GlossaryBlueboxAdeviceusedtosendspecialtonestotelephonesystems.
Thesewereoncethetoolofchoiceforearlytelephonephreaks.
Theywererenderedobsoletebydigitalphoneexchanges.
Theywerecalledblueboxessimplybecauseblueorbeigewasastandardcolorforelectroniccomponentsinthe1960sand'70s.
CacheAsetoffilescreatedbyawebbrowser,operatingsystem,orotherprogram.
Acachekeepstrackofprogramstatus.
Cachesusuallyincludethefilesyou'veeditedordeleted,websitesyou'veviewed,andotherpotentiallyprivateinformation.
Insomecases,blackhatscancapturecacheddataandfindvaluableinformationfor!
aterexploitation.
CodeDivisionMultipleAccess(COMA)Apopularcellularphonetransmissionscheme.
CookieAsmallfilethatappearsonyourharddrive.
It'susedbywebsitestotrackonlineshoppingcartsandbrowsinghabits.
Mostcookiesareinnocuous,butsomecanbeusedtotrackyourbehaviorfromsitetositeorcaptureimpor-tantinformationlikeaddressesorcredit-cardnumbers.
CopyprotectionAmethodusedbysoftwareandmediadistributorstopreventunauthorizedcopyingofsoftware,CDs,orDVDs.
CrackingTheprocessofbreakingcopyprotectionforthepurposeofpersonaluseormassreproduction.
ContentScrambllngSystem(CSS)AprimitiveencryptionschemeusedbyDVDmanufacturerstopreventthepiracyofDVDvideos.
DynamicHostConfigurationProtocol(DHCP)AmethodusedtodynamicallyconfigureandassignIPaddressestocomputersonasubnet.
Dial-upAmethodforconnectingtoanetworkusingastandardphoneline.
.
,.
111!
1111BlackHotMisfits,Criminals,andScammersintheInternetAgeDigitalMillenniumCopyrightAct(DMCA)Alaw,passedonOctober28,1998,thatgavecontentproducerstherighttoprotecttheirmedia,chargepirates,andsuehackersandcrackersinfederalcourt.
Thefirstpartofthelawpreventselectroniccircumventionofcopyprotection,andthesecondpartprotectsInternetserviceprovidersfromlitigationifcopyrightedmaterialisfoundontheirservers,buthasbeenostensiblycreatedoruploadedbyoneoftheircustomers.
DomainNameSystem(DNS)Thesystemthattranslatestextaddresses(suchaswww.
goog1e.
com)intoIPaddresses(192.
168.
0.
1).
ItcanalsobeusedtoconfirmtheexistenceofaserverontheInternet.
DenialofService(DoS)Anyattackthatpreventslawfulusersfromaccessingacomputerresource.
MostDoSattacksarecarriedoutbyfloodinganetworkwithjunkpacketsorfillingdiskdriveswithgarbageuntilacomputercrashes.
However,aDoSattackcouldalsoinvolvecuttingpowertoacomputeroreventhrowingabrickthroughamonitor.
EncryptionTheprocessofconvertingaplaintextmessageintoaciphertextmessage.
Ciphertextmessagesarethendecodedintheprocessofdecryption.
EthernetAsystemforconnectingoneormorecomputers.
Ethernetisanopen-endedsysteminthatthefirstcomputeronachaindoesn'thavetobedirectlyconnectedtothelastcomputeronthechain,meaningnewcomputerscanbeaddedtothenetworkwithoutdisruptingothersystems.
Ethernet,sonamedbecauseitseemedtosendsignalsoutintotheimaginaryether,caneitherrunalocalareanetwork(LAN)orwideareanetwork(WAN).
ExploitAmethodusedbyhackerstogainprivilegedaccessonacomputer.
Exploitscanbebugsinanoperatingsystemoritsattendantprograms,orasimplermethodlikesocialengineering.
GlobalPositioningSystem(GPS)Awirelesssystemcreatedtopinpointanypositionontheglobethroughsatellitetriangulation.
GlobalSystemforMobileCommunications(GSM)Acellularprotocolthat'spopularinEurope.
ItusessmallSIMcardsandcompatiblehandsetstoconnecttothecellularnetwork.
HackingEarlyusageequatedthistermwithacomputeruserwholovestoexploreandimprovehardwareandsoftware.
Later,theterm"hacker"begantomeanamaliciouscomputeruserwhoisouttostealordamageinformationonacomputersystem.
lnstantmessaging(IM)AsystemofprotocolsthatincludemethodstosendshortmessagesovertheInternetandkeeptrackofuserswhoareon-andoffline.
IMisquicklybecomingoneofthemostpopularmediumsforquick,off-the-cuffcommunication.
Glossarylllll·FIIInternetTheworldwidenetworkofcomputersconnectedbytheTCPIIPProtocolandothernetworkingprotocols.
TheInternetismorethanjusttheWorldWideWeb,whichsimplyservesupwebpagesanddata.
TheInternetcarriesvoiceinformation,email,andscientificdataatextremelyhighspeedsandcanroutearounddamagingfiles.
Originallydesignedasaresilientcom-municationssysteminthecaseofanuclearwar,theInternethasevolvedintoanentirelynewandall-inclusivemediaforinformationandcreativecontent.
lntellectualproperty{IP)Apatentorideaownedbyacompanyorcompaniesrelatedtoaspecifictechnologyormedia.
Forexample,aprogramisIPaswellastheprogramminglanguageitwaswrittenin.
ManycompaniesciteIPprotectionlawswhengoingaftercopyrightinfringersandmalicioushackers.
IPaddressDouble-dottedpair(thatis,192.
168.
0.
1)addressthatpinpointsacomputerorsubnetintheInternet.
IPaddressesallowonecomputertocontactanotherovertheInternet.
ISPInternetserviceprovider.
LinuxAlsoGNU/Linux.
AnoperatingsystemcreatedbyLinuxTorvaldsandcountlessinternationalvolunteers.
Linuxisanopen-sourcesystem.
MP3,MPEG,AudioLayer3Aformatusedbypopularmusicplayersforencodinganddecodingaudio.
lnitiatedbyFraunhoferInstitutIlS-A,theMP3formatisapatentedmethodforcompressingandencryptingaudio.
MotionPictureAssociationofAmerica(MPAA)Anonprofitorgan-izationformedinordertosupportandadvancetheinterestsofmajormoviestudios.
OpensourceOpen-sourcesoftwareisanysoftwarewhosesourcecodeandownershiprightsareinthepublicdomainorlicensedunderanopen-sourceorGNU(GNU'sNotUNIX)PublicLicense.
Mostopen-sourcesoftwareisfreeandcanbefreelymodifiedaslongasanychangestothecoresourcealsobecomepartofthepublicdomain.
PrettyGoodPrivacy(PGP)ApublickeycryptographysystemcreatedbyPhilZimmermanforthepurposesofencryptingprivatecommunications.
ZimmermanfacedanumberofinvestigationsforallowingPGPtospreadoutofthecount:ryinviolationoffederalmunitionsstatutes.
PhreakingPhonecracking.
Theprocessofbreakingthroughprotectionsonthetelephonesysteminordertoaccessadministratorfeaturesandstealphoneservice.
[ll~tllBlackHot:Misfits,Criminals,andScammersintheInternetAgePublickeycryptographyAformofcryptographyinwhichtwokeysareused,apublickeyandahiddenone.
ItwasoriginallyinventedbyCliffordCocksandrediscoveredbyresearchersatMIT.
Inpublickeycryptography,userAencryptsamessagetouserBusinguserB'spublickey.
ThismessagecanonlybedecodedusinguserB'shidden,privatekeyandcannotbedecodedusingauser'spublickey.
RecordinglndustryAssociationofAmerica(RIAA)Anonprofitorganizationformedinordertosupportandadvancetheinterestsofmajorrecordingstudios.
SendmailAprotocolbasedonoriginalInternetstandardsusedfortrans-portingelectronicmailovertheInternet.
SpamUnwantedandunsolicitedcommercialemail.
SpimUnwantedandunsolicitedinstantmessages,includingcellularSMSmessagessenttocellularhandsets.
TCP/IPTransmissionControlProtocoVInternetProtocol.
AsuiteofprotocolsforsendingandreceivinginformationovertheInternet.
TCPIIPdataissplitintosmallpacketsandthenre-createdatthereceivingend.
TheTCP/IPProtocolallowsdisparatepiecesofthesamedatatoberoutedthroughdifferentconnectionsforlaterreconstruction.
TrunkAmaintelephonelinethatconnectsindividualtelephoneswitheachother.
Imaginethetelephoneexchangeasatree.
Individualphonesareleaves,locallinesarebranches,andtheselinesleadintothetrunk,whichcarriesphonecallsfromoneleaftotheother.
Wi-FiWirelessFidelity.
Awirelessdata-transferstandardthathasbecomeincreasinglypopular.
Ittransmitsdataat11Mbps.
Alsoknownas802.
llb,and802.
llg,whichwasanimprovementonthisstandard.
Ittransmitsinformationatapproximately54Mbps.
Zero-dayexploitArecentlydiscoveredexploitthathasn'tyetbeenpatchedbyasoftwaremanufacturer.
SelectedReadingHackingHafner,Katieetal.
CYBERPUNK:OutlawsandHackersontheComputerFrontier.
NewYork:Simon&Schuster,1991.
Levy,Steven.
Crypto:HowtheCadeRebelsBeattheGovemment-SavingPrivacyintheDigitalAge.
NewYork:Penguin,2002.
Levy,Steven.
Hackers:HeroesoftheComputerRevolution.
NewYork:Anchor,1984.
Nuwere,EjoviandDavidChanoff.
HackerCracker:A]oumeyfromtheMeanStreetsofBrooklyntotheFrontiersofCyberspace.
NewYork:Perennial,2003.
Slatalla,MichelleandJoshuaQuittner.
MastersofDeception:TheGangThatRuledCyberspace.
NewYork:HarperCollins,1995.
OpenSourceFink,Martin.
TheBusinessandEconomicsofLinuxandOpenSource.
NewYork:PrenticeHaliPTR,2002.
Moody,Glyn.
RebelCade:LinuxandtheOpenSourceRevolution.
Boulder,CO:PerseusPublishing,2002.
Raymond,EricS.
TheCathedral&theBazaar:MusingsonLinuxandOpenSourcebyanAccidentalRevolutionary.
Boston:O'Reilly&Associates,1999.
Torvalds,LinusandDavidDiamond.
JustforFun:TheStoryofanAccidentalRevolutionary.
NewYork:HarperBusiness,2002.
Williams,Sam.
FreeasinFreedom:RichardStallman'sCrosadeforFreeSoftware.
Boston:O'Reilly&Associates,2002.
IIIDIDJI:IIBlackHat:Misfits,Criminals,andScammersintheInternetAgeSystemAdministrationCobb,Chey.
NetworkSecurityforDummies.
NewYork:ForDummies,2002.
Greene,ThomasC.
ComputerSecurityfortheHomeandSmallOffice.
Berkeley,CA:Apress,2004.
Hallberg,BruceA.
Networking:ABeginner'sGuide.
NewYork:McGraw-HillCompanies,2001.
Hatch,BrianandJamesLee.
Linux(HackingExposed),2nded.
NewYork:McGraw-HillOsbomeMedia,2002.
Jones,Keithetal.
Anti-HackerToolKit.
NewYork:McGraw-HillOsbomeMedia,2002.
IndexSymbolsandNumbers@(at)symbol,identif)ringemailaddressesby,14414hackers,descriptionof,118419scamTheCommunityoftheMonksofAdoration,75--76exampleof,72-76explanationof,71-72goalandprocessof,75impactonShawnandJeffMosch,84aslotteryannouncement,771986ComputerFraudandAbuseAct,applicationof,602600:TheHackerQuarterlyoriginsof,103-104rulinginMPAAtria!
,107webaddressfor,102AAd-aware,featuresof,38-39administrators,advicefor,139-140ads,abuseof,38-41adservers,featuresof,33AdvancedEmailExtractor,webaddressfor,14advance-feefraudexampleof,72-76explanationof,71-72goalandprocessof,75adware.
SeespywareAllen,PaulandBASICIanguage,95AltairBASIC,developmentof,95AltnetbundlingwithKazaa,objectionsto,46Anti-JunkFaxlaw,introductionof,12Anti-Spamlaw,introductionof,10antispywareversusspyware,41-43webresourcefor,39AppleMafia,formationandbreakupof,120--121Apple'siTunes,salesrealizedby,108--109Arpanet,relationshiptooriginofspam,7-8articles"50%ofInternetE-mailIsNowSpamAccordingtoAnti-SpamLeaderBrightmail,"10"ABugintheLegalCode",108"AIIegedWarDriver'Releasedon$5,000Baii,"128"AnOpenLettertoHobbyists,"96"AttomeyGeneralDeclaresWininState'sFirstAnti-spamRuling,"12"BigBadWorld,"129"BrightmailFindsSpammersHitNewLowforValentine'sDay,"2"BrothersWinWebBully'Lawsuit,"38"CaliforniaWinsAnti-spamCase,"12"ComputerVirusesbyEugeneKaspersky,"58"Court:Pop-upsBurdenofUsingNet,"43"DespiteU.
S.
Efforts,WebCrimesThrive,"129"DihydrogenMonoxide,"79"DVDGroup:StopWearingOurCode!
",104"eBayScamArtistsFaceCriminalCharges,"85'li111,111BlackHat:Misfits,Criminals,andScammersintheInternetAge"E-mailProvidersSlamSpammers,"12"TheFiveRulesforDoingBusinesswithNigeria,"77"ForgetSmartTags:TopTextIsDoingWhatYouFeared,"36"GalleryofCSSDescramblers,"104"HistoryofCopyProtection,"97"TheHistoryofHacking,"118"HowtheDMCAAffectsUs,"100"IdentityTheftSurveyReport,"83"IFCC2002InternetFraudReport,"72"InteltoEmbedSerialNumbersonPentiumIIIChips,"36"InternetSecuritiesFraud:OldTrick,NewMedium,"88"lt'sGettingHardertoHideinCyberspace,"62"JailTimeforeBayScamArtist,"85"KeithLynch'stimelineofspamrelatedtermsandconcepts,"6"MedalofHonor:AlliedAssaultCheats&Hacks,"124"APeekatScriptKiddieCulture,"127"APlanforSpam,"19"RIAALawsuitsYieldMixedResults,"109"TheRiseoftheSpammers,"17"ScamVictimsUnited,"84"ScriptKiddy,"125"SeeYouLater,Anti-Gators'',37"TheSpamhausProject,"6"Spam:HowItlsHurtingE-mail,"18"Spam:HowItIsHurtingE-mailandDegradingLifeontheInternet,"11"SpamKingLivesLargeOffOthers'E-mailTroubles,"6"TheSpreadoftheSapphire/SlammerWorm,"63"StockScamsProliferateonWeb,"88"StockScams101:StockScams,Shams,andSpams,"88"ATemptingOfferforRussianPair,"130"VALIDCREDITCARDNUMBERS!
!
!
I,"83''VirusesandWorms:WhatCanWeDoAboutThem,"66''What'sWrongwithCopyProtection,"98artificialintelligence,relationshiptoworms,60at(@)symbol,identif)ingemailaddressesby,14attachments,advisoryaboutopeningof,137attacks,respondingto,139--140auctionscams,formsof,84--85audiotape,developmentof,96-97autonomouscomputersecurity,Bdevelopmentof,69-70.
Seealsocomputersecuritybackdoors,characteristicsof,34,45backups,importanceof,139BarrosoBerrueta,David:"TheRiseoftheSpammers,"17BASIClanguage,originof,95BatchWormGenerator,descriptionof,49--50Bayesiananalysis,roleinfilters,19--20BBSs(bulletinboardsystems),abuseof,97Beach,Scottandphishingscam,85Bedrosian,Steveanddehydratedwaterscam,78-79Benecke,Jensandride-sharingwebsite,1benignspyware,examplesof,32--33BitTorrent,successof,109--111black-hathackersadjustingto,141-142characteristicsof,3objectivesof,2persistenceof,133potentialharmlessnessof,133--134blackmarkets,overviewof,93--94Bloomberg,MichaelandpreventingKazakhstanhackingscheme,129Borland,John:"RIAALawsuitsYieldMixedResults,"109"BrightmailFindsSpammersHitNewLowforValentine'sDay,"webaddressfor,2BrilliantDigital,relationshiptospyware,46BrotherJohnRaymond,experiencewith419scam,75--76Brunner,JohnandTheShockwaveRider,51bulletinboards,appearanceofscamson,83cCAN-SPAMActeffectivenessof,90introductionof,11-12Canter&Siegel,roleinoriginofspam,9CaptainCrunch'shackingtechnique,descriptionof,117CDtheft,preventing,112cellphones,vulnerabilityof,26-27,68Cha,ArianaEunjung"DespiteU.
S.
Efforts,WebCrimesThrive,"129"ATemptingOfferforRussianPair,"130challenge-responsesystemsversusencryptedmessages,20featuresof,7Chameleonandclosingsecurityexploits,131chameleons,characteristicsof,34-35chatbot,explanationof,28cheats,addingtocomputergames,122-125Citibank,attackbyRussianhackerson,129Clariaspywarelawsuit,37Clarke,lanandFreenet,109-110CodeRedworm,impactof,66Cohen,BramandBitTorrent,111Cohen,FredandVMworm,60Cohenv.
California,significanceof,104collectiblepaintingscam,descriptionof,85TheCommunityoftheMonksofAdoration,experiencewith419scam,75-76companionviruses,characteristicsof,59computergames,significanceof,122-125computerpirates.
Seepiratescomputers,backingup,139computersecurity,bestpracticesfor,137-141.
Seealsoautonomouscomputersecuritycookies,characteristicsof,35Copyleft.
com,supportfor2600,104copyprotectionarticleabout,97ineffectivenessof,98"correspondencemanagers"scam,descriptionof,85-86Cox,Beth:"JailTimeforeBayScamArtist,"85crackersearlytechniquesusedby,98useofaudiotapesby,97cracks,obtainingfromwebsites,98-99CrayThinkingMachines,impactonLordDigital,118credit-cardnumbers,phishingfor,81-84creditcards,protecting,135CSS(ContentScrambleSystem),significanceof,102Ddataminers,featuresof,32-33Dave,Damien:"ABugintheLegalCode'',108DEC,roleinoriginofspam,7-9DeCSSprogramalternativeto,103-104versusMP3,106purposeof,101screendumpof,105Index1111'~1···1dehydratedwaterscam,overviewof,78-80Delio,Michelle:"E-mailProvidersSlamSpammers,"12DeMicco,FrankJ.
pumpscam,descriptionof,87dictionaryattacksexampleof,29reasonfor,15digitalphonesystems,precursorto,117digitalstamps,proposalsforuseof,21dihydrogenmonoxidescam,descriptionof,79-80DMCA(DigitalMillenniumCopyrightAct)citationof,106effectivenessof,132purposeof,100-101violationof,102DNS(DomainNameSystem),significanceof,67-68DoSattacks,descriptionof,127DoubleClick,relationshiptochameleons,35Draper,John'shackingtechnique,descriptionof,117Drumrnie,Gretchen:"Alleged'WarDriver'Releasedon$5,000Baii,"128DT:"HistoryofCopyProtection,"97DVDCCA(DVDCopyControlAssociation),significanceof,102DVDs,watchingwithDeCSSprogram,101EEbolaMonkeyMan,relationshiptoadvance-feefraud,71EcoQuest,advisoryabout,89eEyeDigitalSecurity,foundingof,131EFF(ElectronicFrontierFoundation),relationshipto2600defendants,103-104electronicsignatures,futureof,91email,hidingroutinginformationin,22-23emailaddressescreatingseparateversionsof,137currentnumberof,18·identifying,14typicalformatof,15emailextractors,purposeof,13-14,.
.
1118/ackHat:Misfits,Criminals,andScammersintheInternetAgeE-Money,Inc.
,relationshiptoVasilyGorshkov,130TheEmperorSecurityTeamhackers,techniqueof,126Emulexstockscam,descriptionof,89eMusic,relationshiptochameleons,35encryptedmessages,proposalsforuseof,20encryption,importanceof,135-136,140EnviroVoraxialTechnologyscam,descriptionof,87EU's(EuropeanUnion's)approachtowardspam,overviewof,11-12EULA(EndUserLicenseAgreement)advisoryabout,37exampleof,31-32ExpertGroupofProtectionAgainstHackers,significanceof,129Explorer,vulnerabilitytophishing,81-82Ff2mailsub-server,exampleof,23"fairuse"roleinMPAAtrial,107significanceof,102Fallows,Deborah:"Spam:HowItIsHurtingE-mailandDegradingLifeontheInternet,"11,18Fanning,ShawnandNapster,108faxlaw,introductionof,12FederalTradeCommission:"IdentityTheftSurveyReport,"83Festa,Paul:"SeeYouLater,Anti-Gators",37Fetterman,Kennethandphishingscam,85filesharing,vulnerabilityof,133fileworms,characteristicsof,59filtering,processof,18-20ffiters,fooling,21-22,24-25Flaum,David:"ScamVictimsUnited,"84FraudBureau.
com:"StockScams101:StockScams,Shams,andSpams,"88"free-as-in-freedom"model,explanationof,96freemarketing,costof,11-13Freenet,creationof,109-111freespeechrulinginfavorof,104significanceinMPAAtrial,107FreeToSell,advisoryabout,89-90FTC(FederalTradeCommission),finesimposedononlinestoresby,90GGAINPublishing,trustingcontentfrom,39-41games.
SeecomputergamesGarbus,MartinandMPAAtrial,100-107Gates,BillandBASIClanguage,95GatoreWalletspywarelawsuit,descriptionof,37Gatorsoftware,software-acceptancedialogboxfor,39-40Ghasemi,Dr.
Shahlaand419scam,77Gilmore,Johnoncopyprotection,98-99Gold,LeonandMPAAtrial,100-107Gorshkov,Vasilyandhackingscheme,129-130Graham,Paul:"APlanforSpam,"19CreatWorm,characteristicsof,59-61greencardlotteryassistance,roleinoriginofspam,9Griffin,ClaudiaandPaulWillis,lawsuitagainst,12Hhackerbulletinboards,appearanceofscamson,83hackercrackdown,firstexampleof,118hackerscapabilitiesof,130-131characteristicsof,115-116andcomputergames,122-125goalsof,131-132hiring,131-132originaltechniquesof,94securitybreachesattributedto,129useofDoSattacksby,127hackingcounterculture,originof,116hackinghistory,webresourcefor,118hardrerouters,featuresof,33HaXXorDVDVolume1:NoLongerFloppy,significanceof,115HighSpeedVerifier,featuresof,15hoaxes.
Seescamshoneypots,purposeof,13Hulme,GeorgeV.
:"BigBadWorld,"1291Iaconi,Teresaandauctionscam,85ibogaine,significancetoLordDigital,121identitythefteffectsof,3exampleof,83lE(InternetExplorer),vulnerabilitytophishing,81-82IFCC(InternetFraudComplaintCenter),complaintsregisteredwith,90IM(instantmessaging),spamprojectionsfor,27-28infection,occurrenceof,51--55Intel'sTrustedComputingPlatformArchitecture"trust"system,advisoryabout,98--99Internetrerouters,featuresof,33Internettheft,performingwithwardriving,128investors,obtainingprotectionfromSecuritiesActof1993,89IPaddressesformatof,15--16vulnerabilityof,35IP-Messenger,webaddressfor,27ITadministrators,advicefor,139-140iTunes,salesrealizedby,108--109Ivanov,Alexyandhackingscheme,129-130Jjackingin,explanationof,119Jakob,Markandstockscam,89jamestama2004.
orgdomain,examiningpapertrailfor,23--24Janos,IgoronNew.
NetandSaveNow,42Jiang,Jujuandpasswordabuse,43--44Johansen,JonandDeCSS,101-102andrulinginMPAAtrial,108KKaplan,JudgeandMPAAtrial,104,107Kaspersky,Eugene:"ComputerVirusesbyEugeneKaspersky,"58KazaabundlingwithAltnet,46fatalflawof,110"KeithLynch'stimelineofspam-relatedtermsandconcepts,"webaddressfor,6KeyGenerator,exampleof,99keystrokeloggersavoiding,46characteristicsof,34exampleof,43--45IndexIIIJiiJIIKhan,RishiandMelissaworm,62Kirch,AndrewD.
andscriptkiddies,127Kittrick,Paulashoneypot,13Konrad,Rachel:"AttorneyGeneralDeclaresWininState'sFirstAnti-spamRuling,"12Kroupa,Patrick'sexploits,118--122Llaws1986ComputerFraudandAbuseAct,60Anti-JunkFax,12Anti-Spamlaw,10CAN-SPAMAct,11-12,90DMCA(DigitalMillenniumCopyrightAct),100,132MurkowskiAnti-Spamlaw,10overviewof,90--91SecuritiesActof1993,89significanceof,140--141bystates,12againstUCE(unsolicitedcommercialemail),12leeches,relationshiptoBBSs,97LegionofDoom,descriptionof,121legislation.
SeelawsLevy,StevenandHackers,3libraryviruses,characteristicsof,59linkverifiers,featuresof,14-15linkviruses,characteristicsof,59Linux,securityof,137Linuxsystems,vulnerabilitytovirusesandworms,60--61Linuxusers,roleinMPAAtrial,107lists,averagecostof,13Logue,AarononDMCA(DigitalMillenniumCopyrightAct),100LordDigital,exploitsof,118--122MMacintoshsystems,vulnerabilitytovirusesandworms,60MagicLanternspyware,exampleof,44Magnatune,webaddressfor,138Mahoney,Michael:"eBayScamArtistsFaceCrimuialCharges,"85Maiffret,Mareandclosingsecurityexploits,131mailengines,convertingmachinesto,17Biill·ll8/ackHot:Mis~ts,Criminals,andScammersintheInternetAgemailinglists,averagecostof,13mainframes,relationshiptooriginofhackers,116malignantspyware,overviewof,33-35MasterCardInternational'sassessmentofcostsrelatedtospam,11MedalofHonorcomputergame,significanceof,124Melissaworm,characteristicsof,61-62MicrosoftInternetExplorer'svulnerabilitytophishing,81-82Palladiumadvismy,98-99SystemUpdateasspyware,34Mikkelson,BarbaraandDavidP.
:"DihydrogenMonoxide,"79Miller,Robin:"APeekatScriptKiddieCulture,"127MITS,roleinexposingcomputerpirates,95-96MMF(MakeMoneyFast)letters,roleinoriginofspam,10Moore,Davidetal:''heSpreadoftheSapphire/SlammerWorm,"63Morgenstern,JonofE-Money,Inc.
,interactionwithVasilyGorshkov,130Morrisworm,overviewof,59-61Mosch,ShawnandJeffonadvance-freefraud,84MP3versusDeCSSprogram,106MPAA(MotionPictureAssociationofAmerica),relationshiptoDeCSS,102-106Mr.
BadandalternativetoDeCSS,descriptionof,103murking,explanationof,10MurkowskiAnti-Spamlaw,introductionof,10music,obtaining,138MyDoomworm,characteristicsof,51MYSQL,relationshiptoSlammerworm,63,65NNaider,Avionspyware,37Napsterfatalflawof,110overviewof,108-109NETeller'sabusebyJujuJiang,descriptionof,43-44"NETSEND"messages,explanationof,27NetworkSolutions,relationshiptoDNS,68New.
NetandSaveNow,advisoryabout,41-42newsgroups,roleinoriginofspam,9-10.
NFOfile,advisoryabout,99Nigerianbankscam,descriptionof,71Nigerianresponseto419scam,overviewof,76-78oObasanjo,Olusegunon419scam,76-77Olsen,Stefanie:"Court:Pop-upsBurdenofUsingNet,"43Omegawatchscam,descriptionof,85onlinesalescams,formsof,84openrelaysdynamicsof,16exampleof,23open-sourceconsidering,136-137supporting,141OperationCyberSweep,resultsof,86OperationSunDevii,descriptionof,121OTCBB(OvertheCounterBulletinBoard),relationshiptoscams,87OUSS(OneUltimateSolutiontoSpam),nonexistenceof,18overwritingviruses,characteristicsof,58ppaintingscam,descriptionof,85PairGainscamp,descriptionof,88Palladium"trust"system,advisoryabout,98-99papertapesevolutionof,96hackers'useof,94-95papertrails,examining,23-24parasiticviruses,characteristicsof,58Park,YunSooOhscam,88passwords,vulnerabilityof,43--44PayPalabuseof,80-84benefitsof,135pay-per-downloadservices,using,138Pazdan,Jenniferandfile-sharingdownloads,31PCPitstop,lawsuitagainst,37peer-to-peerspamming.
Seealsospam;scamsexplanationof,17sourcesof,39penilepatchscams,descriptionof,85PentiumIIIprocessors,relationshiptospyware,36"PersonalFirewallDay,"supportfor,90personalinformationphishingfor,81--84protecting,135Pethia,RichardD.
:"VirusesandWorms:WhatCanWeDoAboutThem,"66PewInternet&AmericanLifeProject,surveyperformedby,10-11PGP(PrettyGoodPrivacy),supportfor,136phishingscamsexampleof,85overviewof,81--84phonephreak,explanationof,117PHP.
Rainbowvirus,dissecting,55--58phreaking,originof,117piracycombating,100extentof,138piratemarkets,overviewof,93-94piratesabuseofCDsandDVDsby,109earlytechniquesusedby,98firstattemptatexposureof,95-96opinionsabout,113useofaudiotapesby,97popmusic,availabilityinpiratemarkets,94pop-underwindows,disadvantagesof,38pop-upwindowsdisadvantagesof,38legalrulingabout,43port1434,Slammerworm'sconnectionto,63Prodromou,EvanandalternativetoDeCSS,descriptionof,103publicencryption,importanceof,136pumpanddumpscams,descriptionof,87-90PunkBusterprogram,featuresof,124punks,participationincomputergames,122-125PWMarketing,lawsuitagainst,12Qqmail,exampleof,22-23RRadLight'sNew.
NetandSaveNow,advisoryabout,41-42RainBowvirus,dangersof,57,67Ralsky,Alan,3,5-6Index11111!
~···randomnumbergenerator,usinginviruses,56Raymond,BrotherJohnandexperiencewith419scam,75-76ReadyRangersLiberationFront,significanceof,50rediffmailpro.
comexample,22-23rerouters,examplesof,33resources.
SeearticlesRIAA(RecordingIndustryAssociationofAmerica)lawsuitslliedby,109relationshiptoNapster,108"TheRiseoftheSpammers,"webaddressfor,17Robertson,Jack:"InteltoEmbedSerialNumbersonPentiumIIIChips,"36rootdomains,managementbyDNS,67-68routinginformation,hidinginemail,22-23Russianhackers,attackonCitibank,129sS.
771Bill,purposeof,10safesurfing,threerulesof,134-137salesscam,exampleof,85-86SaveMyLifescam,overviewof,72-76SaveNowprogramcharacteristicsof,37,46andNew.
Netadvisories,41-43scams.
Seealsopeer-to-peerspamming;spamadvance-feefraud,71auctions,84dehydratedwater,78-80onhackerbulletinboards,83onlinesales,84phishing,81--84pumpanddump,87SaveMyLife,72-76stocksites,87SCO,relationshiptoMyDoomworm,51scriptkiddies,overviewof,125-128scriptviruses,characteristicsof,67searchengines,usingmailextractorswith,14SearchSecurity.
com:"ScriptKiddy,''125SecondParttoHellevaluating,3,134prollieof,49-50SecuritiesActof1993,purposeof,89security.
Seecomputersecuritysecurityinformation,accessing,981111~11BlackHat:Mis(its,Criminals,andScammersintheInternetAgesecuritypatches,advisoryaboutdisseminationof,54serialnumbersobtainingfromwebsites,98-99inPentiumIIIprocessors,36Shah,Vipul:"InternetSecuritiesFraud:OldTrick,NewMedium,"88Shamos,MichaelandMPAAtrial,106Sheils,Maggie:"CaliforniaWinsAnti-spamCase,"12TheS1wckwaveRiderbyJohnBrunner,significanceof,51Slammer(akaSapphire)wormcharacteristicsof,64computerschosenby,65minutesafterinitialoutbreakof,63numberofcomputersinfectedby,65numberofserversinfectedby,65spreadof,65-66small-capcompanies,scamsrelatedto,88Smith,DavidL.
andMelissaworm,61-62Smith,Teresaandauctionscam,85Sober.
Dworm,characteristicsof,54-55socialengineeringexplanationof,117usebyLordDigital,120software,creatingactivationkeysfor,99software-acceptancedialogbox,exampleof,39-40sourcecodeviruses,characteristicsof,59spam.
Seealsopeer-to-peerspamming;scamscostof,11-13currentdailyamountsof,18currentpercentageof,10deleting.
137EU's(EuropeanUnion's)approachtoward,11-12exampleof,21-26firstexampleof,9futureof,26-29impactonJensBenecke,1increasein,2originof,7-10reducingamountof,7requirementsfor,18sendingtoIMusers,27-28spambody,exampleof,24-25spambot,exampleof,17-18spamfilters,fooling,21-25spammerscatchingwithtarpits,16habitsof,88lawsagainst,11maskingidentitiesof,17returnoninvestmentexpectedby,13techniquesusedby,15-16,29tracingactivitiesof,16spamoperators,registryfor,6spam-relatedtermsandconcepts,timelineof,10SPtH.
SeeSecondParttoHellSpybot-Search&Destroy,featuresof,38SpySweeper,featuresof,38spywareversusantisypware,41-43benignspyware,32-33examples,31factorscontributingto,35-36growthof,42malignantspyware,33-35originsof,36problemsassociatedwith,42sourcesof,39,46tracking,47wormsas,45SQLinjection,effectof,126Stadion,significanceof,93Starkman,DeanandDeanTakahashi:"It'sGettingHardertoHideinCyberspace,"62Statesv.
TheProgressive,Inc.
case,relationshiptoMPAAtrial,107stealthvirus,explanationof,53StepWeb:"VAUDCREDITCARDNUMBERS!
!
!
!
,"83Stevenson,FrankandMPAAtrial,106StockGenie,descriptionof,89StockGeniescam,descriptionof,87stockscams,declineof,89stock-sitescams,descriptionof,87-90subjectlines,randomgenerationof,25Sullivan,Danny:"ForgetSmartTags:TopTextIsDoingWhatYouFeared,"36SystemUpdateasspyware,34TTakahashi,DeanandDeanStarkman:"It'sGettingHardertoHideinCyberspace,"62tarpits,catchingspammerswith,16tokens,relationshiptofilters,19"TokyoJoe"scam,descriptionof,88tonedialing,introductionof,117Touretzky,Dr.
DavidS.
andDeCSSdescramblers,104andrulinginMPAAtrial,108trackers,examplesof,33Trojanhorses,characteristicsof,34trustlimiting,135significanceof,112"trust"systems,vulnerabilityof,98-99T-shirtsproducedbyCopyleft.
com,controversyrelatedto,104uUha,Florence419scam,72-76UCE(unsolicitedcommercialemail)lawagainst,11significanceof,11U-Haul,relationshiptoSaveNow,43UNIXsystems,vulnerabilitytovirusesandworms,60-61Usenetnewsgroups,roleinoriginofspam,9-10users,lockingdown,139U.
S.
Scammerspostscam,descriptionof,85-86VValenti,JackandcriticismofDeCSS,103Viagra,numberofmisspellingsof,25viruscheckers,using,138virusesbeginningsof,133dynamicsof,51environmentconduciveto,60futureof,28,68PHP.
RainBow,55-58RainBowvirus,67rationalesofferedforcreationof,49-50scriptviruses,67spreadof,138targetsof,67typesof,58-59withoutentrypoints,58versusworms,51-53virusidentificationservices,significanceof,69virusscanners,significanceof,69VMworm,characteristicsof,60wW32.
Sober.
Dworm,characteristicsof,53Walton,KennethA.
andphishingscam,85wardialer,explanationof,125-126wardriving,explanationof,128Warholworm,characteristicsof,66WeatherBug,interfacefor,41websitesIndexIIIJI-wl····"50%oflnternetE-maillsNowSpamAccordingtoAnti-SpamLeaderBrightmail,"102600:TheHackerQuarterly,102"ABugintheLegalCode'',108AdvancedEmailExtractor,14"AllegedWarDriver'Releasedon$5,000Baii,"128antispyware,39"AttorneyGeneralDeclaresWininState'sFirstAnti-spamRuling,"12"BigBadWorld,"129Brightmail,2,10-11"BrightmailFindsSpammersHitNewLowforValentine'sDay,"2"CaliforniaWinsAnti-spamCase,"12"ComputerVirusesbyEugeneKaspersky,"58"Court:Pop-upsBurdenofUsingNet,"43"DespiteU.
S.
Efforts,WebCrimesThrive,"129"DihydrogenMonoxide,"79"DVDGroup:StopWearingOurCode!
,"104"eBayScamArtistsFaceCriminalCharges,"85EbolaMonkeyMan,71"E-mailProvidersSlamSpammers,"12"TbeFiveRulesforDoingBusinesswithNigeria,"77"ForgetSmartTags:TopTextIsDoing\VhatYouFeared,"36"GalleryofCSSDescramblers,"104"HistoryofCopyProtection,"97"TheHistoryofHacking,"118"HowtheDMCAAffectsUs,"100"IdentityTheftSurveyReport,"83"IFCC2002InternetFraudReport,"72"InteltoEmbedSerialNumbersonPentiumIIIChips,"36internationalregisterofspamoperators,6"InternetSecuritiesFraud:OldTrick,NewMedium,"88IP-Messenger,27"It'sGettingHardertoHideinCyberspace,"62"JailTimeforeBayScamArtist,"85"KeithLynch'stimelineofspamrelatedtermsandconcepts,"6--BlackHot:Misfits,Criminals,andScammersintheInternetAgeMagnatune,138Mandrake,137"MedalofHonor:AlliedAssaultCheats&Hacks,"124,.
AnOpenLettertoHobbyists,"96OpenOffice,137open-sourceapplications,137"APeekatScriptKiddieCulture,"127PGP(PrettyGoodPrivacy),136"APlanforSpam,"19"RlAALawsuitsYieldMixedResults,"109ride-sharing(JensBenecke),1"TheRiseoftheSpammers,"17"SaveNow,"42"ScamVictimsUnited,"84"ScriptKiddy,"125"SeeYouLater,Anti-Gators",37"TheSpamhausProject,"6"Spam:HowItIsHurtingE-mailandDegradingLifeontheInternet,"11,18"SpamKingLivesLargeOffOthers'E-mailTroubles,"6spampurveyors,11spywaretracking,47"StockScamsProliferateonWeb,"88"StockScams101:StockScams,Shams,andSpams,"88"ATemptingOfferforRussianPair,"130''TheSpreadoftheSapphire/SlammerWorm,"63''VALIDCREDITCARDNUMBERS!
!
!
!
,"83''VirusesandWorms:WhatCanWeDoAboutThem,"66W32.
Sober.
Dworm,54"What'sWrongwithCopyProtection,"98Xandros,137Wecker,JoeonDeCSS,101Wendland,Mike:"SpamKingLivesLargeOffOthers'E-mailTroubles,"6Willis,PaulandClaudiaGriffin,lawsuitagainst,12Wimer,Scottonautonomouscomputersecurity,69-70Windowssystems,vulnerabilitytovirusesandworms,60-61WindTreesgenerators,advisoryabout,89wirelessnetworks,relationshiptowardriving,128wormsXbeginningsof,133characteristicsof,50dissecting,5~8environmentconduciveto,60examplesof,51futureof,28,68Melissa,61-62Mortisworm,59-61originsof,51propagationof,52relationshiptoartificialintelligence,60Slammer(akaSapphire),62-67spreadof,138targetsof,67versusviruses,51-53Warholworm,66X10,lawsuitagainst,38Xingprogram,copyingvideoswith,106yyahoo.
combugscam,descriptionof,83Yaukey,John:"StockScamsProliferateonWeb,"88zZoEmailsystem,featuresof,20Zohner,Nathananddihydrogenmonoxidescam,79-80JOINTHEAPRESSFORUMSANDBEPARTOFOURCOMMUNITY.
You'lltinddiscussionsthatcovertopicsofinteresttorTprofessionals,programmers,andenthusiastsjustlikeyou.
lfyoupostaquerytooneofourforums,youcanexpectthatsomeofthebestmindsinthebusiness-especiallyApressauthors,whoaliwritewithTheExpert'sVoicerM_willchimeintohelpyou.
Whynotaimtobecomeoneofourmostvaluableparticipants(MVPs)andwincoolstuffHere'sasamplingofwhatyou'llfind:DATABASESDatadriveseverylhlng.
Shareinformation,exchangeideas,anddiscussanydatabaseprogrammingoradministrationissues.
INTERNETTECHNOLOGIESANDNETWORKINGTrylivingwithoutplumblng(andeventually1Pv6).
Talkaboutnetworkingtopicsincludingprotocols,design,administration,wireless,wired,storage,backup,certifications,trends,andnewtechnologies.
JAVAWe'vecarnealongwayfromtheoldOaktree.
HangoutanddiscussJavainwhateverflavoryouchoose:J2SE,J2EE,J2ME,Jakarta,andsoon.
MACOSXAliabouttheZenofOSX.
OSXisboththepresantandthefutureforMacapps.
Makesuggestions,offerupideas,orboastaboutyournewhardware.
OPENSOURCESourcecadelsgood;understanding(open)sourceisbetter.
DiscussopensourcetechnologiesandrelatedtopicssuchasPHP,MySQL,Linux,Peri,Apache,Python,andmore.
HOWTOPARTICIPATE:PROGRAMMING/BUSINESSUnfortunately,itis.
TalkabouttheApresslineofbooksthatcoversoftwaremethodology,bestpractices,andhowprogrammersinteractwiththe'suits.
"WEBDEVELOPMENT/DESIGNUglydoesn'tcutitanymore,andCGIisabsurd.
Helpisinsightforyoursite.
RnddesignsolutionsforyourprojectsandgetideasforbuildinganinteractiveWebs~e.
SECURITYLotsofbadguysoutthere-thegoodguysneedhelp.
Discusscomputerandnetworksecurityissueshere.
Justdon'tletanyoneelseknowtheanswers!
TECHNOLOGYINACTIONCoolthings.
Funthings.
lfsafterhours.
lt'stimetoplay.
Whetheryou'reintoLEGOMINDSTORMSortuminganoldPCintoaDVR,thisiswheretechnologytumsintotun.
WINDOWSNodefenestratlonhere.
AskquestionsaboutaliaspectsofWindowsprogramming,gethelponMicrosofttechnologiescoveredinApressbooks,orprovidefeedbackonanyApressWindowsbook.
GototheApressForumssiteathttp://forums.
apress.
com/.
ClicktheNewUserlink.
profitserver怎么样?profitserver是一家成立于2003的主机商家,是ITC控股的一个部门,主要经营的产品域名、SSL证书、虚拟主机、VPS和独立服务器,机房有俄罗斯、新加坡、荷兰、美国、保加利亚,VPS采用的是KVM虚拟架构,硬盘采用纯SSD,而且最大的优势是不限制流量,大公司运营,机器比较稳定,数据中心众多。此次ProfitServer正在对德国VPS(法兰克福)、西班牙v...
wordpress高级全行业大气外贸主题,wordpress通用全行业高级外贸企业在线询单自适应主题建站程序,完善的外贸企业建站功能模块 + 高效通用的后台自定义设置,更实用的移动设备特色功能模块 + 更适于欧美国外用户操作体验 大气简洁的网站风格设计 + 高效优化的网站程序结构,更利于Goolge等SEO搜索优化和站点收录排名。点击进入:wordpress高级全行业大气外贸主题主题价格:¥398...
进入6月,各大网络平台都开启了618促销,腾讯云目前也正在开展618云上Go活动,上海/北京/广州/成都/香港/新加坡/硅谷等多个地区云服务器及轻量服务器秒杀,最低年付95元起,参与活动的产品还包括短信包、CDN流量包、MySQL数据库、云存储(标准存储)、直播/点播流量包等等,本轮秒杀活动每天5场,一直持续到7月中旬,感兴趣的朋友可以关注本页。活动页面:https://cloud.tencent...
punkbuster为你推荐
软银收购arm一个公司要收购另一个公司(特别是国际大公司之间的收购行为)要满足什么条件才能收购?电脑管家和360哪个好腾讯电脑管家和360安全卫士哪个更好江门旅游景点哪个好玩的地方江门有什么地方好玩的?手动挡和自动挡哪个好自动挡和手动挡哪个好?苹果手机助手哪个好最新版iphone助手 PP助手好用吗?核芯显卡与独立显卡哪个好独立显卡和核芯显卡有什么区别网校哪个好市面上的网校,谁最好?雅思和托福哪个好考现在考雅思还是托福好电动牙刷哪个好飞利浦电动牙刷哪款好?求推荐美国国际东西方大学出国留学,美国“野鸡大学”有哪些?
域名备案只选云聚达 怎么申请域名 vir 美国主机评论 免备案cdn 大容量存储 最好看的qq空间 100x100头像 什么是刀片服务器 北京双线 徐正曦 共享主机 网通服务器托管 双线机房 免费mysql数据库 帽子云排名 日本代理ip 114dns 工信部icp备案查询 电信宽带测速软件 更多