How Personal & Internet Security Works
Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] caching data CALEA (Communications Assistance for Law Enforcement Act) call associated data (CDC) call content information (CCC) cameras, closed-circuit CAPPSII (Computer Assisted Passenger Prescreening System) 2nd cards (RFID) Carnivore system (FBI) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) CAs (certificate authorities) 2nd CCC (call content information) CDC (call associated data) cell phones [See also Bluetooth.] bluebugging bluesnarfing cell phone cloners cell phone snoopers home location register (HLR) location tracking Paris Hilton case study viruses workplace surveillance certificate authorities (CAs) 2nd certificates, digital 2nd checksums China, web blocking and choke routers circuit-switched networks cleaning data clear to send (CTS) client/server model closed-circuit cameras cobs CODIS (Combined DNA Identification System) Communications Assistance for Law Enforcement Act (CALEA) Communications Decency Act Computer Assisted Passenger Prescreening System (CAPPSII) 2nd cookies CoolMiner corporate firewalls 2nd credit cards black market credit card money trail credit card fraud, detecting identity theft theft of credit card information credit repair scams cryptosystems 2nd CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) CTS (clear to send) |