Index[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
naming code sections naming conventions computer viruses 2nd !*vendor-specific_comment& #*packer& *family_name& 2nd *infective_length& *malware_type&:// *modifiers& *platform&/ 2nd 3rd 4th 5th 6th *variant& .*group_name& :*locale_specifier& @m @mm [*devolution&] native viruses 2nd native Windows NT service viruses native Windows NT viruses natural infection testing 2nd natural infections nature-simulation games Core War 2nd 3rd 4th Edward Fredkin structures 2nd 3rd game of Life (Conway) 2nd 3rd 4th 5th 6th John von Neumann theory 2nd 3rd Navrhar (virus) infection technique NC (NetCat) NC (NetCat) tool NCAs (Nexus Agents) NE viruses 2nd nearly-exact identification 2nd NEAT (WebTV worm) Neat (worm) 911 attacks Nebbett, Gary Needham, Roger NET$DOS.SYS file boot viruses in 2nd NetCat (NC) NetCat (NC) tool netqworks ports monitoring network enumeration attacks 2nd 3rd network injectors definition of network intrusion detection system (NIDS) 2nd network protocol dependency network scanning 2nd 3rd 4th 5th 6th network share enumeration attacks 2nd 3rd network-intrusion detection system (NIDS) network-level defense strategies 2nd counterattacks early warning systems firewalls 2nd 3rd 4th honeypot systems 2nd 3rd network-intrusion detection system (NIDS) 2nd router access lists 2nd 3rd worm behavior patterns 2nd 3rd 4th 5th 6th 7th 8th 9th 10th networks boot viruses 2nd in-memory injectors over networks peer-to-peer network attacks 2nd peer-to-peer network control (worms) 2nd 3rd 4th traffic capturing neural networks heuristic analysis using 2nd 3rd Nexiv_Der (virus) infection technique 2nd 3rd 4th Next Generation Secure Computing Base (NGSCB) Next Generation Virus Creation Kit (NGVCK) 2nd 3rd Nexus Agents (NCAs) NGSCB (Next Generation Secure Computing Base) NGVCK (Next Generation Virus Creation Kit) 2nd 3rd NIDS (network intrusion detection system) 2nd NIDS (network-intrusion detection system) Nimda
[See W32/Nimda (worm)] Nimda (worm) 2nd backdoor-compromised systems NNTP attacks worm infections NNTP-based e-mail address collection 2nd no-payload viruses 2nd NoKernel (virus) self-protection technique non-TSR viruses nondestructive payload viruses 2nd 3rd 4th 5th 6th nonexecutable (NX) feature nonexecutable (NX) pages nonlinear decryption nonstateful firewalls normal COM definition of Norton AntiVirus (antivirus program) Norton, Peter (Programmer's Guide to the IBM PC ) notepad.exe STR streams NOTEPAD.EXE, W32/Parvo (virus) inside Novell NetWare ExecuteOnly attribute attacks via 2nd 3rd 4th 5th Nowhere Man (virus construction kit writer) NTDLL functions NTFS file systems compression viruses stream viruses 2nd NtOpenThread() function NtQueryInformationThread() API NtQuerySystemInformation() (NtQSI) 2nd 3rd NtQueryVirtualMemory() API Number_Of_The_Beast (virus) 2nd NumberOfSections field (PE header) NX (nonexecutable) feature NX (nonexecutable) pages |