packet monkeys, 47
packet switching, 33–34, 252
packets, 6, 61
Parson, Jeffrey Lee, 48
passive devices, hubs, 5
passwords
access control and, 169
encryption and, 169
selection tips, 190–191
social engineering and, 55–56
SSID and, 190
trashing, crackers and, 56
wardriving protection and, 93
WEP and, 181
patches, security and, 211–213
payloads, viruses, 104, 111
PC manufacturers, 240–241
PCI, adapter cards, 13–14
PCMCIA, card adapters, 13–14
PDAs (personal digital assistants)
antivirus software, 120
as clients, 4
definition, 253
manufacturers, 240–241
virus infection, 103–104
peers, networks, 27
personal firewalls, 79. See also firewalls
PGP (Pretty Good Privacy), public key cryptography, 175, 184
physical barriers, interference and, 136–137
Physical layer
OSI reference model, 29
Wi-Fi, 31
piconets, 18, 253
PIF file extensions, viruses and, 107
PLA (Phone Losers of America), 58
plaintext
ciphertext, 170
in the clear, 169
encryption and, 168–169
PoE (Power over Ethernet), 253
policies on privacy, 156–157
port scanners
home network attacks, 78
services check, 79
unauthorized connections and, 131
power surges, hardware failure and, 218
P3P (Platform for Privacy Preferences), 157
Presentation layer, OSI reference model, 29
print servers, access points and, 11
printers, as clients, 4
privacy. See also encryption
cookies and, 154–156
cordless phones, 163–165
Google and, 148
PGP (Pretty Good Privacy), 184
policies, 156–157
P3P, 157
public databases and, 148
reasons for, 147–149
resource Web sites, 238–239
spyware exposure, 151–152
threats, 149–156
video cameras, 161–163
WEP, 179–181
WPA and, 182–183
privacy settings, Internet Explorer, 154–156
promiscuous mode, NICs, 87–88
proprietary protocols, 24
protection tips
backups, 219–228
blended threats, 115
bot software, 117
data threat identification, 217–219
hardware protection, 228–232
public hotspots, 65–67
Trojans, 111
worms, 114
protocols
definition, 24
open, 24
proprietary, 24
TCP/IP, 32
proxy servers, HTTP, VPNs, 67
pseudo-random encryption key, 180
public databases, privacy and, 148
public hotspots, session hijacking, 64–65
public key cryptography
digital envelope, 175
invention, 174
PGP (Pretty Good Privacy), 175