THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    rabbit (worm)

    definition of

    Radai, Yisrael

    Raiu, Costin

    Rajaat (virus writer)

    Ralf Brown Interrupt List

    Ramble (virus)

    Ramdhani, Denny Yanuar (virus writer)

    Ramen (worm)

    random decryption algorithm (RDA) viruses 2nd 3rd

    random entry points

    in code section 2nd

    random execution logic 2nd

    random overwriting viruses (infection technique) 2nd 3rd

    randomization

    process address space

    randomized network scanning 2nd

    Raptor (firewall)

    Ratter (virus writer)

    W32/Kick virus

    WinCE/Duts.1520 virus

    RDA (random decryption algorithm) viruses 2nd 3rd

    RDA.Fighter (virus)

    self-protection techniqiue

    RDTSC instruction

    read stealth viruses 2nd 3rd 4th 5th

    read-only kernel memory

    ReadProcessMemory() API 2nd 3rd

    real permutating engine (RPME)

    Reaper (antivirus program)

    recalculating checksum 2nd

    reconfiguring key functions 2nd

    recycling

    compiler alignment areas

    Redcode language 2nd 3rd

    Core Wars instructions (1994 revision)

    refiltering drivers (DeactivatorDriver)

    registries

    monitoring

    Registry keys

    detecting debuggers

    macro viruses

    Registry-dependent viruses 2nd

    Regmon tool

    regular disinfection methods 2nd

    standard 2nd 3rd

    relative virtual address (RVA)

    relocation cavity viruses (infection technique)

    remote control

    of worms 2nd 3rd 4th 5th

    peer-to-peer network control 2nd 3rd 4th

    remote login-based attacks 2nd

    RemoteExplorer virus
    [See WNT/RemEx (virus)]

    renaming

    sections

    replication [See also self-replicating systems]

    worms [See also worm blocking techniques]

    Repus
    [See W95/Repus (virus)]

    requests

    Address Resolution Protocol (ARP)

    pings

    capturing W32/Welchia (worm)

    research honeypots

    research papers (virus)

    resident viruses
    [See memory-resident viruses]

    resource dependency 2nd

    resources

    early warning/up-to-date security information

    retro viruses

    retroviruses 2nd 3rd

    somewhat destructive payload viruses

    retroworms

    return-to-LIBC attacks 2nd 3rd 4th 5th

    reviving

    dead virus code

    REXX viruses 2nd 3rd

    Riordan, Roger

    Ripper (virus)

    Ritchie, Dennis

    Core War

    rootkits

    definition of 2nd

    routers

    access lists 2nd 3rd

    Rowe, Mark

    roy g biv (virus writer)

    Ginger virus

    MSIL/Impanate virus 2nd

    W32/Chiton virus 2nd

    W64/Rugrat.3344 virus

    RPME (real permutating engine)

    RT Fishel (virus writer)

    Ginger virus

    RTL (run-time library) functions

    Rugrat
    [See W64/Rugrat.3344 (virus)]

    run-time code injection attacks
    [See code injection attacks]

    run-time library (RTL) functions

    run-time packers

    Russel, Ryan

    RVA (relative virtual address)


  • / 191