Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Macintosh applications as single icons, displaying email access, securing email attachment viruses, eliminating main propagation method of file access, securing OS 10.3, user interface error viruses/worms MailFrontier, study of phishing attack success mailing lists, as security administration tool Mainwaring, Scott D. malware file changes man-in-the-middle attacks manipulation, as criterion of informed consent Marsh, Steve Martin, David Mathewson, Nick meaningfulness, authentication memorability authentication keys medium-fidelity prototypes of user interface Melissa virus memometric authentication 2nd memorability aspects of criterion for evaluating authentication challenge questions systems graphical passwords order of images picture effect and user-selected memory as human factor methods of remembering mnemonic-based passwords passwords recognition and security and, tradeoff in password selection uncued recall message boards, web bugs and messages encrypting IBM Lotus Notes/Domino PGP v5.0, usability evaluation user reluctance forged retrieving, phishing attack defense user feedback in postrelease, analyzing Microsoft users and trust users, researching Microsoft Internet Explorer consent dialogs extensibility of, Bugnosis user interface file download dialogs remote software installation SpoofGuard spoofing identification cues version 5, Privacy Bird add-on version 6 P3P functionality in peripheral awareness system Privacy Bird add-on Microsoft SQL Server passwords and SQLSnake/Spida worm Slammer worm SQLSnake/Spida worm Microsoft Word Melissa virus Miller, Robert MIME (Multipurpose Internet Mail Extensions) minimal distraction, informed consent model mirror sites, phishing and Mixmaster networks Mixminion network mMode Find People Nearby service (AT&T), information flow, obscuring mnemonic-based passwords difficulty of cracking memorability of monitoring 2nd application for biometric authentication data mining and intrusion detection systems 2nd local drives, tools for minimizing attacks by networks in real time log analysis 2nd scan reports, analyzing surveillance and, applications for keystroke authentication web logs, scanning 2nd with code samples Monrose, Fabian MOO (Object Oriented MUDMultiple User Dialog), as security administration tool 2nd 3rd Moromisa, George Moskowitz, Courtney MoTEC model of trust Mozilla Firefox Cookie Manager tool, redesign file access options version 1.73, peripheral awareness system Mozilla Foundation Multics operating system, internal security between users Multipurpose Internet Mail Extensions (MIME) MyDoom virus case study of signature detection in web logs Mynatt, Elizabeth D. |