Outline for May 11, 2007

  1. Greetings and felicitations!
  2. Web browsers (con't)
    1. Cookies: name, value, issuer, expiration date
    2. Running applets and Java using virtual machines
  3. Search engines and searching on the web
    1. Web crawlers or spiders follow links and send back URL to indexing software.
    2. Indexed based on frequency of words in the document.
    3. When a user visits a search engine, it looks up words in its database
  4. Security: how they attack your system
    1. Casing the system: port scan, guessing passwords, sniffing infrmation
    2. Identifying targets: servers on ports
    3. First step: get on the system
    4. Next step: escalate privileges
  5. The nasty stuff
    1. Spyware
    2. Adware
    3. Computer viruses
      1. Different types: boot sector infectors, executable infectors
      2. How they work
    4. How they get there: email attachments, JavaScript or ActiveX vituses

Here is a PDF version of this document.