backdoors, Trojans and, 111
backups
bare metal, 220
differential, 220
frequency, 220
incremental, 220
Internet, 225–226
media selection, 223–224
nearline storage, 222–223
offline storage, 223
online storage, 220–221
planning considerations, 224–225
software, 226–228
storage, 220–223
what to back up, 219
bandwidth, sharing, 131
bare metal backups, 220
BAT file extensions, viruses and, 107
beacon frames, wardriving and, 91
black hats, 46–47
Blaster worm, 48
blended attacks, spoofing and, 65
blended threats, 101, 114–115
Bluetooth
802.15.1 and, 18–20
definition, 250
master devices, 18
piconets, 18
scatternets, 19
slave devices, 18
Bots, 101, 116–117
bridge mode, access points, 11–12, 11–13
bridges, network connection and, 41
British government, hacktivist, 49
broadcast
connection speed, minimum, 205
inline attenuators, 203
overview, 10
parameter modification, security, 202–205
power adjustments, 203
SSID broadcast, disabling, 204–205
browsing, VPN and, 67
BSS (Basic Service Set), 250
built-in adapters, 13