10.07.2015 Views

CIRCUMVENTION TOOLS - FLOSS Manuals

CIRCUMVENTION TOOLS - FLOSS Manuals

CIRCUMVENTION TOOLS - FLOSS Manuals

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A screenlogger is software able to record everything your computer displays on the screen.T he main feature of a screenlogger is to capture the screen and log it into files to view at anytime in the future. Screen loggers can be used as powerful monitoring tool. You should beaware of any screen logger running on any computer you are using, anytime.SCRIPTA script is a program, usually written in an interpreted, non-compiled language such asJavaScript, Java, or a command interpreter language such as bash. Many Web pages includescripts to manage user interaction with a Web page, so that the server does not have to senda new page for each change.SMARTPHONEA smartphone is a mobile phone that offers more advanced computing ability and connectivitythan a contemporary feature phone, such as Web access, ability to run elaborated operatingsystems and run built-in applications.SPAMSpam is messages that overwhelm a communications channel used by people, most notablycommercial advertising sent to large numbers of individuals or discussion groups. Most spamadvertises products or services that are illegal in one or more ways, almost always includingfraud. Content filtering of e-mail to block spam, with the permission of the recipient, isalmost universally approved of.SSH (SECURE SHELL)SSH or Secure Shell is a network protocol that allows encrypted communication betweencomputers. It was invented as a successor of the unencrypted T elnet protocol and is alsoused to access a shell on a remote server.T he standard SSH port is 22. It can be used to bypass Internet censorship with portforwarding or it can be used to tunnel other programs like VNC.SSL (SECURE SOCKETS LAYER)SSL (or Secure Sockets Layer), is one of several cryptographic standards used to makeInternet transactions secure. It is was used as the basis for the creation of the relatedT ransport Layer Security (TLS). You can easily see if you are using SSL/T LS by looking at theURL in your Browser (like Firefox or Internet Explorer): If it starts with https instead of http,your connection is encrypted.STEGANOGRAPHYSteganography, from the Greek for hidden writing, refers to a variety of methods of sendinghidden messages where not only the content of the message is hidden but the very fact thatsomething covert is being sent is also concealed. Usually this is done by concealing somethingwithin something else, like a picture or a text about something innocent or completelyunrelated. Unlike cryptography, where it is clear that a secret message is being transmitted,steganography does not attract attention to the fact that someone is trying to conceal orencrypt a message.SUBDOMAINA subdomain is part of a larger domain. If for example "wikipedia.org" is the domain for theWikipedia, "en.wikipedia.org" is the subdomain for the English version of the Wikipedia.THREAT ANALYSIS226

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!