1. Trang chủ >
  2. Công Nghệ Thông Tin >
  3. Kỹ thuật lập trình >

Creating a Password Reset Disk

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (12.33 MB, 266 trang )


244
Contributors
Jack McCullough Wireless Security Expert
Security Consultant and Author
Keith Watson Security Researcher
Linda McCarthy Security Researcher
Richard Ford, Harris Professor of Assured Information,
Florida Tech
Denise Weldon-Siviy Writer, Editor, Teacher, and Mom
Eric 17 Novato, California Teen Insight
Brian 17 Novato, California Teen Insight
Hala 17 Pleasanton, California Teen Contributor
Tabitha 17 Littlestown, Pennsylvania Teen Contributor
Kayla 15 Gettysburg, Pennsylvania Teen Contributor
Gino 13 Lodi, California Teen Contributor
Dominic 11 Lodi, California Teen Contributor
Waqas 14 Tacoma, Washington Teen Contributor
Index Index
802.11, 802.11a, 802.11b, 802.11g, 802.11n IEEE
standards, 193–194
A
accounts Administrator, 230–231
password protection, 233–235
password reset disks, 235–236
Users, 231–233 ACLU American Civil
Liberties Union, 208 Acrobat Reader Adobe,
malware attacks, 26–27 add-ons, 128
Administrator accounts, 230–231
Adobe Acrobat Reader, malware attacks, 26–27
Adobe Flash, 149 malware attacks, 27
plug-ins, 128, 135–136 ADR American Data
Recovery, 49 adware, 3, 31–32
anti-adware software, 212 data grabbers, 30
EULAs End User Licensing Agreements, 32–34
P2P Peer-to-Peer networks, 33–34
PUPs potentially unwanted programs, 30
Aguila, Breena, 208 American Civil Liberties
Union ACLU, 208 American Data Recovery
ADR, 49 Anderson, Tom, 152
Android Google operating system, 205
anti-adware software, 212 anti-fraud protection, 214
Anti-Phishing Working Group APWG, 87
anti-spyware software, 212, 215
AntiVirus 2009 Norton, 4, 36
Anti-Virus Reward Program, 9 antivirus software, 26–27,
213–214 awareness information
websites, 221–222 bundled packages,
215–216 limitations, 4
malware, avoiding, 26–27 updates, 19, 220–221
vendors, 218–220 virus removal tools,
217–218 Apple iPhone operating
system, 205 Applied Cryptography, 111
APWG Anti-Phishing Working Group, 87
Areps.at, 154 Armstrong, Elizabeth, 141
Arrington, Michael, 95 attack blogs, 143–145
authentication, 112–114 AVG Security
antivirus software, 26 LinkScanner tool, 36
security software, 219, 225 Avira security software, 219
B
backups mobile devices, 206
procedures, 216–217 security essentials, 212
software, 216–217,
219–220 bandwidth, 184
Barger, John, 139 Bebo, 151
Berry, Justin, 156 biometrics, 54
Bit Torrent, 33 black hat SEO search engine
optimization, 40–42, 48, 205
BlackBerry operating system, 205
Blaster worm, 8–9, 15, 17, 46 Blogger tool, 140
Blogger.com, 140 blogs, 138–139
attack blogs, 143–145 legal repercussions, 145
Blogger tool, 140 blogosphere, 143
dangers, 141–142 growth, 140–141
guidelines for blogging,
141, 146–147 permanence, 142–143
implications of, 145–146
Bluetooth technology, 205 bot networks, 22–24, 50.
See also hackers; malware; Trojan horses; viruses;
worms armies, 3
Brain virus, 12

Xem Thêm
Tải bản đầy đủ (.pdf) (266 trang)

×