index_B

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

Back doors
     drawbacks of
     software for
     to op-codes
Back Orifice program 2nd
Behavior detection
BHOs (Browser Helper Objects)
Binary code, patching
bind function
Binding
     in IAT hooking
     in inline function hooking
     to interfaces
BIOS, accessing
BLINK member
     as process pointer
     changing value of 2nd 3rd
Bootloaders, modifying
Bootstrap code, activation of
Bouncing packets
Browser Helper Objects (BHOs)
Buffer pools
Buffer-overflow exploits 2nd
Buffers in NDIS 2nd
Bug fixes by Microsoft
Build environments
Build utility
Bus
     data
     I/O
     PCI
Bypassing
     firewalls
     forensic tools

 < Day Day Up >   


Rootkits(c) Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
ISBN: 0321294319
EAN: 2147483647
Year: 2006
Pages: 111

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net