Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] e-gold EAP (Extensible Authentication Protocol) eavesdropping [See electronic surveillance.] Echelon system electro-dermal activity Electronic Communication Privacy Act of 1986 Electronic Privacy Information Center (EPIC) electronic surveillance FBI Carnivore system NSA Echelon system Patriot Act digital certificates phishing phishing email messages protecting against spam anti-spam software dangers of dictionary attacks laws regulating Nigerian 419 scams open mail relays open proxies public sources of email addresses spammers' methods to hide their identity spammerwocky speed at which spam spreads zombies/bots encryption 2nd EPIC (Electronic Privacy Information Center) eradication programs ESS (extended service set) evil twin hacks extended service set (ESS) Extensible Authentication Protocol (EAP) exterior screening routers |