Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] V.T. (virus writer) Darth_Vader virusV2Px (virus) self-protection technique Vacsina (virus) infection technique Vajda, Ferencevalidation application rights verification exception-handler 2nd 3rd 4th input validation attacks 2nd MIME types 2nd 3rd 4th 5th 6th URL encoding 2ndValleZ (virus writer) W32/Zelly virus vampire attacks vampire warriors (Core War game) van Wyk, KenVaricella (virus) self-protection technique VAT (Virus Analysis Toolkit) 2nd 3rdVAX/VMS systems DCL viruses 2nd VBA document macros 2ndVBS/Bubbleboy (virus) safe-for-scripting ActiveX controlsVBS/BubbleBoy (worm) detailed description of 2ndVBS/Bubbleboy (worm) HTML-based mailVBS/LoveLetter.A@mm (virus) infection technique VBS/LoveLetter.A@mm (worm) VBS/Loveletter.A@mm (worm) VBS/LoveLetter@mm (worm) 2ndVBS/Loveletter@mm (worm) script blocking VBS/VBSWG.J (Anna Kournikova virus) VBScript viruses 2nd 3rd VCL (Virus Creation Laboratory) 2nd 3rdVCL.379 (virus) generic disinfection methods VCL.428 (virus) VCS (Virus Construction Set) 2nd Vecna (virus writer) Coke virus HybrisF virus W32/Borm worm W32/HybrisF virus W95/Fabi virus W95/Regswap virus Veldman, Frans 2nd 3rd 4thVelvet (virus) self-protection technique vendors, antivirus software (contact information) VET (antivirus program) VGrepvideo memory checking Vienna (virus) 2nd 3rd infection technique VIM viruses 2nd Virdem (virus) 2nd infection technique VIRKILL (antivirus program) VIROCRK (antivirus program) virtual address spaces 2nd 3rd 4th 5th 6th 7thvirtual addresses translation of virtual debuggers virtual machine (VM) virtual machine manager (VMM) Virtual Machine Manager (VMM) memory areavirtual machines code emulation 2nd 3rd 4th encrypted/polymorphic virus detection 2nd 3rd 4th 5th Virtual Memory Manager virtual memory systems (Windows NT) 2nd 3rd 4th virtual address spaces 2nd 3rd 4th 5th 6th 7th VirtualAlloc() function VirtualProtectEx() function VirtualQueryEx() API VirtualRoot (Trojan horse) Virus Analysis Toolkit (VAT) 2nd Virus Bulletin web site virus construction kits 2nd ethics of using GenVir list of 2nd NGVCK 2nd 3rd PS-MPC 2nd VCL (Virus Creation Laboratory) 2nd VCS (Virus Construction Set) 2nd Virus Construction Set (VCS) 2nd Virus Creation Laboratory (VCL) 2nd 3rdvirus generators definition of Virus Patrol (antivirus service) Virus Research Unit of the University of Tampere in Finland virus throttlingviruses [See computer viruses] access control systems 2nd algorithmic scanning methods 2nd 3rd filtering 2nd 3rd static decryptor detection 2nd 3rd X-RAY method 2nd 3rd 4th 5th antivirus defense techniques 2nd behavior blocking 2nd 3rd 4th code emulation 2nd 3rd 4th dynamic decryptor detection 2nd encrypted/polymorphic virus detection 2nd 3rd 4th 5th disinfection methods 2nd 3rd 4th generic decryptors 2nd heuristics for generic repair 2nd standard 2nd 3rd first-generation antivirus scanners bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic detection hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2ndheuristic analysis of 32-bit Windows viruses 2nd 3rd 4th 5th 6th using neural networks 2nd 3rd inoculation 2nd integrity checking 2nd 3rd 4th metamorphic virus detection code emulation 2nd 3rd 4th 5th disassembling techniques 2nd geometric detection 2nd sand-boxing 2nd second-generation antivirus scanners exact identification 2nd 3rd nearly-exact identification 2nd skeleton detection smart scanning 2nd Visual .NET 2003 (Microsoft) 2nd 3rd 4th VLAD (virus writer) W95/Boza virus VM (virtual machine) VMM (virtual machine manager) VMM (Virtual Machine Manager) memory area VMWARE 2nd 3rd 4th von Neumann, John self-reproducing automata theory 2nd 3rd von Neumann, Nicholas VOOGLE VPN (virtual private network) [See also network-level defense strategies] VTC (University of Hamburg's Virus Test Center)vulnerabilitiesblended attacks [See blended attacks] vulnerability dependency VxD viruses VxD-based viruses (infection technique) 2nd 3rd 4thVxDs LE (linear executable) file formatVyssotsky, Victor Core War |