| < Day Day Up > |
|
WAN, see Wide area network
War driving, 209
Warm sites, 30
Web
application assessments, 191, 201
-based e-mail, 224, 323
pages, password cracking, 303
proxy, 199
server policies, 97
site(s)
E-commerce, 214
privacy statement, 387
vandalism, 257, 258
tools, automated, 199
Well-known ports, 409-449
WEP, see Wired Equivalent Privacy
What-if idea, 15
Whisker, 200, 504
White-hat system attacking, 172
Wide area network (WAN), 26, 99
Wilbur, 221
Windows
Advanced Server for LAN Management, 168
-based operating systems,undeleting in, 277
Developers Conference, 168
FAT, information hiding in, 278
file allocation table, 276
logging, 241
logical file review in, 297
NT, auditing,168, 227
NT audit policy, 307
NT file system (NTFS), 278, 279
NT incidents, responding to, 293
collecting volatile live-time evidence, 296
data storage, 293
open ports and listening services, 295
processes running on target computer, 295
system turned off, 294
system users, 294
tools in tool bag, 293
NT logging, 304
NT Server multi-user core, 169
operating systems, evidence on, 296
password-protected user accounts, 102
Registry, 222, 299
Server Message Block, 142
system documentation, 141
Windump, 162, 205
Winscan, 504
Wire communications, 392
Wired Equivalent Privacy (WEP), 83, 85, 208, 209, 210
Wireless local area network (WLAN), 82, 207
Wireless networks, auditing, 206
Wireless policies, 84
Witness reports, 265
WLAN, see Wireless local area network
Workplace
fraud, 354
safety, 76, 77
Workstation auditing, 68, 104, 219, 220
World Wide Web, search, 85, see also Web
WORM media, see Write Once, Read Many media
Worms, 23, 70, 229
WPRM media, 78
Write Once, Read Many (WORM) media, 70
| < Day Day Up > |
|