Index[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
p-code macro viruses 2nd packed code sections 2nd packers
[See compression] packers, run-time packets decoders PAE (Physical Address Extension) page directories (memory) page directory entries (PDEs) page frames (memory) page table entry (PTE) page tables (memory) PAGE_READONLY access paging memory scanning and 2nd 3rd Palm platform resource-dependent viruses Palm/Phage (virus) parasitic viruses
[See classic parasitic viruses (infection technique)] parsing files for e-mail addresses 2nd partition table (PT) entries changing 2nd partitions definition of 2nd password cracking Morris worm password handling vulnerabilities password protection password-capturing attacks password-stealing Trojans definition of passwords security problems 2nd 3rd Pasteur (antivirus program) 2nd patches to import address table (IAT) patching code in active pages 2nd Pathogen (virus) X-RAY scanning patterns matching of computer viruses worm behavior 2nd 3rd 4th 5th 6th 7th 8th 9th 10th PaX (kernel mode extension) 2nd payload activation accidentally destructive payload viruses highly destructive payload viruses 2nd 3rd 4th 5th 6th 7th no-payload viruses 2nd nondestructive payload viruses 2nd 3rd 4th 5th 6th of worms 2nd somewhat destructive payload viruses 2nd 3rd types of W32/Simile virus 2nd 3rd PDEs (page directory entries) PDF viruses 2nd PDF/Yourde (virus) PE (portable executable) applications PE (portable executable) file format 2nd infection techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th PE files entry points infection by W95/Zmist virus 2nd infection techniques 2nd Windows CE PE header avoiding infection code section sizes infection multiple headers SizeOfCode field virtual size PE viruses 2nd 3rd 4th PEDUMP 2nd PeElf (virus) peer-to-peer network attacks worm infections 2nd peer-to-peer network control (worms) 2nd 3rd 4th peer-to-peer networks Linux/Slapper worm 2nd PEID tools Pentium II processors sysenter Perl viruses 2nd permutation complex permutation techniques (metamorphic viruses) 2nd 3rd 4th 5th simple permutation techniques (metamorphic viruses) 2nd 3rd 4th W95/Zmist virus Perriot, fFederic Perriot, Frederic 2nd personal firewalls [See also firewalls] Phager (virus) Phalcon-Skism Mass Produced Code Generator (PS-MPC) 2nd phishing attacks 2nd 3rd definition of phones wireless mobile worms 2nd 3rd PHP viruses 2nd PHP/Caracula (virus) PHP/Feast (virus) Physical Address Extension (PAE) Pietrek, Matt PIF viruses 2nd Pile, Christopher (virus writer) Ping Pong (virus) pings W32/Welchia (worm) platform dependency of macro viruses 2nd platform support for Win32 2nd 3rd Playgame (virus) nondestructive payload viruses Ply (virus) self-protection technique Pobresito (virus) Polimer.512.A (virus) infection technique polymorphic decryptor W32/Simile virus 2nd polymorphic decryptors interrupts in polymorphic macro viruses polymorphic PHP viruses polymorphic viruses 1260 virus 2nd 32-bit polymorphic viruses 2nd 3rd 4th 5th MtE (mutation engine) 2nd 3rd polymorphic worms 2nd polymorphism virus detection 2nd 3rd 4th 5th Popp, Joseph port 80 (HTTP), NetCat port I/O disk access 2nd portable executable (PE) applications portable executable (PE) file format 2nd infection techniques 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th ports monitoring PPE (Prizzy polymorphic engine) predefined class table (network scanning) 2nd 3rd 4th prefetch-queue attacks 2nd prepending viruses with encrypted host file headers 2nd prepending viruses (infection technique) 2nd 3rd 4th 5th preprocessors network intrusion detection system (NIDS) printers targeted by worms private pages, Win32 viruses that allocate Prizzy (virus writer) W32/Crypto virus Prizzy polymorphic engine (PPE) process address space randomization PROCESS_TERMINATE access PROCESS_VM_OPERATION access processes computer virus analysis 2nd 3rd 4th 5th 6th 7th 8th context (memory scanning) 2nd enumerating memory scanning 2nd monitoring terminating user address space of (scanning) viruses in 2nd profiles decryptors tracking program shepherding buffer overflow attacks (worms) 2nd Programmer's Guide to the IBM PC (Norton) propagation (worms)
[See code propagation techniques (worms)] ProPolice 2nd 3rd Provos, Niels proxy firewalls PS-MPC (Phalcon-Skism Mass-Produced Code Generator) 2nd PSD v(irus) pseudo-decryption loops PSMPC generators PT (partition table) entries changing 2nd PTE (page table entry) Python viruses 2nd |