[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Vapor virus (Palm OS) VB.NET PCS device programming 2nd VBA (Visual Basic for Applications) Melissa virus 2nd VBS Timfonica airborne virus vehicles war driving setups 2nd VeriSign certificate authority (CA) vulnerability examples 2nd 3rd viewing NetStumbler database results 2nd 3rd SYN flood attack NETSTAT tool Virtual Private Networks, [See VPNs] viruses damage potential defined execution process file infectors human temptation importance of human interaction macro 2nd Melissa 2nd prevention/protection software 2nd spread variables payload effects reproductive abilities social attraction versus Trojan horses versus worms viruses (airborne) attack on NTT DoCoMo i-mode network early transmission of future motivation for writing 2nd Palm OS infection methods 2nd Liberty Crack 2nd Phage Vapor Phage (Palm OS) smart phones 2nd Timofonica Windows CE. NET 2nd Visual Basic for Applications, [See VBA] VPNs (Virtual Private Networks) attacks clients 2nd servers authentication benefits challenges channel encryption deploying in WLANs 2nd encrypted communication methods Remote-Access Model Site-to-Site Model IPSec 3DES (Triple DES) DES (Data Encryption Standard) transport mode tunnel mode IPSec protocol encrytion machine-level authentication key features L2F Protocol lack of Cisco support L2TP (Layer 2 Tunneling Protocol) 2nd 3rd PPP (Ponit-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) rogue access points tunneling data forwarding private address masks security features transport of non-IP payloads uses WLAN security tunneling 2nd 3rd VSWR (Voltage Standing Wave Ratio) Antennas vxUtil installing 2nd 3rd 4th launching utilities DNS Lookup finger HTTP Fetch information password generator ping ping sweeper port scanner System Calculator Tracert whois |