Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] rabbit (worm) definition of Radai, Yisrael Raiu, Costin Rajaat (virus writer) Ralf Brown Interrupt List Ramble (virus) Ramdhani, Denny Yanuar (virus writer) Ramen (worm) random decryption algorithm (RDA) viruses 2nd 3rdrandom entry points in code section 2nd random execution logic 2nd random overwriting viruses (infection technique) 2nd 3rdrandomization process address space randomized network scanning 2nd Raptor (firewall)Ratter (virus writer) W32/Kick virus WinCE/Duts.1520 virus RDA (random decryption algorithm) viruses 2nd 3rdRDA.Fighter (virus) self-protection techniqiue RDTSC instruction read stealth viruses 2nd 3rd 4th 5th read-only kernel memory ReadProcessMemory() API 2nd 3rd real permutating engine (RPME) Reaper (antivirus program) recalculating checksum 2nd reconfiguring key functions 2ndrecycling compiler alignment areas Redcode language 2nd 3rd Core Wars instructions (1994 revision) refiltering drivers (DeactivatorDriver)registries monitoringRegistry keys detecting debuggers macro viruses Registry-dependent viruses 2nd Regmon tool regular disinfection methods 2nd standard 2nd 3rd relative virtual address (RVA) relocation cavity viruses (infection technique)remote control of worms 2nd 3rd 4th 5th peer-to-peer network control 2nd 3rd 4th remote login-based attacks 2ndRemoteExplorer virus [See WNT/RemEx (virus)]renaming sections replication [See also self-replicating systems] worms [See also worm blocking techniques]Repus [See W95/Repus (virus)]requests Address Resolution Protocol (ARP)pings capturing W32/Welchia (worm) research honeypots research papers (virus)resident viruses [See memory-resident viruses] resource dependency 2ndresources early warning/up-to-date security information retro viruses retroviruses 2nd 3rd somewhat destructive payload viruses retroworms return-to-LIBC attacks 2nd 3rd 4th 5threviving dead virus code REXX viruses 2nd 3rd Riordan, Roger Ripper (virus)Ritchie, Dennis Core Warrootkits definition of 2ndrouters access lists 2nd 3rd Rowe, Mark roy g biv (virus writer) Ginger virus MSIL/Impanate virus 2nd W32/Chiton virus 2nd W64/Rugrat.3344 virus RPME (real permutating engine)RT Fishel (virus writer) Ginger virus RTL (run-time library) functionsRugrat [See W64/Rugrat.3344 (virus)]run-time code injection attacks [See code injection attacks] run-time library (RTL) functions run-time packers Russel, Ryan RVA (relative virtual address) |