Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] Back doors drawbacks of software for to op-codes Back Orifice program 2nd Behavior detection BHOs (Browser Helper Objects) Binary code, patching bind functionBinding in IAT hooking in inline function hooking to interfaces BIOS, accessingBLINK member as process pointer changing value of 2nd 3rd Bootloaders, modifying Bootstrap code, activation of Bouncing packets Browser Helper Objects (BHOs) Buffer pools Buffer-overflow exploits 2nd Buffers in NDIS 2nd Bug fixes by Microsoft Build environments Build utilityBus data I/O PCIBypassing firewalls forensic tools |