... 19 36 , 30 36 , 130 – 131 , 269, 290automated password guessing, 32 33 buffer overruns, 29, 34 , 234 , 286denial of service, 22, 30 32 , 287forged e-mail, 32 , 240–241man-in-the-middle attacks, 36 , 291phishing, ... guessing, 32 33 automated security policy, applying, 64 avalanche attack, 31 32 B “back doors”, 13, 34 Back Orifice, 34 background radiation, 260, 286backups, 133 – 138 vs. archiving, ... 291phishing, 33 session hijacking, 35 36 source routing, 35 Trojan horses, 32 , 34 , 112, 119–121, 271, 297early history, 9information gathering, 29 30 architecture probes, 29 30 437 4Indx.fm Page 30 4...