Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] W32.Funner worm W32.Mytob-P worm war driving 2nd Web client/server model URLs web browsers web blocking web browsers 2nd buffer overflow attacks drive-by download attacks hacker attacks phishing attacks protecting against browser-based attacks web bugs 2nd websites blocking buffer overflow attacks collecting personal information via dictionary attacks DoS (denial-of-service) attacks ping requests protecting against Internet searches with Google blocking Google indexer deep crawling fresh crawls Froogle Gmail Google Desktop Google Local Google Toolbar Googlebot indexer parental controls 2nd personal information collected by Search History search process stop words privacy cookies personal profiles sniffers 2nd user activity, tracking web bugs 2nd sniffers WEP (Wireless Encryption Protocol) whitelists Wi-Fi APs (access points) BSS (basic service set) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) CTS (clear to send) encryption ESS (extended service set) evil twin hacks hacker attacks hotspot hacking hotspot protection hotspots peer-to-peer networks probe request frames RTS (request to send) stations war driving wireless network protection Wireless Encryption Protocol (WEP) wireless Internet connections Bluetooth Bluetooth sniffers bonding hacker attacks link controllers piconets spoofing Wi-Fi APs (access points) BSS (basic service set) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) CTS (clear to send) encryption ESS (extended service set) evil twin hacks hacker attacks hotspot hacking hotspot protection hotspots peer-to-peer networks probe request frames RTS (request to send) stations war driving wireless network protection wireless networks wiretapping 2nd [See also electronic surveillance.] illegal wiretapping legal wiretapping workplace surveillance badges/ID tags cell phones closed-circuit cameras continuous, systematic surveillance GPSs (global positioning systems) Internet use statistics wiretapping World Wide Web [See Web.] worms 2nd antivirus software eradication programs W32.Funner worm W32.Mytob-P worm |