Index_H

 < Day Day Up > 



H

hacker insurance

American International Group, 522–23

Counterpane Internet Security Inc., 66–67, 524, 559

coverages, 523

cyberintrusions pricing, 525

Deposit Companies, 524

discounts, 524

e-commerce, 524

FBI and Computer Security Institute’s 2000 DoS survey, 524

Fidelity, 524

Frank Crystal & Co, 524

free on-site security assesment, 522–23

Global Integrity, 404, 523

Hewlett-Packard, 247, 463, 524

Insurance Information Institute, 523

insurer-certified security firm, 524

Lloyd’s of London, 70, 524

lower costs, 525

managed service contracts, 524

Marsh & McClennan Companies, 524

premium rates, 523–24

Safeonline, 524

security assessments, 524

St. Paul Companie, 524

The Chubb Group, 524

Unisys, 523

Wurzler, 524

hacker tools

9-11 2001 terrorist attacks, 76, 173, 248

Dsniff, 453

EvilPing, 353

Knark, 453

QuickFire, 353

sniffer software, 543

Snot,61

Stick, 61

SubSeven, 584

Trojan Horse programs, 37, 82, 240, 440–41, 584

Whisker, 61

WinSmurf, 353

Hackers on Planet Earth (See HOPE)

Hamas, 262, 312, 325, 327–28, 334

Happy 99 e-mail virus, 244

hard drive electronic trails, 563

hard-kill options, 291–92

hardware documentation, 149

hardware failures, 109

hardware requirements, 213

Hasan al Banna, 326

hash functions, 610

hash value, 173, 176

Hassan I. Sabbah, 316

hazardous material (HAZMAT) units, 343

Health Insurance Portability and Accountability Act (HIPAA), 543–45

Herbert Pierre-Louis, 595

HERF gun, 356–57

Herve Guttuso, 330

Hewlett-Packard, 247, 463, 524

Hexadecimal notation, 623

Hezbollah, 312, 327, 355, 368, 575

hidden data

Access, 212–15, 360, 594

database files, 215

digital watermark, 415

e-mails, 451

embedded text, 214

Excel, 44, 211, 214–15, 489, 491–92

File |Properties, 214

hidden columns, 214

hidden comments, 214–15

hidden fields, 215

Hide and Seek1416

JavaScript, 451–52

Jpeg-Jsteg, 416

microdot, 415

SFS (Steganographic File System), 415–16

spreadsheet file formulas, 214

Stealth., 416

steganography programs, 415

Steganos, 416

StegoDos, 416

S-Tools for Windows, 416

table formulas, 214

White Noise Storm, 416

hidden fields, 215–15

Hide and Seek, 416

High Energy Radio Frequency (HERF) guns, 270–71, 356–57, 427–28

High Power Microwave (HPM), 427–28, 437

high-speed intrusion detection, 59–60

high-tech braindrain, 295

high-tech exports, 360

Hindu nationalists, 313

Hit Theorist Web site, 427

Hizb-ut-Tahrir, 327–28

Hogwarts, 442

hollow bunnies, 574

Holocaust deniers, 327, 329

Honda, 443

honeypot, 174, 452, 579

Hong Kong Blondes, 347

Hong Kong’s privacy commissioner, 529

HOPE (Hackers on Planet Earth) conference, 331–32

HOPE (Hackers on Planet Earth), 331–32

hosting providers, 402

hot keys, 153

hot recovery, 107

Hotmail, 452

House Appropriations Committee, 412

HPM devices, 430

HTML-enabled e-mail readers, 452

HTTP (80), 592

http://csrc.nist.gov/, 569

http://csrc.nist.gov/publications/drafts.html, 569

http://network-tools.com/5/, 73

http://www .403-security.org, 593

http://www.abscomtrak.com, 484

http://www.allwhois.com, 73

http://www.altavista.com, 74

http://www.anonymizer.com, 75

http://www.armenian-genocide.org, 245

http://www.bi.com, 484

http://www.cnn.com, 73

http://www.cownow.com, 331–332

http://www.cultdeadcow.com/hacktivismo.html, 331

http://www.deja.com, 75

http://www.dhp.com, 331

http://www.digitalintel.com/, 609

http://www.eeye.com/html/Research/Tools/nmapNT.html, 593

http://www.eff.org, 333

http://www.encase.com/html/index. html, 138, 158, 609

http://www.fedcirc.gov/, 616

http://www.forensics-intl.com, 40

http://www.forensics-intl.com/safeback.html, 35–37, 138, 145–46, 609

http://www.g8online.org/, 506, 605–06

http://www.geocities .com/SiliconValley/Bay/5598, 349

http://www.gnupg.org, 417

http://www.icq.com, 75

http://www.insecure.org/nmap/, 593

http://www .ifcss.org, 349

http://www.iomega.com, 211

http://www.L0pht.com, 593

http://www.loc8.net, 486

http://www.onion-router.net, 414–15, 581–82

http://www.privacycenter.du.edu/demos/ bugged.doc, 491

http://www.privacycenter.du.edu/demos/bugged.xls, 492

http://www.ptm.com, 484

http://www.research.att.com, 582

http://www.samspade.org, 73

http://www.sans.org, 76

http://www.sans.org/y2k/, 73

http://www.securityfocus.com, 76, 355, 543

http://www.speakfreely.org, 416, 559

http://www.toolsthatwork .com/byte.shtml, 138, 609

http://www.whitehouse.gov, 40

Hughes aerospace firm, 362

Hughes Electronics Corp, 360, 362

human resources proceedings, 5

human rights codes, 183

Human Rights Watch, 565

hybrid host-network IDS capabilities, 587

Hycamtin, 196

hypertext markup language (HTML), 284



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net