Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] UDP-based attacks undocumented functions virus self-protection techniques 2nd Unicode strings [See also strings] University of Hamburg's Virus Test Center (VTC) UNIX shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th unknown entry points (infection technique) 2nd 3rd 4th unpacking malicious code analysis techniques 2nd up-conversion update interface authenticated updates 2nd 3rd 4th 5th 6th 7th updates buffer overflow attacks (worms) 2nd 3rd upper 2G of address space (memory scanning) user address space of processes, scanning the user macros user mode executed images (Win32 viruses 2nd 3rd hidden window procedure (Win32 viruses native Windows NT service viruses NtQuerySystemInformation() (NtQSI) 2nd 3rd user mode rootkits user-mode user-mode rootkits |