Outline for May 11, 2007
-
Greetings and felicitations!
-
Web browsers (con't)
-
Cookies: name, value, issuer, expiration date
-
Running applets and Java using virtual machines
-
Search engines and searching on the web
-
Web crawlers or spiders follow links and send back URL to indexing software.
-
Indexed based on frequency of words in the document.
-
When a user visits a search engine, it looks up words in its database
-
Security: how they attack your system
-
Casing the system: port scan, guessing passwords, sniffing infrmation
-
Identifying targets: servers on ports
-
First step: get on the system
-
Next step: escalate privileges
-
The nasty stuff
-
Spyware
-
Adware
-
Computer viruses
-
Different types: boot sector infectors, executable infectors
-
How they work
-
How they get there: email attachments, JavaScript or ActiveX vituses
Here is a PDF version of this document.