THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources]

Peter Szor

نسخه متنی -صفحه : 191/ 179
نمايش فراداده

  • Index

    [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

    naming

    code sections

    naming conventions

    computer viruses 2nd

    !*vendor-specific_comment&

    #*packer&

    *family_name& 2nd

    *infective_length&

    *malware_type&://

    *modifiers&

    *platform&/ 2nd 3rd 4th 5th 6th

    *variant&

    .*group_name&

    :*locale_specifier&

    @m

    @mm

    [*devolution&]

    native viruses 2nd

    native Windows NT service viruses

    native Windows NT viruses

    natural infection testing 2nd

    natural infections

    nature-simulation games

    Core War 2nd 3rd 4th

    Edward Fredkin structures 2nd 3rd

    game of Life (Conway) 2nd 3rd 4th 5th 6th

    John von Neumann theory 2nd 3rd

    Navrhar (virus)

    infection technique

    NC (NetCat)

    NC (NetCat) tool

    NCAs (Nexus Agents)

    NE viruses 2nd

    nearly-exact identification 2nd

    NEAT (WebTV worm)

    Neat (worm)

    911 attacks

    Nebbett, Gary

    Needham, Roger

    NET$DOS.SYS file

    boot viruses in 2nd

    NetCat (NC)

    NetCat (NC) tool

    netqworks

    ports

    monitoring

    network enumeration attacks 2nd 3rd

    network injectors

    definition of

    network intrusion detection system (NIDS) 2nd

    network protocol dependency

    network scanning 2nd 3rd 4th 5th 6th

    network share enumeration attacks 2nd 3rd

    network-intrusion detection system (NIDS)

    network-level defense strategies 2nd

    counterattacks

    early warning systems

    firewalls 2nd 3rd 4th

    honeypot systems 2nd 3rd

    network-intrusion detection system (NIDS) 2nd

    router access lists 2nd 3rd

    worm behavior patterns 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    networks

    boot viruses 2nd

    in-memory injectors over networks

    peer-to-peer network attacks 2nd

    peer-to-peer network control (worms) 2nd 3rd 4th

    traffic

    capturing

    neural networks

    heuristic analysis using 2nd 3rd

    Nexiv_Der (virus)

    infection technique 2nd 3rd 4th

    Next Generation Secure Computing Base (NGSCB)

    Next Generation Virus Creation Kit (NGVCK) 2nd 3rd

    Nexus Agents (NCAs)

    NGSCB (Next Generation Secure Computing Base)

    NGVCK (Next Generation Virus Creation Kit) 2nd 3rd

    NIDS (network intrusion detection system) 2nd

    NIDS (network-intrusion detection system)

    Nimda [See W32/Nimda (worm)]

    Nimda (worm) 2nd

    backdoor-compromised systems

    NNTP attacks

    worm infections

    NNTP-based e-mail address collection 2nd

    no-payload viruses 2nd

    NoKernel (virus)

    self-protection technique

    non-TSR viruses

    nondestructive payload viruses 2nd 3rd 4th 5th 6th

    nonexecutable (NX) feature

    nonexecutable (NX) pages

    nonlinear decryption

    nonstateful firewalls

    normal COM

    definition of

    Norton AntiVirus (antivirus program)

    Norton, Peter (Programmer's Guide to the IBM PC )

    notepad.exe

    STR streams

    NOTEPAD.EXE, W32/Parvo (virus) inside

    Novell NetWare ExecuteOnly attribute

    attacks via 2nd 3rd 4th 5th

    Nowhere Man (virus construction kit writer)

    NTDLL functions

    NTFS file systems

    compression viruses

    stream viruses 2nd

    NtOpenThread() function

    NtQueryInformationThread() API

    NtQuerySystemInformation() (NtQSI) 2nd 3rd

    NtQueryVirtualMemory() API

    Number_Of_The_Beast (virus) 2nd

    NumberOfSections field (PE header)

    NX (nonexecutable) feature

    NX (nonexecutable) pages