hacker(s). See also information security; malware, automated
client security and, 526-530
criminal, 70, 71
dedicated, 60-61
exploitation techniques, 43-60
IE and, 253-254, 289
intentions, 70-71
malware types and, 62-70
methodology, 60-61
PM's impact on, 253-254
popular software and, 246, 289
hard disk encryption, 534-535
hardening, 547. See also Internet Information Services 7.0; named pipes; service(s)
people, 547
Hardware key, 102
harmonics, 463
hash tables, pre-computed, 49
hashes. See specific hashes
HelpAssistant account, 181
removal of Support and, 181
hives, 101. See also registry; specific hives
abbreviations, 101
levels under, 102-103
types, 101
HKCC (HK_Current Config) hive, 107-108
HKCR (HKey_Classes_Root) hive, 103-107
file associations and, 103, 104
sections, 104-105
Trojans and, 106, 107
use of, 103
HKCU (HKey_Current_Users) hive, 107
file associations and, 104
spyware and, 107
HK_Current Config hive. See HKCC hive
HKey_Classes_Root hive. See HKCR hive
HKey_Local_Machine hive. See HKLM hive
HKey_Users hive. See HKU hive
HKLM (HKey_Local_Machine) hive, 102-103
file associations and, 104
keys in, 102-103
Software, 103
System, 103
HKU (HKey_Users) hive, 107
Howard, Michael, 4, 128
Http.sys kernel mode driver, 308
hybrid mode, 90
Hydra program, 45. See also password guessing
Hyperterminal, 215. See also telnet client