THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    p-code

    macro viruses 2nd

    packed code sections 2nd

    packers
    [See compression]

    packers, run-time

    packets

    decoders

    PAE (Physical Address Extension)

    page directories (memory)

    page directory entries (PDEs)

    page frames (memory)

    page table entry (PTE)

    page tables (memory)

    PAGE_READONLY access

    paging

    memory scanning and 2nd 3rd

    Palm platform

    resource-dependent viruses

    Palm/Phage (virus)

    parasitic viruses
    [See classic parasitic viruses (infection technique)]

    parsing files

    for e-mail addresses 2nd

    partition table (PT) entries

    changing 2nd

    partitions

    definition of 2nd

    password cracking

    Morris worm

    password handling

    vulnerabilities

    password protection

    password-capturing attacks

    password-stealing Trojans

    definition of

    passwords

    security problems 2nd 3rd

    Pasteur (antivirus program) 2nd

    patches

    to import address table (IAT)

    patching code in active pages 2nd

    Pathogen (virus)

    X-RAY scanning

    patterns

    matching

    of computer viruses

    worm behavior 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    PaX (kernel mode extension) 2nd

    payload activation

    accidentally destructive payload viruses

    highly destructive payload viruses 2nd 3rd 4th 5th 6th 7th

    no-payload viruses 2nd

    nondestructive payload viruses 2nd 3rd 4th 5th 6th

    of worms 2nd

    somewhat destructive payload viruses 2nd 3rd

    types of

    W32/Simile virus 2nd 3rd

    PDEs (page directory entries)

    PDF viruses 2nd

    PDF/Yourde (virus)

    PE (portable executable) applications

    PE (portable executable) file format 2nd

    infection techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

    PE files

    entry points

    infection by W95/Zmist virus 2nd

    infection techniques 2nd

    Windows CE

    PE header

    avoiding infection

    code section sizes

    infection

    multiple headers

    SizeOfCode field

    virtual size

    PE viruses 2nd 3rd 4th

    PEDUMP 2nd

    PeElf (virus)

    peer-to-peer network attacks

    worm infections 2nd

    peer-to-peer network control (worms) 2nd 3rd 4th

    peer-to-peer networks

    Linux/Slapper worm 2nd

    PEID tools

    Pentium II processors

    sysenter

    Perl viruses 2nd

    permutation

    complex permutation techniques (metamorphic viruses) 2nd 3rd 4th 5th

    simple permutation techniques (metamorphic viruses) 2nd 3rd 4th

    W95/Zmist virus

    Perriot, fFederic

    Perriot, Frederic 2nd

    personal firewalls [See also firewalls]

    Phager (virus)

    Phalcon-Skism Mass Produced Code Generator (PS-MPC) 2nd

    phishing attacks 2nd 3rd

    definition of

    phones

    wireless mobile worms 2nd 3rd

    PHP viruses 2nd

    PHP/Caracula (virus)

    PHP/Feast (virus)

    Physical Address Extension (PAE)

    Pietrek, Matt

    PIF viruses 2nd

    Pile, Christopher (virus writer)

    Ping Pong (virus)

    pings

    W32/Welchia (worm)

    platform dependency

    of macro viruses 2nd

    platform support for Win32 2nd 3rd

    Playgame (virus)

    nondestructive payload viruses

    Ply (virus)

    self-protection technique

    Pobresito (virus)

    Polimer.512.A (virus)

    infection technique

    polymorphic decryptor

    W32/Simile virus 2nd

    polymorphic decryptors

    interrupts in

    polymorphic macro viruses

    polymorphic PHP viruses

    polymorphic viruses

    1260 virus 2nd

    32-bit polymorphic viruses 2nd 3rd 4th 5th

    MtE (mutation engine) 2nd 3rd

    polymorphic worms 2nd

    polymorphism

    virus detection 2nd 3rd 4th 5th

    Popp, Joseph

    port 80 (HTTP), NetCat

    port I/O

    disk access 2nd

    portable executable (PE) applications

    portable executable (PE) file format 2nd

    infection techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

    ports

    monitoring

    PPE (Prizzy polymorphic engine)

    predefined class table (network scanning) 2nd 3rd 4th

    prefetch-queue attacks 2nd

    prepending viruses

    with encrypted host file headers 2nd

    prepending viruses (infection technique) 2nd 3rd 4th 5th

    preprocessors

    network intrusion detection system (NIDS)

    printers

    targeted by worms

    private pages, Win32 viruses that allocate

    Prizzy (virus writer)

    W32/Crypto virus

    Prizzy polymorphic engine (PPE)

    process address space randomization

    PROCESS_TERMINATE access

    PROCESS_VM_OPERATION access

    processes

    computer virus analysis 2nd 3rd 4th 5th 6th 7th 8th

    context (memory scanning) 2nd

    enumerating

    memory scanning 2nd

    monitoring

    terminating

    user address space of (scanning)

    viruses in 2nd

    profiles

    decryptors

    tracking

    program shepherding

    buffer overflow attacks (worms) 2nd

    Programmer's Guide to the IBM PC (Norton)

    propagation (worms)
    [See code propagation techniques (worms)]

    ProPolice 2nd 3rd

    Provos, Niels

    proxy firewalls

    PS-MPC (Phalcon-Skism Mass-Produced Code Generator) 2nd

    PSD v(irus)

    pseudo-decryption loops

    PSMPC generators

    PT (partition table) entries

    changing 2nd

    PTE (page table entry)

    Python viruses 2nd


  • / 191