S



Index


[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

satellites
scanners (airport)
script kiddies
search page hijackers
searching the Internet with Google
     blocking Google indexer
     deep crawling
     fresh crawls
     Froogle
     Gmail
     Google Desktop
     Google Local
     Google Toolbar
     Googlebot
     indexer
     personal information collected by
     Search History
     search process
     stop words
secret-key cryptography
sending instant messages
servers, proxy 2nd
signature bases
signatures 2nd
smurf attacks [See DoS (denial-of-service) attacks.]
sniffers 2nd 3rd 4th
     Bluetooth sniffers
     packet sniffers
software
     anti-spam software
         Bayesian filters
         blacklists
         peer-to-peer technology
         spam blockers
         spam filters
         whitelists
     spyware
         affiliate programs
         anti-spyware
         dialers
         home page hijackers
         keyloggers
         money trail
         polymorphic spyware
         privacy issues
         rootkits
         search page hijackers
     viruses
         antivirus software
         cell phones
         eradication programs
         Trojan horses 2nd 3rd
         virus markers
         zombies 2nd
spam
     anti-spam software
         Bayesian filters
         blacklists
         peer-to-peer technology
         spam blockers
         spam filters
         whitelists
     dangers of
     dictionary attacks
     laws regulating
     Nigerian 419 scams
     open mail relays
     open proxies
     public sources of email addresses
     spammers' methods to hide their identity
     spammerwocky
     speed at which spam spreads
spammerwocky
spiders
spoofing
     Bluetooth
     spam return addresses
Spoofstick
spyware
     affiliate programs
     anti-spyware
     dialers
     home page hijackers
     keyloggers
     money trail
     polymorphic spyware
     privacy issues
     rootkits
     search page hijackers
stateful inspection
stations (Wi-Fi)
Steinhardt, Barry
stop words
SurfWatch
surveillance
     FBI Carnivore system
     NSA Echelon system
     Patriot Act
     workplace surveillance
         badges/ID tags
         cell phones
         closed-circuit cameras
         continuous, systematic surveillance
         GPSs (global positioning systems)
         Internet use
         statistics
         wiretapping



How Personal & Internet Security Work
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net