152 INDEX
Trojan horses, 75–77, 80, 81, 84
Trusted entity scams, 91
Universities and development of Internet, 4,
5
UNIX, 6
U.S. v. Scarfo, 142
Usenet newsgroups, 104, 105
User access, 81, 82, 84
User information, 115
Username
and identity theft, 93
wireless networks, 72
Video files, illegal copying, 103–105
Virus protection software, 78, 79
Viruses, 75–77, 84
Vo i r d i r e , 6 1
Volatile memory, 114, 115
War chalking, 73
War dialing, 68
War driving, 72
Web browsers, 77
Web sites, phony, 93
Wi-Fi, 72, 84
Windows, 17, 22, 32, 112
WinHex, 20, 39, 121, 122
Wireless networks, hacking, 71–75
Wiretap Act (Title III), 139, 140
Wiretaps, 80, 81, 139, 140
Witnesses
cross-examination, 135, 136
expert. See Expert witnesses
lay witnesses, 61, 130, 131
Word processing, 18
World Wide Web, development of, 5, 6
Worms, 75–77, 84
Wozniak, Steve, 4, 5
Write blocking, 33, 38, 117, 120,
122
X-Ways Software, 39
Komentáře k této Příručce