|
|
hackers
described, 684
good and bad, 655
jargon, 655-656
methods used, 321
shutting out, 44
hacking, 42, 323
handshakes and TCP SYN attacks, 325
hash functions
cryptography function, 201
described, 330
hash message authentication codes (HMAC), 330
hashing
messages, 330
password, 530
HFNetChk
switches (table), 141-142
using, 96-97, 139-145
hisecdc.inf, 22, 89
hisecws.inf, 22, 92
honeypot, 624
hop time, 391
hosts involved in DDoS attacks, 671
hotfixes, described, 134, 135-136
HTTP
attack vulnerabilities, 714
port numbers and, 710
selecting Web service, 103
|
|