Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] p-code macro viruses 2nd packed code sections 2ndpackers [See compression] packers, run-timepackets decoders PAE (Physical Address Extension) page directories (memory) page directory entries (PDEs) page frames (memory) page table entry (PTE) page tables (memory) PAGE_READONLY accesspaging memory scanning and 2nd 3rdPalm platform resource-dependent viruses Palm/Phage (virus)parasitic viruses [See classic parasitic viruses (infection technique)]parsing files for e-mail addresses 2nd partition table (PT) entries changing 2ndpartitions definition of 2ndpassword cracking Morris wormpassword handling vulnerabilities password protection password-capturing attackspassword-stealing Trojans definition ofpasswords security problems 2nd 3rd Pasteur (antivirus program) 2ndpatches to import address table (IAT) patching code in active pages 2ndPathogen (virus) X-RAY scanningpatterns matching of computer viruses worm behavior 2nd 3rd 4th 5th 6th 7th 8th 9th 10th PaX (kernel mode extension) 2ndpayload activation accidentally destructive payload viruses highly destructive payload viruses 2nd 3rd 4th 5th 6th 7th no-payload viruses 2nd nondestructive payload viruses 2nd 3rd 4th 5th 6th of worms 2nd somewhat destructive payload viruses 2nd 3rd types of W32/Simile virus 2nd 3rd PDEs (page directory entries) PDF viruses 2nd PDF/Yourde (virus) PE (portable executable) applications PE (portable executable) file format 2nd infection techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13thPE files entry points infection by W95/Zmist virus 2nd infection techniques 2nd Windows CEPE header avoiding infection code section sizes infection multiple headers SizeOfCode field virtual size PE viruses 2nd 3rd 4th PEDUMP 2nd PeElf (virus)peer-to-peer network attacks worm infections 2nd peer-to-peer network control (worms) 2nd 3rd 4thpeer-to-peer networks Linux/Slapper worm 2nd PEID toolsPentium II processors sysenter Perl viruses 2ndpermutation complex permutation techniques (metamorphic viruses) 2nd 3rd 4th 5th simple permutation techniques (metamorphic viruses) 2nd 3rd 4th W95/Zmist virus Perriot, fFederic Perriot, Frederic 2nd personal firewalls [See also firewalls] Phager (virus) Phalcon-Skism Mass Produced Code Generator (PS-MPC) 2nd phishing attacks 2nd 3rd definition ofphones wireless mobile worms 2nd 3rd PHP viruses 2nd PHP/Caracula (virus) PHP/Feast (virus) Physical Address Extension (PAE) Pietrek, Matt PIF viruses 2nd Pile, Christopher (virus writer) Ping Pong (virus)pings W32/Welchia (worm)platform dependency of macro viruses 2nd platform support for Win32 2nd 3rdPlaygame (virus) nondestructive payload virusesPly (virus) self-protection technique Pobresito (virus)Polimer.512.A (virus) infection techniquepolymorphic decryptor W32/Simile virus 2ndpolymorphic decryptors interrupts in polymorphic macro viruses polymorphic PHP viruses polymorphic viruses 1260 virus 2nd 32-bit polymorphic viruses 2nd 3rd 4th 5th MtE (mutation engine) 2nd 3rd polymorphic worms 2ndpolymorphism virus detection 2nd 3rd 4th 5th Popp, Joseph port 80 (HTTP), NetCatport I/O disk access 2nd portable executable (PE) applications portable executable (PE) file format 2nd infection techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13thports monitoring PPE (Prizzy polymorphic engine) predefined class table (network scanning) 2nd 3rd 4th prefetch-queue attacks 2ndprepending viruses with encrypted host file headers 2nd prepending viruses (infection technique) 2nd 3rd 4th 5thpreprocessors network intrusion detection system (NIDS)printers targeted by worms private pages, Win32 viruses that allocatePrizzy (virus writer) W32/Crypto virus Prizzy polymorphic engine (PPE) process address space randomization PROCESS_TERMINATE access PROCESS_VM_OPERATION accessprocesses computer virus analysis 2nd 3rd 4th 5th 6th 7th 8th context (memory scanning) 2nd enumerating memory scanning 2nd monitoring terminating user address space of (scanning) viruses in 2ndprofilesdecryptors trackingprogram shepherding buffer overflow attacks (worms) 2nd Programmer's Guide to the IBM PC (Norton)propagation (worms) [See code propagation techniques (worms)] ProPolice 2nd 3rd Provos, Niels proxy firewalls PS-MPC (Phalcon-Skism Mass-Produced Code Generator) 2nd PSD v(irus) pseudo-decryption loops PSMPC generators PT (partition table) entries changing 2nd PTE (page table entry) Python viruses 2nd |