Index C


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

CA Public Key Certificates (WTLS Class 2)   2nd   3rd  
capturing
       data
               CENiffer  
Carnivore (FBI sniifer)  
Carrier Sense Multiple Access/Collision Detection,   [See CSMA/CD]2nd   [See CSMA/CD]
cell phones
       Internet-enabled
                airborne viruses   2nd  
CENiffer
       access points (APs)
               searching   2nd   3rd   4th   5th  
       data capturing  
       filters   2nd   3rd  
       installing  
       launching   2nd  
certificate authorities (CAs)
       certificate chain  
       trust issues  
       trusted root certificate  
       VeriSign  
       vulnerability examples   2nd   3rd  
       X.509 standard  
               format components   2nd  
               revocation of certificates  
certificate revocation list (RCL)
       X.509 standard  
certificates
       delivery (WAP PKI)   2nd  
       devices (WAP PKI)   2nd  
       enrollment (WAP PKI)   2nd  
       managing (WAP PKI Model)   2nd   3rd  
        requests (WAP PKI)   2nd  
chat rooms
       hacker targeting of newbies   2nd  
checksums
       RC4 algorithm
               WEP security  
checksums (CRCs)
       data integrity verification   2nd  
cHTML
       i-mode technology   2nd  
ciphers
       RC4 encryption  
               block   2nd  
               self-synchronizing stream   2nd  
               stream   2nd  
ciphertext
       creating (WEP)  
        keystream deductions (WEP)   2nd   3rd  
Cisco
       L2F protocol (VPNs)  
client attacks (VPNs)   2nd  
Client Public Key Certificates (WMLScript SignText)   2nd   3rd   4th  
Client Public Key Certificates (WTLS Class 3)   2nd   3rd  
client-to-client hacking
       association relationships   2nd   3rd   4th  
       wireless sniffers
               AiroPeek   2nd  
       WNICs
               PEER mode   2nd   3rd   4th  
collisions (IV)
       WEP   2nd   3rd   4th  
Compaq iPAQ  
       CENiffer
               access point searches   2nd   3rd   4th   5th  
               data capturing  
               filters   2nd   3rd  
               installing  
               launching   2nd  
       features   2nd  
       IBM Security Auditor
               application window  
               configuration screen  
               features   2nd  
               GPS support  
               Help menu  
               launching  
               root background window  
               supported WNICs  
       MiniStumbler  
               access point searches   2nd  
               installing  
               launching   2nd  
       Net Force
               installing   2nd   3rd   4th  
               launching  
       Pocket PC
               hacking overview   2nd  
       programs
               installing   2nd  
       technical specifications  
       vxUtil
               installing   2nd   3rd   4th  
               launching  
       WLAN drivers
               installing   2nd  
Compaq Web site  
concatenating
       packets keys
               IV (WEP Initialization Vector)  
configuring
       Apache Server
               WML applications   2nd  
       Ethereal   2nd   3rd  
       Internet Information Server (IIS)
               WML applications  
       NetStumbler software (war driver)   2nd   3rd  
       ORiNOCO software (war driver)   2nd   3rd  
crackers
       AirSnort  
               features   2nd   3rd  
               installing   2nd  
               ORiNOCO card   2nd   3rd   4th   5th   6th  
               version 1   2nd   3rd  
               version 2+   2nd   3rd  
       WEPCrack
               development of  
               features   2nd  
               installing  
               output  
                prismdump program   2nd   3rd   4th   5th   6th   7th   8th   9th  
               scripts   2nd  
               supported platforms  
               Web site  
cracking
       WEP
               key extraction   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  
       WEP encryption   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd  
CRCs
       (Cyclic Redundancy Checks)   2nd  
       checksums
               data integrity verification   2nd  
cryptology
       encryption/decryption  
                asymmetrical   2nd  
               symmetrical   2nd  
CSMA/CA
       (Carrier Sense Multiple Access/Collision Avoidance)   2nd  
CSMA/CD (Carrier Sense Multiple Access/Collision Detection standard (IEEE 802.3)   2nd  
Cyclic Redundancy Checks,   [See CRCs]2nd   [See CRCs]



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net