How Personal & Internet Security Works
Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] satellites scanners (airport) script kiddies search page hijackers searching the Internet with Google blocking Google indexer deep crawling fresh crawls Froogle Gmail Google Desktop Google Local Google Toolbar Googlebot indexer personal information collected by Search History search process stop words secret-key cryptography sending instant messages servers, proxy 2nd signature bases signatures 2nd smurf attacks [See DoS (denial-of-service) attacks.] sniffers 2nd 3rd 4th Bluetooth sniffers packet sniffers software anti-spam software Bayesian filters blacklists peer-to-peer technology spam blockers spam filters whitelists spyware affiliate programs anti-spyware dialers home page hijackers keyloggers money trail polymorphic spyware privacy issues rootkits search page hijackers viruses antivirus software cell phones eradication programs Trojan horses 2nd 3rd virus markers zombies 2nd spam anti-spam software Bayesian filters blacklists peer-to-peer technology spam blockers spam filters whitelists dangers of dictionary attacks laws regulating Nigerian 419 scams open mail relays open proxies public sources of email addresses spammers' methods to hide their identity spammerwocky speed at which spam spreads spammerwocky spiders spoofing Bluetooth spam return addresses Spoofstick spyware affiliate programs anti-spyware dialers home page hijackers keyloggers money trail polymorphic spyware privacy issues rootkits search page hijackers stateful inspection stations (Wi-Fi) Steinhardt, Barry stop words SurfWatch surveillance FBI Carnivore system NSA Echelon system Patriot Act workplace surveillance badges/ID tags cell phones closed-circuit cameras continuous, systematic surveillance GPSs (global positioning systems) Internet use statistics wiretapping |