Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] hackershalf-cooked repairs definition ofHamming code error detection and correction 2nd Hamming, Richard Happy99 (worm) 2nd e-mail address harvesting 2nd 3rd 4th NNTP attacks Happy99 worm 2nd 3rd nondestructrive payload viruses hard-coded API addresses 2nd hardware destroying viruses 2nd hardware-level stealth viruses 2nd 3rdHare (virus) infection technique self-protection technique harvesting e-mail addresses (worms) 2nd 3rd 4th 5th 6th 7thhashing first-generation antivirus scanners 2ndheader PE files 2nd 3rd 4th 5th header infection viruses (infection technique) 2nd heap management 2nd heap overflows 2nd 3rd 4th exploiting 2nd 3rd 4th Linux/Slapper worm 2nd 3rd 4th 5th 6th 7th 8th heap-based overflow attacks, compiler-level solutionsheaps definition of 2nd exception-handler validation Helenius, Marko Helenius, marko Help file viruses 2ndheuristic analysis antiheuristics techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th of 32-bit Windows viruses 2nd 3rd 4th 5th 6th using neural networks 2nd 3rd heuristic behavior-blocking systemsheuristics code emulation 2nd for generic repair 2nd Heyne, Frank hidden window procedure (Win32 viruses) HIEW tool 2nd goat files (cleaning) High Memory Area (HMA) high-interaction honeypot systems highly destructive payload viruses 2nd 3rd 4th 5th 6th 7th history of antivirus programs 2nd history of blended attacks 2nd history of computer viruses 2nd 3rd history of self-replicating systems Core War 2nd 3rd 4th Edward Fredkin structures 2nd 3rd game of Life (Conway) 2nd 3rd 4th 5th 6th John von Neumann theory 2nd 3rd history of Win32 viruses 2ndhit list method [See IP addresses, scanning]hive definition of HLP/Demo (virus) HMA (High Memory Area)hoaxes definition of 2nd holes in memory Honeyd honeypot systems 2nd 3rd hook table for Frodo virus 2ndhooking API hooking (infection technique) 2nd 3rd function call-hooking (infection technique) 2nd 3rd IAT (import address table) 2nd interrupts 2nd 3rd 4th 5th INT 1 and INT 3 on INT 13h (boot viruses) 2nd 3rd on INT 21h (file viruses) 2nd 3rd 4th host application mutation (metamorphic viruses) 2ndhost file headers encryption 2ndhost files detection of end host size dependency 2nd host-based intrusion prevention techniques 2nd 3rd 4thbuffer overflow attcks blocking 2nd code reviews compiler-level solutions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th kernel-mode extensions 2nd opreating system-level solutions 2nd 3rd program shepherding 2nd subsystem extensions 2nd script/SMTP blocking 2nd 3rd WebTV worms 2nd HTML viruses 2nd HTML-based mailHybrisF (virus) self-protection techniqueHyperCard HyperTalk viruses 2ndhyperfast disk access first-generation antivirus scanners HyperTalk viruses 2nd Hypervisor (virus) Hypponen, Mikko 2nd 3rd |