cabinets, interference and, 127
cameras, 159, 161–163
cantenna, 250
case sensitivity, SSID, 190
ceilings, interference and, 127
CERT (Computer Emergency Response Team), security vulnerabilities, 85
certificate authority, digital certificates and, 177
CF (Compact Flash), card adapters, 13–14
channels
adjacent, overlap, 130
configuration errors and, 133
Chaos Computer Club, 58
ciphers
definition, 168
encryption key, 170
frequency analysis, 172
ciphertext, 170
classes, addresses, 35–36
client mode, access points, 11–12
clients
description, 26
excess number, 133
introduction, 4
security, 207–215
wireless adapters and, 9
wireless NICs and, 9
coaxial cable, Ethernet networks and, 5
CodeRed worm, 115
COM file extensions, viruses and, 107
Computer Browser service, 214
configuration
adapter modes, 133
antenna installation and, 133
channels, 133
connection speed, 133
error checking, 132–133
IP addresses, 133
SSID and, 133
connections
accidental, 129
bridges, 41
gateways, 41–42
routers, 41–42
speed, configuration errors and, 133
speed, minimum, 205
unauthorized, identifying, 131
conventions/gatherings for hackers and crackers, 53–54
cookies, privacy and, 154–156
cordless phones, 163–165
CPUs (central processing units), hubs and, 6
crackers
2600 Magazine, 54
black hats, 47
conventions/gatherings, 53–54
digital certificates and, 178
fink-fund virus reporting reward, 109
hacker comparison, 45–46
jargon, 50–51
packet monkeys, 47
reasons for cracking, 51–53
resources, 57–58
script kiddies, 47–49
session hijacking, 59
s’kiddiots, 47
social engineering, 50, 55–56
spoofing and, 60
trashing, 56
tricks, 54–57
viruses and, 102
cross-contamination of infection, 103
cryptanalysis, 168
cryptography, 168, 173–176
cryptology, 168
cryptosystems, 168
cyber vandalism, script kiddies and, 48