Index[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
hackers half-cooked repairs definition of Hamming code error detection and correction 2nd Hamming, Richard Happy99 (worm) 2nd e-mail address harvesting 2nd 3rd 4th NNTP attacks Happy99 worm 2nd 3rd nondestructrive payload viruses hard-coded API addresses 2nd hardware destroying viruses 2nd hardware-level stealth viruses 2nd 3rd Hare (virus) infection technique self-protection technique harvesting e-mail addresses (worms) 2nd 3rd 4th 5th 6th 7th hashing first-generation antivirus scanners 2nd header PE files 2nd 3rd 4th 5th header infection viruses (infection technique) 2nd heap management 2nd heap overflows 2nd 3rd 4th exploiting 2nd 3rd 4th Linux/Slapper worm 2nd 3rd 4th 5th 6th 7th 8th heap-based overflow attacks, compiler-level solutions heaps definition of 2nd exception-handler validation Helenius, Marko Helenius, marko Help file viruses 2nd heuristic analysis antiheuristics techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th of 32-bit Windows viruses 2nd 3rd 4th 5th 6th using neural networks 2nd 3rd heuristic behavior-blocking systems heuristics code emulation 2nd for generic repair 2nd Heyne, Frank hidden window procedure (Win32 viruses) HIEW tool 2nd goat files (cleaning) High Memory Area (HMA) high-interaction honeypot systems highly destructive payload viruses 2nd 3rd 4th 5th 6th 7th history of antivirus programs 2nd history of blended attacks 2nd history of computer viruses 2nd 3rd history of self-replicating systems Core War 2nd 3rd 4th Edward Fredkin structures 2nd 3rd game of Life (Conway) 2nd 3rd 4th 5th 6th John von Neumann theory 2nd 3rd history of Win32 viruses 2nd hit list method
[See IP addresses, scanning] hive definition of HLP/Demo (virus) HMA (High Memory Area) hoaxes definition of 2nd holes in memory Honeyd honeypot systems 2nd 3rd hook table for Frodo virus 2nd hooking API hooking (infection technique) 2nd 3rd function call-hooking (infection technique) 2nd 3rd IAT (import address table) 2nd interrupts 2nd 3rd 4th 5th INT 1 and INT 3 on INT 13h (boot viruses) 2nd 3rd on INT 21h (file viruses) 2nd 3rd 4th host application mutation (metamorphic viruses) 2nd host file headers encryption 2nd host files detection of end host size dependency 2nd host-based intrusion prevention techniques 2nd 3rd 4th buffer overflow attcks blocking 2nd code reviews compiler-level solutions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th kernel-mode extensions 2nd opreating system-level solutions 2nd 3rd program shepherding 2nd subsystem extensions 2nd script/SMTP blocking 2nd 3rd WebTV worms 2nd HTML viruses 2nd HTML-based mail HybrisF (virus) self-protection technique HyperCard HyperTalk viruses 2nd hyperfast disk access first-generation antivirus scanners HyperTalk viruses 2nd Hypervisor (virus) Hypponen, Mikko 2nd 3rd |