Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] naming code sectionsnaming conventions computer viruses 2nd !*vendor-specific_comment& #*packer& *family_name& 2nd *infective_length& *malware_type&:// *modifiers& *platform&/ 2nd 3rd 4th 5th 6th *variant& .*group_name& :*locale_specifier& @m @mm [*devolution&] native viruses 2nd native Windows NT service viruses native Windows NT viruses natural infection testing 2nd natural infections nature-simulation games Core War 2nd 3rd 4th Edward Fredkin structures 2nd 3rd game of Life (Conway) 2nd 3rd 4th 5th 6th John von Neumann theory 2nd 3rd Navrhar (virus) infection technique NC (NetCat) NC (NetCat) tool NCAs (Nexus Agents) NE viruses 2nd nearly-exact identification 2nd NEAT (WebTV worm)Neat (worm) 911 attacks Nebbett, Gary Needham, RogerNET$DOS.SYS file boot viruses in 2nd NetCat (NC) NetCat (NC) toolnetqworksports monitoring network enumeration attacks 2nd 3rdnetwork injectors definition of network intrusion detection system (NIDS) 2nd network protocol dependency network scanning 2nd 3rd 4th 5th 6th network share enumeration attacks 2nd 3rd network-intrusion detection system (NIDS) network-level defense strategies 2nd counterattacks early warning systems firewalls 2nd 3rd 4th honeypot systems 2nd 3rd network-intrusion detection system (NIDS) 2nd router access lists 2nd 3rd worm behavior patterns 2nd 3rd 4th 5th 6th 7th 8th 9th 10thnetworks boot viruses 2nd in-memory injectors over networks peer-to-peer network attacks 2nd peer-to-peer network control (worms) 2nd 3rd 4thtraffic capturingneural networks heuristic analysis using 2nd 3rdNexiv_Der (virus) infection technique 2nd 3rd 4th Next Generation Secure Computing Base (NGSCB) Next Generation Virus Creation Kit (NGVCK) 2nd 3rd Nexus Agents (NCAs) NGSCB (Next Generation Secure Computing Base) NGVCK (Next Generation Virus Creation Kit) 2nd 3rd NIDS (network intrusion detection system) 2nd NIDS (network-intrusion detection system)Nimda [See W32/Nimda (worm)] Nimda (worm) 2nd backdoor-compromised systemsNNTP attacks worm infections NNTP-based e-mail address collection 2nd no-payload viruses 2ndNoKernel (virus) self-protection technique non-TSR viruses nondestructive payload viruses 2nd 3rd 4th 5th 6th nonexecutable (NX) feature nonexecutable (NX) pages nonlinear decryption nonstateful firewallsnormal COM definition of Norton AntiVirus (antivirus program) Norton, Peter (Programmer's Guide to the IBM PC )notepad.exe STR streams NOTEPAD.EXE, W32/Parvo (virus) insideNovell NetWare ExecuteOnly attribute attacks via 2nd 3rd 4th 5th Nowhere Man (virus construction kit writer) NTDLL functionsNTFS file systems compression viruses stream viruses 2nd NtOpenThread() function NtQueryInformationThread() API NtQuerySystemInformation() (NtQSI) 2nd 3rd NtQueryVirtualMemory() API Number_Of_The_Beast (virus) 2nd NumberOfSections field (PE header) NX (nonexecutable) feature NX (nonexecutable) pages |