Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] obfuscated code 2nd opcode mixing-based code confusion 2nd 3rd 4th obfuscated entry points obfuscated file formats obfuscated tricky jump (infection technique) 2nd 3rd 4th object code viruses 2nd 3rd Object Manager functions objects (network enumeration)octopus (worm) definition of 2nd off-by-one buffer overflows 2nd 3rd 4thOLE2 files macro viruses 2nd oligomorphic viruses 2nd 3rdOlivia (virus) infection technique 2nd 3rd 4th OllyDBG toolOmud (virus) infection technique on-access antivirus scanners 2nd [See also scanners] on-demand antivirus scanners 2nd [See also scanners] One_Half (virus) 2nd generic disinfection methods infection technique opcode mixing-based code confusion 2nd 3rd 4thOpenSSL vulnerabilities in OpenThread() function operating system dependency 2nd operating system version dependency 2ndoperating systems access control systems 2nd buffer overflow attacks (worms) Solaris on SPARC 2ndWindows NT virtual address spaces 2nd 3rd 4th 5th 6th 7th virtual memory systems 2nd 3rd 4th ordinal, imports by ordinal-based importsoriginal boot sector not saving 2nd saving at end of disk 2ndOS/2 LX viruses 2nd NE viruses 2nd OS2/Jiskefet (virus) OS2/Myname (virus) outbreak statistics (worm)outgoing e-mail messages harvesting e-mail addresses using 2nd 3rd 4thoverflows [See buffer overflow attacks] Overmars, Mark overwriting data viruses 2nd 3rd overwriting viruses (infection technique) 2nd 3rd 4th |