GlossaryBlueboxAdeviceusedtosendspecialtonestotelephonesystems.
Thesewereoncethetoolofchoiceforearlytelephonephreaks.
Theywererenderedobsoletebydigitalphoneexchanges.
Theywerecalledblueboxessimplybecauseblueorbeigewasastandardcolorforelectroniccomponentsinthe1960sand'70s.
CacheAsetoffilescreatedbyawebbrowser,operatingsystem,orotherprogram.
Acachekeepstrackofprogramstatus.
Cachesusuallyincludethefilesyou'veeditedordeleted,websitesyou'veviewed,andotherpotentiallyprivateinformation.
Insomecases,blackhatscancapturecacheddataandfindvaluableinformationfor!
aterexploitation.
CodeDivisionMultipleAccess(COMA)Apopularcellularphonetransmissionscheme.
CookieAsmallfilethatappearsonyourharddrive.
It'susedbywebsitestotrackonlineshoppingcartsandbrowsinghabits.
Mostcookiesareinnocuous,butsomecanbeusedtotrackyourbehaviorfromsitetositeorcaptureimpor-tantinformationlikeaddressesorcredit-cardnumbers.
CopyprotectionAmethodusedbysoftwareandmediadistributorstopreventunauthorizedcopyingofsoftware,CDs,orDVDs.
CrackingTheprocessofbreakingcopyprotectionforthepurposeofpersonaluseormassreproduction.
ContentScrambllngSystem(CSS)AprimitiveencryptionschemeusedbyDVDmanufacturerstopreventthepiracyofDVDvideos.
DynamicHostConfigurationProtocol(DHCP)AmethodusedtodynamicallyconfigureandassignIPaddressestocomputersonasubnet.
Dial-upAmethodforconnectingtoanetworkusingastandardphoneline.
.
,.
111!
1111BlackHotMisfits,Criminals,andScammersintheInternetAgeDigitalMillenniumCopyrightAct(DMCA)Alaw,passedonOctober28,1998,thatgavecontentproducerstherighttoprotecttheirmedia,chargepirates,andsuehackersandcrackersinfederalcourt.
Thefirstpartofthelawpreventselectroniccircumventionofcopyprotection,andthesecondpartprotectsInternetserviceprovidersfromlitigationifcopyrightedmaterialisfoundontheirservers,buthasbeenostensiblycreatedoruploadedbyoneoftheircustomers.
DomainNameSystem(DNS)Thesystemthattranslatestextaddresses(suchaswww.
goog1e.
com)intoIPaddresses(192.
168.
0.
1).
ItcanalsobeusedtoconfirmtheexistenceofaserverontheInternet.
DenialofService(DoS)Anyattackthatpreventslawfulusersfromaccessingacomputerresource.
MostDoSattacksarecarriedoutbyfloodinganetworkwithjunkpacketsorfillingdiskdriveswithgarbageuntilacomputercrashes.
However,aDoSattackcouldalsoinvolvecuttingpowertoacomputeroreventhrowingabrickthroughamonitor.
EncryptionTheprocessofconvertingaplaintextmessageintoaciphertextmessage.
Ciphertextmessagesarethendecodedintheprocessofdecryption.
EthernetAsystemforconnectingoneormorecomputers.
Ethernetisanopen-endedsysteminthatthefirstcomputeronachaindoesn'thavetobedirectlyconnectedtothelastcomputeronthechain,meaningnewcomputerscanbeaddedtothenetworkwithoutdisruptingothersystems.
Ethernet,sonamedbecauseitseemedtosendsignalsoutintotheimaginaryether,caneitherrunalocalareanetwork(LAN)orwideareanetwork(WAN).
ExploitAmethodusedbyhackerstogainprivilegedaccessonacomputer.
Exploitscanbebugsinanoperatingsystemoritsattendantprograms,orasimplermethodlikesocialengineering.
GlobalPositioningSystem(GPS)Awirelesssystemcreatedtopinpointanypositionontheglobethroughsatellitetriangulation.
GlobalSystemforMobileCommunications(GSM)Acellularprotocolthat'spopularinEurope.
ItusessmallSIMcardsandcompatiblehandsetstoconnecttothecellularnetwork.
HackingEarlyusageequatedthistermwithacomputeruserwholovestoexploreandimprovehardwareandsoftware.
Later,theterm"hacker"begantomeanamaliciouscomputeruserwhoisouttostealordamageinformationonacomputersystem.
lnstantmessaging(IM)AsystemofprotocolsthatincludemethodstosendshortmessagesovertheInternetandkeeptrackofuserswhoareon-andoffline.
IMisquicklybecomingoneofthemostpopularmediumsforquick,off-the-cuffcommunication.
Glossarylllll·FIIInternetTheworldwidenetworkofcomputersconnectedbytheTCPIIPProtocolandothernetworkingprotocols.
TheInternetismorethanjusttheWorldWideWeb,whichsimplyservesupwebpagesanddata.
TheInternetcarriesvoiceinformation,email,andscientificdataatextremelyhighspeedsandcanroutearounddamagingfiles.
Originallydesignedasaresilientcom-municationssysteminthecaseofanuclearwar,theInternethasevolvedintoanentirelynewandall-inclusivemediaforinformationandcreativecontent.
lntellectualproperty{IP)Apatentorideaownedbyacompanyorcompaniesrelatedtoaspecifictechnologyormedia.
Forexample,aprogramisIPaswellastheprogramminglanguageitwaswrittenin.
ManycompaniesciteIPprotectionlawswhengoingaftercopyrightinfringersandmalicioushackers.
IPaddressDouble-dottedpair(thatis,192.
168.
0.
1)addressthatpinpointsacomputerorsubnetintheInternet.
IPaddressesallowonecomputertocontactanotherovertheInternet.
ISPInternetserviceprovider.
LinuxAlsoGNU/Linux.
AnoperatingsystemcreatedbyLinuxTorvaldsandcountlessinternationalvolunteers.
Linuxisanopen-sourcesystem.
MP3,MPEG,AudioLayer3Aformatusedbypopularmusicplayersforencodinganddecodingaudio.
lnitiatedbyFraunhoferInstitutIlS-A,theMP3formatisapatentedmethodforcompressingandencryptingaudio.
MotionPictureAssociationofAmerica(MPAA)Anonprofitorgan-izationformedinordertosupportandadvancetheinterestsofmajormoviestudios.
OpensourceOpen-sourcesoftwareisanysoftwarewhosesourcecodeandownershiprightsareinthepublicdomainorlicensedunderanopen-sourceorGNU(GNU'sNotUNIX)PublicLicense.
Mostopen-sourcesoftwareisfreeandcanbefreelymodifiedaslongasanychangestothecoresourcealsobecomepartofthepublicdomain.
PrettyGoodPrivacy(PGP)ApublickeycryptographysystemcreatedbyPhilZimmermanforthepurposesofencryptingprivatecommunications.
ZimmermanfacedanumberofinvestigationsforallowingPGPtospreadoutofthecount:ryinviolationoffederalmunitionsstatutes.
PhreakingPhonecracking.
Theprocessofbreakingthroughprotectionsonthetelephonesysteminordertoaccessadministratorfeaturesandstealphoneservice.
[ll~tllBlackHot:Misfits,Criminals,andScammersintheInternetAgePublickeycryptographyAformofcryptographyinwhichtwokeysareused,apublickeyandahiddenone.
ItwasoriginallyinventedbyCliffordCocksandrediscoveredbyresearchersatMIT.
Inpublickeycryptography,userAencryptsamessagetouserBusinguserB'spublickey.
ThismessagecanonlybedecodedusinguserB'shidden,privatekeyandcannotbedecodedusingauser'spublickey.
RecordinglndustryAssociationofAmerica(RIAA)Anonprofitorganizationformedinordertosupportandadvancetheinterestsofmajorrecordingstudios.
SendmailAprotocolbasedonoriginalInternetstandardsusedfortrans-portingelectronicmailovertheInternet.
SpamUnwantedandunsolicitedcommercialemail.
SpimUnwantedandunsolicitedinstantmessages,includingcellularSMSmessagessenttocellularhandsets.
TCP/IPTransmissionControlProtocoVInternetProtocol.
AsuiteofprotocolsforsendingandreceivinginformationovertheInternet.
TCPIIPdataissplitintosmallpacketsandthenre-createdatthereceivingend.
TheTCP/IPProtocolallowsdisparatepiecesofthesamedatatoberoutedthroughdifferentconnectionsforlaterreconstruction.
TrunkAmaintelephonelinethatconnectsindividualtelephoneswitheachother.
Imaginethetelephoneexchangeasatree.
Individualphonesareleaves,locallinesarebranches,andtheselinesleadintothetrunk,whichcarriesphonecallsfromoneleaftotheother.
Wi-FiWirelessFidelity.
Awirelessdata-transferstandardthathasbecomeincreasinglypopular.
Ittransmitsdataat11Mbps.
Alsoknownas802.
llb,and802.
llg,whichwasanimprovementonthisstandard.
Ittransmitsinformationatapproximately54Mbps.
Zero-dayexploitArecentlydiscoveredexploitthathasn'tyetbeenpatchedbyasoftwaremanufacturer.
SelectedReadingHackingHafner,Katieetal.
CYBERPUNK:OutlawsandHackersontheComputerFrontier.
NewYork:Simon&Schuster,1991.
Levy,Steven.
Crypto:HowtheCadeRebelsBeattheGovemment-SavingPrivacyintheDigitalAge.
NewYork:Penguin,2002.
Levy,Steven.
Hackers:HeroesoftheComputerRevolution.
NewYork:Anchor,1984.
Nuwere,EjoviandDavidChanoff.
HackerCracker:A]oumeyfromtheMeanStreetsofBrooklyntotheFrontiersofCyberspace.
NewYork:Perennial,2003.
Slatalla,MichelleandJoshuaQuittner.
MastersofDeception:TheGangThatRuledCyberspace.
NewYork:HarperCollins,1995.
OpenSourceFink,Martin.
TheBusinessandEconomicsofLinuxandOpenSource.
NewYork:PrenticeHaliPTR,2002.
Moody,Glyn.
RebelCade:LinuxandtheOpenSourceRevolution.
Boulder,CO:PerseusPublishing,2002.
Raymond,EricS.
TheCathedral&theBazaar:MusingsonLinuxandOpenSourcebyanAccidentalRevolutionary.
Boston:O'Reilly&Associates,1999.
Torvalds,LinusandDavidDiamond.
JustforFun:TheStoryofanAccidentalRevolutionary.
NewYork:HarperBusiness,2002.
Williams,Sam.
FreeasinFreedom:RichardStallman'sCrosadeforFreeSoftware.
Boston:O'Reilly&Associates,2002.
IIIDIDJI:IIBlackHat:Misfits,Criminals,andScammersintheInternetAgeSystemAdministrationCobb,Chey.
NetworkSecurityforDummies.
NewYork:ForDummies,2002.
Greene,ThomasC.
ComputerSecurityfortheHomeandSmallOffice.
Berkeley,CA:Apress,2004.
Hallberg,BruceA.
Networking:ABeginner'sGuide.
NewYork:McGraw-HillCompanies,2001.
Hatch,BrianandJamesLee.
Linux(HackingExposed),2nded.
NewYork:McGraw-HillOsbomeMedia,2002.
Jones,Keithetal.
Anti-HackerToolKit.
NewYork:McGraw-HillOsbomeMedia,2002.
IndexSymbolsandNumbers@(at)symbol,identif)ringemailaddressesby,14414hackers,descriptionof,118419scamTheCommunityoftheMonksofAdoration,75--76exampleof,72-76explanationof,71-72goalandprocessof,75impactonShawnandJeffMosch,84aslotteryannouncement,771986ComputerFraudandAbuseAct,applicationof,602600:TheHackerQuarterlyoriginsof,103-104rulinginMPAAtria!
,107webaddressfor,102AAd-aware,featuresof,38-39administrators,advicefor,139-140ads,abuseof,38-41adservers,featuresof,33AdvancedEmailExtractor,webaddressfor,14advance-feefraudexampleof,72-76explanationof,71-72goalandprocessof,75adware.
SeespywareAllen,PaulandBASICIanguage,95AltairBASIC,developmentof,95AltnetbundlingwithKazaa,objectionsto,46Anti-JunkFaxlaw,introductionof,12Anti-Spamlaw,introductionof,10antispywareversusspyware,41-43webresourcefor,39AppleMafia,formationandbreakupof,120--121Apple'siTunes,salesrealizedby,108--109Arpanet,relationshiptooriginofspam,7-8articles"50%ofInternetE-mailIsNowSpamAccordingtoAnti-SpamLeaderBrightmail,"10"ABugintheLegalCode",108"AIIegedWarDriver'Releasedon$5,000Baii,"128"AnOpenLettertoHobbyists,"96"AttomeyGeneralDeclaresWininState'sFirstAnti-spamRuling,"12"BigBadWorld,"129"BrightmailFindsSpammersHitNewLowforValentine'sDay,"2"BrothersWinWebBully'Lawsuit,"38"CaliforniaWinsAnti-spamCase,"12"ComputerVirusesbyEugeneKaspersky,"58"Court:Pop-upsBurdenofUsingNet,"43"DespiteU.
S.
Efforts,WebCrimesThrive,"129"DihydrogenMonoxide,"79"DVDGroup:StopWearingOurCode!
",104"eBayScamArtistsFaceCriminalCharges,"85'li111,111BlackHat:Misfits,Criminals,andScammersintheInternetAge"E-mailProvidersSlamSpammers,"12"TheFiveRulesforDoingBusinesswithNigeria,"77"ForgetSmartTags:TopTextIsDoingWhatYouFeared,"36"GalleryofCSSDescramblers,"104"HistoryofCopyProtection,"97"TheHistoryofHacking,"118"HowtheDMCAAffectsUs,"100"IdentityTheftSurveyReport,"83"IFCC2002InternetFraudReport,"72"InteltoEmbedSerialNumbersonPentiumIIIChips,"36"InternetSecuritiesFraud:OldTrick,NewMedium,"88"lt'sGettingHardertoHideinCyberspace,"62"JailTimeforeBayScamArtist,"85"KeithLynch'stimelineofspamrelatedtermsandconcepts,"6"MedalofHonor:AlliedAssaultCheats&Hacks,"124"APeekatScriptKiddieCulture,"127"APlanforSpam,"19"RIAALawsuitsYieldMixedResults,"109"TheRiseoftheSpammers,"17"ScamVictimsUnited,"84"ScriptKiddy,"125"SeeYouLater,Anti-Gators'',37"TheSpamhausProject,"6"Spam:HowItlsHurtingE-mail,"18"Spam:HowItIsHurtingE-mailandDegradingLifeontheInternet,"11"SpamKingLivesLargeOffOthers'E-mailTroubles,"6"TheSpreadoftheSapphire/SlammerWorm,"63"StockScamsProliferateonWeb,"88"StockScams101:StockScams,Shams,andSpams,"88"ATemptingOfferforRussianPair,"130"VALIDCREDITCARDNUMBERS!
!
!
I,"83''VirusesandWorms:WhatCanWeDoAboutThem,"66''What'sWrongwithCopyProtection,"98artificialintelligence,relationshiptoworms,60at(@)symbol,identif)ingemailaddressesby,14attachments,advisoryaboutopeningof,137attacks,respondingto,139--140auctionscams,formsof,84--85audiotape,developmentof,96-97autonomouscomputersecurity,Bdevelopmentof,69-70.
Seealsocomputersecuritybackdoors,characteristicsof,34,45backups,importanceof,139BarrosoBerrueta,David:"TheRiseoftheSpammers,"17BASIClanguage,originof,95BatchWormGenerator,descriptionof,49--50Bayesiananalysis,roleinfilters,19--20BBSs(bulletinboardsystems),abuseof,97Beach,Scottandphishingscam,85Bedrosian,Steveanddehydratedwaterscam,78-79Benecke,Jensandride-sharingwebsite,1benignspyware,examplesof,32--33BitTorrent,successof,109--111black-hathackersadjustingto,141-142characteristicsof,3objectivesof,2persistenceof,133potentialharmlessnessof,133--134blackmarkets,overviewof,93--94Bloomberg,MichaelandpreventingKazakhstanhackingscheme,129Borland,John:"RIAALawsuitsYieldMixedResults,"109"BrightmailFindsSpammersHitNewLowforValentine'sDay,"webaddressfor,2BrilliantDigital,relationshiptospyware,46BrotherJohnRaymond,experiencewith419scam,75--76Brunner,JohnandTheShockwaveRider,51bulletinboards,appearanceofscamson,83cCAN-SPAMActeffectivenessof,90introductionof,11-12Canter&Siegel,roleinoriginofspam,9CaptainCrunch'shackingtechnique,descriptionof,117CDtheft,preventing,112cellphones,vulnerabilityof,26-27,68Cha,ArianaEunjung"DespiteU.
S.
Efforts,WebCrimesThrive,"129"ATemptingOfferforRussianPair,"130challenge-responsesystemsversusencryptedmessages,20featuresof,7Chameleonandclosingsecurityexploits,131chameleons,characteristicsof,34-35chatbot,explanationof,28cheats,addingtocomputergames,122-125Citibank,attackbyRussianhackerson,129Clariaspywarelawsuit,37Clarke,lanandFreenet,109-110CodeRedworm,impactof,66Cohen,BramandBitTorrent,111Cohen,FredandVMworm,60Cohenv.
California,significanceof,104collectiblepaintingscam,descriptionof,85TheCommunityoftheMonksofAdoration,experiencewith419scam,75-76companionviruses,characteristicsof,59computergames,significanceof,122-125computerpirates.
Seepiratescomputers,backingup,139computersecurity,bestpracticesfor,137-141.
Seealsoautonomouscomputersecuritycookies,characteristicsof,35Copyleft.
com,supportfor2600,104copyprotectionarticleabout,97ineffectivenessof,98"correspondencemanagers"scam,descriptionof,85-86Cox,Beth:"JailTimeforeBayScamArtist,"85crackersearlytechniquesusedby,98useofaudiotapesby,97cracks,obtainingfromwebsites,98-99CrayThinkingMachines,impactonLordDigital,118credit-cardnumbers,phishingfor,81-84creditcards,protecting,135CSS(ContentScrambleSystem),significanceof,102Ddataminers,featuresof,32-33Dave,Damien:"ABugintheLegalCode'',108DEC,roleinoriginofspam,7-9DeCSSprogramalternativeto,103-104versusMP3,106purposeof,101screendumpof,105Index1111'~1···1dehydratedwaterscam,overviewof,78-80Delio,Michelle:"E-mailProvidersSlamSpammers,"12DeMicco,FrankJ.
pumpscam,descriptionof,87dictionaryattacksexampleof,29reasonfor,15digitalphonesystems,precursorto,117digitalstamps,proposalsforuseof,21dihydrogenmonoxidescam,descriptionof,79-80DMCA(DigitalMillenniumCopyrightAct)citationof,106effectivenessof,132purposeof,100-101violationof,102DNS(DomainNameSystem),significanceof,67-68DoSattacks,descriptionof,127DoubleClick,relationshiptochameleons,35Draper,John'shackingtechnique,descriptionof,117Drumrnie,Gretchen:"Alleged'WarDriver'Releasedon$5,000Baii,"128DT:"HistoryofCopyProtection,"97DVDCCA(DVDCopyControlAssociation),significanceof,102DVDs,watchingwithDeCSSprogram,101EEbolaMonkeyMan,relationshiptoadvance-feefraud,71EcoQuest,advisoryabout,89eEyeDigitalSecurity,foundingof,131EFF(ElectronicFrontierFoundation),relationshipto2600defendants,103-104electronicsignatures,futureof,91email,hidingroutinginformationin,22-23emailaddressescreatingseparateversionsof,137currentnumberof,18·identifying,14typicalformatof,15emailextractors,purposeof,13-14,.
.
1118/ackHat:Misfits,Criminals,andScammersintheInternetAgeE-Money,Inc.
,relationshiptoVasilyGorshkov,130TheEmperorSecurityTeamhackers,techniqueof,126Emulexstockscam,descriptionof,89eMusic,relationshiptochameleons,35encryptedmessages,proposalsforuseof,20encryption,importanceof,135-136,140EnviroVoraxialTechnologyscam,descriptionof,87EU's(EuropeanUnion's)approachtowardspam,overviewof,11-12EULA(EndUserLicenseAgreement)advisoryabout,37exampleof,31-32ExpertGroupofProtectionAgainstHackers,significanceof,129Explorer,vulnerabilitytophishing,81-82Ff2mailsub-server,exampleof,23"fairuse"roleinMPAAtrial,107significanceof,102Fallows,Deborah:"Spam:HowItIsHurtingE-mailandDegradingLifeontheInternet,"11,18Fanning,ShawnandNapster,108faxlaw,introductionof,12FederalTradeCommission:"IdentityTheftSurveyReport,"83Festa,Paul:"SeeYouLater,Anti-Gators",37Fetterman,Kennethandphishingscam,85filesharing,vulnerabilityof,133fileworms,characteristicsof,59filtering,processof,18-20ffiters,fooling,21-22,24-25Flaum,David:"ScamVictimsUnited,"84FraudBureau.
com:"StockScams101:StockScams,Shams,andSpams,"88"free-as-in-freedom"model,explanationof,96freemarketing,costof,11-13Freenet,creationof,109-111freespeechrulinginfavorof,104significanceinMPAAtrial,107FreeToSell,advisoryabout,89-90FTC(FederalTradeCommission),finesimposedononlinestoresby,90GGAINPublishing,trustingcontentfrom,39-41games.
SeecomputergamesGarbus,MartinandMPAAtrial,100-107Gates,BillandBASIClanguage,95GatoreWalletspywarelawsuit,descriptionof,37Gatorsoftware,software-acceptancedialogboxfor,39-40Ghasemi,Dr.
Shahlaand419scam,77Gilmore,Johnoncopyprotection,98-99Gold,LeonandMPAAtrial,100-107Gorshkov,Vasilyandhackingscheme,129-130Graham,Paul:"APlanforSpam,"19CreatWorm,characteristicsof,59-61greencardlotteryassistance,roleinoriginofspam,9Griffin,ClaudiaandPaulWillis,lawsuitagainst,12Hhackerbulletinboards,appearanceofscamson,83hackercrackdown,firstexampleof,118hackerscapabilitiesof,130-131characteristicsof,115-116andcomputergames,122-125goalsof,131-132hiring,131-132originaltechniquesof,94securitybreachesattributedto,129useofDoSattacksby,127hackingcounterculture,originof,116hackinghistory,webresourcefor,118hardrerouters,featuresof,33HaXXorDVDVolume1:NoLongerFloppy,significanceof,115HighSpeedVerifier,featuresof,15hoaxes.
Seescamshoneypots,purposeof,13Hulme,GeorgeV.
:"BigBadWorld,"1291Iaconi,Teresaandauctionscam,85ibogaine,significancetoLordDigital,121identitythefteffectsof,3exampleof,83lE(InternetExplorer),vulnerabilitytophishing,81-82IFCC(InternetFraudComplaintCenter),complaintsregisteredwith,90IM(instantmessaging),spamprojectionsfor,27-28infection,occurrenceof,51--55Intel'sTrustedComputingPlatformArchitecture"trust"system,advisoryabout,98--99Internetrerouters,featuresof,33Internettheft,performingwithwardriving,128investors,obtainingprotectionfromSecuritiesActof1993,89IPaddressesformatof,15--16vulnerabilityof,35IP-Messenger,webaddressfor,27ITadministrators,advicefor,139-140iTunes,salesrealizedby,108--109Ivanov,Alexyandhackingscheme,129-130Jjackingin,explanationof,119Jakob,Markandstockscam,89jamestama2004.
orgdomain,examiningpapertrailfor,23--24Janos,IgoronNew.
NetandSaveNow,42Jiang,Jujuandpasswordabuse,43--44Johansen,JonandDeCSS,101-102andrulinginMPAAtrial,108KKaplan,JudgeandMPAAtrial,104,107Kaspersky,Eugene:"ComputerVirusesbyEugeneKaspersky,"58KazaabundlingwithAltnet,46fatalflawof,110"KeithLynch'stimelineofspam-relatedtermsandconcepts,"webaddressfor,6KeyGenerator,exampleof,99keystrokeloggersavoiding,46characteristicsof,34exampleof,43--45IndexIIIJiiJIIKhan,RishiandMelissaworm,62Kirch,AndrewD.
andscriptkiddies,127Kittrick,Paulashoneypot,13Konrad,Rachel:"AttorneyGeneralDeclaresWininState'sFirstAnti-spamRuling,"12Kroupa,Patrick'sexploits,118--122Llaws1986ComputerFraudandAbuseAct,60Anti-JunkFax,12Anti-Spamlaw,10CAN-SPAMAct,11-12,90DMCA(DigitalMillenniumCopyrightAct),100,132MurkowskiAnti-Spamlaw,10overviewof,90--91SecuritiesActof1993,89significanceof,140--141bystates,12againstUCE(unsolicitedcommercialemail),12leeches,relationshiptoBBSs,97LegionofDoom,descriptionof,121legislation.
SeelawsLevy,StevenandHackers,3libraryviruses,characteristicsof,59linkverifiers,featuresof,14-15linkviruses,characteristicsof,59Linux,securityof,137Linuxsystems,vulnerabilitytovirusesandworms,60--61Linuxusers,roleinMPAAtrial,107lists,averagecostof,13Logue,AarononDMCA(DigitalMillenniumCopyrightAct),100LordDigital,exploitsof,118--122MMacintoshsystems,vulnerabilitytovirusesandworms,60MagicLanternspyware,exampleof,44Magnatune,webaddressfor,138Mahoney,Michael:"eBayScamArtistsFaceCrimuialCharges,"85Maiffret,Mareandclosingsecurityexploits,131mailengines,convertingmachinesto,17Biill·ll8/ackHot:Mis~ts,Criminals,andScammersintheInternetAgemailinglists,averagecostof,13mainframes,relationshiptooriginofhackers,116malignantspyware,overviewof,33-35MasterCardInternational'sassessmentofcostsrelatedtospam,11MedalofHonorcomputergame,significanceof,124Melissaworm,characteristicsof,61-62MicrosoftInternetExplorer'svulnerabilitytophishing,81-82Palladiumadvismy,98-99SystemUpdateasspyware,34Mikkelson,BarbaraandDavidP.
:"DihydrogenMonoxide,"79Miller,Robin:"APeekatScriptKiddieCulture,"127MITS,roleinexposingcomputerpirates,95-96MMF(MakeMoneyFast)letters,roleinoriginofspam,10Moore,Davidetal:''heSpreadoftheSapphire/SlammerWorm,"63Morgenstern,JonofE-Money,Inc.
,interactionwithVasilyGorshkov,130Morrisworm,overviewof,59-61Mosch,ShawnandJeffonadvance-freefraud,84MP3versusDeCSSprogram,106MPAA(MotionPictureAssociationofAmerica),relationshiptoDeCSS,102-106Mr.
BadandalternativetoDeCSS,descriptionof,103murking,explanationof,10MurkowskiAnti-Spamlaw,introductionof,10music,obtaining,138MyDoomworm,characteristicsof,51MYSQL,relationshiptoSlammerworm,63,65NNaider,Avionspyware,37Napsterfatalflawof,110overviewof,108-109NETeller'sabusebyJujuJiang,descriptionof,43-44"NETSEND"messages,explanationof,27NetworkSolutions,relationshiptoDNS,68New.
NetandSaveNow,advisoryabout,41-42newsgroups,roleinoriginofspam,9-10.
NFOfile,advisoryabout,99Nigerianbankscam,descriptionof,71Nigerianresponseto419scam,overviewof,76-78oObasanjo,Olusegunon419scam,76-77Olsen,Stefanie:"Court:Pop-upsBurdenofUsingNet,"43Omegawatchscam,descriptionof,85onlinesalescams,formsof,84openrelaysdynamicsof,16exampleof,23open-sourceconsidering,136-137supporting,141OperationCyberSweep,resultsof,86OperationSunDevii,descriptionof,121OTCBB(OvertheCounterBulletinBoard),relationshiptoscams,87OUSS(OneUltimateSolutiontoSpam),nonexistenceof,18overwritingviruses,characteristicsof,58ppaintingscam,descriptionof,85PairGainscamp,descriptionof,88Palladium"trust"system,advisoryabout,98-99papertapesevolutionof,96hackers'useof,94-95papertrails,examining,23-24parasiticviruses,characteristicsof,58Park,YunSooOhscam,88passwords,vulnerabilityof,43--44PayPalabuseof,80-84benefitsof,135pay-per-downloadservices,using,138Pazdan,Jenniferandfile-sharingdownloads,31PCPitstop,lawsuitagainst,37peer-to-peerspamming.
Seealsospam;scamsexplanationof,17sourcesof,39penilepatchscams,descriptionof,85PentiumIIIprocessors,relationshiptospyware,36"PersonalFirewallDay,"supportfor,90personalinformationphishingfor,81--84protecting,135Pethia,RichardD.
:"VirusesandWorms:WhatCanWeDoAboutThem,"66PewInternet&AmericanLifeProject,surveyperformedby,10-11PGP(PrettyGoodPrivacy),supportfor,136phishingscamsexampleof,85overviewof,81--84phonephreak,explanationof,117PHP.
Rainbowvirus,dissecting,55--58phreaking,originof,117piracycombating,100extentof,138piratemarkets,overviewof,93-94piratesabuseofCDsandDVDsby,109earlytechniquesusedby,98firstattemptatexposureof,95-96opinionsabout,113useofaudiotapesby,97popmusic,availabilityinpiratemarkets,94pop-underwindows,disadvantagesof,38pop-upwindowsdisadvantagesof,38legalrulingabout,43port1434,Slammerworm'sconnectionto,63Prodromou,EvanandalternativetoDeCSS,descriptionof,103publicencryption,importanceof,136pumpanddumpscams,descriptionof,87-90PunkBusterprogram,featuresof,124punks,participationincomputergames,122-125PWMarketing,lawsuitagainst,12Qqmail,exampleof,22-23RRadLight'sNew.
NetandSaveNow,advisoryabout,41-42RainBowvirus,dangersof,57,67Ralsky,Alan,3,5-6Index11111!
~···randomnumbergenerator,usinginviruses,56Raymond,BrotherJohnandexperiencewith419scam,75-76ReadyRangersLiberationFront,significanceof,50rediffmailpro.
comexample,22-23rerouters,examplesof,33resources.
SeearticlesRIAA(RecordingIndustryAssociationofAmerica)lawsuitslliedby,109relationshiptoNapster,108"TheRiseoftheSpammers,"webaddressfor,17Robertson,Jack:"InteltoEmbedSerialNumbersonPentiumIIIChips,"36rootdomains,managementbyDNS,67-68routinginformation,hidinginemail,22-23Russianhackers,attackonCitibank,129sS.
771Bill,purposeof,10safesurfing,threerulesof,134-137salesscam,exampleof,85-86SaveMyLifescam,overviewof,72-76SaveNowprogramcharacteristicsof,37,46andNew.
Netadvisories,41-43scams.
Seealsopeer-to-peerspamming;spamadvance-feefraud,71auctions,84dehydratedwater,78-80onhackerbulletinboards,83onlinesales,84phishing,81--84pumpanddump,87SaveMyLife,72-76stocksites,87SCO,relationshiptoMyDoomworm,51scriptkiddies,overviewof,125-128scriptviruses,characteristicsof,67searchengines,usingmailextractorswith,14SearchSecurity.
com:"ScriptKiddy,''125SecondParttoHellevaluating,3,134prollieof,49-50SecuritiesActof1993,purposeof,89security.
Seecomputersecuritysecurityinformation,accessing,981111~11BlackHat:Mis(its,Criminals,andScammersintheInternetAgesecuritypatches,advisoryaboutdisseminationof,54serialnumbersobtainingfromwebsites,98-99inPentiumIIIprocessors,36Shah,Vipul:"InternetSecuritiesFraud:OldTrick,NewMedium,"88Shamos,MichaelandMPAAtrial,106Sheils,Maggie:"CaliforniaWinsAnti-spamCase,"12TheS1wckwaveRiderbyJohnBrunner,significanceof,51Slammer(akaSapphire)wormcharacteristicsof,64computerschosenby,65minutesafterinitialoutbreakof,63numberofcomputersinfectedby,65numberofserversinfectedby,65spreadof,65-66small-capcompanies,scamsrelatedto,88Smith,DavidL.
andMelissaworm,61-62Smith,Teresaandauctionscam,85Sober.
Dworm,characteristicsof,54-55socialengineeringexplanationof,117usebyLordDigital,120software,creatingactivationkeysfor,99software-acceptancedialogbox,exampleof,39-40sourcecodeviruses,characteristicsof,59spam.
Seealsopeer-to-peerspamming;scamscostof,11-13currentdailyamountsof,18currentpercentageof,10deleting.
137EU's(EuropeanUnion's)approachtoward,11-12exampleof,21-26firstexampleof,9futureof,26-29impactonJensBenecke,1increasein,2originof,7-10reducingamountof,7requirementsfor,18sendingtoIMusers,27-28spambody,exampleof,24-25spambot,exampleof,17-18spamfilters,fooling,21-25spammerscatchingwithtarpits,16habitsof,88lawsagainst,11maskingidentitiesof,17returnoninvestmentexpectedby,13techniquesusedby,15-16,29tracingactivitiesof,16spamoperators,registryfor,6spam-relatedtermsandconcepts,timelineof,10SPtH.
SeeSecondParttoHellSpybot-Search&Destroy,featuresof,38SpySweeper,featuresof,38spywareversusantisypware,41-43benignspyware,32-33examples,31factorscontributingto,35-36growthof,42malignantspyware,33-35originsof,36problemsassociatedwith,42sourcesof,39,46tracking,47wormsas,45SQLinjection,effectof,126Stadion,significanceof,93Starkman,DeanandDeanTakahashi:"It'sGettingHardertoHideinCyberspace,"62Statesv.
TheProgressive,Inc.
case,relationshiptoMPAAtrial,107stealthvirus,explanationof,53StepWeb:"VAUDCREDITCARDNUMBERS!
!
!
!
,"83Stevenson,FrankandMPAAtrial,106StockGenie,descriptionof,89StockGeniescam,descriptionof,87stockscams,declineof,89stock-sitescams,descriptionof,87-90subjectlines,randomgenerationof,25Sullivan,Danny:"ForgetSmartTags:TopTextIsDoingWhatYouFeared,"36SystemUpdateasspyware,34TTakahashi,DeanandDeanStarkman:"It'sGettingHardertoHideinCyberspace,"62tarpits,catchingspammerswith,16tokens,relationshiptofilters,19"TokyoJoe"scam,descriptionof,88tonedialing,introductionof,117Touretzky,Dr.
DavidS.
andDeCSSdescramblers,104andrulinginMPAAtrial,108trackers,examplesof,33Trojanhorses,characteristicsof,34trustlimiting,135significanceof,112"trust"systems,vulnerabilityof,98-99T-shirtsproducedbyCopyleft.
com,controversyrelatedto,104uUha,Florence419scam,72-76UCE(unsolicitedcommercialemail)lawagainst,11significanceof,11U-Haul,relationshiptoSaveNow,43UNIXsystems,vulnerabilitytovirusesandworms,60-61Usenetnewsgroups,roleinoriginofspam,9-10users,lockingdown,139U.
S.
Scammerspostscam,descriptionof,85-86VValenti,JackandcriticismofDeCSS,103Viagra,numberofmisspellingsof,25viruscheckers,using,138virusesbeginningsof,133dynamicsof,51environmentconduciveto,60futureof,28,68PHP.
RainBow,55-58RainBowvirus,67rationalesofferedforcreationof,49-50scriptviruses,67spreadof,138targetsof,67typesof,58-59withoutentrypoints,58versusworms,51-53virusidentificationservices,significanceof,69virusscanners,significanceof,69VMworm,characteristicsof,60wW32.
Sober.
Dworm,characteristicsof,53Walton,KennethA.
andphishingscam,85wardialer,explanationof,125-126wardriving,explanationof,128Warholworm,characteristicsof,66WeatherBug,interfacefor,41websitesIndexIIIJI-wl····"50%oflnternetE-maillsNowSpamAccordingtoAnti-SpamLeaderBrightmail,"102600:TheHackerQuarterly,102"ABugintheLegalCode'',108AdvancedEmailExtractor,14"AllegedWarDriver'Releasedon$5,000Baii,"128antispyware,39"AttorneyGeneralDeclaresWininState'sFirstAnti-spamRuling,"12"BigBadWorld,"129Brightmail,2,10-11"BrightmailFindsSpammersHitNewLowforValentine'sDay,"2"CaliforniaWinsAnti-spamCase,"12"ComputerVirusesbyEugeneKaspersky,"58"Court:Pop-upsBurdenofUsingNet,"43"DespiteU.
S.
Efforts,WebCrimesThrive,"129"DihydrogenMonoxide,"79"DVDGroup:StopWearingOurCode!
,"104"eBayScamArtistsFaceCriminalCharges,"85EbolaMonkeyMan,71"E-mailProvidersSlamSpammers,"12"TbeFiveRulesforDoingBusinesswithNigeria,"77"ForgetSmartTags:TopTextIsDoing\VhatYouFeared,"36"GalleryofCSSDescramblers,"104"HistoryofCopyProtection,"97"TheHistoryofHacking,"118"HowtheDMCAAffectsUs,"100"IdentityTheftSurveyReport,"83"IFCC2002InternetFraudReport,"72"InteltoEmbedSerialNumbersonPentiumIIIChips,"36internationalregisterofspamoperators,6"InternetSecuritiesFraud:OldTrick,NewMedium,"88IP-Messenger,27"It'sGettingHardertoHideinCyberspace,"62"JailTimeforeBayScamArtist,"85"KeithLynch'stimelineofspamrelatedtermsandconcepts,"6--BlackHot:Misfits,Criminals,andScammersintheInternetAgeMagnatune,138Mandrake,137"MedalofHonor:AlliedAssaultCheats&Hacks,"124,.
AnOpenLettertoHobbyists,"96OpenOffice,137open-sourceapplications,137"APeekatScriptKiddieCulture,"127PGP(PrettyGoodPrivacy),136"APlanforSpam,"19"RlAALawsuitsYieldMixedResults,"109ride-sharing(JensBenecke),1"TheRiseoftheSpammers,"17"SaveNow,"42"ScamVictimsUnited,"84"ScriptKiddy,"125"SeeYouLater,Anti-Gators",37"TheSpamhausProject,"6"Spam:HowItIsHurtingE-mailandDegradingLifeontheInternet,"11,18"SpamKingLivesLargeOffOthers'E-mailTroubles,"6spampurveyors,11spywaretracking,47"StockScamsProliferateonWeb,"88"StockScams101:StockScams,Shams,andSpams,"88"ATemptingOfferforRussianPair,"130''TheSpreadoftheSapphire/SlammerWorm,"63''VALIDCREDITCARDNUMBERS!
!
!
!
,"83''VirusesandWorms:WhatCanWeDoAboutThem,"66W32.
Sober.
Dworm,54"What'sWrongwithCopyProtection,"98Xandros,137Wecker,JoeonDeCSS,101Wendland,Mike:"SpamKingLivesLargeOffOthers'E-mailTroubles,"6Willis,PaulandClaudiaGriffin,lawsuitagainst,12Wimer,Scottonautonomouscomputersecurity,69-70Windowssystems,vulnerabilitytovirusesandworms,60-61WindTreesgenerators,advisoryabout,89wirelessnetworks,relationshiptowardriving,128wormsXbeginningsof,133characteristicsof,50dissecting,5~8environmentconduciveto,60examplesof,51futureof,28,68Melissa,61-62Mortisworm,59-61originsof,51propagationof,52relationshiptoartificialintelligence,60Slammer(akaSapphire),62-67spreadof,138targetsof,67versusviruses,51-53Warholworm,66X10,lawsuitagainst,38Xingprogram,copyingvideoswith,106yyahoo.
combugscam,descriptionof,83Yaukey,John:"StockScamsProliferateonWeb,"88zZoEmailsystem,featuresof,20Zohner,Nathananddihydrogenmonoxidescam,79-80JOINTHEAPRESSFORUMSANDBEPARTOFOURCOMMUNITY.
You'lltinddiscussionsthatcovertopicsofinteresttorTprofessionals,programmers,andenthusiastsjustlikeyou.
lfyoupostaquerytooneofourforums,youcanexpectthatsomeofthebestmindsinthebusiness-especiallyApressauthors,whoaliwritewithTheExpert'sVoicerM_willchimeintohelpyou.
Whynotaimtobecomeoneofourmostvaluableparticipants(MVPs)andwincoolstuffHere'sasamplingofwhatyou'llfind:DATABASESDatadriveseverylhlng.
Shareinformation,exchangeideas,anddiscussanydatabaseprogrammingoradministrationissues.
INTERNETTECHNOLOGIESANDNETWORKINGTrylivingwithoutplumblng(andeventually1Pv6).
Talkaboutnetworkingtopicsincludingprotocols,design,administration,wireless,wired,storage,backup,certifications,trends,andnewtechnologies.
JAVAWe'vecarnealongwayfromtheoldOaktree.
HangoutanddiscussJavainwhateverflavoryouchoose:J2SE,J2EE,J2ME,Jakarta,andsoon.
MACOSXAliabouttheZenofOSX.
OSXisboththepresantandthefutureforMacapps.
Makesuggestions,offerupideas,orboastaboutyournewhardware.
OPENSOURCESourcecadelsgood;understanding(open)sourceisbetter.
DiscussopensourcetechnologiesandrelatedtopicssuchasPHP,MySQL,Linux,Peri,Apache,Python,andmore.
HOWTOPARTICIPATE:PROGRAMMING/BUSINESSUnfortunately,itis.
TalkabouttheApresslineofbooksthatcoversoftwaremethodology,bestpractices,andhowprogrammersinteractwiththe'suits.
"WEBDEVELOPMENT/DESIGNUglydoesn'tcutitanymore,andCGIisabsurd.
Helpisinsightforyoursite.
RnddesignsolutionsforyourprojectsandgetideasforbuildinganinteractiveWebs~e.
SECURITYLotsofbadguysoutthere-thegoodguysneedhelp.
Discusscomputerandnetworksecurityissueshere.
Justdon'tletanyoneelseknowtheanswers!
TECHNOLOGYINACTIONCoolthings.
Funthings.
lfsafterhours.
lt'stimetoplay.
Whetheryou'reintoLEGOMINDSTORMSortuminganoldPCintoaDVR,thisiswheretechnologytumsintotun.
WINDOWSNodefenestratlonhere.
AskquestionsaboutaliaspectsofWindowsprogramming,gethelponMicrosofttechnologiescoveredinApressbooks,orprovidefeedbackonanyApressWindowsbook.
GototheApressForumssiteathttp://forums.
apress.
com/.
ClicktheNewUserlink.
天上云怎么样?天上云隶属于成都天上云网络科技有限公司,是一家提供云服务器及物理服务器的国人商家,目前商家针对香港物理机在做优惠促销,香港沙田机房采用三网直连,其中电信走CN2,带宽为50Mbps,不限制流量,商家提供IPMI,可以自行管理,随意安装系统,目前E3-1225/16G的套餐低至572元每月,有做大规模业务的朋友可以看看。点击进入:天上云官方网站天上云香港物理机服务器套餐:香港沙田数据中...
欧路云怎么样?欧路云主要运行弹性云服务器,可自由定制配置,可选加拿大的480G超高防系列,也可以选择美国(200G高防)系列,也有速度直逼内地的香港CN2系列。所有配置都可以在下单的时候自行根据项目 需求来定制自由升级降级 (降级按天数配置费用 退款回预存款)。2021年7月14日美国 CERA 弹性云服务器 上新 联通CUVIP 线路!8折特惠中!点击进入:欧路云官方网站地址付款方式:PayPa...
老周互联怎么样?老周互联隶属于老周网络科技部旗下,创立于2019年12月份,是一家具有代表性的国人商家。目前主营的产品有云服务器,裸金属服务器。创办一年多以来,我们一直坚持以口碑至上,服务宗旨为理念,为用户提供7*24小时的轮班服务,目前已有上千多家中小型站长选择我们!服务宗旨:老周互联提供7*24小时轮流值班客服,用户24小时内咨询问题可提交工单,我们会在30分钟内为您快速解答!另免费部署服务器...
punkbuster为你推荐
金士顿内存卡金士顿这三种内存卡的区别,求解马云将从软银董事会辞职阿里巴巴马云为啥叫董事局主席而不叫董事会主席?董事局和董事会啥区别?美女桌面背景图片非主流美女手机壁纸三国游戏哪个好玩三国类单机游戏哪个最好玩啊?无纺布和熔喷布口罩哪个好无纺布除了做尿布湿口罩这些,还有其他什么用处吗?手机管家哪个好最好的手机管家手机炒股软件哪个好什么手机炒股软件好用,你们都用哪个海克斯皮肤哪个好lol100块抽11次的海克斯宝箱值得买吗51个人空间登录51个人空间怎么申请???qq空间登录不上qq空间登不进去 怎么办
com域名空间 中国域名网 openv 息壤主机 百度云100as 青果网 一点优惠网 标准机柜尺寸 圣诞节促销 免费全能空间 anylink 徐正曦 太原网通测速平台 支付宝扫码领红包 上海服务器 Updog 镇江高防 国外网页代理 香港ip 湖南铁通 更多