![]() | ![]() |
| ||||||||||
![]() |
![]() |
![]() | |||||
| |||||
![]() |
of argument
in Dd.exe command-line syntax, 307
OllyDbg disassembler
function of and website address, 356
on-screen logging
in Honeyd, 135
Open Ports utility
for listing active listening ports, 276
looking for new network ports and services with, 319
website address, 276
open proxy server
for KFSensor honeypot, 205
open relays
sources of, 206–207
what happens to, 207
open source software
defined, 122
Open System Interconnection (OSI) models. See OSI models
Open Watcom assembler
website address, 352
open-source ComLog utility
function of, 281
open-source Windows forensics tools
website address, 335
operating system
analyzing as part of your network traffic analysis, 318–319
checking for pending file changes, 319
OS personalities
IP stack characteristic emulations as, 129–130
OSI model
example of, 228
importance of in network analysis, 227–229
network analysis and, 229
website address, 227
OSI models
within OSI models, 224–225
Oudot, Laurent
Honeyd used by to catch MBlaster worm, 180–181
website address for MBlaster worm article, 181
Outlook for Web Access
for retrieving e-mail, 83
OutlookRecovery tool
for recovering e-mail from Outlook PST files, 315
out-of-band monitoring
advantages of, 277
defined, 90
vs. in-band monitoring, 277
![]() | |||||
| |||||
![]() |