< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] DAC (discretionary access control) daemon security (Unix) DARPA (Defense Advanced Research Projects Agency) data erasure tools data packets (TCP/IP) data recovery, legal considerations databases attacks on [See SQL injection attacks] design errors, finding shells usage by web sites dd command dd tool debug registers, Intel processors debug traps debuggers 2nd [See also gdb; ptrace ] deception network "decrypt-except" signature transform DeepSight Analyzer Defense Advanced Research Projects Agency (DARPA) defragmenting Deletang, Frederic DELETE command DES algorithm DHCP DI (destination) register dictionary attacks differential power analysis Digital Millennium Copyright Act (DMCA) directional antennas directory traversal dis-asm.h disassemble_info structure disassemblers Linux disassembly identifying functions prologue and epilogue intermediate code generation libopcodes, using Linux, static linking and program control flow writing tools for discretionary access control (DAC) disk cloning disk imaging Disk KEK display command Dittrich, Dave DMCA (Digital Millennium Copyright Act) DMZ DNS (Domain Name Service) access controls security risks 2nd domain restriction DoS (denial-of-service) attacks Unix application-level DoS coordinated denial-of-service distributed DoS attacks local resource attacks reflexive DoS Windows clients help center attacks SMB (Service Message Block) attack UPnP (Universal Plug and Play) attacks DOS MZ header DOS stub DPAPI RA DROP command DS (code segment) Dshield.org dsniff toolkit dump tool dumpster-diving DX (data) register |
< Day Day Up > |