hackers
2600 Magazine, 54
conventions/gatherings, 53–54
cracker comparison, 45–46
MIT and, 45–46
reasons for hacking, 51–53
resources, 57–58
hacktivists, 49–50
handhelds, antivirus software, 120
hardware. See also firmware
failure, 218
grounding antennas, 229–230
lightening arrestors, 229–230
maintenance, protection and, 230–232
manufacturers, 233–236
protection tips, 228–232
SSID and, 190
static electricity, 231
surge protection, 228–232
hijacking, session hijacking, 59
HiperLAN (High-Performance Radio Local Area Network), 248
hoaxes
description, 120–121
FCC and, 121
identification, 121–122
Trojans and, 121
hobo symbols, 97
home networks
attacks, 77
TCP/IP port scanners, 78
HomeRF working group, 14–15, 251
HOPE (Hackers on Planet Earth) convention, 53
host names, 40
hosts
definition, 26
security, 207–215
hotspots
protection in, 65–67
rogue access points and, 68
session hijacking, 64–65
HTA file extensions, viruses and, 107
HTTP (Hypertext Transfer Protocol)
description, 32
proxy servers, VPNs and, 67
hubs
access points and, 11
as active devices, 5
CPUs and, 6
multiport repeaters, 6
as passive devices, 5
routing and, 6
hybrid cryptosystems
digital certificates, 177–178
digital signatures, 176–177
overview, 175–176
hybrid wireless/Ethernet network, diagram, 5