Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] e-mail executable code-based attacks HTML-based mail e-mail address harvesting (worms) 2nd 3rd 4th 5th 6th 7the-mail addresses parsing files fore-mail attachment inserters worm infectionse-mail attacks worm infections 2nd early warning systemsearly warnings information onEaster eggs definition of ecophagy Eddie (virus) self-protection technique Eddie-2 (virus) EICAR (European Institute for Computer Antivirus Research) ELF viruses 2nd Elk Cloner (virus) 2nd 3rd EMACS viruses embedded decryptor (infection technique) 2nd 3rd embedded decryptor and virus body (infection technique) 2nd 3rd embedded object insertion dependency 2ndemulation [See code emulation] antiemulation techniques (armored viruses) 2nd 3rd 4th 5th 6th encoding URLs 2nd encrypted viruses 2nd 3rd 4th 5th 6th 7th 8th 9th encryption 2nd 3rd 4th 5th 6th 7th 8th [See also decryption] Linux/Slapper worm of host file headers 2nd virus detection 2nd 3rd 4th 5th W95/Marburg virus X-RAY algorithmic scanning method 2nd 3rd 4th 5th entry point-obscuring polymorphic virusesentry points obfuscation random entry points in code section 2nd entry-point obscuring technique 2nd entry-point obscuring viruses (infection technique) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13thentry-point scanning first-generation antivirus scanners 2ndenumeration network enumeration attacks 2nd 3rd of network shares 2nd 3rd processes environments of malicious code 2nd 3rd archive format dependency 2nd compiler and linker dependency 2nd computer architecture dependency 2nd CPU dependency 2nd date and time dependency 2nd debugger dependency 2nd 3rd device translator layer dependency 2nd 3rd 4th 5th embedded object insertion dependency 2nd extension dependency 2nd 3rd file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th file system dependency 2nd 3rd 4th host size dependency 2nd interpreted environment dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th JIT dependency 2nd 3rd multipartite viruses 2nd network protocol dependency operating system dependency 2nd operating system version dependency 2nd resource dependency 2nd self-contained environment dependency 2nd 3rd 4th source code dependency 2nd vulnerability dependency EPO (entry-point obscuring) viruses (infection technique) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13thEPO mechanism W32/Simile virus EPO viruseserror detection and correction with Hamming code 2ndESC sequences reconfiguring 2nd Etap.D (virus) 2nd ETG (executable trash generator) engineEthereal Linux/Slapper (worm) W32/Aliz@mm (worm) captures W32/Blaster worms W32/Sasser.D (worm)ethics of using virus construction kits Etoh, Hiroaki European Institute for Computer Antivirus Research (EICAR)Evol (virus) code emulation evolution of macro viruses 2nd evolution of virus code 2nd exact identification 2nd 3rdExcel viruses [See macro viruses] exception handlersexception handling CodeRed worm 2nd exception-handler validation 2nd 3rd 4thexceptions generating structured exception handling 2nd EXE viruses 2nd Exebug (virus)execode macro viruses 2nd executable code-based attacks executable trash generator (ETG) engineexecutables linking DLLs to 2nd 3rd 4th executed images (Win32 viruses) 2nd 3rdExecuteOnly attribute (Novell NetWare) attacks via 2nd 3rd 4th 5thexecution random execution logic 2ndexecution environments [See environments of malicious code] execve() functionexploits [See blended attacks] [See vulnerability dependency] automated discovery 2nd definition of exploits W32/Slammer (worm) 2nd 3rd export table (PE files) 2ndexporting functions 2nd extended access lists Extended Memory Specification (XMS) extended tiny encryption algorithm (XTEA) extension dependency 2nd 3rdextensions kernel-mode 2nd subsystems 2ndextra disk sectors formatting 2nd 3rd |