dams, cyber-terrorists, 117
database, Consumer Sentinel, 73, 242 “243
DEFCON
hackers, 104 “107
Moss, Jeff
Black Hat Briefings, 105, 108
White Hat Briefings, 108
Web site, 123
defragmenting disks (Disk Defragment), 203
deleting
files and programs, 200 “202
cookies, 228 “231
Disk Cleanup, 202
Disk Defragment, 203
history, 230 “231
spam, 234
denial-of-service attacks, 110
deregulating media (FCC), 137
Desktop Messenger spyware, 143, 149
detecting
spyware, 77 “78, 81, 207 “211, 230
Desktop Messenger, 143, 149
information brokers , 148
Logitech, 143 “149, 207 “211
WildTangent, 143 “149, 207 “211
viruses, 211, 212, 213
detectives .See private investigators
digital dopplegangers.See dopplegangers
Digital Rights Management.See DRM
disabling spyware, 215 “218
discount cards, convergence (advertising), 48
do not call lists
advertising, convergence, 50 “52
fax.com, 68
do not call registry (FTC), enforcing, 70 “73, 226
Docusearch Investigations Web site, 59
DOE CIAC warnings Web site, 193
dopplegangers
creating, 33 “34
instant messaging, 87
overview, 30 “31
presence awareness technology, 87
using, 32 “33
Web sites, 33, 226 “228
dot-com bankruptcies, 8 “11
dot-com bust, 6 “11, 135 “136
DoubleClick information broker, 166 “168
download managers
Go!zilla spyware, 79 “81
Speedbit Download Accelerator Plus, 81
DrinkOrDie warez, 138 “139
DRM (Digital Rights Management), 140
Apple, 140 “141, 143
iTunes, 140 “143
laws and regulations, 139 “140
Microsoft, 140 “141, 143
dummy administrator accounts, 189
DVR (information brokers), 154 “156