< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] radio frequency signal drift , reducing RADIUS (remote authentication dial-in user service) Rain Forest Puppy RAM (Random Access Memory) 2nd RAM types rapport RARP (Reverse Address Resolution Protocol) RC4 algorithm RCE (reverse code engineering) 2nd embedded operating systems [See Windows CE] history legality Linux antidebugging antidisassembly disassembly tools, writing problem areas serial.exe [See serial.exe, reverse engineering] test.exe, using MVC Windows CE [See Windows CE] Windows code tools debuggers disassemblers hex editors install managers personal firewalls system monitors unpackers Windows examples malicious binaries Muad'Dib's Crackme #1 realms (Kerberos) receiver operating characteristic (ROC) curve reconnaissance active FTP stealth web site analysis evidence left by human online passive tools web searching Recourse Man Trap recover Recovery Agents (RAs) reflexive denial of service reg macro registers ARM processor, description of Registry system call regmon relational databases [See databases] remote assistance (Windows) Remote Desktop (Windows) remote root shells research honeypots resource consumption resource exhaustion attacks Reverse Address Resolution Protocol (RARP) reverse code engineering [See RCE] reverse shell/telnet covert channel reverse tunneled shell covert channel RING tool risk analysis rlogin, security risks Rogue ROM (Read Only Memory) root root servers rootkits commonly replaced binaries LKM kits methodologies of sniffers Rotate Right Extended (ROR) routing protocols RPC attacks, evidence security risks rsh, security risks runtime monitoring, Linux and Unix rwatch watchpoints |
< Day Day Up > |