How Personal & Internet Security Works

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

W32.Funner worm

W32.Mytob-P worm

war driving 2nd

Web

     client/server model

     URLs

     web browsers

web blocking

web browsers 2nd

     buffer overflow attacks

     drive-by download attacks

     hacker attacks

     phishing attacks

     protecting against browser-based attacks

web bugs 2nd

websites

     blocking

     buffer overflow attacks

     collecting personal information via

     dictionary attacks

     DoS (denial-of-service) attacks

         ping requests

         protecting against

     Internet searches with Google

         blocking Google indexer

         deep crawling

         fresh crawls

         Froogle

         Gmail

         Google Desktop

         Google Local

         Google Toolbar

         Googlebot

         indexer

         parental controls 2nd

         personal information collected by

         Search History

         search process

         stop words

     privacy

         cookies

         personal profiles

         sniffers 2nd

         user activity, tracking

         web bugs 2nd

     sniffers

WEP (Wireless Encryption Protocol)

whitelists

Wi-Fi

     APs (access points)

     BSS (basic service set)

     CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

     CTS (clear to send)

     encryption

     ESS (extended service set)

     evil twin hacks

     hacker attacks

     hotspot hacking

     hotspot protection

     hotspots

     peer-to-peer networks

     probe request frames

     RTS (request to send)

     stations

     war driving

     wireless network protection

Wireless Encryption Protocol (WEP)

wireless Internet connections

     Bluetooth

         Bluetooth sniffers

         bonding

         hacker attacks

         link controllers

         piconets

         spoofing

     Wi-Fi

         APs (access points)

         BSS (basic service set)

         CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

         CTS (clear to send)

         encryption

         ESS (extended service set)

         evil twin hacks

         hacker attacks

         hotspot hacking

         hotspot protection

         hotspots

         peer-to-peer networks

         probe request frames

         RTS (request to send)

         stations

         war driving

         wireless network protection

wireless networks

wiretapping 2nd [See also electronic surveillance.]

     illegal wiretapping

     legal wiretapping

workplace surveillance

     badges/ID tags

     cell phones

     closed-circuit cameras

     continuous, systematic surveillance

     GPSs (global positioning systems)

     Internet use

     statistics

     wiretapping

World Wide Web [See Web.]

worms 2nd

     antivirus software

     eradication programs

     W32.Funner worm

     W32.Mytob-P worm

Категории