CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [98]
vulnerability A bug or glitch in computer software, an operating system, or architecture that can be exploited, leading to a system compromise.
vulnerability scanning Searching for devices, processes, or configurations on your network that have known vulnerabilities.
war d is ler A malicious application that randomly calls phone numbers while trying to detect the response of a computer modem.
warchalking A technique to identify key features of Wi-Fi networks for others by drawing symbols in public places (where anyone can intrude easily) and encourage open access.
web server The computer that delivers web pages to browsers and other files to applications via the HTTP protocol.
web spider Scanning web sites for certain information such as e-mail accounts.
white-box testing Testing software, a system, or a network with knowledge of the internal structure. Also called glass box testing.
Wi-Fi A certification from the Wi-Fi alliance to promote interoperability of wireless equipment for 802.11 networks (including 802.11b, 802.11a, 802.11g, and 802.11n). This term was popularized by the Wi-Fi Alliance.
Wired Equivalent Privacy (WEP) A technically obsolete protocol for wireless local area networks (WLAN). WEP was proposed to present a level of security similar to that of a wired LAN.
wiretapping A process by which a third party intervenes in a telephone conversation, usually through a secret medium.
worm A malicious software application that is structured to spread through computer networks. These applications are self-propagating.
Index
Note to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations.
Wiley Publishing, Inc.
End-User License Agreement
READ THIS. You should carefully read these terms and conditions before opening the software packet(s) included with this book "Book". This is a license agreement "Agreement" between you and Wiley Publishing, Inc. "WPI".
\By opening the accompanying software packet(s), you acknowledge that you have read and accept the following terms and conditions. If you do not agree and do not want to be bound by such terms and conditions, promptly return the Book and the unopened software packet(s) to the place you obtained them for a full refund.
1. License Grant. WPI grants to you (either an individual or entity) a nonexclusive license to use one copy of the enclosed software program(s) (collectively, the "Software," solely for your own personal or business purposes on a single computer (whether a standard computer or a workstation component of a multi-user network). The Software is in use on a computer when it is loaded into temporary memory (RAM) or installed into permanent memory (hard disk, CD-ROM, or other storage device). WPI reserves all rights not expressly granted herein.
2. Ownership. WPI is the owner of all right, title, and interest, including copyright, in and to the compilation of the Software recorded on the physical packet included with this Book "Software Media". Copyright to the individual programs recorded on the Software Media is owned by the author or other authorized copyright owner of each program. Ownership of the Software and all proprietary rights relating thereto remain with WPI and its licensers.
3. Restrictions On Use and Transfer.
(a) You may only (i) make one copy of the Software for backup or archival purposes, or (ii) transfer the Software to a single hard disk, provided that you keep the original for backup or archival purposes. You may not (i) rent or lease the Software, (ii) copy or reproduce the Software through a LAN or other network system or through any computer subscriber system or bulletin-board system, or (iii) modify, adapt, or create derivative works based on the Software.
(b) You may not reverse engineer, decompile, or disassemble the Software. You may transfer the Software and user documentation on a permanent basis, provided that the transferee agrees to accept the terms and conditions of this Agreement and you retain