Flylib.com
Internet Forensics
Internet Forensics
ISBN: 059610006X
EAN: 2147483647
Year: 2003
Pages: 121
Authors:
Robert Jones F.R
BUY ON AMAZON
Internet Forensics
Table of Contents
Copyright
Preface
Who This Book Is For
Contents of This Book
Conventions Used in This Book
Safari Enabled
Using Code Examples
How to Contact Us
Acknowledgments
Chapter 1. Introduction
Section 1.1. What Is Internet Forensics?
Section 1.2. The Seamy Underbelly of the Internet
Section 1.3. Pulling Back the Curtain
Section 1.4. Taking Back Our Internet
Section 1.5. Protecting Your Privacy
Section 1.6. Before You Begin
Section 1.7. A Network Neighborhood Watch
Chapter 2. Names and Numbers
Section 2.1. Addresses on the Internet
Section 2.2. Internet Address Tools
Section 2.3. DNS Record Manipulation
Section 2.4. An ExampleDissecting a Spam Network
Chapter 3. Email
Section 3.1. Message Headers
Section 3.2. Forged Headers
Section 3.3. Forging Your Own Headers
Section 3.4. Tracking the Spammer
Section 3.5. Viruses, Worms, and Spam
Section 3.6. Message Attachments
Section 3.7. Message Content
Section 3.8. Is It Really Spam?
Chapter 4. Obfuscation
Section 4.1. Anatomy of a URL
Section 4.2. IP Addresses in URLs
Section 4.3. Usernames in URLs
Section 4.4. Encoding the Entire Message
Section 4.5. Similar Domain Names
Section 4.6. Making a Form Look Like a URL
Section 4.7. Bait and SwitchURL Redirection
Section 4.8. JavaScript
Section 4.9. Browsers and Obfuscation
Chapter 5. Web Sites
Section 5.1. Capturing Web Pages
Section 5.2. Viewing HTML Source
Section 5.3. Comparing Pages
Section 5.4. Non-Interactive Downloads Using wget
Section 5.5. Mapping Out the Entire Web Site
Section 5.6. Hidden Directories
Section 5.7. In-Depth ExampleDirectory Listings
Section 5.8. Dynamic Web Pages
Section 5.9. Filling Out Forms
Section 5.10. In-Depth ExampleServer-Side Database
Section 5.11. Opening the Black Box
Chapter 6. Web Servers
Section 6.1. Viewing HTTP Headers
Section 6.2. What Can Headers Tell Us?
Section 6.3. Cookies
Section 6.4. Redirection
Section 6.5. Web Server Statistics
Section 6.6. Controlling HTTP Headers
Section 6.7. A Little Bit of Everything
Chapter 7. Web Browsers
Section 7.1. What Your Browser Reveals
Section 7.2. Apache Web Server Logging
Section 7.3. Server Log Analysis
Section 7.4. Protecting Your Privacy
Chapter 8. File Contents
Section 8.1. Word Document Metadata
Section 8.2. U.K. Government Dossier on Iraq
Section 8.3. Document Forgery
Section 8.4. Redaction of Sensitive Information
Chapter 9. People and Places
Section 9.1. Geographic Location
Section 9.2. Time Zone
Section 9.3. Language
Section 9.4. Expertise
Section 9.5. Criminal or Victim?
Section 9.6. Hardware and Software
Chapter 10. Patterns of Activity
Section 10.1. Signatures
Section 10.2. Searching with Signatures
Section 10.3. Problems with Simple Signatures
Section 10.4. Full Text Comparison
Section 10.5. Using Internet Search Engines for Patterns
Chapter 11. Case Studies
Section 11.1. Case Study 1: Tidball
Section 11.2. Case Study 2: Spam Networks
Chapter 12. Taking Action
Section 12.1. What Is Being Done to Tackle Internet Fraud?
Section 12.2. What You Can Do to Help
Section 12.3. Getting in Over Your Head
Section 12.4. Vision of a Community Response
About the Author
Colophon
Index
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
Q
R
S
T
U
V
W
Z
Internet Forensics
ISBN: 059610006X
EAN: 2147483647
Year: 2003
Pages: 121
Authors:
Robert Jones F.R
BUY ON AMAZON
Oracle Developer Forms Techniques
Standard Toolbar Implementation
Summary
Inheritance
Summary
Basing a Block on a Stored Procedure Involving Object Tables
Java for RPG Programmers, 2nd Edition
The Java Onion
Javas Language And Syntax
Data Types And Variables
User Interface
Appendix B Mixing RPG And Java
Managing Enterprise Systems with the Windows Script Host
Networking Resources
Input/Output Streams
Network Administration/WMI
Data Access
Internet Information Server
C++ How to Program (5th Edition)
Summary
Summary
D.6. Negative Binary Numbers: Twos Complement Notation
Terminology
L.4. Controlling Execution Using the Step Into, Step Over, Step Out and Continue Commands
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 1. Set Up Bluetooth on Linux
Hack 2. Set Up Bluetooth on Windows XP
Hack 5. Connect Windows XP with a Bluetooth Phone
Hack 36. Estimate Network Performance
Hack 69. Extend Your Wireless Network with WDS
Web Systems Design and Online Consumer Behavior
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XIV Product Catalog and Shopping Cart Effective Design
Chapter XV Customer Trust in Online Commerce
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies