Babbage, 191
Back Orifice, 277, 449
Backup copies, 203, 292
10Base5, 420–1
10/100BaseT, 421
100BaseT, 421
Balanced tree (B-tree), 260, 323–4
Banks, 37
unauthorized access to records from, 30
Bar code scanning, 338
Basic Input and Output System see BIOS
Basic Security Module (BSM), 311
Behavioral evidence, 662
analysis, 414–15, 662
crime scene characteristics
Behavioral imprints, 115
Behavior-motivational typology, 662
classification system, 159
Behaviors, types of, 159
Bell Atlantic Laboratories, 194
Benedict, L., 134
Bensusan Restaurant Corporation v. King, 41–2
Beowulf cluster, 310
Berkeley Database (DB), 233, 316, 331
Best Evidence Rule, 178
Bigendian systems, 198
BIOS, 195–6
Bitstream copy:
of disk, 294
of digital evidence, 395
Black Widow, 491
Blackberry devices, 355
Block groups, 292
in UNIX file systems, use of, 307
Blowfish, 207, 497
encryption, 525
Blue Magnet, 154
Blue Note jazz club in New York City, 41
Bluetooth, 338, 364
Bondage and sadomasochism (BDSM) online groups, 587
Boole, G., 191
Boolean logic, 191
Boot disks, 227, 256, 290
Boot sector, 203
Bootstrap Protocol (BOOTP), 457, 618
Bots, 497
see also Internet Relay Chats
"bouncer" (BNC), 498
see also Internet Relay Chats
Brandies, L., 51
Briefcase feature on Yahoo!, 285
BrightStor ARCserve Backup, 393
Broad targeting, 542, 662
Broad versus narrow searches, issue of, 214
BSM audit records, 364
B-tree see Balanced tree
Buffer overflows, 524, 662
Bugtraq, 404
Bulletin Board System (BBS), 44, 379, 662
Byte Back, 261