data files, viruses and, 107
Data link layer, OSI reference model, 29
Data link (MAC) layer, TCP/IP model, 29, 30
data protection, backup systems, 219–228
data rate, 8
data threats, 217–219
DDoS (distributed denial of service) attacks, 70
decibels, antenna gain, 140
decryption, 168
DEFCON hacking convention, 53
demultiplexing, encapsulation and, 34
DHCP (Dynamic Host Configuration Protocol)
access points and, 193
definition, 250
disabling, 193
ICS (Internet Connection Sharing) and, 133, 194
introduction, 32
IP addresses and, 38–39
IP addresses assignment, 193
problems, 194
security and, 193–197
services, access points and, 11
wardriving and, 94–95
differential backups, 220
digital certificates, 177–178
digital envelope, public key systems, 175
digital signatures, one-way-hash function, 176–177
directional antennas, 133
disassociate frames, 61, 73
disassociation messages, DoS attacks, 61
distributed denial of service attack (DDoS), 70
diversity antenna system, multipath interference and, 127
DMZ (demilitarized zone), security and, 210–211
DNS (Domain Name System), 32
DoC (Dis Org Crew), 58
domain names, 39–40
DoS (denial of service) attacks
accidental, 71
bots and, 116
definition, 250
disassociate frames, 73
disassociation messages and, 61
exposing, 70–74
FakeAP, 74
networking device flaws and, 71
session hijacking and, 61
strong signal jamming, 73–74
WPA, 72–73, 182–183
drive-by downloads, 152–154
drivers, optimization and, 146
DSS (Digital Spread Spectrum), cordless phones and, 164
DSSS (Direct Sequence Spread Spectrum), interference and, 129
dual-band devices, 16
dust accumulation, hardware failure and, 218