Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Kaspersky, Eugene 2nd 3rd 4th 5th 6th 7th KAV (antivirus program) 2ndKefi (virus writer) PHP/Feast virus Kelsey, Johnkernel mode entering on Windows 9x 2nd viruses in 2nd 3rd 4th 5thkernel modification W32/Bolzano virus 2ndkernel-mode debuggersextensions buffer overflow attacks (worms) 2ndKERNEL32.DLL checksum recalculation 2nd hard-coded pointers to imports imports by ordinal inconsistency infection of 2ndkernels memory scanning 64-bit platforms 2nd 3rd classes of context 2nd filter driver virus deactivation 2nd 3rd read-only memory upper 2G of address space user address space of processes Windows NT functions 2nd Windows NT service API entry points 2ndkey functions reconfiguring 2ndkeyboard disabling 2ndkeyloggers definition of Khafir, Masouf Kinematic Self-Replicating Machines (Freitas and Merkle)kits definition of KiUserExceptionDispatcher() function knowledge bases, malicious code analysis techniques 2nd known plain-text attacks KOH (virus)Krishna (virus) infection technique Krukov, Andrew |