TCP/IP model
Application layer, 30
Data link (MAC) layer, 30
Network layer, 30
OSI model comparison, 29–30
Transport layer, 30
TCP/IP port scanners, home network attacks, 78
TCP/IP protocols
definition, 254
descriptions, 32
encapsulation, 33–34
packet switching, 33–34
Telnet, 214
theft of service identification, 131–132
threats to privacy, location-based services, 149–151
throughput, 8
time outs, session hijacking and, 59
TLD (top-level domain), 40
ToorCon hacker/cracker convention, 54
topologies, 5, 24
traffic filtering, network security and, 197–202
transceivers
antennas and, 139
definition, 254
Transport layer
OSI reference model, 29
TCP/IP model, 29, 30
transposition cipher
encryption and, 171
ROT13 encryption, 172
trashing, crackers and, 56
trees, interference, 144–145
Trojans
backdoors and, 111
description, 110
hoaxes and, 121
introduction, 101
troubleshooting
adjacent channel overlap, 130
configuration errors, 132–133
equipment optimization, 145–146
interference detection, 134–137
interoperability issues, 138
multipath interference, 125–130
theft of service identification, 131–132