Index_P


P

packet monkeys, 47

packet switching, 33–34, 252

packets, 6, 61

Parson, Jeffrey Lee, 48

passive devices, hubs, 5

passwords

access control and, 169

encryption and, 169

selection tips, 190–191

social engineering and, 55–56

SSID and, 190

trashing, crackers and, 56

wardriving protection and, 93

WEP and, 181

patches, security and, 211–213

payloads, viruses, 104, 111

PC manufacturers, 240–241

PCI, adapter cards, 13–14

PCMCIA, card adapters, 13–14

PDAs (personal digital assistants)

antivirus software, 120

as clients, 4

definition, 253

manufacturers, 240–241

virus infection, 103–104

peers, networks, 27

personal firewalls, 79. See also firewalls

PGP (Pretty Good Privacy), public key cryptography, 175, 184

physical barriers, interference and, 136–137

Physical layer

OSI reference model, 29

Wi-Fi, 31

piconets, 18, 253

PIF file extensions, viruses and, 107

PLA (Phone Losers of America), 58

plaintext

ciphertext, 170

in the clear, 169

encryption and, 168–169

PoE (Power over Ethernet), 253

policies on privacy, 156–157

port scanners

home network attacks, 78

services check, 79

unauthorized connections and, 131

power surges, hardware failure and, 218

P3P (Platform for Privacy Preferences), 157

Presentation layer, OSI reference model, 29

print servers, access points and, 11

printers, as clients, 4

privacy. See also encryption

cookies and, 154–156

cordless phones, 163–165

Google and, 148

PGP (Pretty Good Privacy), 184

policies, 156–157

P3P, 157

public databases and, 148

reasons for, 147–149

resource Web sites, 238–239

spyware exposure, 151–152

threats, 149–156

video cameras, 161–163

WEP, 179–181

WPA and, 182–183

privacy settings, Internet Explorer, 154–156

promiscuous mode, NICs, 87–88

proprietary protocols, 24

protection tips

backups, 219–228

blended threats, 115

bot software, 117

data threat identification, 217–219

hardware protection, 228–232

public hotspots, 65–67

Trojans, 111

worms, 114

protocols

definition, 24

open, 24

proprietary, 24

TCP/IP, 32

proxy servers, HTTP, VPNs, 67

pseudo-random encryption key, 180

public databases, privacy and, 148

public hotspots, session hijacking, 64–65

public key cryptography

digital envelope, 175

invention, 174

PGP (Pretty Good Privacy), 175




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net