hardcoded algorithms, 137, 148
hash-based message authentication codes (HMACs), 136
hash functions, 9, 136
hashing data, 141
headers, 8
heap
countermeasures, 58
defenses, 55–59, 72
overrun, 57, 173
randomization, 51
heap spraying, 55
HeapTerminateOnCorrupt, 72
high-integrity objects
determining, 39–40
labeling, 37–39
high-integrity processes, 32–34, 37, 41–42
high-level privileges, 104–106
highestAvailable manifest option, 23
HKCU registry, 43
HKLM registry, 13, 43
HMAC (hash-based message authentication codes), 136
“How Windows Defender Identifies Spyware,” 168
Howard, Michael, 1, 49, 83, 130, 181
HTML, 121, 123
clipboard access, Internet Explorer 7, 132
gadgets, 181
Identity Selector, Information Card, 157
HTTP remote file access, 145
HTTPExemptionList, 167
Huitema, Christian, 77, 80
Humphrey, Watts, 50, 97
Hungarian notation, 8