SAP (Software Access Point), 254
satellite broadband, 253
scan lines, television, 126
scatternets, Bluetooth and, 19
SCR file extensions, viruses and, 107
script kiddies, 47–49
scytale, 171
secret key cryptography, failings, 173–174
security
antivirus software, 213
backup systems, 219–228
black hats, 46, 47
Blaster worm, 48
broadcast and, 10
broadcast parameters modification, 202–205
CERT Web site, vulnerabilities, 85
clients, 207–215
cyber vandalism, 48
data threat identification, 217–219
default settings and, 188–193
DHCP and, 193–197
DMZ (demilitarized zone), 210–211
encryption and, 10, 205–206
Ethernet networks, 8
firewall setup in XP, 208–210
gray hats, 47
hacktivists, 49–50
hosts, 207–215
IP addresses, 191–193
IP addresses, static, 195
known issues exploitation, 83–85
network traffic filtering, 197–202
password selection tips, 190–191
patches, 211–213
resource Web sites, 238–239
script kiddies, 47–49
services, disable unnecessary, 214–215
updates, 211–213
urban locations, 188
white hats, 46
WLAN vulnerabilities, 187–188
WPA firmware upgrades, 206
Server Service, 215
servers, overview, 4, 26
services
disable unnecessary, 214–215
networks, 26
theft, identification, 131–132
session hijacking
definition, 59
diagram flow charts, 62
DoS attacks, 61
MITM (man-in-the-middle) attacks, 61
public hotspots, 64–65
time outs and, 59
user sessions, 59
Session layer, OSI reference model, 29
SHS file extensions, viruses and, 107
signal jamming, DoS attack, 73–74
signal propagation, multipath, 126
signals, X10 device signal interception, 158–161
Simple File Sharing, vulnerabilities and, 81
site surveys, multipath interference and, 129
s’kiddiots, 47
slave devices, Bluetooth and, 18
SMTP (Simple Mail Transfer Protocol), ports, 78
sniffers
attenuation and, 85
NICs and, 87–88
software, 86–87
spoofing and, 60
social engineering, crackers and, 50, 55–56
software. See also firmware
ad-blocking, 153
backup software, 226–228
bot software, 116–117
malicious, 101
spy-blocking, 153
wardriving defense, 99
Web sites, 241–242
SOHO (small office/home office), 254
speed
attenuation, 8
data rate, 8
latency and, 8
throughput, 8
Wi-Fi versus Ethernet, 6
spoofing
blended attacks and, 65
definition, 254
disassociate frames, 61
firewalls and, 64
MAC addresses, 61, 63
race conditions and, 61
routers and, 64
sniffers and, 60
spy-blocking software, 153
spycleaners, 119
spyware
description, 118
drive-by downloads, 152
exposure, 151–152
keyloggers, 119
system monitors, 119
SSDP Discovery Service, 215
SSID (service set identifier)
access point location and, 190
broadcast disable, 204–205
case sensitivity, 190
configuration errors and, 133
creation tips, 190
default, wardriving protection and, 93, 188–190
definition, 254
hardware identification and, 190
network protection and, 91
passwords and, 190
personal information in, 190
usernames and, 190
standards
802.11, 249
802.11a, 244, 249
802.11b, 243, 249
802.11c, 244
802.11d, 244
802.11e, 245
802.11f, 245
802.11g, 244, 249
802.11h, 245
802.11i, 245, 249
802.11IR, 246
802.11n, 246
802.11x, 249
802.15.1, 247
802.15.3, 248
802.15.4, 247
802.16a, 246
Bluetooth, 247
HiperLAN, 248
introduction, 15
outdated, 14–15
WiMAX, 246
WiMedia, 248
ZigBee, 247
star network topology, 5
static electricity, hardware and, 231
static IP addresses, security and, 195
steganography, 171
storage, backups, 220–223
strong signal jamming DoS attack, 73–74
subdomains, 40
subnets
addresses, 36–37
masking, 38
surge protection, 228–229
switches, access points and, 11
symmetric key cryptography, failings, 173–174
system monitors, 119