Index – Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Index

 

7-Zip tool, 147
420 (nym), 6

A

Abyss Web server, 356–360
access accounts, 207–208
acronyms. See nyms
active vs.inactive information, 48
Ad-Aware, 419–420
addiction, Internet, 33–34
address listings, 373–374
Address Resolution Protocol (ARP), 346–348
aggregators, 322–324
America Online. See also AOL Instant Messenger (AIM)
browser client, 237, 275, 276
collecting e-mail account information, 212–214
e-mail client, 296
finding old e-mail messages, 224
Open Mail Access feature, 303
viewing browser history, 237
Web-based e-mail, 214
American Encryption Standard (AES), 130–131
AOL Instant Messenger (AIM)
collecting passwords and buddy lists, 325
overview, 319, 320, 322
port number, 115
problem with instant connectivity, 205
recovering chat logs, 228–229
role of AIM Express, 385
searching for accounts, 226–227
setting up message logging, 330
viewing chats, 220
Apple Computer, 90, 107
AR Soft, 380–382
archive tools, 147–148
archives, unpacking to folders, 147–148
ARP (Address Resolution Protocol), 346–348
ARP poisoning, 348, 349, 352–353
ASL (nym), 6
at sign (@), searching for, 222
attrib.exe command, 150
audio recording, 82
auto completion, Internet Explorer, 246, 247

B

Barry Manilow T-shirt experiment, 52
behavior modification, 49
Best Free Keylogger (BFK), 165, 255–258
BFK (Best Free Keylogger), 165, 255–258
bits, defined, 93, 117
blogs, 28–29, 371
bookmarks, Web browser, 269–270, 271
bootable operating systems, 383–384
broadband home networks, 121, 123
broadcast regions, 168
alternative application use, 239
AOL Explorer, 275, 276
bookmarking favorite sites, 269–270, 271
browsing case study, 286–288
browsing overview, 266–267
erasing cache, 385–386
exploiting browsing, 277
history of sites visited, 268–269
increasing cache size, 230, 232
typical, 269–274
viewing caches, 229–232, 272
viewing cookies, 233–235, 281
viewing histories, 235–237
Brugioni, Dino A., 65
buddy lists, instant messaging
collecting from AOL, 325
collecting from MSN, 326
collecting from Yahoo, 325
collecting using Gaim, 326–328
collecting using Trillian, 328–329
overview, 319–320
bullying, 29–30
Burgh, John A., 51
bytes, defined, 93, 117

C

c2c Only (nym), 6
cable modems, 121, 206
cache, Web browsers
erasing, 385–386
increasing size, 230, 232
overview, 270
viewing, 229–232
Cain & Abel (C&A) tool, 348–355
CamStudio, 360, 361
canary traps, defined, 48
cases, computer, 89, 90
CD drives, 94–95
cell phones, 344, 366–370
Central Intelligence Agency (CIA), 64
CGI (common gateway interface), 358, 360
Chartrand, Tanya, 51
chat logs, 228–229
chat rooms. See also instant messaging
capturing chats, 228–229
encrypting messages, 400–405
and sexual predators, 30–33
uncovering identities from names, 206–214
children
as bloggers, 28–29
cheating on homework, 26
as hackers, 28
illegal file sharing, 26–28
monitoring behavior of, 60–62, 63, 83–85
new dangers, 26–29
old dangers, 29–30
online property theft, 26–28
overview, 25–26
and sexual predators, 30–33
spying on, 25–34
types of dangers, 25–26
CIA (Central Intelligence Agency), 64
ciphers, defined, 49
cmd.exe command, 146
collaboration, online, 16, 29
Columbine tragedy, 60
command prompt, opening, 146–147
command.com command, 146
common gateway interface (CGI), 358, 360
communication, as a main use of network technology, 133
examining for evidence of being spied on, 408–415, 417
exclusion of home network, 384
exclusion of media, 378–384
how to react if targeted, 415–416
limiting evidence by limiting usage, 378–385
limiting evidence with secrecy and stealth, 385–407
total exclusion, 385
Concealment Device, defined, 49
confronting spies, 416, 418–419
connectivity, disconnecting computers from Internet, 205–206
connectors, computer, 97–101
Control Panel
Add or Remove Programs, 150–151
Classic view, 148–150
Network and Internet Connections, 206
switching from Category to Classic view, 148–149
cookies, browser
defined, 270
erasing, 385–386
how to view, 233–235, 281
overview, 270
viewing by using WinSpy, 281
viewing in Internet Explorer, 233–234
viewing in Mozilla Firefox, 234–235
copyright, 27–28
court records, 372–373
covert, defined, 49
covert spying
defined, 48, 53, 71
vs.overt spying, 48, 53, 74
overview, 53, 71
problems with using, 71–73
revealing your hand, 75–76
covert vs.overt information, 48
CPUs (central processing units), 90–91
credit reports, 373
cryptography. See encryption
Cuban missile crisis, 65, 66
culture of mistrust, 18–19, 70, 79–80
cyber-affairs, 7–13 See also infidelity
cybering (nym), 6

D

data encryption standard (DES), 130
databases, online, 371–375
decrypting e-mail, 394–395
deleted files, recovering, 163–164, 259–261
DES (data encryption standard), 130
desktop movies, 360–361
deterrent, surveillance as, 58–64
device drivers, 107, 168–169
dial-up networks, 120
display monitors, 102
Domain Name System, 115–116
downloading. See peer-to-peer file trading
drug involvement online, 13–16, 29
DSL lines, 121, 206
duplicate files, 409
DVD drives, 94–95

e

e-mail
AOL accounts, 212–214, 224, 296
avoiding automatic checking, 211
case study, 314–316
collecting account information from Outlook, 211–212
collecting account information from Outlook Express, 209–211
collecting by sniffing networks, 306–312
collecting files from target computer, 299–300
collecting from target PCs, 298–306
collecting using clients, 300–305
decrypting, 394–395
determining usernames, 209
encrypting, 389–395
finding stored messages, 222–225
history, 293–295
how it is transmitted, 292–293
identifying targets, 298–299
lack of privacy, 60
local client accounts, 208–214
monitoring employees, 81–82
overview, 292–295
popular clients, 295–296
searching for @ sign, 222
summary of collection methods, 313–314
uncovering identities from names, 206, 208–214
uncovering passwords with Protected Storage Explorer, 213, 214
using shared folders to access remotely, 253–254
viewing access times in Outlook Express, 413
Web-based accounts, 208, 214–222, 267–268
Ebay, 13
Edonkey, 27
Electronic Communications Privacy Act (ECPA), 81
employee polygraph tests, 64
encryption
of chat sessions, 400–405
of e-mail, 389–395
Enigma machine, 76–78
of files by using PGP, 396
of files with Windows XP Professional Edition, 395
of hard disk storage, 396–400
overview, 129–130
vs.steganography, 405, 406
strength comparison, 130–131
Enigma machine, 76–78
entertainment, as a main use of network technology, 133
Ethereal
analyzing chat and instant messages, 332, 333
analyzing e-mail messages in, 310, 311
overview, 128, 169–174
vs.Snort, 310, 332
Ethernet cable, removing, 205
ethics, and spying, 16–20
Ettercap, 128
extramarital affairs. See infidelity

F

favorites, Web browser, 269–270, 271
FBI (Federal Bureau of Investigation), 73–74, 78, 79
file sharing, illegal, 26–28
as operating system concept, 107–108
viewing access times in Windows Explorer, 412–413
FilterFilesWithUnknownExtensions registry entry, 220
Firefox. See Mozilla Firefox
firewalls, 197, 198, 359
firewire ports, 99, 100
floppy disk drives, 95, 96
folders
as operating system concept, 108
sharing, 251–254
viewing access times in Windows Explorer, 412–413
420 (nym), 6
Freeh, Louis, 79
FTP (File Transfer Protocol), 115

G

Gaim
collecting buddy lists, 326–328
collecting passwords, 326–328
defined, 323
encryption plug in, 402–403
and impersonation, 338–339
overview, 323
setting up message logging, 331–332
vs.Trillian, 403
gigabits, defined, 117
gigabytes, defined, 93
Gilovich, Thomas, 50
Gmail, 214, 297–298
GNU Public License (GPL), 155
Google
cached links, 370
Desktop Search, 161–163, 220–222, 229
Gmail, 214, 297–298
hacking to discover information, 371
search engine as tool for cyber-spying, 370–371
gut feeling, trusting, 415, 420

h

hacking, 28
Hanssen, Robert, 73–74, 78
hard disks
encrypting storage, 396–400
examining for suspicious software installations, 409
limiting evidence by limiting usage, 378–379
overview, 91–92
recovering deleted files, 259–261
searching for account information, 218–220
searching for cookies, 218, 219
searching for Web-based e-mail accounts, 208, 214–222
hardware
cases, 89, 90
connectors, 97–101
CPUs, 90–91
firewire ports, 99, 100
floppy drives, 95, 96
hard disks (hard disks)
interface components, 102–104
keyboards, 102, 407
laptops, 105
main memory, 91
memory cards, 97
mice, 103
microphones, 103
modems, 94, 100
monitors, 102
motherboards, 94
network cards, 94
non-interface components, 89–97
optical drives, 94–95
overview, 89
parallel ports, 101
ports, 99, 100, 101
printers, 104
PS/2 connectors, 98
scanners, 104
serial ports, 101
sound cards, 93–94
USB connectors, 98–99
USB drives, 96, 379–380
useful for spying, 97
video cards, 93
Webcams, 103–104
Harris, Eric, 60
hidden attribute, setting, 149–150
hiding
desktop icons, 221, 250–251, 359
files, by storing on removable drives, 379–380
files, using Windows Explorer, 144–146, 149–150
messages, in images, 405–407
history, Internet Explorer
erasing, 385–386, 387
overview, 235–236, 272
removing media evidence, 380–382
viewing by using WinSpy, 280–281
home computers. See also browsers; e-mail; hardware; instant messaging
examining for evidence of being spied on, 408–415, 417
exclusion of home network, 384
exclusion of media, 378–384
how to react if targeted, 415–416
limiting evidence by limiting usage, 378–385
limiting evidence with secrecy and stealth, 385–407
total exclusion, 385
home networks
broadband, 121, 123
cable modem, 121, 206
dial-up, 120
DSL, 121, 206
overview, 120
typical setups, 125
homework, cheating on, 26
honey tokens, 413–414
Hotmail.com
defined, 208
Outlook Express example, 211
overview, 297
searching hard disks for account evidence, 214, 218–220
HTML (Hypertext Markup Language), 266–267
HTTP Post requests, 311, 312
Hushmail.com, 214

I

icons, hiding, 221, 250–251, 359
ICQ (I Seek You), 320, 321
identities, collecting e-mail account information from Outlook Express, 209–211
IEEE 1394, 99
illegal drug involvement online, 13–16, 29
images, hiding messages in, 405–407
impersonation, and instant messaging, 337–338
IMSmarter, 333–336
inactive vs.active information, 48
infidelity
online, 7–13
overview, 21–23
warning signs, 22
InstallSpy, 382
instant messaging. See also AOL Instant Messenger (AIM)
case study, 339–341
collecting chat and messages, 330–337
collecting messages through logging, 330–332
collecting messages through sniffing, 332–333
encrypting messages, 400–404
and impersonation, 337–338
logging messages by using IMSmarter, 333–336
overview, 318–320
role of aggregators, 322–324
searching for accounts, 226–227
setting up message logging using MSN Messenger, 331
setting up message logging using Trillian, 332
setting up message logging using Yahoo Messenger, 330–331
instincts, trusting, 415, 420
Internet
depth of penetration into lives, 133–134
as type of network, 117–118
Internet addiction, 33–34
Internet cafes, 385
Internet Explorer
AutoComplete feature, 246, 247
erasing cookies and Internet files, 386
extra cache information, 273
history of sites visited, 235–236, 272, 280–281, 380–382, 385–386, 387
identifying stored passwords, 217–218
increasing cache size, 230
obtaining copy of Favorites, 271
overview, 271–273
running other programs from, 277
super hidden directory, 386
viewing cache, 229–230, 272
viewing cookies, 233–234, 272
Internet Relay Chat (IRC), 115, 320–321
Internet service providers (ISPs), 59, 60
interpersonal relationships. See also children; loved ones; marriage
breaking trust, 18, 69, 70
creating culture of mistrust, 18–19, 70, 78–80
deciding to spy on loved ones, 17–18
Intrusion Detection Systems (IDSs), 179–182
IP addresses
and Domain Name System, 115–116
Network Address Translation, 113–114
overview, 112–113
and ports, 114–115
spoofing, 346–348
Ipconfig tool, 197–198, 362
iPods, storing files on, 379–380
IRL (nym), 7
ISO (nym), 7
ISPs (Internet service providers), 59, 60
iTunes, 27–28
IZArc tool, 147, 156–158

J

Juno.com, 214

K

Kaboodle, 158–159
Keen, Harold, 77
keyboards. See also keystroke loggers
legality of logging keystrokes, 81
onscreen, 407
overview, 102
types of connectors, 102
keyloggers. See keystroke loggers
keystroke loggers
avoiding, 407
Best Free Keylogger, 165, 255–258
for collecting e-mail, 300
defined, 195
illustration, 195
in Internet cafes, 385
legality of using, 81
overview, 254
reason to buy two, 345
using them on yourself, 410
kilobits, defined, 117
kilobytes, defined, 93
Klebold, Dylan, 60
Knoppix, 383–384

L

LANs (local area networks)
ARP spoofing, 346–348
illustration, 117
overview, 116
laptops, 105
legal issues
monitoring employee e-mail, 81–82
overview, 80–81
protecting employees, 81
protecting employers, 81
legends, defined, 49
LexisNexis, 371–372
libraries, Internet access, 385
Linksys routers, 351, 359, 362–365
Linux operating system, 106–107
listening posts (LPs), defined, 49
local area networks (LANs)
ARP spoofing, 346–348
illustration, 117
overview, 116
loggers, keystroke. See keystroke loggers
long distance telephone calls, 403–404
loved ones
breaking trust, 18, 69, 70
creating culture of mistrust, 18–19, 70, 79–80
deciding to spy on, 17–18
monitoring children’s behavior, 60–62, 63, 83–85
spying on children, 25–34
spying on spouses, 20–24, 79–80
Lynn, Michael, 47

M

MAC (Media Access Control) addresses, 346–348
Macintosh, 90, 107
MacOS, 107
main memory. See memory
man-in-the-middle (MITM) attacks, 345, 347–348, 349, 350, 353, 354–355
marks, defined, 49
marriage
financial issues, 23
infidelity in, 7–13, 21–23
liability issues, 23
multiple identities in, 24
spying on spouses, 20–24, 79–80
Media Access Control (MAC) addresses, 346–348
megabits, defined, 117
megabytes, defined, 93
memory, computer, 91
memory cards, 97
mice, 103
microphones, 103
Microsoft .NET Passport, 219
Microsoft Outlook. See Outlook; Outlook Express
Microsoft Search
overview, 160
searching hard disks for Web-based e-mail account evidence, 218–220
searching specific time periods, 244–247
Microsoft Windows operating systems. See Windows operating systems
MITM (man-in-the-middle) attacks, 345, 347–348, 349, 350, 353, 354–355
modems, 94, 100
monitors, computer, 102
motherboards, 94
mouse, 103
Moustakes, John, 79
movies, desktop, 360–361
Mozilla Firefox
erasing cookies and Internet files, 385–386
history of sites visited, 236, 237
identifying stored passwords, 216–217
increasing cache size, 232
vs.Netscape Navigator, 216
overview, 274–275
viewing cache, 230–232
viewing cookies, 234–235
viewing histories, 236–237
MP3 players, storing files on, 379–380
MPAA (Motion Picture Association of America), 28
MS Search
overview, 160
searching hard disks for Web-based e-mail account evidence, 218–220
searching specific time periods, 244–247
MSN Messenger
collecting passwords and buddy lists, 326
overview, 319, 320, 322
searching for accounts, 227
setting up message logging, 331
multimedia, 269, 271
multiple personalities, 24
music players, storing files on, 379–380

n

nanny cams, 82–83
NAT (Network Address Translation), 113–114, 359
.NET Passport, 219
Netscape Navigator, identifying stored passwords, 215–216
Network Address Translation (NAT), 113–114, 359
network cards, 94, 128
network ports, 100
networks. See also home networks; Internet
common uses, 133–134
disabling connections, 206
and Domain Name System, 115–116
home, 120–125
IP addresses, 112–116, 346–348
LANs, 116, 117, 346–348
overview, 112
packet travel, 118, 119
ports, 114–115
sniffing, 128–129
tracking target machines using Kaboodle, 158–159
traffic on, 125–134
types of traffic, 126–127
new accounts, 409
newly installed software, as indicator of suspicious activity, 408–409
Notepad, 413, 414
NSA (nym), 7, 8
NTFS file system, 395
nyms, 6–7

O

One-Way Network Snniffer (OWNS)
collecting target information, 282–285
overview, 182–187
sniffing traditional e-mail, 307
online addiction, 33–34
online databases, 371–375
online drug access, 13–16, 29
online infidelity, 7–13
Open Mail Access, AOL, 303
bootable, 383–384
common types, 105–107
concepts, 107–109
determining version, 195–196
overview, 105
virtual, 382–383
optical drives, 94–95
Outlook
collecting e-mail account information, 211–212
decrypting, 394–395
encrypting e-mail with PGP, 392–395
finding old e-mail messages, 223, 224
overview, 295–296
receiving PGP encrypted messages, 394–395
storing e-mail on encrypted drives, 399–400
Outlook Express
collecting e-mail account information, 209–211, 301–303
decrypting, 394–395
encrypting e-mail with PGP, 392–395
finding old e-mail messages, 222–223, 224
overview, 295
receiving PGP encrypted messages, 394–395
storing e-mail on encrypted drives, 399–400
overt, defined, 49
overt monitoring, using as deterrent, 57–70
overt spying
vs.covert spying, 48, 53, 74
defined, 48, 53
impact of being “watched, ”, 67–70
problems with using, 64–70
overt vs.covert information, 48
OWNS (One-Way Network Snniffer)
collecting target information, 282–285
overview, 182–187
sniffing traditional e-mail, 307

P

packets
overview, 118
sniffing (sniffers)
traveling, 119
UDP vs.TCP, 126–127
Packetyzer, 128, 174–179
parallel ports, 101
passive forensics, 411
Passport, Microsoft, 219
password profiling, 199–200
password recovery
Cain & Abel tool, 348–355
using keystroke loggers, 195, 197
passwords, e-mail accounts
identifying in Internet Explorer, 217–218
identifying in Mozilla Firefox, 216–217
identifying in Netscape Navigator, 215–216
uncovering with Protected Storage Explorer, 213, 214
passwords, instant messaging
collecting from AOL, 325
collecting from MSN, 326
collecting from Yahoo, 325
collecting using Gaim, 326–328
collecting using Trillian, 328–329
PC Inspector, 163–164, 259–261
PCMCIA card, removing, 205
PDAs (personal digital assistants), 344
peer-to-peer file trading, 26–28
permissions, as operating system concept, 109
personal computers. See computers; hardware; software
PGP (Pretty Good Privacy)
encrypting e-mail, 392–395
encrypting files, 396
history behind, 394
key generation and exchange, 389–391
overview, 132
wipe capability, 387–388
phone listings, 373–374
photographs, hiding messages in, 405–407
pictures, hiding messages in, 405–407
piracy, online, 26–28
poisoning, ARP, 348, 349, 352–353
police cameras, 59–60
polygraph tests, 64
POP3 e-mail, 115, 304–305
ports, and IP addresses, 114–115
POS (nym), 7, 66
Post Office Protocol (POP), 115, 304–305
Postmark.net, 214
potential spies, identifying and tracking, 410
predators, sexual, 30–33
prescription drugs online, 13–14
Pretty Good Privacy (PGP)
encrypting e-mail, 392–395
encrypting files, 396
history behind, 394
key generation and exchange, 389–391
overview, 132
wipe capability, 387–388
printers, 104
privacy, 51, 52, 60
Process Explorer, 153–154
processes
defined, 153
as operating system concept, 108
viewing, 153–154
property theft, online, 26–28
Protected Storage Explorer, 164, 213, 214
PS/2 connectors, 98
public records, 371–373

R

RAM drives
stealthy software installation, 382
storing files on, 380–382
random-access memory (RAM), 91 See also RAM drives
recent documents list
checking for clues to computer activity, 410
editing My Recent Documents folder, 241–243
removing evidence, 380–382
recent programs list, 238–240, 409
records, public, 371–373
Recycle Bin, 258–259
Regedit tool, 151–153, 220, 239–241
registry, 151–153, 220, 239–241
Rejewski, Marian, 76
remote access tools
installing software, 197–198
overview, 187
Ultra VNC, 187–189, 197, 247–251
removable drives
limiting evidence by using, 379–380
stealthy software installation, 382
storing files on, 379–380
reports, credit, 373
reverse directories, 374
RIAA (Recording Industry Association of America), 28
Rjindall algorithm, 130
root-server directory, 358, 359
routers
broadband, 123
determining default IP address, 362–363
determining user name and password, 363
gaining access to, 362–364
logging capability, 364–366
resetting to factory defaults, 363
small, for home networks, 362–366
wireless, 123–124
Rozycki, Jerry, 76

S

S-Tools, 405–407
S2R (nym), 7
Savitsky, Kenneth, 50
scanners, 104
Schmidt, Hans-Thilo, 76
screenshots, capturing, 407
Secure Socket Layer (SSL), 115, 131–132, 347
serial ports, 101
Service Pack, 2, Windows XP, 155, 160, 198
services, defined, 153 See also processes
7-Zip tool, 147
sexual predators, 30–33
shadow clients, 303–304
sharing folders, 251–254
Simple Mail Transfer Protocol (SMTP), 115, 292
skipping school, 29
Skype, 403–404
SLEUTH method, 53–57, 191–201
SMTP (Simple Mail Transfer Protocol), 115, 292
sniffers
Cain & Abel tool options, 348–349, 350
capturing incoming and outgoing e-mail, 306–312
collecting chat and messages through, 332–333
collecting target information, 282–285
Ethereal, 128, 169–174, 310, 311, 332, 333
how they work, 166–168
One-Way Network Sniffer, 182–187, 282–285, 307
overview, 128–129, 166–168
Packetyzer, 128, 174–179
sniffing your own network traffic, 411
tools for sniffing, 168–187
WinPcap, 168–169, 348
snooping, defined, 2
Snort tool
collecting chat and messages through sniffing, 332
collecting target information, 282–285
overview, 179–182, 310
social engineering, 375
social spotlight effect, 50, 52, 57
software. See also operating systems
for collecting information, 163–165
for finding files of interest, 160–163
MS Search, 160, 218–220, 244–247
overview, 105–109
remote access tools, 187–189
uninstalling, 150–151
unsigned, 155–156
useful for online spying, 154–189
utilities, 156–159
sound cards, 93–94
spies
avoiding, 415–416
confronting, 416, 418–419
identifying, 416–419
ignoring, 416
spoofing, 346–348
Spybot, 420
spyware, 419–420
SSL (Secure Socket Layer), 115, 131–132, 347
Start menu
disabling frequent and recently used programs list, 239–241
editing My Recent Documents folder, 241–243
steganography
vs.encryption, 405, 406
hiding information in files, 405–407
straying, defined, 2
surveillance, as deterrent, 58–64
Surveillance Camera Players, 68, 69
surveillance cameras, 58, 59–60
switched networks, 121–123, 129, 166, 168, 344–354
system attribute, setting, 150
system files, viewing, 143–145

T

Task Manager, 154
TCP (transmission control protocol), 126–127
temporary Internet files, erasing, 385–386
Thunderbird, 296
“tips” jar, 46–47
Toogood, Madelyne, 58
transactions, as a main use of network technology, 133
transmission control protocol (TCP), 126–127
traps
setting, 412–414
watching out for, 244–245
Trillian
and AOL, 401
collecting buddy lists, 328–329
collecting passwords, 328–329
defined, 323, 400
enabling encryption, 400–401
encrypting chat sessions, 400–402
vs.Gaim, 403
and impersonation, 338–339
overview, 323
SecureIM capability, 401–402
setting up message logging, 332
TrueCrypt, 396–400
trust
breaking, 18, 69, 70
creating culture of mistrust, 18–19, 70, 79–80
Turing, Alan, 77
Tweak UI, 387

U

UDP (user datagram protocol), 126–127
Ultra VNC, 187–189, 197, 247–251
Uninstall menu, removing programs from, 153
uninstalling software, 150–151
unsigned software, 155–156
USB connectors, 98–99
USB drives, 96, 379–380
user accounts. See also e-mail
for computer access, 207–208
identifying, 206–214
new, watching out for, 409
uncovering identities, 206–214
user datagram protocol (UDP), 126
users
as operating system concept, 109
profiling from passwords, 199–200

V

video cards, 93
video game consoles, 344
video recording, 82–83
virtual machines, 382–383
Virtual Network Computing (VNC), 158, 187–189, 197, 247–251, 360–361
virtual operating systems, 382–383
virtual RAM drives
stealthy software installation, 382
storing files on, 380–382
virus scanners, 197
VMware, 382–383
VNC (Virtual Network Computing), 158, 187–189, 197, 247–251, 360–361
Voice Over IP, 403, 404

W

Web-based e-mail accounts
advantages, 208, 268
automatic logins, 215
checking POP e-mail boxes, 304–305
identifying stored passwords in Netscape Navigator, 215–218
vs.local e-mail clients, 208, 267–268
methods for collecting messages, 305
overview, 296–298
searching hard drives for, 214–222
sniffing, 308–312
utilities for message alerts, 305–306
Web browsers. See also Internet Explorer; Mozilla Firefox
alternative application use, 239
AOL Explorer, 275, 276
bookmarking favorite sites, 269–270, 271
browsing case study, 286–288
browsing overview, 266–267
erasing cache, 385–386
exploiting browsing, 277
history of sites visited, 268–269
increasing cache size, 230, 232
typical, 269–274
viewing caches, 229–232
viewing cookies, 233–235, 281
viewing histories, 235–237
Web cams, 361–362
Web servers
accessing remotely, 358, 360
secret, installing on target computer, 355–360
Webcams, 103–104
Wehrmacht Enigma machine, 76–78
Welchman, Gordon, 77
white pages, 373–374
Wi-Fi, 124
Windows Explorer
creating hidden files, 149–150
launching from Run dialog box, 139–140
My Computer folder, 141–146
My Documents folder, 141
running, 139–146
viewing file details, 412–413
viewing hidden files, 144–146
viewing system files, 143–145
Windows NT, 106
Windows operating systems
Control Panel, 148–150
opening command prompt, 146–147
overview, 105–106
registry, 151–153
running Windows Explorer, 139–146
Search utility, 160, 218–220, 244–247
Start menu, 239–243
Windows Task Manager, 154
Windows XP
encrypting files in Professional Edition, 395
overview, 106
Service Pack, 2, 155, 160, 198
WinPcap, 168–169, 348
WinRAR, 147
WinSpy, 278–281
WinZip, 147
wireless access points (WAPs), 359, 384
wireless Internet access, disabling, 205
wireless PCMCIA card, removing, 205
wireless routers, 123–124
women, and extramarital affairs, 11

Y

Yahoo e-mail
checking POP e-mail boxes from, 304–305
compressed archive files, 309–310
defined, 208
overview, 297
searching for accounts, 214, 215
searching hard disks with Google Desktop tool, 220–221
Yahoo Messenger
collecting passwords and buddy lists, 325
overview, 319, 320, 322
searching for accounts, 227
setting up message logging, 330–331

Z

Zimmermann, Philip R., 394
Zygalski, Henryk, 76