[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] packet keys RC4 algorithm WEP security 2nd packet splitting IDS hacker attacks Palm OS airborne viruses infection methods 2nd Liberty Crack 2nd Phage Vapor Phage virus Palm PDAs 2nd Parabolic Grid Antennas HyperLink HG2419G 2nd technical specifications 2nd pass-through authentication Funk Steel-Belted Server software (RADIUS) 2nd 3rd password generator utility (vxUtil) passwords dumpster diving 2nd employee impersonations 2nd lost encryption disadvantages weaknesses PCS devices (Personal Communications Service) PCS devices .NET programming 2nd browsing (WAP) 2nd 3rd Japanese i-mode technology 2nd Java 2 Micro Environment (J2ME) 2nd minibrowsers sample WML cards 2nd WML application creation WML applications creating testing (Openwave SDK) WMLScript client-side scripting 2nd 3rd PDAs Compaq iPAQ features 2nd technical specifications Palm 2nd PocketPC 2nd programming languages 2nd .NET 2nd HTML i-mode 2nd Java 2nd WML 2nd 3rd WMLScript 2nd 3rd XHTML 2nd 3rd 4th XML 2nd 3rd protocols WAP 2nd 3rd 4th 5th 6th 7th 8th 9th PEER mode (WNICs) probe request frames 2nd 3rd 4th Perl.com Web site Phage virus (Palm OS) 2nd piconet Bluetooth protocol PING hacking tool 2nd ping sweeper utility (vxUtil) ping utility (NetForce) ping utility (vxUtil) PKI (Public Key Infrastructure) certificate authorities (CAs) certificate chain trust issues trusted root certificate X.509 standard 2nd 3rd 4th 5th 6th 7th digital signatures nonrepudiation one-way hash algorithm 2nd public key cryptography public key algorithms 2nd 3rd 4th WAP PKI Model CA Public Key Certificates (WTLS Class 2) 2nd 3rd certificate delivery 2nd certificate enrollment 2nd certificate management 2nd 3rd certificate requests 2nd Client Public Key Certificates (WMLScript SignText) 2nd 3rd 4th Client Public Key Certificates (WTLS Class 3) 2nd 3rd device certificates 2nd limitations 2nd security tokens 2nd 3rd 4th 5th 6th 7th 8th Service and Device Management (SDM) 2nd 3rd SmartTrust software 2nd SmartTrust Wireless Internet Browser (WIB) 2nd Trusted Operator Services (TOS) 2nd 3rd 4th 5th 6th WIM implementation methods 2nd wireless implementation Entrust.com example 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th plaintext predetrmining (WEP) 2nd Pocket PC CENiffer access point searches 2nd 3rd 4th 5th data capturing filters 2nd 3rd installing launching 2nd hacking overview 2nd Web site resources 2nd IBM Wireless Security Auditor application window configuration screen features 2nd GPS support Help menu launching root background window supported WNICs MiniStumbler access point searches 2nd installing launching 2nd Net Force installing 2nd 3rd 4th launching programs installing 2nd vxUtil installing 2nd 3rd 4th launching WLAN drivers installing 2nd PocketPC PDA 2nd port scanner utility (NetForce) port scanner utility (vxUtil) ports Trojan horses client/server side 2nd PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) predetermining plaintext (WEP) 2nd predictive value (IDS) Bayes theorem function of predictive values (IDS) likelihood ratios (LRs) 2nd 3rd preventing malicious scripts Web pages 2nd virus infections 2nd PRG Algorithm RC4 algorithm WEP security 2nd 3rd 4th PRGA (Pseudo Random Generation Algorithm) RC4 encryption example 2nd 3rd 4th XOR with plaintext example 2nd prismdump program WEPCrack installing 2nd 3rd prism-getIV.pl script 2nd weakIVGen.pl script 2nd WEPCrack.pl script 2nd probe request frames WNICs PEER mode 2nd 3rd 4th programming languages .NET 2nd HTML i-mode 2nd Java 2nd overview 2nd WML 2nd 3rd WMLScript 2nd 3rd XHTML 2nd 3rd 4th XML 2nd 3rd programs Pocket PC installing 2nd promiscuous mode Kismet network cards (sniffers) 2nd 3rd protocols 802.11 standard (IEEE) CSMA/Collision Avoidance 2nd overview 2nd prior technologies 802.11a standard (IEEE) 5GHz range Orthogonal Frequency Division Multiplexing overview versus 802.11b standard 2nd 802.11b standard (IEEE) 2.4 GHz range 2nd DSSS (direct-sequence spread spectrum) versus 802.11a standard 2nd 802.11g standard (IEEE) overview 802.3 standard (IEEE) CSMA/CD 2nd Bluetooth communication process 2nd development of overview piconet security features 2nd technical specifications HomeRF FHSS standard 2nd overview IrDA overview 2nd 3rd PANs (personal area networks) potential light transmission problems overview 2nd TKIP (Temporal Key Integrity Protocol) Message Integrity Check 2nd 3rd RC4 algorithm WAP application stack 2nd 3rd 4th 5th 6th PCS device browsing 2nd 3rd Pseudo Random Generation Algorithm (PRGA) RC4 encryption example 2nd 3rd 4th XOR with plaintext example 2nd public key algorithms Diffie-Hellman DSA RSA public key cryptography private keys public key algorithms 2nd 3rd 4th public keys Public Key Infrastructure, [See PKI] publications reference resources 2nd |