How Personal & Internet Security Works

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

satellites

scanners (airport)

script kiddies

search page hijackers

searching the Internet with Google

     blocking Google indexer

     deep crawling

     fresh crawls

     Froogle

     Gmail

     Google Desktop

     Google Local

     Google Toolbar

     Googlebot

     indexer

     personal information collected by

     Search History

     search process

     stop words

secret-key cryptography

sending instant messages

servers, proxy 2nd

signature bases

signatures 2nd

smurf attacks [See DoS (denial-of-service) attacks.]

sniffers 2nd 3rd 4th

     Bluetooth sniffers

     packet sniffers

software

     anti-spam software

         Bayesian filters

         blacklists

         peer-to-peer technology

         spam blockers

         spam filters

         whitelists

     spyware

         affiliate programs

         anti-spyware

         dialers

         home page hijackers

         keyloggers

         money trail

         polymorphic spyware

         privacy issues

         rootkits

         search page hijackers

     viruses

         antivirus software

         cell phones

         eradication programs

         Trojan horses 2nd 3rd

         virus markers

         zombies 2nd

spam

     anti-spam software

         Bayesian filters

         blacklists

         peer-to-peer technology

         spam blockers

         spam filters

         whitelists

     dangers of

     dictionary attacks

     laws regulating

     Nigerian 419 scams

     open mail relays

     open proxies

     public sources of email addresses

     spammers' methods to hide their identity

     spammerwocky

     speed at which spam spreads

spammerwocky

spiders

spoofing

     Bluetooth

     spam return addresses

Spoofstick

spyware

     affiliate programs

     anti-spyware

     dialers

     home page hijackers

     keyloggers

     money trail

     polymorphic spyware

     privacy issues

     rootkits

     search page hijackers

stateful inspection

stations (Wi-Fi)

Steinhardt, Barry

stop words

SurfWatch

surveillance

     FBI Carnivore system

     NSA Echelon system

     Patriot Act

     workplace surveillance

         badges/ID tags

         cell phones

         closed-circuit cameras

         continuous, systematic surveillance

         GPSs (global positioning systems)

         Internet use

         statistics

         wiretapping

Категории