Index[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
F-PROT (antivirus program) 2nd 3rd 4th F1 key Help file viruses 2nd false positives integrity checking 2nd signatures FAT file systems cluster viruses 2nd 3rd Father Christmas (worm) Father Christmas worm 2nd FC (File Compare) 2nd Ferenc, Leitold Ferrie, Peter TLSDEMO program File Compare tool file extension dependency 2nd 3rd file format dependency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th file formats obfuscation file infection techniques
[See infection techniques] File Monitor log file parsing attacks 2nd file stealth viruses 2nd 3rd file structure infection Win32 file system dependency 2nd 3rd 4th file systems filter drivers file viruses generic disinfection methods 2nd hooking INT 21h (interrupt handler) 2nd 3rd 4th FileAlignment field (PE header) files goat (natural infection testing) 2nd IDA command script (IDC) images scanning monitoring 2nd Filler (virus) 2nd infection technique filter driver virus deactivation (memory scanning) 2nd 3rd filtering algorithmic scanning methods 2nd 3rd as process of computer virus analysis 2nd filters drivers fingerd program Morris worm attack against fingerprinting worm targets 2nd 3rd 4th 5th 6th Finnpoly (virus) firewalls 2nd 3rd 4th BlackIce first-generation antivirus scanners bookmarks 2nd entry-point scanning 2nd fixed-point scanning 2nd generic detection hashing 2nd hyperfast disk access mismatches string scanning 2nd 3rd top-and-tail scanning wildcards 2nd first-generation buffer overflows 2nd 3rd 4th definition of first-generation Windows 95 viruses 2nd 3rd FitzGerald, Nick fixed-point scanning first-generation antivirus scanners 2nd flags suspicious combinations of Flash ActionScript viruses 2nd Flash BIOS viruses 2nd Flip (virus) somewhat destructive payload viruses flirt signatures flooders definition of FluShot (antivirus program) Ford, Richard Form (virus) infection technique format specifiers format string attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th formatting extra sectors 2nd 3rd formula macros 2nd FPU instructions 2nd fractionated cavity viruses (infection technique) 2nd 3rd 4th 5th Franvir
[See W32/Franvir (virus)] Fredkin, Edward self-replicating structures 2nd 3rd free() function FreeBSD/Scalper (worm) shellcode blocking Freitas, Robert A., Jr Frodo (virus) hook table 2nd interrupt hooking 2nd 3rd self-protection technique full-stealth file viruses full-stealth polymorphic viruses full-stealth viruses 2nd function GetProcAddress() function call-hooking (infection technique) 2nd 3rd function pointer overflows 2nd 3rd 4th functions direct library invocation detection 2nd 3rd execve() exporting 2nd free() KiUserExceptionDispatcher() LoadLibrary() malloc() NTDLL NtOpenThread() Object Manager OpenThread() run-time library (RTL) VirtualAlloc() VirtualProtectEx() Windows NT for kernel-mode memory scanning 2nd functionsGetProcAddress() future worm attacks 2nd 3rd 4th |