolss.exe | spoolssv.exe | SPOOLSU.EXE | spoolsub.exe | spoolsurf.exe | Spoolsv.exe | SPOOLSV32.EXE | SpoolSvc.exe | spoolsvc32.exe | spoolsvr.exe | spoolsvs.exe | SPOOLSVU.EXE | spoolsvv.exe | SPOOLSYS.exe | spooltsrv.exe | spoolv.exe | spoolvs.exe | spoolvse.exe | spoolxx.exe | spower.drv | sppbridge.exe | spqmdmui.exe | SprintPortA.exe | spvic.exe | spvsper.exe | Spy-Control.exe | SpyAgent4.exe | Spyassault.exe | SpyAssaultScanner.exe | SpyBan.exe | SpyBlast.exe | spyblocker.exe | SpyBlocs.exe | SpyBlocs3.0.exe | Spybotsd.exe | spybott.exe | SpyBuddy.exe | spydoctor.exe | SpyElim.exe | SpyHunter.exe | Spykiller.exe | Spynuker.exe | SpySheriff.exe | SpySpotter.exe | spystopper.exe | SpySub.exe | SpySweeper.exe | Spyware-Cop.exe | Spyware.exe | SpywareBeGone.exe | Spywareguard.exe | SpywareKilla.exe | SpyWareKiller.exe | SpywareNo.exe | SpywareNukerInstaller.exe | SpywareSlayer.Exe | SpywareStormer.Exe | SpywareX.exe | spywar~1.exe | SpyWatch.exe | SQInstaller.exe | sql.exe | sqldata1.exe | Sqlexploit.exe | sqlmangr.exe | sqstart.exe | sqvynikp.exe | sr.exe | srbho.exe | SrchAsst.exe | srchhook.exe | srchupdt.exe | SRClean.exe | sres32.exe | srmclean.exe | srng.exe | srrpro.exe | SrsTray.Exe | srv.exe | srv2.exe | Srv32.exe | Srv325.exe | srvc32.exe | srvexc.exe | srvprc.exe | srxTray.exe | sr_exe.exe | SS.exe | ss2-full.exe | SsAAD.exe | ssaver.scr | SSBkgdupdate.exe | sscbltqu.exe | SSCFBTN.EXE | sscs.exe | ssc_serv.exe | ssdiag.exe | ssdpsrv.exe | Sservice.exe | SSFSch.exe | SSh32.exe | ssisvri.exe | Ssk.exe | SSLFVIEW.EXE | ssloserv.exe | ssmgr.exe | ssmmgr.exe | ssmr.exe | ssms.exe | ssmss.exe | ssprotecter.exe | ssrs.exe | sssasasb32.exe | ssservice.exe | sst4.exe | sst6.exe | SStb.exe | sstray.exe | SSUpdate.exe | ssvchost.exe | ssvhost.exe | ssvr.exe | ssweeper.exe | sswizard.exe | SSYS.EXE | SSYTEM.EXE | st01b.exe | sta.exe | Stacmon.exe | stagmr.exe | starskin.exe | start.bat | start.exe | start1.exe | startacc.exe | startauth.exe | startcop.exe | StartCpl.exe | StartEAK.exe | starter.exe | startl.exe | STARTM.EXE | startman.exe | StartMessager.exe | | STARTS.exe | STARTSTOP.EXE | startsvs.exe | StartupMonitor.exe | startwin.exe | stat.exe | STATBAR.exe | statemgr.exe | station.sbrt | StatnPerf.exe | status.exe | StatusCheck.exe | StatusClient.exe | StayCon.exe | STBVisn.exe | STBWEBTV.EXE | StCenter.exe | stcloader.exe | stcloader.exeSTCLOA~1.exe | STCLOA~1.exe | STCPO.exe | Std.exe | STDSB.exe | Stealth KeySpy.exe | stealth.exe | stealth25.exe | Steam.exe | STICKIES.EXE | StickyNote.exe | stikynot.exe | Stimon.exe | stisrv.exe | stisvsq.exe | STMonitor.exe | STMS.EXE | stopsignav.exe | stopsinfo.dll", VerifySta | Stopthepop.exe | Stopzilla.exe | storesp.exe | story.exe | STPMGR.EXE | StrgSync.exe | strngbox.exe | strto.exe | stswin.exe | stsystra.exe | stte.exe | sttray.exe | stub.exe | Stubbish.exe | stubinstaller****.exe (* | stubinstaller****.exe [* | Studio.exe | stuffmon.exe | STUpdate.exe | stutfix.exe | StyleXP.exe | suatshut.exe | SubAH.exe | suchost.exe | suge.exe | Suitcase.exe | SuiteOffices.exe | suitest.exe | SULFNBJ.EXE | sum32.exe | Sunasdtserv.exe | sunasServ.exe | SupaDial.exe | super.exe | Supercleaner.exe | SuperHeissSex.exe | Supervisor.exe | suploads.exe | support.exe | supporter5.exe | surfboard.exe | SURFBRD.EXE | surfer.exe | SurfStream.exe | surfya.exe | surveysa.exe | Susp.exe | SV00LSV.EXE | svapache.exe | SVAplayer.exe | svc.exe | svc23.exe | svcadmin.exe | svcc.exe | svcchost.exe | svcchosts.exe | svcdll.exe | Svced.exe | SVCH0ST.EXE | svchelper.exe | svchhost.exe | svch?.exe | svchoosts.exe | svchos.exe | svchos1.exe | svchosl.exe | svchosl.pif | svchosst.exe | svchost.com | svchost.exe | svchost.exe... | svchost.scr | svchost1.exe | svchost2.exe | svchost32.exe | svchost323.exe | svchost64.exe | svchosta.exe | svchostb.exe | svchostc.exe | Svchoste.exe | SVCHOSTES.EXE | svchosthlp.exe | svchosting.exe | svchostn.exe | svchostr.exe | Svchosts.exe | svchosts.scr | svchosts32.exe | svchostss.exe | svchostt.exe | svchostz.exe | svchsst.exe | svchst.exe | svcinfo.exe | svcinit.exe | svcinit.exesvcpack.exe | svclgx32.exe | svcman.exe | svcmdx32.exe | svcmfte32.exe | svcmgr32.exe | Svcmm32.exe | svcmon.exe | svcnet.exe | svcnow32.exe | svcnt.exe | svcnt32.exe | svcnut.exe | svcnut32.exe | svcnxp32.exe | svcpack.exe | svcrhost.exe | svcroot.exe | svcrun.exe | svcsenes.exe | svcsenes32a.exe | svcshost.exe | svcss.exe | svcsys.exe | svcsys32.exe | svcsysreg.exe | svctask.exe | svctrl.exe | svcxnv32.exe | svcxnw32.exe | svdhost.exe | svdhost32.exe | SVEHOST.EXE | svghost.exe | svh0st.exe | svhosint32.exe | Svhosl.exe | svhost.exe | svhost32.exe | svhost33.exe | svhost8.exe | svhostcs32.exe | svhosts.exe | Svhots.exe | svhst.exe | SVIDC32M.exe | svigost.exe | sviload32.exe | svmhost.exe | svmpop.exe | svnlitup32.exe | svnload32.exe | SVOHOST.exe | svosm.exe | svphost.exe | svrrun.exe | svrv.exe | svsekt.exe | svshost.exe | svshost32.exe | SVSS32.EXE | svssshost.exe | svthost.exe | svthx.exe | svupdate.exe | svvhost.exe | svxhost.exe | svzhost.exe | sw32.exe | Swap.exe | SWcaller.exe | SWcaller.exeSwcaller2.exe | Swcaller2.exe | swchost.exe | swcroot.exe | swdoctor.exe | swe.bat | swed.bat | sweden.exe | Sweeper.exe | swef.bat | swhost.exe | SwimSuitNetwork.exe | swin.bat | SWINGSYS.EXE | SWINIT.EXE | swiss.bat | switpa.exe | swn2.exe | swoff.exe | swsys.exe | SWTRAY.EXE | SWTrayV4.exe | swwhost.exe | sxgdsenu.exe | sxgtkbar.exe | sxpstub.exe | sxrrv.pif | sxvhost.exe | sycfg34.exe | sychost.exe | sycuptime.exe | Sygat.exe | Sygate.exe | Sygate32.exe | symantec32.exe | SymAV.exe | symcsvc.exe | symlcsvc.exe | Symmon.exe | SYMTRAY.EXE | Sync.exe | sync2it.exe | syncagent.exe | Synchost.exe | Syncit.exe | SyncroAd.exe | SyncService.exe | SynTP.tmp RunOnce.exe | syntpenh.exe | syntplpr.exe | sys#.exe | sys*****.exe (***** = ran | sys*****.exe [***** = ran | sys****.exe | sys*.exe (* = random numb | sys*.exe [* = random numb | sys.exe | sys008.exe | sys009.exe | sys16.exe | sys209.exe | sys22.exe | sys32.exe | sys32cfg.exe | sys32Conf.exe | sys32dll.exe | sys32ms.exe | Sys32Smm.exe | sys32snd.exe | sys32win.exe | sys64dvr.exe | SysAgent.exe | SysAI.exe | SysBackup.exe | sysbat32.exe | sysbho.exe | sysbot.exe | sysc0de.exe | SysCache.exe | syscfg.exe | SYSCFG16.EXE | syscfg32.exe | syscfg34.exe | syscfg35.exe | Syscheck.exe | SysCheckBop32.exe | Syschk.exe | syschost.exe | Syscm.exe | syscnfg.exe | SYSCNTR.EXE | syscon.exe | sysconf.exe | sysconf16.exe | sysconf32.exe | sysconfig.exe | sysconfigs.exe | Syscpy.exe | sysctl.exe | sysctrl.exe | sysdasp.exe | sysdat.dll.exe | Sysdata.EXE | Sysdeb32.exe | sysdiag.exe | sysdiag32.exe | Sysdll.exe | sysdll32.exe | sysdllwm.reg | Sysdoc32.exe | sysdoor.exe | sysdpt.exe | SysDref.exe | SysDrefIWv2.exe | sysdxvid.exe | SYSENTRY.EXE | SYSENTRY32.EXE | syserror.exe | sysexhook.exe | sysfile.vbs | sysfiler.exe | SYSfit.exe | sysflg32.exe | sysformat.exe | sysgut.exe | syshelp.exe | syshelper.exe | syshost.exe | syshosts.exe | sysinfo.exe | sysinfo33.exe | sysinit.exe | sysint16.exe | SYSio32.exe | syslaunch.exe | sysldr32.exe | Syslib.exe | sysload32.exe | Syslog.exe | Syslog32.exe | syslogin.exe | syslx32.exe | Sysman | Sysman32.exe | SysMap.exe | sysmd.exe | SysMetrix.exe | sysmgr.exe | sysMGT.exe | sysmod.exe | Sysmodule.exe | sysmon.exe | sysmon12.exe | Sysmon16.exe | sysmon32.exe | sysmon44.exe | sysmonnt.exe | SysMonXP.exe | SYSMSG32.EXE | sysmsvc.exe | sysnate.exe | sysnav32.exe | sysnd.exe | sysnet.exe | SYSNT.exe | sysobj.exe | SysOps | sysoverload.exe | syspanel.exe | syspci32.exe | syspw32.exe | SysReg.exe | SysRen.exe | sysreq.exe | Sysres.exe | sysrestore.exe | sysrun32.exe | Syss.exe | Syssafe.exe | SysService.exe | SysService32.exe | SysService32.exeln32k.dll | SYSsfitb.exe | SysSupport.exe | syst.exe | systacq.exe | systask32l.exe | systcpm.exe | system copy.exe | System service62 | system...exe | system..exe | System.dat.vbs | System.exe | system.exe (74295303) | System.exe 4820 | system.pif | system03.exe | SYSTEM2.EXE | system23.exe | system32,1.exe | system32.exe | system32.vbs | System32Driver32.exe | System32Ex.exe | SYSTEM64.EXE | systemc.exe | systemc32.exe | Systemcheck.exe | SystemCONF98i.exe | systemconfig.exe | systemctrl.exe internet.d | systemDA.exe | systemdev.exe | SystemDll.exe | systemdll32.exe | SystemFile.exe | systemi32.exe | systeminfos.exe | systeminit.exe | Systemiom.exe | systemll.exe | systemm.exe | Systemnt.exe | systemproc.exe | SystemReg16.exe | SystemReg166.exe | SystemRestorer.exe | systemry.exe | systems.exe | systemse.exe | systemsearch.hta | systemss.exe | SystemStats.exe | SystemTray.exe | SystemtrayV100B.exe | SystemUpd.exe | systemupdate.exe | systemwin32s.exe | Systemwiper.exe | Systemwks32.exe | systemyom.exe | Systen.exe | systerm.exe | Systern.exe | systesms.exe | Systest.exe | systime.exe | Systmesy.exe | systmp.exe | systoan.exe | Systools.exe | Systpl.exe | systr32.exe | Systra.exe | SYSTRAV.exe | systrax.exe | Systray.exe | systray32.exe | Systray_.Exe | systree | systroy.exe | Systrsy.exe | sysu.exe | sysug32.exe | sysup.exe | Sysupd.exe | Sysupd.exeWindowsUpd1.exe | sysupdate.exe | sysuptime.exe | sysupudt.exe | SysUtil.exe | Sysvupex.exe | SYSWB6.exe | sysweb.exe | SysWin.exe | syswin32.exe | Syswindow.exe | syswork.exe | syswr.exe | syswrun4x.exe | Syswu32.exe | sysx32.exe | sysxp.exe | SYSZ.exe | sys_alert.exe | sys_xp.exe | Szchost.exe | SZMsgSvc.exe | SZNTSVC.EXE | s_menu.exe
(E6)(L?) http://www.tasklist.org/tasklist_t.html
T: t1ktik.exe | t4skmgr.exe | t?skmgr.exe | tablet s | Tablet.exe | tabletsk32.exe | tabtip.exe | TabUserW.exe | TAcelMgr.exe | tad.exe | tadxtr.exe | tag.exe | Tahni.exe | Tahoma.vbs | taksmgr.exe | TALKINGREMINDER.EXE | talknow.exe | TangoManager.exe | Tapicfg.exe | TapiTNA.exe | Tardis.exe | Task.jvb | task32.exe | taskbar.exe | taskbar.svc | TaskBarClient.exe | TaskbarIcon.exe | taskbarmngr.exe | taskbars.exe | TaskBarSvr.exe | taskemngr.exe | tasker.exe | taskfile.exe | taskgamr.exe | taskgm.exe | taskgmgr.exe | taskgmr.exe | taskgmr32.exe | taskgmrr.exe | taskgmrs.exe | taskimg.exe | taskimgr.exe | tasklist32.exe | taskman.exe | TASKMAN4.EXE | TASKMANAGER.exe | taskmanger.exe | taskmg.exe | taskmgn.exe | taskmgr#.exe | taskmgr*.exe (* = number) | taskmgr*.exe [* = number] | Taskmgr.bat | taskmgr.com | taskmgr.exe | taskmgr32#.exe | taskmgr32*.exe (* = numbe | taskmgr32*.exe [* = numbe | taskmgrnt.exe | taskmgrs.exe | TASKMGRU.EXE | taskmgs.exe | taskmngr.exe | taskmngrs.exe | taskmnsgr.exe | taskmon.exe | taskmone.exe | taskmqrs.exe | taskmr.exe | taskmrg.exe | Taskmsg.exe | taskopen.exe | TaskPanl.exe | TASKPLUS0.EXE | TASKPLUS0.EXETASKPL~1.EXE | TASKPL~1.EXE | TaskSch.exe | taskservices.exe | tasksetup.exe | tasksmanagers.exe | taskswitch.exe | tasksys.exe | tasksys.vbs | TaskSystemDll.Exe | TaskTray.exe | Task_Agent.exe | tata.exe | tatss.exe | TAudEff.exe | Taumon.exe | tazkmgr.exe | tb2logon.exe | tb2start.exe | TBC.exe | tbcpro.exe | tbctray.exe | tbhdhelp.exe | tblmouse.exe | TBMon.exe | tbnote.exe | TBPanel.exe | TBPS.exe | tbsvc32.exe | tbtray.exe | TBuninst.exe /remove | TbUpdate.exe | TB_ANI~1.EXE | tb_setup.exe | tc.exe | tca.exe | TCASUTI.exe | tcaudiag.exe | TCDPbtn.exe | TCDPlay.drv | TCLOCK.EXE | TCLOCKEX.EXE | tcm.exe | tcoyftray.exe | tcpcheck.exe | tcpsvc.exe | tcpxp.exe | tcupdater.exe | TD.exe | TDispVol.exe | TDKSTART.EXE | TDKTASK.EXE | TDS-3.exe | Tdspoff.exe | te.exe | teachbox.exe | TeaTimer.exe | techbox.exe | techstart.exe | teekids.exe | telace.exe | telemeter3.exe | telepath.exe | tellecom.exe | temp532.exe | TemplateDongle.exe | TempTool.exe | tempx.exe | teqq32.exe | TEscKey.exe | TESLA.EXE | Test.exe | test2.exe | test3.exe | Testimonials.exe | Testing.exe | Testing.exelcd.exeSdjoije | testtts.exe | Test_BS.exe | TExBUtil.exe | TextAloudMP3.exe | tfimemsr.exe | TFncky.exe | TFNF5.exe | TForm1.exe | tfswctrl.exe | tftp### | tftp*** | TFuncKey.exe | tgb.exe | tgcmd.exe | tgdc.exe | tgfix.exe | tgkill.exe | TGRCNLUD.EXE | thdetr32.exe | THE WEATHER CHANNEL.exe | THE WEATHER CHANNEL.exeor | thehel1iawgrd32.exe | thehel1iawgrd32.exeFawgrd | THEWEA~1.EXE | The_Eye.exe | THGuard.exe | thmbplus**.exe | THotkey.exe | thpsrv.exe | thunk32.exe | TH_Guard.exe | tibs3.exe | tibs5.exe | tidslmon.exe | tikl.exe | TikTo.exe | time123.exe | TimeLeft.exe | Timemanager.exe | TIMEONLINE.EXE | TIMER.EXE | TimeSRV.exe | TimeSynchronize.exe | Timeup.exe | timeupdate.exe | TimeZone.exe | TINTSETP.EXE | tinyspell.exe | Tioman.Exe | TiTleBarClock.exe | TizzleTalk.exe | tkbell.exe | TkBellExe.exe... | TKONNECT.EXE | tlen.exe | Tmas.exe | tmchook.exe | TMEEJME.EXE | TMEMSER.EXE | TMERzCtl.EXE | TMESBS2.EXE | TMESBS21.exe | TMESBS32.EXE | TMESRV.EXE | TMESRV31.EXE | TMLISTEN.EXE | Tmmkysvr.exe | TMNTSrv.exe | Tmntsrv32.exe | TMOAgent.exe | tmouse.exe | tmp**.exe (* = random cha | tmp**.exe [* = random cha | tmproxy.exe | tmservice.exe | TMTMTSR.exe | TMTMTST.exe | TMTray.exe | TNBUtil.exe | TNTCLK.exe | ToADiMon.exe | tomorrow.exe | toolbar.exe | ToolBox.exe | tools.exe | toolsclickstat.exe | TopContext.exe | TopDesk.exe | TopSearch.exe | TorontoMail.exe | toscdspd.exe | Toshibsu.exe | TosHKCW.exe | tosmem.exe | TotRecSched.exe | TouchED.exe | tp4ex.exe | tp4mon.exe | tp4serv.exe | TP98.EXE | TP98TRAY.EXE | TPHKMGR.EXE | TpKmapAp.exe | TpKmapMn.exe | tpopservice.exe | Tppaldr.exe | Tprtray.exe | TpScrLk.exe | TpShocks.exe | TPSMain.exe | TPTray.exe | TPwrMgr.exe | Tpwrtray.exe | tqrecv.exe | Tracker.exe | traficy.exe | tranicon.exe | TransparentB.exe | TransparentD.exe | TransparentW.exe | TransparentW.exeTranspare | transtask.exe | TRASHGRD.EXE | Tray.exe | TrayApplication.exe | trayclnt.exe | TrayControl.exe | TRAYDATE.EXE | TrayIcon.exe | Trayicos.exe | Trayman.exe | traymon.exe | TrayMonitor.exe | TrayPlt.exe | TraySaver.exe | TrayServer.exe | TRAYWND.EXE | Trayz.exe | tray_helper.exe | trdb.exe | tres32.exe | trickler_bic_GatorDM_**** | trickler_bic_GatorDM_4010 | TridTray.exe | triggusr.exe | trillian.exe | trirot.exe | Trjscan.exe | trmupdate.exe | TRot.exe | TRPT.exe | TrueImageMonitor.exe | TRUG.vbs | trun.exe | trustras.exe | TrustyHound-TS.exe | trycrt.exe | TSADBOT.EXE | tskdbg.exe | tskm0nitor.exe | tskmg.exe | tskmgr.exe | tskmgr32.exe | tskmsgr.exe | TSkrMain.exe | tsl.exe | tsl2.exe | tsm.exe | tsm2.exe | TSMsger.exe | tss.exe | tstool.exe | tsyssmon.exe | tsystray.exe | ttasq.exe | TTEST6.EXE | ttuh.exe | ttupt.exe | tuaa.exe | TukatiRedistributor.exe | turbodetect.exe | turbomemorycharger.exe | TurboTop.exe | turkey.exe | Tvm.exe | tvmd.exe | TvNow.exe | TVRMVCR.EXE | TVSCHL.EXE | TvsTray.exe | tvs_b.exe | tvs_ln.exe | tvs_re_inst.exe | TVTMD.EXE | tvwakeup.exe | tvwatch.exe | twarnmsg.exe | TWBrowse.drv | twister.exe | twksup.exe | twunk16.exe | twunk_32.exe | twunk_32.exeorwinhelp.exe | twunk_64.exe | twunk_65.exe | type32.exe | typeconf.exe
(E6)(L?) http://www.tasklist.org/tasklist_u.html
U: uability.exe | UBSShell.exe | uc.exe | ucstart.exe | ucstartup.exe | UD.EXE | uddater.exe | UDetect.exe | udpsys32.exe | UEPROC32.exe | uGiG.eXe | uGuru.exe | Uidler.exe | Uint32.exe | uio.exe | UIWatcher.exe | uk nm.exe | ukvideo2.exe | uline.exe | umonit.exe | umsd.exe | umxagent.exe | umxldra.exe | UMXLDRW.exe | un32info.Exe | Uninstall.log.vbs | Unisc.exe | uniucu.exe | unldr16.exe | unldr32.exe | UNMT.EXE | unninst32.exe | unpak32.exe | untray.exe | UNWISE.EXE | up2dat5.exe | upd.exe | Updadv.exe | UPDATE-28062004.exe(25 bl | UPDATE-28062004.exe[25 bl | Update.exe | update2.exe | update32.exe | update32.pif | update911.js | updatelavasoft.exe | UpdateManager.exe | UpdateMedia.exe | updatemgr.exe | updatemgr.exeUPDATE~1.EXE | updater.exe | updater.pif | updater32.exe | UpdaterUI.exe | updates.exe | updates.pif | Updatestats.exe | updatetc.exe | updatev01.exe | updatewinlocator.exe | updatewiz.exe | UpdateXP*.exe (* = random | updateXP.exe | UpdateXP2.exe | updateXPSPC.exe | Updatez.exe | update_w.exe | updating.pif | updmgr.exe | Updreg.exe | updsys.exe | updtSup3.exe | UPERVGAS.exe | UpgConf.exe | upgrdmgr.exe | upnpman.exe | Upromise0.exe | ups.exe | UPS32.exe | UPSCHD.EXE | upsd.exe | upssrv.exe | Uptimer4.exe | uptodate.exe | upx.exe | UrlLstCk.exe | Urlmap.exe | urlmon32.dll.exe | Urt95Svc.exe | urx.exe | Usb.exe | usb32.exe | USBDetector.exe | USBhardware.exe | USBhardware326.exe | USBHARDWARE32C.EXE | usbmmkbd.exe | USBMonit.exe | USBmonitor.exe | usbn.exe | USBPNP.exe | usbsvc.exe | usbsystem.exe | usbtapnp.exe | usb_d.exe | user32.exe | userint.exe | userint32.exe | UserSp1.exe | usersvc.exe | userx.exe | usr32wink.exe | USRINIT.EXE | UsrLog.exe | USRmlnkA.exe | UsrPrmpt.exe | USRSTA.exe | USRWLANG.exe | USSSHREG.EXE | UtilityPro.exe | UTILIT~1.EXE | utsgmon.exe | uwcdsvr.exe | uwyrl.exe | uzqkst.exe
(E6)(L?) http://www.tasklist.org/tasklist_v.html
V: V38SHELL.EXE | V3calmcp.exe | V3faxecp.exe | V66SHELL.EXE | va10key.exe | vabian.vbs | VAGCTRL.EXE | VAGNT.exe | Van de Kelder Lien.exe | vAppCon.exe | var.txt.exe | varpc32.exe | VASCHD32.EXE | VAServ.exe | vb6.exe | vbdd.exe | VBI_SE~1.EXE | VbouncerInner****.exe (* | VbouncerInner****.exe [* | VBouncerInner.exe | VBouncerInnerxxxx.exe | VBPTASK.EXE | vbsystem35.exe msvbrun.ex | vbsystem35.exe setups.exe | Vc030405.exe | VC5Play.exe | VC6Play.exe | Vcatch.exe | VCatchpre.exe | vccxzq.exe | VCDDaemon.exe | Vcdlf.exe | VCDPlayer.exe | vcdplayx.exe | VCDTower.exe | VCDWATCH.EXE | vchk.exe | vchk.exe.exe | VCMnet11.exe | vcpdll.exe | vcsplay.exe | vcsystem.exe | vdtask.exe | VELOZSYS.EXE | versato.exe | Version.exe | Version.exemanage.exe | VersionCueCS2Tray.exe | VersionCueTray.exe | ver_chk.exe | vet32.exe | vet98.exe | vet98.exevet32.exe | VETMSG.EXE | vetmsg9x.exe | vettray.exe | Vg.exe | vgacard.exe | VGAProbe.exe | vhchost.exe | vi.exe | vid32cntl.Exe | vidcntl.Exe | Vidcompat.exe | vidctrl.exe | video.exe | video2.exe | Videocntl.exe | videodrv.exe | VIDEOL32.EXE | VideoLanPlayer.exe | videol_32.exe | videomgr.exe | videons32.exe | videoporno.exe | videosd32.exe | videosync.exe | video_32D.exe | video_32sD.exe | vide_32.exe | vidsvr.exe | vietato.exe | view.exe | viewer.exe | ViewMgr.exe | viewport.exe | Viewsonic.exe | virscana.exe | Virt.exe | VirtuaGirl2 | VirtualBouncer.exe | virtualmemory.exe | VirtuaReminder.exe | Virus salvado | virus.exe | Virus_Cleaner.exe | VISIONGS.EXE | vistascan.exe | VisualGuard.exe | VividGalut.exe | vi_grm.exe | VKatja.exe | vmdfw.exe | vmmon32.exe | VMSNGRABER.EXE | vmss.exe | VMUSrvc.exe | vmware.exe | vnmispoisn downloader.exe | VOBRegCheck.exe | Voltio.exe | volume.exe | VolumeControl.exe | VPC32.EXE | vpd.exe | vplus.exe | vpngui.exe | vpnservices.exe | vpop3.exe | VProperty.exe | vptray.exe | vrmonnt.exe | Vrres.exe | vrsprtc.exe | vrtxctrl.exe | VS.VSN | vsaccess.exe | VSECOMR.EXE | VSENMB.exe | VSHWIN32.EXE | VSMON.EXE | VSN.exe | vsnct511.exe | vsnpstd.exe | vsnpstd2.exe | vspdfprsrv.exe | vsserv.exe | VsStat.exe | VSStatmn32.exe | VSStatmn326.exe | vtd 16.exe | VtlAgent.exe | vtpassld.exe | VTPreset.exe | vtray.exe | VTTimer.exe | vTuner.exe | vuamgard.exe | VVSN.exe | vxdman.exe | vxdrun6.exe | vxst.exe | vzSFPWin.EXE | v_ctrl.exe
(E6)(L?) http://www.tasklist.org/tasklist_w.html
W: w****.exe (* = random cha | w****.exe [* = random cha | W1NT45K.exe | w32.exe | w32dns.exe | w32explorer.exe | w32NTupdt.exe | W32RfSA.exe | w32sup.exe | w32tm.exe | w32usb2.exe | W3dbsmgr.exe | W75P2PS.EXE | W815DM.exe | W95AGENT.EXE | W95Mm.exe | w98Eject.exe | w?aclt.exe | w?auboot.exe | w?auclt.exe | w?crtupd.exe | w?nlogon.exe | w?nword.exe | w?wexec.exe | wait4IP.exe | WAK.exe | walg32.exe | Wallchgr.exe | wallflip.exe | Wanadoo Messenger.exe | WanMPSvc.exe | Waol.exe | wap***.exe (* = random ch | wap***.exe [* = random ch | wapdate.exe | wapicc.exe | wapiit.exe | wapisu.exe | wapisvit.exe | wapisvsu.exe | wapisvtr.exe | war-ftpd.exe | WareOut.exe | warez.exe | Warm.scr | WARN0190.EXE | WARN0900.EXE | warner.exe | warnet.exe | wartray.exe | washer.exe | washerie.exe | washidx.exe | wast.exe | wasul.exe | WATCH.exe | Watchdog.exe | WatchPNM.exe | wauguard.exe | wauluclt.exe | waurclt.exe | wavepcmonitor.exe | WaveTop.exe | wbcgosvc.exe | Wbiff.exe | wbload.exe | Wbsched.exe | Wbutton.exe | wcdvtray.exe | WCEMNGR.EXE | WCESCOMM.EXE | wcmdmgr.exe | wcmdmgrl.exe | wcnsfty.exe | wcp****.exe (* = random c | wcp****.exe [* = random c | wcpcc.exe | WCPDT.EXE | wcpsvit.exe | wcsnfty.exe | wd.exe | WDBtnMgr.exe | wdevice.exe | wdfmgr.exe | wdfmrg.exe | wdgmr32.exe | wdinfo.exe | wdns33.exe | wdnupdate.exe | wdrk32.exe | Wdrun32.exe | wdskctl.exe | wdwctrl.exe | We Love Lien Van de Kelde | WEATHER.EXE | Weatherbug.exe | WeatherOnTray.exe | Weatherscope.exe | web.exe | web3trap.exe | webadmin.exe | webalize.exe | webassist.exe | WEBCAMRT.exe | webcel.exe | webcheck.exe | WebCheck.pif | WebCpr0.exe | webdav.exe | webemir.exe | WebInstall.exe | WebKey.exe | webm.exe | WebMailSpy.exe | webprinter.exe | WebRebates0.exe | websaverlive.exe | WebSavingsFromEbates0.exe | WebSavingsfromEbatesrun.e | WebScanX.exe | WebSecureAlert.exe | Webshots Tray.exe | Webshots Tray.exewebsho~1 | websho~1.exe | websvc.exe | webtrap.exe | WebTrapNT.exe | wees.exe | WeirdOnTheWeb.exe | Welcome.exe | Wepstat.exe | wetsock.exe | WF.exe | WF2k.exe | wf32b.exe | wf32vbc.exe | wf32vbs.exe | wfdmgr.exe | WFGStartup.exe | wfirewall7.exe | wftestb.exe | Wfwiz.exe | wfx5.exe | WFXCTL32.EXE | wfxload.exe | wfxsnt40.exe | WFXSWTCH.exe | WG511WLU.exe | wgafixer.exe | wgengmon.exe | WGFE95.EXE | wgp.exe | WGPRO32.EXE | WGWLocalManager.exe | whagent.exe | WHATPU~1.EXE | WhatsNewBot.exe | whismng.exe | whse.exe | whSurvey.exe | Whvlxd.exe | wi32.exe | wicomgr.exe | wifeman.exe | wiinsvc.exe | WillowRoad.exe | wilogon32.exe | WIMMUN32.exe | wimp.exe | wimsqaad.exe | WIN HOST PROCESS.EXE | win***32.exe (* = random | win***32.exe [* = random | WIN-BUGSFIX.EXE | win-logon.exe | win-mang.exe | win.bat | win.exe | win.exe.exe | win.hta | win.ini | win128.exe | win14.exe | win16dll.exe | win1ogoin.exe | win32.exe | win32API.exe | win32bat.exe | win32clf.exe | Win32Debug.exe | Win32dll.exe | Win32DLL.vbs | Win32edit.exe | win32exe.exe | win32exec.exe | win32gb.exe | win32hlp.exe | win32hlp.exeWinRunHelp.wr | win32info.exe | Win32ldr.exe | win32nls.exe | win32resc.exe | win32s.exe | win32server.exe | win32server.scr | Win32sl.exe | WIN32SNC.EXE | win32snd.exe | Win32sp.vbs | win32src.exe | win32sys4.exe | win32tool.exe | win32ttb.exe | win32upd.exe | Win32Update.exe | win32us.exe | win32usb.exe | Win32x.exe | win32xpsys.exe | win32_i.exe | Win386.exe | win43.exe | win64.exe | win70.exe | Win86.exe | Win9x.exe | Win???.exe | winabsmod.exe | Winacsr.exe | WINACTIVE.EXE | WinActiveJ.exe | Winad.exe | WinAdCnt.exe | WinAdCtl.exe | winadm.exe | WinAdServ.exe | WinAdTools.exe | winagent.exe | Winahlp.exe | winallap.exe | winallapu.exe | | | | | | | winapa.exe | winapi32.exe | winapix.exe | WINAPLOGUPD.EXE | winaps.exe | winasp.exe | winaup.exe | WinAwk.exe | winbackup.exe | winbait.exe | WinBar.exe | winbas12.exe | winbed.exe | Winbios.exe | winbog32.exe | Winboot32.exe | wincalc.exe | wincffg.exe | wincfg.exe | WINCFG.SCR | Wincfg32.exe | WinCheck.exe | winchi~1.exe | winchost.exe | WinCinemaMgr.exe | WinCinemaMgr.exeWINCIN~1. | WINCIN~1.EXE | winclean.exe | winclient.exe | WINClock.exe | wincmd.exe | Wincmp32.exe | wincms.exe | WinComm.exe | wincomp.exe | wincomp.exewinmgts.exe | WinConst.exe | wincontrol32.exe | wincool.exe | wincore332.exe | wincpu.exe | wincrs.exe | wincrt32.exe | WinCtlAd.exe | wind.exe | WIND0WS.exe | wind32.exe | WinDat.exe | windatemanager.exe | windates.exe | windbg.exe | windbg32.exe | WINDBKGND.EXE | windde32.exe | winde.exe | windefault.exe | windesktop.exe | windex.exe | windexv1.exe | windfind.exe | windhost.exe | windir32.exe | windir32a.exe | WINdirect.exe | windlhhl.exe | Windll.exe | windll32.exe | WINDLL32XP.EXE | windllsys32.exe | windlmngr.exe | windns.exe | windns32.exe | windnsd.exe | windos.exe | window.exe | Windows-Update.exe | windows.com | Windows.exe | windows.vbs | windows16.exe | windows24.exe | Windows32.exe | WindowsAgent.exe | WINDOWSBACKUP.EXE | WindowsFirewall.exe | windowsp.exe | windowsps.exe | WindowsSP.exe | WindowsSys32.exe | windowsu.exe | windowsup.exe | WindowsUpd1.exe | WindowsUpd2.EXE | WindowsUpd4.exe | windowsupdate.exe | Windowsusb.exe | windowsx.exe | windowsxpupdate.exe | windows_critical_update.e | Windows_kernel32.exe | windows_update.exe | windowxp.exe | Windowz.exe | windrg32.exe | WinDriv32.exe | windrive.exe | WinDrivers.exe | windrives.exe | WINDRV.EXE | windrv32.exe | windrvconf.exe | windrvl32.exe | windrvx.exe | winDSL.exe | WinDSL_MTU.exe | windsns.exe | windup.exe | windupds.exe | windupdts.exe | windvd98.exe | WinDVRCtrl.exe | winerdir.exe | Winex.exe | WinExec.exe | Winexec.exe.vbs | Winexec32.exe | winexplor.exe | WINFAH.EXE | WINFAT32B.exe | WinFavorites.exe1 | Winfi1e32.exe | WinFIX1.0.vbs | winfix22490.exe | WinFixd32.exe | WinFixIDs.exe | winfont.exe | WinForm.exe | Winfrw.exe | WinGamed.exe | WinGate.exe | wingmt.exe | wingo.exe | wingraphics.exe | wingrd.exe | wingrd32.exe | wingtp.exe | winguard.exe | winhe1p.exe | WinHelp.exe | WinHelpcfn.exe | WinHelper.exe | winhelper32.exe | winhelpsv.exe | winhlp.exe | winhlp.pif | winhlp3.exe | winhlp32.exe | winhlpp32.exe | winhost.exe | winhost32.exe | WINHOSTING.EXE | wini.exe | winicfg32.exe | winierun.exe | winimsg.exe | wininet.exe | wininet32.exe | wininetd.exe | wininfo.exe | winini.exe | wininigo.exe | wininit.exe | Wininit.exeMsinit.exe | wininit32.exe | WinInitDll.exe | WinIogon.exe | Winipcfgs.exe | winiprtx.exe | winipsec.exe | WinIRXHelper.exe | winis.exe | winit.exe | winit32.exe | winitr32.exe | winitXP32.exe | WINIUPDATES.EXE | winjes.exe | Winjsd.exe | Wink*.exe | Wink*.exe (* = random cha | Wink*.exe [* = random cha | winkb6.exe | WinKer.exe | winkernal.exe | winkey.exe | winkll.exe | winkrnl386.exe | WINL0G0N.exe | WinLab32.exe | winldra.exe | WinLED.exe | winlgz2.exe | winlibs.exe | winligon.exe | winlink32.exe | Winllogo.exe | winln.exe | Winload.exe | winload32.exe | WINLODR.SCR | winlog.exe | Winlog0n.exe | winlogd.exe | winlogg.exe | winloggs.exe | winlogin.exe | winlogin.pif | WinLoginnn.exe | winlogins.exe | winlogon.exe | winlogon.scr | winlogon32.exe | winlogonn.exe | winlogonpc.exe | winlogons.exe | WinlogonStartup | winmain.exe | winman32.exe | WinManager.Exe | winmants.exe | winmapp.exe | WinMatrixXP.exe | winmax.exe | winmedplay.exe | WinMem.exe | winmep.exe | winmes.exe | Winmgm32.exe | WinMgmt.exe | winmgr.exe | winmgr32.exe | winmgts.exe | winmguard.exe | winmm64.exe | winmms32.exe | winmon.exe | winmon32.exe | winmonitor.exe | winmonv.exe | WinMoviePlugIn.exe | winmp.exe | winmplayd.exe | winmplayer.exe | winmplayers.exe | winmplyer32.exe | winms.exe | winmsg.exe | Winmsixp32.exe | winmsn.exe | winmsn32.exe | WinMsrv32.exe | Winmsuit.exe | winmu.exe | WinMuschi.exe | WinMX.exe | winmys.exe | winmysqladmin.exe | winn43.exe | WinnConfig.exe | winnet.exe | WinNeth.exe | winnie.exe | winnook.exe | winnt update.exe | winnt.exe | winnt64.exe | WinntBB.exe | winNTsys32.exe | winocx32.exe | winoeinit.exe | winoff.exe | winortho.exe | winos.exe | WINOSCFG.EXE | winpack.exe | winpadg.exe | WinPatrol.exe | winpdg.exe | winPE.exe | winpipe.exe | WinPlosion.exe | winpnp.exe | winpopup.exe | winpppoverethernet.exe | winppr32.exe | winproc.exe | winproc32.exe | winprocer32.exe | winprocessor.exe | Winprot.exe | Winprot.exeserver.exe | winprotect.exe | WinProxy.EXE | winpsd.exe | winpup32.exe | winrapid.exe | winrar.exe | winrarshell32.exe | winrarx.exe | WINRE16.EXE | winread.exe | winrecon.exe | WINREG.EXE | winregal.exe | Winregs32.exe | Winregs326a.exe | winregsrv.exe | winres32.exe | winrestore.exe | winreups.exe | WINRLS.EXE | winroute.exe | winrpc.exe | Winrsm.exe | winrun.exe | WinRunHelp.wrh | wins.exe | wins32.exe | wins32svcs.exe | winsc.exe | winscan.exe | WinScheduler.exe | WinScheduler.exeSchSvr.ex | winsci.exe | winscr32.exe | winscv.exe | winsec.exe | winsec16.exe | winsecure.exe | winsecurity.exe | winser32.exe | WinServ.exe | Winserv.ila | winserv32.exe | WinServAd.exe | winserver.exe | winservice.exe | WinServices.exe | winservn.exe | winservs.exe | winses.exe | winset.exe | Winset32.exe | WinSetup.exe | winsfcm.exe | winshock.exe | winshost.exe | winshvc.exe | winsis32.exe | winslogon.exe | winsmc.exe | winsmsgr.exe | winsN2S.exe | winsN2SD.exe | winsnav.vbs | winsnd32.exe | winsock.exe | winsock2.2.exe | winsock3.exe | winSOCKS.exe | WinSocks5.exe | WINSOS.EXE | winsound.exe | WinSound1.exe | winspd32.exe | winspec.exe | winspf32.exe | winsplx.exe | winspool.exe | winsql32.exe | winsrv.exe | winsrv32.exe | winsrvc.exe | winss.exe | winssh.exe | winssk32.exe | winssv.exe | WinStabilizer.exe | winstall.exe | winstart.exe | WinStart.pif | WinStart001.exe | winstart32.exe | winstartup.exe | WinStat.exe | winstats.exe | winsta~1.exe | winsta~1.exewinstartup.ex | WinSth16.exe | winstr32.exe | winsupdater.exe | winsvc.exe | WinSvc16.exe | Winsvc32.exe | WinSVCservice.exe | winsy.exe | winsy32.exe | winsync.exe | winsys.exe | winsys32.exe | winsys33.exe | winsysengine.exe | winsysi.exe | winsyslog.exe | WinSysRM.exe | winsysrpc.exe | winsyst32.exe | winsystem.exe | winsystem32xp.exe | winsystems.exe | Wint**.exe (* = random ch | Wint**.exe [* = random ch | Wintask.exe | Wintaskad.exe | wintasks.exe | wintbp.exe | wintbpx.exe | wintcp.exe | wintective.exe | wintel.exe | wintems.exe | WinTidy.exe | Wintime.exe | wintnask32.exe | wintnl.exe | wintnpx.exe | wintr.com | wintray.exe | wintrims.exe | Wintsk32.exe | wintsk32dll.exe | wintsvcc.exe | wintsvit.exe | wintsvtr.exe | wintt.exe | winu32.exe | winudll.exe | winuodps.exe | WinUp.exe | WINUP2DATE.DLL, SHStart | WinUp32.exe | winupated.exe | WINUPD.EXE | winupd32.exe | winupdat.exe | winupdate.exe | winupdate1.exe | WinUpdate32.exe | winupdate32a.exe | winupdate32x.exe | winupdater.exe | WinUpdater5.0.vbs | winupdates.exe | winupdatexx.exe | winupdgm.exe | Winupdsdgm.exe | winupdsv.exe | WinUpdt.exe | winupdtl.exe | winupie.exe | winusb.exe | Winusb2.exe | winuser32.exe | WinUsr.exe K1S2 | winvc32.exe | winversion.exe | WinVNC.exe | winvxd32.exe | winwan.exe | winwd.exe | winwkys.exe | winword.exe | winworks.exe | winworld.exe | winx.exe | winxp.exe | winxp2.exe | winxp32.exe | winxp34.exe | winxpdll32.exe | winxpdriver.exe | winxpini.exe | winxpinit.exe | winxpro.exe | winxpserv.exe | winxpstat.exe | WinxPupd.exe | winXPupdate.exe | WinxSys.exe | winxtc.exe | winxtn.exe | winy.exe | winz32.exe | Win_.exe | win_spool2.exe | Win_vader.vbs | wipv6.exe | wiseupdt.exe | wisvc.exe | wisvccz.exe | wiustv.exe | wiusyt.exe | WIWT.EXE | wiz98.exe | wizard.exe | wjview ...Code | wjview ...MyPointsPointAl | wjview ...websearch.exe | wjview.exe | wkcalrem.exe | wkdetect.exe | wkfix.exe | wkfud.exe | wkfxi.js | wkmst.exe | WksSb.exe | wkssvc32.exe | wkssvr.exe | wkssvrs.exe | wkstmg.exe | WkUFind.exe | wlancfg.exe | WLANMON.exe | WLANSTA.EXE | wlanutil.exe | WLAN_Cfg.exe | wloader.exe | wlogf.exe | wm1exe.exe | Wm24Pan.Exe | wm95.exe | WMADZ.EXE | wmapp.exe | wmbem.exe | wmedia16.exe | wmediaplayer.exe | wmediautil.exe | WMENCAGT.EXE | wmexe.exe | wmgrdf.exe | wmiapi.exe | wmiexe.exe | wmilib32.exe | wmimgr.exe | Wminf.exe | Wminfo.exe | wmipcvse.exe | wmiprv.exe | wmiprvsa.exe | wmiprvsc.exe | wmiprvse.exe | wmiprvsw.exe | wmisg.exe | wmlaunch .exe | wmmndir.exe | wmmon32.exe | wmon32.exe | WMP11Cfg.exe | WMP23.exe | WMP54Gv4.exe | wmp9.exe | wmpa36.exe | WMPA36B.EXE | wmpa36d.exe | WMPLAYER.EXE | WMPVer.EXE | Wmsngr.exe | wmsys32.exe | wN2S.exe | WNAD.EXE | Wnetlib.exe | wnetmgr.exe | wngard.exe | wnmgre.exe | wnpsm.exe | wns*****.exe (* = random | wns*****.exe [* = random | wnscp**.exe (* = random c | wnscp**.exe [* = random c | wnscpsu.exe | wnscpsv.exe | WNSM.EXE | wntlgns.exe | wntsf.exe | WnvMenu.Exe | WnvRsvr.Exe | wo.exe | woekd.exe | word.EXE | WordQcrs.exe | workflow.exe | world_cup_.bat | worm.exe | wormexe.exe | wovax.exe | wowdache.exe | wp.exe | wpad.exe | WPC54CFG.EXE | wpctrl.exe | wpctrl95.exe | wpctrlnt.exe | wpctrlnt.exewpctrl95.exe | WpCycleWin.exe | wperl.exe | WPN511.exe | wpsche~1.exe | wpshrc.exe | WPSLOAD.EXE | wpsvr.exe | wpwlogon.exe | wpwmgrs.exe | WQK.exe | WR.EXE | wrauclt.exe | wrcam.exe | WrCtrl.exe | WrDialer.exe | wregbios.exe | wrexec.exe | wriste.exe | wrkstn.exe | wrmana32.exe | ws2help.exe | ws2_32s.exe | wsass.exe | wsbklite.exe | wscel.exe | WScheduler.exe | wscndrives.exe | WSconf.exe | wscrc.exe | wscrestp.exe | wscript MSupdt32.vbs | wscript zshell.js | wscript.exe | wscript.exe (filename) | wscript.exe (path) All Us | wscript.exe (path) All Us | wscript.exe (path) Instal | wscript.exe (System or Sy | Wscript.exe ..ChkMgr32.vb | Wscript.exe ..Msexec32.vb | wscript.exe filename | wscript.exe gpremier.vbs | Wscript.exe LGuarg.exe.vb | Wscript.exe OXNEY.B.VBS | Wscript.exe UpdataFiles.v | Wscript.exe WinStart.vbs | wscript.exe [filename] | wscript.exe [path] All Us | wscript.exe [path] All Us | wscript.exe [path] Instal | wsctl.exe | wscxt.exe | wserb32.exe | wserv32.exe | wserver.exe | WService.exe | wsg32.exe | wsiptis.exe | wskrnl.exe | wsnfty.exe | wsot.exe | wsript.exe Q152404.VBS | wssdsu.exe | wssdtu.exe | wssvr.exe | wssys.exe | wstart32.exe | Wstat32.exe | wstcl.exe | wstimeb.exe | wstray.exe | wsul.exe | wswpd.exe | wsxsvc.exe | wsys.exe | wsys32.exe | WTC32.scr | wtemp32.exe | WTFCTF.exe | wtfeat.exe | wtftest.exe | wtgamechannel.exe | WTHRTRAY.EXE | wtm.exe | wtm32.exe | WToolsA.exe | wts**.exe (* = random cha | wts**.exe [* = random cha | wtta.exe | wuaaclt.exe | wuadfdqr.exe | wuafix.exe | wuagrd.exe | wualcts.exe | wuam.exe | wuamagr32.exe | wuamgard.exe | wuamgd.exe | Wuamgrd.exe | wuamgrd3.exe | wuamgrd32.exe | wuamgrd33.exe | wuamgrder.exe | WUAMGRDXS.EXE | wuamguards.exe | wuamk0032.exe | wuamk032.exe | wuamk0p32.exe | wuamkop.exe | wuamkop32.exe | wuamkopxp.exe | wuammgr32.exe | wuammgrd32.exe | wuamngr1.exe | wuamngr32.exe | wuampd.exe | wuampkd.exe | Wuanclt.exe | wuanguard32.exe | wuap.exe | wuapdate16.exe | wuarclt.exe | wuauboot.exe | wuauclt32.exe | wuaucrlt.exe | wuauct.exe | wuauct1.exe | wuaumgr.exe | WUAUMQR.EXE | wuaurlt.exe | wuautlc.exe | wuawx.exe | wuclient.exe | Wucrtupd.exe | wuctl.exe | wucxt.exe | wudate.exe | Wudates.exe | wudmate.exe | wugfixx.exe | wuitgurd.exe | wumgrd.exe | wumgrd32.exe | wunit32.exe | WUOLService9x.exe | wuosdial.exe | wup.exe | wupades.exe | Wupated.exe | wupd.exe | wupda32.exe | wupdata.exe | wupdate.exe | wupdate32.exe | wupdated.exe | wupdater.exe | wupdates32.exe | Wupdm32.exe | wupdmgr.exe | wupdmgr32.exe | wupdmngr.exe | wupdt.exe | wupdt32x.exe | wupgrd.exe | wuraclt.exe | wurauclt.exe | wurguar.exe | wusas.exe | WUSB11B.exe | WUSB11cfg.exe | WUSB54Gv4.exe | wuservices.exe | wutop.exe | wuuaclt.exe | wuviewer.exe | Wuxat.exe | wuytc.exe | WvStatus.Exe | wvsvc.exe | ww.exe | wwasher.exe | wwDisp.exe | WWE DIVAS.exe | wweb32.exe | wwf.exe | wWin32.com | WWMon.exe | wxmct.exe | Wxpload.exe Wintime | WXprocMgr.exe | wXPupdate.exe | wys.exe | WZCSLDR.exe | WZCSLDR2.exe | wzhelper.exe | WZQKPICK.EXE
(E6)(L?) http://www.tasklist.org/tasklist_x.html
X: x(Number from 1 to 7).exe | X.exe | x10nets.exe | x3watch.exe | x8impipe.exe | Xadult1.exe | Xanadu.exe | XBox64.exe | xclean.exe | xcleaner.exe | XCLEAN~1.EXE | xcommsur.exe | xcommsvr.exe | XCPCMenu.exe | Xcpy1.exe | xdaemon.exe | xDcc.exe | Xfire.exe | xflash.exe | xfr.exe | Xftpgraber.exe | xhi.exe | Xhrmy.exe | xicon.exe | xin.exe | Xiwin32.exe | xl.exe | xmconfig.exe | XoftSpy.exe | xp386.exe | xpagent.exe | xpcd.exe | xpcfg.exe | xpclient.exe | xpcphost.exe | XpFirewall.exe | xpiupdate.exe | xPlanetControl.exe | xplore.exe | xpscan.exe | xpservicepack.exe | xpsp1mfh.exe | xpsp2.exe | xpsp2fw.exe | xpspz.exe | xpssl.exe | XPsys.exe | Xptryicn.exe | xpupdate.exe | xpupdater02.exe | XStop95.exe | xstyles.exe | xswin.exe | XTCfgLoader.exe | XTCfgLoader.exeBWCfgLoade | XTCsgloader.exe | XTermInit.exe | xtmop.exe | xtray_link.exe | XTServiceUpdate.exe | XtTb.exe | xuio.exe | XupiterStartup.exe | xupiterstartup2003.exe | XupiterToolbarLoader.exe | xvshost.exe | xware.exe | XWCTray.exe | xwinrpc32.exe | xwinxrpc.exe | xwinxrpc32.exe | xwiz.exe | XWMSAPI.EXE | xxsrsrv.exe | xxtoolbar.exe | xXx.exe | XXXmpeg.exe | xxxvideo.exe
(E6)(L?) http://www.tasklist.org/tasklist_y.html
Y: y.exe | y.exeservices.exe | yacpower.exe | yahmon.exe | YankClip.exe | ybrwicon.exe | ygpsstra.exe | yhn.exe | yinyin3345.vbs | yop.exe | ypager.exe | ypc.exe | yr.exe | ystckAO32.exe | YTPro.exe | YTRAYMAGIC.EXE | YTunnelPro.exe | YumgoHomepageProtector.ex | ywzizdon.exe | yz.exe | YZH.exe
(E6)(L?) http://www.tasklist.org/tasklist_z.html
Z: Zacker.exe | zango.exe | ZANGOT~1.EXE | zantu.exe | zanu.exe | zaplus.exe | Zapro.exe | zcb.exe | ZDLM.EXE | zenrc32.exe | zentray.exe | ZeroSpyware.exe | zg.exe | ZGNUBI.exe | zHotkey.exe | ZingSpooler.exe | ziphelp.exe | ZipLoader32.exe | ZipLoader32.exemsload32.e | ZISWin.exe | zlclient.exe | ZLH.EXE | zloader3.exe | zm32.exe | znksvc32.exe | zonealarm.exe | ZoneAlarmPr0.exe | Zonealarmupdate.exe | ZoneLockup.exe | zoom.exe | ZoomingHook.exe | ZPOINT32.exe | ZPU.exe | zremote.exe | Zstb.exe | zteam.exe | Zupdate.exe | zxc.exe | zzb.exe | zzb.exeorzzb2.exe | zzgshp.vbs |
U
UAC (W3)
Die Abkürzung "UAC" steht für "User Account Control".
Dieses Security-Feature von Windows Vista ist für die vielen Rückfragen verantwortlich, die durch ihr nervendes Auftreten schon fast das Gegenteil von Sicherheit bewirken.
(E?)(L?) https://www.webopedia.com/TERM/U/User_Account_Control.html
...
- Windows needs your permission to continue
- A program needs your permission to continue
- An unidentified program wants access to your computer
- This program has been blocked
...
urlvoid.com
Internetseiten vorab auf lauernde Gefahren untersuchen
(E?)(L?) http://www.urlvoid.com/
Urlvoid.com is a FREE service developed by NoVirusThanks Company that allows users to scan a website address with multiple web reputation engines to facilitate the detection of possible dangerous websites.
(E?)(L?) http://www.toolsvoid.com/
Network Tools
- My IP Address
- IP Address Lookup
- Domain To IP Address
- URL Content Dump
- Inspect HTTP Headers
- DNS Records
- DiG DNS Lookup
- SSL Certificate Check
- Unshorten URL
- Whois Lookup
- Redirections Fetcher
- Y! Messenger Status Check
- Skype Status Check
- Proxy Test
- HREF Links Extractor
- Ping Host
- Traceroute
- Htpasswd Password
String Tools
- Remove Duplicate Lines
- Append String
- String to Lowercase
- String to Uppercase
- IP2Long Online
- Long2IP Online
- Replace Strings
- Calculate String Length
- Sort Lines
- HTML Encode
- HTML Decode
- Reverse String
- Gzinflate Base64 Decode
- ROT13 Transform
- Base64 Decode
- Base64 Encode
- URL Decode
- URL Encode
- Timestamp to Datetime
- New Line to BR HTML
- Strip HTML Tags
String Tools
- Regex ToolsExtract Emails
- Extract IP Addresses
- Extract Domains
Hash Tools
Our Network
- NoVirusThanks.org
- URLVoid.com
- IPVoid.com
- Malwarehash.com
- Netirk.com
- Threatlog.com
- URLVir.com
- Toolsvoid.com
(E?)(L?) http://www.pcwelt.de/tipps/Surfen-Internetseiten-vor-dem-Besuch-auf-lauernde-Gefahren-untersuchen-6763670.html
Erstellt: 2013-02
V
VIL (W3)
"VIL" steht für "Virus Information Library".
(E?)(L?) http://vil.nai.com/
Threat Resources:
Anti-Malware Tips | Hoaxes | Malware Alerts | Malware Check and Removal Tool "Stinger" | McAfee Avert Labs Threat News | Newly Discovered Malware | Newly Discovered PUPs | Recent Vulnerabilities | Recently Updated Malware | Recently Updated PUPs | Search Threat Library | Submit a Virus Sample | Tools and Utilities | Virus Calendar
Millions of threats exist today. The McAfee Avert Labs Threat Library has detailed information on viruses, Trojans, hoaxes, vulnerabilities and Potentially Unwanted Programs, where they come from, how they infect your system, and how to mitigate or remediate them.
Virus
Computer Virus
malware
Brain (W3)
Die Bezeichnung "Computer Virus" wurde 1984 von Fred Cohen eingeführt, der die (wissenschaftliche) Prägung des Begriffs "Len Adleman" zuschrieb. Allerdings gibt es einige Beispiele in der Populärliteratur, in denen sowohl "virus" als auch "Computer Virus" in Zusammenhang mit Software-Programmen zu finden ist. Das erste Beispiel scheint in einem Film aus dem Jahr 1973 vorzukommen.
Der erste (freigelassene) Computer-Virus soll 1986 von zwei pakistanischen Brüdern geschrieben worden sein, um Raubkopien ihrer Software zu verhindern. Dieser trug den Namen "Brain".
Laut CHIP 04/2008 taucht der "Virus" in der Datenverarbeitung zum ersten Mal offiziell 1981 in einem Gespräch zwischen Dr. Fred Cohen und Professor Leonard M. Adleman auf. Die theoretische Basis für alle Viren lieferte John von Neumann in seiner Theorie der "selbstreproduzierenden Automaten". 1983 definierte Fred Cohen in seiner Computerarbeit "Computer Viruses - Theory and Experiment" zum ersten Mal die grundlegenden Funktionen von Viren.
(E?)(L?) http://www.all.net/books/virus/part5.html
...
The First Virus
On November 3, 1983, the first virus was conceived of as an experiment to be presented at a weekly seminar on computer security. The concept was first introduced in this seminar by the author, and the name 'virus' was thought of by Len Adleman. After 8 hours of expert work on a heavily loaded VAX 11/750 system running Unix, the first virus was completed and ready for demonstration. Within a week, permission was obtained to perform experiments, and 5 experiments were performed. On November 10, the virus was demonstrated to the security seminar.
...
(E?)(L?) http://news.bbc.co.uk/1/hi/technology/3257165.stm
...
Computer viruses now 20 years old
Now most viruses arrive via e-mail
This week computer viruses celebrate 20 years of causing trouble and strife to all types of computer users. US student Fred Cohen was behind the first documented virus that was created as an experiment in computer security.
Now there are almost 60,000 viruses in existence and they have gone from being a nuisance to a permanent menace.
Virus writers have adapted to new technology as it has emerged and the most virulent programs use the net to find new victims and cause havoc.
...
(E?)(L?) http://www.csoonline.com/article/220527/the-devil-s-infosec-dictionary
(E?)(L1) http://www.digitalcraft.org/index.php?artikel_id=281
Chronologie der Computerviren
Von Csilla Burján
1949: Der ungarische Informatiker John von Neumann (1903-1957) entwickelt die Theorie von selbst-reproduzierenden Automaten.
...
1981/82:
Professor Len Adleman verwendet den Begriff "Virus", als er sich mit seinem Informatikstudenten Studenten Fred Cohen über selbstkopierende Programme unterhält.
Joe Dellinger studiert zur gleichen Zeit an der Texas A&M University und schreibt einige sich selbst vervielfältigende Programme für Disketten von Apple II und nennt sie Virus 1, Virus 2, Virus 3.
...
1983 Fred Cohen stellt seinen ersten funktionsfähigen Virus vor: Er ist unter dem Betriebssystem Unix programmiert und nistet sich im Befehl VD ein. Dieser Virus erbt bei jeder Ausführung die Systemprivilegien eines jeden infizierten Programms und kann so innerhalb eines kurzen Zeitraumes jedem Benutzer die geerbten Privilegien übergeben.
1984 Fred Cohen veröffentlicht seine Doktorarbeit "Computer Viruses - Theory and Experiments", die für internationales Aufsehen sorgt. Neben der Definition des Computervirus enthält sie auch zahlreiche Experimentalviren.
...
(E?)(L?) http://www.fismapedia.org/index.php?title=Term: Virus
Term: Virus
Contents
- 1 CNSSI 4009
- 2 DSS Glossary
- 3 GAO-09-232G
- 4 NIST IR 7298
- 5 NIST SP 800-28v2
- 6 NIST SP 800-40
- 7 NIST SP 800-46
- 8 NIST SP 800-47
- 9 NIST SP 800-61r1
- 10 NIST SP 800-61
- 11 NIST SP 800-82 Final Draft
- 12 NIST SP 800-83
(E?)(L?) http://www.fismapedia.org/index.php?title=Virus
Virus
Contents
- 1 CNSSI 4009
- 2 NIST SP 800-28v2
- 3 NIST SP 800-40
- 4 NIST SP 800-46
- 5 NIST SP 800-47
- 6 NIST SP 800-61
- 7 NIST SP 800-61r1
- 8 NIST SP 800-83
(E?)(L?) http://www.infoplease.com/ipa/A0872842.html
Computer Virus Timeline
(E?)(L?) http://en.wikipedia.org/wiki/Computer_virus
The term "virus" was first used in an academic publication by Fred Cohen in his 1984 paper Experiments with Computer Viruses, where he credits Len Adleman with coining it.
However, a mid-1970s science fiction novel by David Gerrold, When H.A.R.L.I.E. was One, includes a description of a fictional computer program called "VIRUS" that worked just like a virus (and was countered by a program called "ANTIBODY"); and John Brunner's 1975 novel "The Shockwave Rider" describes programs known as "tapeworms" which spread through a network for the purpose of deleting data.
The term "computer virus" with current usage also appears in the comic book "Uncanny X-Men" No. 158, published in 1982. And even earlier, in 1973, the phrase "computer virus" was used in the movie Westworld to describe a malicious program that emerged in the computer system of the theme park. Therefore, we may conclude that although Cohen's use of "virus" may, perhaps, have been the first "academic" use, the term has been used earlier.
The term "virus" is often used in common parlance to describe all kinds of "malware" ("malicious software"), including those that are more properly classified as "worms" or "trojans". Most popular anti-viral software packages defend against all of these types of attack.
The plural of "virus" is "viruses", not "virii", which is sometimes used incorrectly, both knowingly and otherwise. See plural of virus.
Vishing (W3)
Das Wort "Vishing" ist eine Kombination aus den Begriffen "Voice over Internet Protocol" (VoIP) und "Phishing" und beschreibt eine neue Betrugsmasche von Datendieben. Dabei werden die geringen Kosten der Internettelefonie (VoIP) dazu genutzt, um automatisch Telefonnummern anzurufen. Hebt der Angerufene ab, wird ihm per Bandansage mitgeteilt, dass seine Kreditkarte missbraucht wurde. Unter der angegebenen Rückrufnummer meldet sich ein Sprachportal. Der angeblich Geschädigte wird dort zur Eingabe seiner Kreditkartennummer und anderer persönlicher Daten über die Tasten seines Telefons aufgefordert. Mit den ergaunerten Daten können die Betrüger dann auf Beutezug gehen. Das BSI warnt ausdrücklich davor, sensible Daten am Telefon preiszugeben.
(E?)(L?) http://www.netlingo.com/word/vishing.php
...
Derived from the terms "voice" and "phishing," vishing is the online scam of stealing personal information or money from individuals using the telephone network, specifically telephony services.
...
(E?)(L?) http://www.netzeitung.de/internet/420715.html
(E?)(L?) http://www.oqlf.gouv.qc.ca/actualites/capsules_hebdo/index_v.html
vishing,11 août 2006
(E?)(L?) http://www.silicon.de/enid/antivirus/20565
(E?)(L?) https://www.webopedia.com/TERM/v/vishing.html
(E2)(L1) http://www.wordspy.com/archives/V.asp
(E?)(L?) http://www.zdnet.de/39145119/warnung-vor-neuer-betrugsmasche-vishing/
Warnung vor neuer Betrugsmasche „Vishing“
von Jason Curtis am 10. Juli 2006, 14:37 Uhr
W
websensesecuritylabs
Threat Map
Threat Map
(E?)(L2) http://www.websensesecuritylabs.com/charts/threatmap.php
Attack Information Center
Websense Global Threat Intelligence
Read about security research as it happens. Obtain in-depth security information including, research & statistics, white papers, presentations and the latest threat maps that display the most recent data collected by Websense Security Labs.
white hat (W3)
In der westlichen Welt steht "weiss" für "gut" und "schwarz" für "böse". Und so auch in der Welt der Hacker.
(E?)(L?) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html
"White hat" describes a "hacker" (or, if you prefer, "cracker") who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it is can be taken advantage by others (such as "black hat" "hackers".)
...
The term comes from old Western movies, where "heros" often wore "white hats" and the "bad guys" wore "black hats".
Wikileaks (W3)
In Analaogie zu Technik und Namen von "Wikipedia" nennt sich die Enthüllungs-Plattform "Wikileaks" nach Hawaiian "wiki", "wikiwiki" = dt. "schnell", "rasend" und engl. "leak" = dt. "Leck". Hier werden also Informationen aus "undichten Stellen" gesammelt um sie möglichst schnell an die Öffentlichkeit zu bringen.
(E?)(L?) http://www.cio.de/news/wirtschaftsnachrichten/2241619/index2.html
(E?)(L?) http://www.wikileaks.org/
Erstellt: 2010-07
wolframalpha
Passwort-Generator
(E?)(L1) http://www.wolframalpha.com/input/?i=secure+password
Erstellt: 2011-10
X
Y
Z
Bücher zur Kategorie:
Etymologie, Etimología, Étymologie, Etimologia, Etymology, (griech.) etymología, (lat.) etymologia, (esper.) etimologio
US Vereinigte Staaten von Amerika, Estados Unidos de América, États-Unis d'Amérique, Stati Uniti d'America, United States of America, (esper.) Unuigintaj Statoj de Ameriko
Informatik, Informática, Informatique, Informatica, Informatics, (esper.) komputiko
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
Schell, Bernadette (Autor)
Martin, Clemens (Autor)
Webster's New World Hacker Dictionary
Taschenbuch: 432 Seiten
Verlag: John Wiley & Sons; Auflage: 1. Auflage (8. September 2006)
Sprache: Englisch
Kurzbeschreibung
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime-crackers have accessed information in the records of large, respected organizations, institutions, and even the military.
This is your guide to understanding hacker terminology. It's up to date and comprehensive, with:
- * Clear, concise, and accurate definitions of more than 875 hacker terms
- * Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools
- * Entries covering general terms, legal terms, legal cases, and people
- * Suggested further reading for definitions
This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information.
Knowledge is power. With this dictionary, you're better equipped to be a white hat and guard against cybercrime.
Erstellt: 2013-02
T
U
V
W
X
Y
Z