Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] T lt get (virus) infection techniquetarget locator of worms 2nd e-mail address harvesting 2nd 3rd 4th 5th 6th 7th IP address scanning 2nd 3rd 4th 5th 6th network share enumeration 2nd 3rd TBCLEAN (antivirus program) 2nd TBSCAN (antivirus program) 2nd 3rd TCL viruses 2nd TCP (virus writer)TCP-based attacks versus UDP-based attacksTechnoRat (virus writer) W32/Harrier virus temporary memory-resident viruses 2ndTentacle_II [See W16/Tentacle_II (virus)]Tentacle_II (virus) infection technique 2nd 3rd 4th Tequila (virus) 2nd infection technique self-protection technique 2nd X-RAY scanning Terminate-and-Stay-Resident (TSR) programs 2nd TerminateProcess() APItermination processes threads 2nd 3rd 4th testers, antivirus softwaretesting black-box natural infection 2nd the kernel-mode drivers third-generation buffer overflows 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd definition of Thomson, Ken Thomson, Roger thread information block (TIB) checking conents thread local storage (TLS) data directory THREAD_TERMINATE access 2ndthreads monitoring terminating 2nd 3rd 4th W32/Niko.5178 (virus) TIB (thread information block) checking contentstiny viruses definition of TLBs (translation look-aside buffers) TLS (thread local storage) data directory TLSDEMO programtop-and-tail scanning first-generation antivirus scanners TPE (Trident Polymorphic Engine)tracing code emulation-based tunneling system calls 2nd with debug interfaces 2ndtracking active instructions decryptors malicious code 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14thtraffic sniffingtranslation of virtual addresses translation look-aside buffers (TLBs)trapdoors [See backdoors] Tremor (virus) 2nd Trident Polymorphic Engine (TPE)triggers definition ofTrivial (virus) infection techniqueTrojan horses definition of 2ndTrojans source code Trojans 2ndtroubleshootingconnections worm blocking techniques 2nd debugging 2nd 3rd 4th 5th TruSecure Corporation TSR (Terminate-and-Stay-Resident) programs 2nd tunneling viruses behavior blocking code emulation disk access with port I/O 2nd memory scanning for interrupt handler 2nd tracing with debug interfaces 2nd undocumented functions 2nd Turbo Debugger divide-by-zero exceptions Turing Machine |