H


hacker(s). See also information security; malware, automated

client security and, 526-530

criminal, 70, 71

dedicated, 60-61

exploitation techniques, 43-60

IE and, 253-254, 289

intentions, 70-71

malware types and, 62-70

methodology, 60-61

PM's impact on, 253-254

popular software and, 246, 289

hard disk encryption, 534-535

hardening, 547. See also Internet Information Services 7.0; named pipes; service(s)

people, 547

Hardware key, 102

harmonics, 463

hash tables, pre-computed, 49

hashes. See specific hashes

HelpAssistant account, 181

removal of Support and, 181

hives, 101. See also registry; specific hives

abbreviations, 101

levels under, 102-103

types, 101

HKCC (HK_Current Config) hive, 107-108

HKCR (HKey_Classes_Root) hive, 103-107

file associations and, 103, 104

sections, 104-105

Trojans and, 106, 107

use of, 103

HKCU (HKey_Current_Users) hive, 107

file associations and, 104

spyware and, 107

HK_Current Config hive. See HKCC hive

HKey_Classes_Root hive. See HKCR hive

HKey_Local_Machine hive. See HKLM hive

HKey_Users hive. See HKU hive

HKLM (HKey_Local_Machine) hive, 102-103

file associations and, 104

keys in, 102-103

Software, 103

System, 103

HKU (HKey_Users) hive, 107

Howard, Michael, 4, 128

Http.sys kernel mode driver, 308

hybrid mode, 90

Hydra program, 45. See also password guessing

Hyperterminal, 215. See also telnet client



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net