[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] I Love You worm estimated damages i-mode (cHTML) 2nd Japanese PCS devices 2nd IBM Wireless Security Auditor application window configuration screen features 2nd GPS support Help menu launching root background window supported WNICs IDS (intrusion detection systems) diagnostic software sensitivity versus specificity 2nd future embedded IDS 2nd geometric data display host versus network-based IDS strict anomaly detection strict anomaly detection; [See fluctuations]2nd [See fluctuations] hacking strategies fragmentation HTTP mutation 2nd spoofing TCP sequence number host-based integrity monitors Tripwire 2nd limitations switched network sensoring update maintenance vulnerability to attack log file monitors Swatch 2nd network-based predictive value Bayes theorem function of predictive values likelihood ratios (LRs) 2nd 3rd problems and solutions ROC curves accuracy measurements sensitivity accuracy results 2nd mathematical formula 2nd signature scanners anomaly detectors Snort 2nd specificity accuracy results 2nd mathematical formula stateful Whister tool (Anti-IDS) IDSs WLAN implementation 2nd IEEE (Institute of Electrical and Electronics Engineers) 802 group certification subsets function of 802.11 standard CSMA/Collision Avoidance 2nd overview 2nd prior technoligies 802.11a standard 5GHz range Orthogonal Frequency Division Multiplexing overview versus 802.11b standard 2nd 802.11b standard 2.4 GHz range 2nd DSSS (direct-sequence spread spectrum) versus 802.11a standard 2nd 802.11g standard overview 802.3 standard CSMA/CD 2nd IEEE 802.11 standard administrative issues future enhancements AES (Advanced Encryption Standard) 2nd TKIP (Temporal Key Integrity Protocol) 2nd 3rd 4th security issues flaws 2nd security protocols Shared Key authentication 2nd WEP encryption 2nd WEP 128-bit development of 2nd flaws 2nd original intent of RC4 algorithm Info panel (Kismet) 2nd 3rd 4th information utility (NetForce) information utility (vxUtil) Initialization Vector (IV) RC4 encryption 2nd WEP flaws 2nd installing AiroPeek NX 2nd 3rd AirSnort 2nd CENiffer Compaq iPAQ Ethereal for Linux 2nd 3rd RPMs 2nd troubleshooting errors 2nd Ethereal for Windows 2nd Kismet 2nd 3rd options 2nd MiniStumbler Compaq iPAQ Net Force Compaq iPAQ 2nd 3rd 4th NetStumbler 2nd 3rd Pocket PC programs 2nd Pocket PC WLAN drivers 2nd Swatch log file monitor 2nd vxUtil Compaq iPAQ 2nd 3rd 4th WEPCrack WinPcap utility Ethereal for Windows WNICs Windows XP 2nd instant mesaging hacker technique 2nd integrity monitors (IDS) Tripwire 2nd Internet Explorer security settings Internet Information Server (IIS) configuring for WML applications intrusion detection systems (IDSs) WLAN implementation 2nd intrusion detection systems, [See IDS] IP addresses masks (VPNs) ipconfig tool MAC addresses displaying (Windows NT/2000/XP/.NET) ipconfig-a tool MAC addresses displaying (Linux) IPSec (Internet Protocol Security) 3DES (Triple DES) DES (Data Encryption Standard) embedded IDS 2nd encryption machine-level authentication RFCs 2401-2409 transport mode tunnel mode IPX packets transporting (VPNs) IrDA protocol (Infrared Data Association) 2nd 3rd 4th 5th overview 2nd 3rd PANs (personal area networks) potential light transmission problems ISM (Industrial, Science, and Medical) frequencies isotropic Antennas IV (Initalization Vector) WEP collisions 2nd 3rd 4th IV (Initialization Vector) WEP weak formats 2nd |