Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] UDP-based attacks versus TCP-based attacks Ulam, Stanislaw UMB (upper memory block) undocumented CPU instructionsundocumented functions virus self-protection techniques 2nd Unicode strings [See also strings] University of Hamburg's Virus Test Center (VTC) University of MagdeburgUNIX ELF viruses 2nd shell scripts 2nd shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th unknown entry points (infection technique) 2nd 3rd 4th unknown virus removalunpacking malicious code analysis techniques 2ndup-conversion of macro viruses 2ndupdate interface of worms 2nd 3rd 4th 5th authenticated updates 2nd 3rd 4th 5th 6th 7th backdoor-based updates 2ndupdates security buffer overflow attacks (worms) 2nd 3rd upper 2G of address space (memory scanning) upper memory block (UMB) UPX (run-time packer) URL encoding 2nd user address space of processes, scanning theuser macros infectinguser mode memory scanning in 2nd 3rd executed images (Win32 viruses 2nd 3rd hidden window procedure (Win32 viruses native Windows NT service viruses NtQuerySystemInformation() (NtQSI) 2nd 3rd processes/rights 2nd Win32 viruses 2nd 3rd 4th viruses in processes 2nduser mode rootkits definition ofuser-mode debuggersuser-mode rootkits definition of UTF-8 encoding 2nd |