Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] data miners DDoS (distributed denial-of-service) attacks dedicated firewall devices default router passwords, changing destination, selecting for file backups 2nd detecting malicious programs viruses heuristic detection time-zero disabling ad-hoc networking 2nd disk scans active scans performing drive-by downloads DVD storage |