The N.nentry shown for each index item
refers to Section N.n of Lecture N.
Therefore, 32.5 in the very first entry 
means Section 32.5 of Lecture 32.



               
A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Z  




A
A3 (GSM)                                32.5
A5/1 cipher (GSM, G2)                   32.1, 32.5
A5/2 cipher                             32.5
A5/3 cipher                             32.5
A5/4 cipher                             32.5
A8 (GSM)                                32.5
A, IPv4 address in Resource Record      17.4
AAAA, IPv6 address in Resource Record   17.4
AA (DNS message)                        17.12
Abdelberi Chaabane                      20.5
abelian group                           4.3, 4.4, 5.3.1, 14.4
AbraWorm.pl                             22.4
access control list                     19.4.2
Access Point                            9.8, 9.8.3
ACK bit, TCP header                     16.4
Acknowledgment Number, TCP header       16.4
ACK packet                              16.4, 16.13
acl, access control list                19.4.2
action attribute of HTML form element   28.1.1
action designators, Procmail recipe     31.6
action (Fail2Ban)                       24.3
action line, Procmail recipe            31.6
Active attack (P2P)                     26.8
ActiveObject('Microsoft.XMLHTTP'), Ajax 28.1.2
Adam Caudill                            32.9
adaptive CCA                            12.7
Additional section (DNS)                17.12
additive identity element               5.5.1
additive inverse                        4.3.1, 5.3.2
additive inverse, set of remainders     5.3
Address Resolution Protocol             9.8.1, 23.3
AddRoundKey, AES                        8.4
add round key, AES                      8.3
Adi Shamir                              8.9, 9.8.2, 12.2
ADMIN (IRC command)                     29.3
ADMINISTRATOR account (Windows)         32.4
AES                                     3.3
AES in CBC mode                         14.1
AES in CTR mode                         14.1
AES, overall structure                  8.3
AF (Assured Forwarding)                 16.3
affine relationship                     8.9
AF_INET socket                          16.14, 16.15
AF_UNIX socket                          16.14, 16.15
Agobot bot                              29.8
Agrawal-Kayal-Saxena algorithm          11.6
AH (IPSec)                              20.3
Ahmed Obied                             28.5
aircrack-ng                             9.8.3
airmon-ng                               9.8.3
akkadia.org                             24.5
A. K. Lenstra                           32.7.1
AKS algorithm for primality testing     11.6
Albert-Laszio Barabasi                  26.4
Alejandro Gervasio                      28.1.2
Aleksandar Kuzmanovic                   16.11
Alert Protocol, SSL                     20.4
Alexander Sotirov                       13.8
Alfred Menezes                          14.8.1, 14.13
Alfred Renyi                            26.4
algebraic attack                        2.1
algebraic elliptic curve group law      14.6, 14.7
algebra, relational                     27.4
Algorithm::BitVector module             9.5.1
Algorithm::BitVector.pl                 2.11
Alpha Centauri, coffee shop             17.1
altering email headers                  31.4
alternative subexpressions (regex)      31.5
Amit Klein                              28.4
amplification attack (DDoS)             29.7
amplification exploit                   29.7
analog phenomena as entropy sources     10.8
anatomy of a virus                      22.2
anatomy of Conficker.A                  22.6.1
anatomy of Conficker.B                  22.6.1
anatomy of Conficker.C                  22.6.2
anchor metacharacters (regex)           31.5
ANCOUNT (DNS message)                   17.12
Anderson, Ross                          8.1
Andrea Lelli                            28.5
Andreas Klein                           9.8.1
Andrei Pyshkin                          9.8.2
Andrew Tanenbaum                        18.1
Android app, public and private keys    32.4
android:exported                        32.4
Android kernel features                 32.4
Android OS                              32.2, 32.4
android:protectionLevel                 32.4
Angelos Stavrou                         32.9
Announce Network Errors, ICMP           16.2
anonymity and privacy                   25.11
anonymity check                         19.3.3
anonymized routing                      20.5
anonymizing proxy                       19.1
anonymizing proxy server                19.4
anonymous defamation                    20.5
ANSI X9.17/X9.31 PRNG algorithm         10.6
Answer section (DNS)                    17.12
ANSWER SECTION, DNS response            17.4
anti-virus tools                        22.8
anti-virus tools vis-a-vis Metasploit   23.5
Antony Rowstron                         25.6
Anumasson, Jean-Philippe                15.9
AP                                      9.8, 9.8.3
apache-badbots (fail2ban)               24.3
Apache Commons                          24.6
APACHEHOME environment variable         19.4.2
apache2 package                         19.4.2
Apache web server                       19.4.2, 27.1
API                                     10.3
APK archive (Android)                   32.3
apk file format                         32.3
app                                     12.1
AppArmor                                32.4
Application Layer DDoS attack           29.7
application layer firewall              19.1
Application Layer, TCP/IP               16.2
Application Package (Android)           32.3
Application Programming Interface       10.3
App Store                               12.1
ARCOUNT (DNS message)                   17.12
arithmetic multiplication in GF(2^n)    7.8
Arjen Lenstra                           13.8
Arnaud Legout                           20.5
Arnold Dumey                            15.9, 25.2
ARP                                     9.8.1, 9.8.3, 23.3
ARP cache                               23.3
ARP caching time                        23.3
arp command                             23.3
array, an object type in JavaScript     28.2
Arturo 'Buanzo' Busleiman               24.3
AS (Kerberos)                           10.3
ASN.1                                   13.4
ASP                                     27.1
Assist Troubleshooting, ICMP            16.2
associative arrays                      15.1, 15.9
associativity, group                    4.2
associativity, ring                     4.4.1
associativity, set of remainders        5.3
Assured Forwarding (AF) PHB             16.3
attack, Active (P2P)                    26.8
attack, algebraic                       2.1
attack, application layer DDoS          29.7
attack, bad apple                       20.5
attack, birthday                        15.6
attack, blind throughput Reduction      16.2
attack, browser vulnerability           28.3
attack, brute-force                     2.1, 24.1
attack, buffer overflow                 21.3.1, 21.4, 23.1
attack, CCA1                            12.7
attack, CCA2                            12.7
attack, chosen ciphertext               8.9, 12.7
attack, chosen plaintext                3.3.2, 8.9
attack, client-side XSS                 28.1, 28.1.1, 28.3
attack, clogging                        20.3.4
attack, codebook                        2.1
attack, cross-site scripting            28.1, 28.1.1, 28.3
attack, DDoS                            29.1, 29.7
attack, DDoS by DNS amplification       29.7
attack, DDoS by NTP amplification       29.7
attack, denial of service               16.12, 16.14
attack, dictionary                      24.1
attack, differential                    3.3.2, 8.9
attack, distributed denial of service   29.1
attack, DNS cache poisoning             17.10
attack, DoS                             16.11, 16.12
attack, electromagnetic analysis        32.6
attack, EM                              32.6
attack, exploiting iframe HTML tag      28.3
attack, fault injection                 12.5, 32.6, 32.7
attack, FMS                             9.8.2
attack, heap spray                      28.3
attack, HTTP GET flood                  29.7
attack, HTTP POST flood                 29.7
attack, interpolation                   8.9
attack, IP source address spoofing      16.13
attack, IP spoofing                     16.13
attack, join-leave churn                26.8
attack, Klein                           9.8.1
attack, known plaintext                 8.9
attack, KoreK                           9.8.2
attack, layer 7 DDoS                    29.7
attack, linear                          8.9
attack, man in the middle               13.2, 13.4, 13.5, 13.8
attack, mathematical                    12.9
attack, meet in the middle              9.2.2
attack, MOV                             14.9, 14.10, 14.14
attack, plaintext-ciphertext            9.8.1
attack, power analysis                  32.6
attack, PTW                             9.8.1, 9.8.2
attack, rainbow table                   24.4
attack, replay                          9.8.3, 10.2, 20.3.2
attack, server-side cross-site          27.3
attack, server-side XSS                 27.3, 28.1
attack, shrew DDoS                      29.7
attack, Shrew DoS                       16.11
attack, side-channel                    12.5, 32.6
attack, Slowloris                       27.7
attack, SlowPOST                        27.7
attack, sneak ACK                       16.9
attack, social engineering              30.1
attack, Spartacus                       25.10
attack, split-handshake                 16.9
attack, SQL injection                   27.5, 27.6
attack, statistical                     2.6
attack, Sybil                           25.10
attack, SYN flood                       16.12
attack, SYN flooding                    16.14
attack, targeted                        30.2, 32.1
attack, TCP state exhaustion DDoS       29.7
attack, time-memory tradeoff            2.1
attack, timing                          12.5, 32.6, 32.8
attack, topology                        25.10
attack, traffic analysis                20.5
attack, untargeted                      32.1
attack, volumetric DDoS                 29.7
attack, Weil descent                    14.14
attack, zero-day                        28.5
attribute (a database concept)          27.4
Aurora trojan                           30.5
authenticated public key                13.3
authentication                          12.1
Authentication Data Field, AH header    20.3.2
Authentication Data field, ESP header   20.3.3
authentication, endpoint                12.6
Authentication Header, IPSec            20.3, 20.3.2
authentication, message                 20.1
authentication of public key            13.3
authentication, sender                  20.1
authentication, server                  12.6
Authentication Server (Kerberos)        10.3
Authentication Service, PGP             20.2
authentication tag                      15.8
authoritative answers, DNS              17.4
authoritative nameserver                17.3, 17.4
Authority section (DNS)                 17.12
AUTHORITY SECTION, DNS response         17.4
AutoRun                                 22.6, 32.9
autorun.inf                             32.9
autorun.inf file                        22.6
avalanche effect                        3.4
Avinash Kak, detecting bots (new algo)  29.1
AWAY (IRC command)                      29.3
Axel Gambe                              29.8

B
baby-step giant-step                    13.7
back of envelope reasoning              15.5
backoff, TCP                            16.11
backports                               9.8.3
backports.wiki.kernel.org               9.8.3
backtracking in regex matching          31.5
bad apple attack                        20.5
BadUSB exploit                          32.9
bailiwick check                         17.13
Balakrishnan, Hari                      25.4
bandwidth exhaustion attack             29.7
bantime (Fail2Ban)                      24.3
Barabasi-Albert random graphs           26.4
Barkan, Elad                            32.5
Base64                                  13.4
Base64 encoding                         2.4, 12.11, 13.4, 13.9, 15.1, 20.2
Base64 encoding in password hashing     24.5
Base64 encoding, MIME compatible        24.5
base point, ECC                         14.11
base pointer                            21.4
Bayesian filtering of spam              31.1
BCP 38                                  16.13, 16.14
bcrypt                                  24.5
behaviour blocking                      22.8
Benne de Weger                          13.8
Benoit Poulo-Cazajou                    32.9
BER, ASN.1 byte encoding                12.11
Berkeley Internet Name Daemon           17.8
Berners-Lee, Tim                        27.2
Bernstein, Daniel                       15.9
Bezout's identity                       5.6, 5.6.2
Bezout's identity, proof                5.6.1
bias, linear approximation              8.9
Biham, Eli                              8.1, 8.9, 32.5
bijection                               11.7
binary code words                       7.6
binary format                           15.1
binary GCD algorithm                    5.4.4
BIND                                    17.4, 17.8
bind9                                   17.8.1
Bionic C library                        32.4
biprime                                 12.9
birthday attack                         15.3, 15.6
birthday paradox                        15.5.1, 16.13
BIT STRING, an ASN.1 keyword            12.11
BitTornado, a Python client             25.9
BitTorrent                              25.1
BitTorrent file block, P2P              25.9
BitTorrent leecher, P2P                 25.9
BitTorrent magnet links, P2P            25.9
BitTorrent PEX protocol, P2P            25.9
BitTorrent protocol, P2P                25.9
BitTorrent seeder, P2P                  25.9
BitTorrent swarm, P2P                   25.9
BitTorrent through Tor                  20.5
BitTorrent, tracker                     25.1
BitTorrent, trackerless mode            25.1, 25.7
BitTorrent tracker, P2P                 25.9
BitVector.py                            2.11
Bjarne Stroustrup                       27.2
Black, Daniel                           24.3
Black Hat conference, 2014              32.9
Black Hat conference, 2011              32.9
Bleichenbache, Daniel                   12.7
blind throughput reduction attack       16.2
block, BitTorrent                       25.9
block cipher                            2.1, 3.1, 3.2, 9.5
block cipher modes                      9.5
BLOCKSIZE                               2.11, 2.12
Blowfish cipher                         24.5
bluetooth                               9.8.3
Bluetooth                               16.2
Blum Blum Shub PRNG                     10.7
Bobax/Kraken botnet                     29.8
Bob Clueless                            30.1
body, part of email                     31.3
Boneh, Dan                              32.7.1
boolean, a primitive type in JavaScript 28.2
booter, botnet                          29.7
bootstrap loader                        32.4
bot                                     29.1
bot, Agobot                             29.8
bot, a silly little bot                 29.6
bot for spewing out spam                29.6
bot herder                              29.1
bot master                              29.1
bot, miniBot.pl                         29.6
botnet                                  29.1
botnet, Bobax/Kraken                    29.8
botnet, C&C needs                       29.2
botnet, command and control needs       29.2
botnet, Curwail                         29.8
botnet exploits                         29.2
botnet, Grum                            29.8
botnet, Nucrypt                         29.8
botnet, OneWordSub                      29.8
botnet, Ozdok                           29.8
botnet, Rustock                         29.1, 29.8
botnet, Spamthru                        29.8
botnet, Srizbi                          29.8
botnet, Storm                           29.8
botnet, Wopla                           29.8
bot, Phatbot                            29.8
bot, rBot/RxBot                         29.8
bots with P2P based C&C                 29.8
bot, Zotob                              29.8
Boucher, David                          32.9
bounded probabilistic polynomial time   11.5.7
BPP                                     11.5.7
Bram Cohen                              25.9
Brandon Wilson                          32.9
breaking the code                       2.1
Briceno, Marc                           32.5.1
Broker                                  19.5.3
Broker, CreateBroker                    19.5.5
Broker, RunBroker                       19.5.5
browser detection with JavaScript       28.2
browser vulnerability attacks           28.3
Bruce Schneier                          8.1
brute-force attack                      2.1, 24.1
bsd_nthash                              24.5
bucket, hash table                      15.4, 25.2
buffer overflow attack                  21.3.1, 21.4, 23.1
buffer overflow, heap                   21.4
buffer overflow vulnerability           21.2, 22.3, 23.1
buffer overread                         23.2.2
buffers in WeeChat                      29.4
buffer, WeeChat                         29.4
buffover.c                              21.4.1
buffover4.c                             21.6
buffover2.c                             21.5
bug, Heartbleed                         20.4.4
Busleiman, Arturo 'Buanzo'              24.3
byte count in a TCP connection          16.4
byte count index                        16.4
byte stream, pseudorandom               9.6, 9.7

C
CAC                                     16.3
CA (Certificate Authority)              13.3, 20.4
CA, intermediate-level                  13.4
CA hierarchy                            13.4
CA, root                                13.3, 13.4
cache, DNS                              17.7
cache manager, Squid                    19.4.2
cache poisoning, DNS                    17.11
caching nameserver, DNS                 17.7.1, 17.8.1
caching proxy server                    19.4
caching, web objects                    19.4
Call Admission Control                  16.3
call stack                              21.4
CAN protocol, P2P                       25.8
cardinality                             4.2.1
cards                                   10.4.1
care-of IP address (mobility)           32.10
Carrier Sense Multiple Access           16.2
CAST-128, a block cipher                20.2
Catherine the Great                     11.3
Caudill, Adam                           32.9
CBC                                     9.5, 9.5.2
CCA                                     12.7
CCA1                                    12.7
CCA2                                    12.7
CCA2 secure                             12.7
ccTLD DNS nameserver                    17.3, 17.4
CDN                                     29.7.1
Ceasar cipher                           2.3
cell, Tor                               20.5
central index server, Napster           25.1
Cerberus                                10.3
certificate                             13.3
certificate authority                   13.3, 20.4
certificate revocation                  13.8
Certificate Revocation List             13.8
Certificate Signing Request             13.8
certificate trust, PGP                  20.2.1
certificate validation                  20.4
certificate_verify message              20.4.3
CFB                                     9.5, 9.5.3, 20.2
CGI script                              28.4
chain policy, iptables                  18.4
chains of rules, firewall tables        18.3
Change Cipher Spec Protocol             20.4.3
channel buffer, WeeChat                 29.4
channel, IRC                            29.3
channel number (WiFi)                   9.8.3
channel operator, IRC                   29.3
ChanServ, Freenode                      29.4
Chaos Communication Congress            14.1
character classes for regex matching    31.5
character class metacharacters (regex)  31.5
character class (regex)                 31.5
characteristic of a ring                14.3
chat link with netcat                   23.6
Checksum field, TCP header              16.4
Chief Justice John Roberts              32.1
Chinese Remainder Theorem               11.7, 12.5, 32.7
Chord protocol, P2P                     25.4
Chord protocol, routing table           25.4
chosen ciphertext attack                8.9, 12.7
chosen plaintext attack                 3.3.2, 8.9
Chris GauthierDickey                    25.8
Christian Grothoff                      25.8
chroot jail                             17.9
churn in a P2P network                  25.3
cipher                                  2.1
cipher, A5/1                            32.1, 32.5
cipher, A5/2                            32.5
cipher, A5/3                            32.5
cipher, A5/4                            32.5
cipher, AES                             8.1
cipher, block                           2.1, 3.1, 9.5
Cipher Block Chaining Mode              9.5, 9.5.2
cipher, Blowfish                        24.5
cipher, CAST-128                        20.2
cipher, Ceasar                          2.3
cipher Counter Mode                     9.5, 9.5.5
cipher, DES                             3.3
cipher, 3DES with three keys            9.4
cipher, 3DES with two keys              9.3.1
Cipher Exchange Protocol, SSL           20.4
cipher feedback mode                    20.2
Cipher Feedback Mode                    9.5, 9.5.3, 20.2
cipher, Hill                            2.8
cipher, IDEA                            20.2
cipher, ideal block                     3.1
cipher, KASUMI                          32.5
cipher, Lucifer                         3.3
cipher, MARS                            8.1
cipher, MISTY1                          32.5
cipher, monoalphabetic                  2.5
cipher Output Feedback Mode             9.5, 9.5.4
cipher, permutation                     2.10
cipher, Playfair                        2.7
cipher, polyalphabetic                  2.9
cipher, RC6                             8.1
cipher, RC4                             9.7
cipher, Rijndael                        8.1, 8.9
cipher, Serpent                         8.1
Cipher Spec, SSL Session State          20.4.2
cipher, stream                          2.1, 9.5.3, 9.6
cipher, substitution                    2.3
ciphertext                              2.1
ciphertext differential                 8.9
cipher, Twofish                         8.1
cipher, variable key-length             9.7
cipher, Vigenere                        2.9
CIRCTech08-001                          27.2
circuit-level proxy                     19.2.2
Cisco Advisory                          17.13, 21.3.1
Citizens Lab                            30.4
Clarke, Ian                             26.2
Class A private network                 16.3
Class A Private Network Address Range   18.3
class BPP                               11.5.7
Class B private network                 16.3
Class C addresses                       9.8
class co-RP                             11.5.7
Class C private network                 16.3
Class C Private Network Address Range   18.3
CLASS (DNS message)                     17.12
classical cryptography                  2.1
classical encryption                    2.2
class NP                                11.5.7
class of Resource Record                17.4
class P                                 11.5.7
class RP                                11.5.7
Claude Castelluccia                     20.5
C library, Bionic (Android)             32.4
C library, Gnu                          32.4
Client Authenticator (Kerberos)         10.3
client, Dante                           19.2.3
client, email                           31.2
client_hello message, SSL handshake     20.4.3
client_key_exchange message             20.4.3
client-server model                     25.1
client-side XSS attack                  28.1.1
Client Write Key                        20.4.2
Client Write MAC Secret                 20.4.2
clique                                  26.4
clocking bit                            32.5
clogging attack                         20.3.4
closed port                             23.1
CLOSED, TCP connection state            16.7
close, IRC command                      29.4
CLOSE_WAIT, TCP connection state        16.7, 16.16
CLOSING, TCP connection state           16.7
closure, group                          4.2
closure, ring                           4.4.1
clustering coefficient of random graph  26.4
codebook                                3.1, 3.1.1
codebook attack                         2.1
Codec library from Apache Commons       24.6
code obfuscation                        28.1.2
coefficient set                         6.1
Cogestion Avoidance Phase, TCP          16.11
Cohen, Bram                             25.9
collision resistance, hashing           15.3
colon line, Procmail recipe             31.6
command-line packet sniffer             16.8
Common Vulnerabilities and Exposures    23.2.2
communications interface                16.3
commutative operator                    4.3
commutative ring                        4.4.3, 4.5, 5.3.1, 6.9
commutativity, set of remainders        5.3
Comodo                                  13.3, 13.4, 13.8
comparing RSA and ECC                   14.1
Compatibility Service, PGP              20.2
compat-wireless                         9.8.3
COMP128 (GSM)                           32.5
composite number                        11.2
composition of permutaitons             4.2.1
composition of permutations             9.2.1
compression function                    15.7
Compression Method, SSL Session State   20.4.2
Compression Service, PGP                20.2
computational complexity                11.5.7, 11.6.3
Computational DH Assumption             13.5
condition-line filtering, Procmail      31.6
condition line metacharacters, Procmail 31.6
condition line, Procmail recipe         31.6
Conficker.A                             22.6
Conficker.A, anatomy                    22.6.1
Conficker.B                             22.6
Conficker.B, anatomy                    22.6.1
Conficker.C                             22.6
Conficker.C, anatomy                    22.6.2
Conficker.D                             22.6
Conficker worm                          22.6
Conficker worm, password guesses        24.2
confidentiality                         12.1
Confidentiality Service, PGP            20.2
Confidentiality Service, SSL            20.4.2
configuring a SOCKS client              19.3.2
configuring BIND                        17.8.1
confusion                               3.3.1, 3.4
congestion control, TCP                 16.4, 16.11
congestion window field, TCP            16.4
Congestion Window field, TCP header     16.11
congruence                              5.1
congruence of squares                   12.9
CONNECT, an HTTP/1.1 method             19.6
connect() for port scanning             23.1.1
connect for sending CONNECT to proxy    19.6
Connection Establishment Timer, TCP     16.10, 16.14
connectionless protocol                 16.3
connection state, SSL                   20.4.3
connection tracking, iptables           18.12
CONNECT (IRC command)                   29.3
connect() scan                          23.1.3
consistent hashing, DHT                 25.2, 25.3
Console Hacking 2010                    14.1
Console Hacking Forum                   14.1
constant polynomial                     6.1
contactless smart cards                 14.1
Content Addressable Network, P2P        25.8
Content Delivery Network                29.7.1
content key, DHT                        25.2
ContentProvider (a Java class)          32.4
ContentResolver (a Java class)          32.4
content switching                       29.7.1
Context-keyed Paylod Encoding           23.5
context label (SELinux)                 32.4
context (SELinux)                       32.4
contraction permutation (DES)           3.3.5, 3.3.7
Control Bits field, TCP header          16.4
control-flow graph                      22.6.1
control stack                           21.4
control torpacket                       20.5
cookie blacklister                      28.1.1
cookie blocker                          28.1.1
cookies                                 28.1.1
cookies for maintaining session state   28.1.1
cookies, stealing by 3rd parties        28.1.1
cookie whitelister                      28.1.1
Coppersmith, Don                        3.2
coprime                                 11.1, 13.5
coprime, pairwise                       11.7
corkscrew for sending CONNECT           19.6
co-RP                                   11.5.7
CPAN archive, Perl                      16.15
cracking passwords                      22.3, 24.4
CRC32                                   9.8
CRC1                                    9.8
CRC field, Ethernet frame               23.3
create, a Tor control command           20.5
CREATE DATABASE (MySQL)                 27.4
created, Tor                            20.5
CREATE USER (MySQL)                     27.4
creating a new channel, Freenode        29.4
CRL                                     13.8
CR+LF, internet line terminator         29.3
cross-platform sharing of files         16.2
cross-site scripting attack             28.1.1, 28.3
CRT                                     11.7, 12.5, 32.7
cryptanalysis                           2.1
cryptanalysis, differential             8.9
Cryptanalysis, linear                   8.9
Crypt::ECB module                       9.5.1
cryptographic checksum                  15.8
cryptographic system                    2.1
cryptography                            2.1
cryptography, classical                 2.1
cryptography, public-key                2.1, 12.1
cryptography, symmetric-key             2.1, 3.1
cryptology                              2.1
crypto secure hash functions            15.7
crypto secure PRNG                      10.6, 10.7
crypto secure random numbers            10.5, 10.6
CSMA/CD                                 16.2
CSPRBG                                  10.7
CSPRNG                                  10.6, 10.7, 10.8
CSR                                     13.8
CTR                                     9.5, 9.5.5
Cutwail botnet                          29.8
CVE-2014-0160                           23.2.2
CVE                                     23.2.2
CWND field, TCP header                  16.11
CWND optional field, TCP header         16.4
cyber espionage                         30.3, 30.4
cyclic elliptic curves                  14.8.1
cyclic group                            13.5
cyclic group, generator                 13.5
cyclic subgroup                         13.5
Cyril Jaquier                           24.3

D
DAC (Discretionary Access Control)      32.4
DAC (Linux)                             32.4
D-addr field, Ethernet frame            23.3
Daemen, Joan                            8.1
daemon server                           21.1
Dag Arne Osvik                          13.8
Dan Boneh                               32.7.1
Daniel Bernstein                        15.9
Daniel Black                            24.3
Daniel Bleichenbache                    12.7
Dan Kaminsky                            17.13
Dante, as a reverse proxy               19.3.1
Dante, a SOCKS server                   19.2.3
Dante client                            19.2.3
Dante server, configuration             19.3.1
darknet overlay, P2P                    26.1
database, relational                    27.4
database security, row-level            27.4
Data Encryption Algorithm               3.3.1
Data Encryption Standard                3.3
Data field, Ethernet frame              23.3
datagram                                16.6
datagram fragmentation                  16.3
data inegrity check                     15.4
data integrity                          20.1
Data Link Layer, TCP/IP                 16.2, 23.3
Data Offset field, TCP header           16.4
Davida, George                          12.7
David Boucher                           32.9
David Karger                            25.4
David Mazieres                          25.7
David Molnar                            13.8
David Wagner                            32.5.1
DDoS attack by DNS amplification        29.7
DDoS attack by NTP amplification        29.7
DDoS attacks                            29.7
ddoser, botnet                          29.7
DEA                                     3.3.1
decentralized algorithm for aggregates  26.9
decentralized information distribution  26.1
decentralized routing                   26.5
decentralized routing algorithm         26.7
deciphering                             2.1
DecryptForFun.py                        2.11, 2.12
decryption                              2.1
decryption algorithm                    2.1
Default PHB                             16.3
definition of spam filter effectiveness 31.1
defragmentation of packets              16.3
deities and prophets                    27.2
Delayed ACK Timer, TCP                  16.10
DELETE FROM (MySQL)                     27.4
Deliver, an MDA                         31.2
delivering recipe, Procmail             31.6
DeMillo, Richard                        32.7.1
Denial of Service                       16.11
denial of service attack                16.12, 16.14
Dennis Ritchie                          27.2
DenyHost, how to un-blacklist           24.3
DenyHosts                               24.3
DenyHosts, synchronization feature      24.3
Department of Energy Technical Bulletin 27.2
DER, ASN.1 byte encoding                12.11
DerbyCon 2014                           32.9
DES                                     2.1, 3.3
DES-CBC MAC                             15.8
DES, 3DES                               9.3
DES, 2DES                               9.2.1
DES, key length                         3.3
DES key schedule                        3.3.5
DES round key                           3.2.1
destemail (Fail2Ban)                    24.3
Destination Address field, IP header    16.3
Destination Address field, IPv6 header  16.3
Destination Port, TCP header            16.4
destination socket                      16.5
destroy, a Tor control command          20.5
detached signatures                     20.2
deterministic test                      11.6
Device Firmware Upgrade (DFU)           32.9
/dev/random                             10.9.1
/dev/urandom                            10.9.1
dex file format                         32.3
DFU (USB)                               32.9
DH                                      12.6
DHCP                                    16.8, 20.3
DH (Diffie-Hellman)                     20.5
Dhem, Jean-Francois                     32.8.1
DHE-RSA                                 12.6
DH protocol                             13.5
DHT consistent hashing                  25.2, 25.3
DHT (Distributed Hash Table)            25.1, 25.2
DHT identifier circle                   25.2
DHT identifier space                    25.10
diameter of a random graph              26.4
dice                                    10.4.1
dictionary attack                       24.1
dictionary attack, guessing passwords   24.2
dictionary attack on root               24.1
dictionary attack, thwart with iptables 24.4
dictionary attack, usernames            24.1
differential attack                     3.3.2, 8.9
differential_attack_toy_example.pl      8.9
differential, ciphertext                8.9
differential cryptanalysis              3.3.2, 8.9
differential, input                     8.9
differential, output                    8.9
differential, plaintext                 8.9
differential XOR                        2.11
Differentiated Service                  16.3
Differentiated Service field            16.3
Differentiated Services Code Point      16.3
Diffie-Hellman                          13.5, 20.5
Diffie-Hellman key exchange             12.6
DiffServe                               16.3
diffusion                               3.3.1, 3.4
Digest, a Perl module                   15.1
Digest package, Apache Commons Codec    24.6
Digest::SHA1                            15.1
Digest-SHA1, a Perl module              15.1
digitally signing an Android app        32.4
Digital Rights Management               14.1, 14.8.1, 14.15
digital signature                       12.1
Digital Signature Algorithm             12.11, 13.6
Digital Signature Standard              13.6, 20.2
digram                                  2.6.1
dig utility                             17.3, 17.4, 17.8
dig -x for reverse DNS lookup           17.4
Di Paola, Stefano                       28.1
disassembler, IDA Pro                   22.6.1
discrete logarithm                      11.8, 13.5, 13.7, 14.2
Discretionary Access Control            32.4
discriminant of a polynomial            14.3
distributed hash table                  25.1, 25.2
distributivity, ring                    4.4.1
distributivity, set of remainders       5.3
dividend                                6.3
divisor                                 5.1, 6.3
djbdns                                  17.8
DNAT                                    18.7
DNS                                     16.2, 17.2
DNS amplification attack                29.7
DNS cache                               17.7
DNS cache poisoning                     17.11
DNS cache poisoning attack              17.10
dns_fake_response.pl                    17.12
DNS hijacking                           17.2
dnsmasq                                 17.8
DNS nameserver, caching                 17.7.1
DNS nameserver, ccTLD                   17.3, 17.4
DNS nameserver, gTLD                    17.3, 17.4
DNS nameserver, primary                 17.6
DNS nameserver, publishing              17.7.1
DNS nameserver, root                    17.3, 17.4
DNS nameserver, secondary               17.6
DNSSEC                                  17.8
DNS Security Extensions                 17.8
DNS sinkholes                           30.4
document, an object in JavaScript       28.2
document.appendChild(), JavaScript      28.2
document.cookie(), retrieving cookies   28.1.1
document.createElement()                28.1.1
document.getElementsByTagName()         28.1.1
Document Object Model (JavaScript)      28.2
document summarization by Essence       19.5.2
Domain Name Server                      17.2
Domain Name Service                     17.2
Domain Name Space                       17.2, 17.4
Domain Name System                      17.4
DOM (JavaScript)                        28.2
Don Coppersmith                         3.2, 9.2.1
Don Johnson                             14.8.1, 14.13
DoS attack                              16.12
DoS4.pl                                 16.15
DoS5.pl                                 16.15
DoS, Slowloris                          27.7
DoS through a replay attack             16.17
dot-decimal notation for IPv4 addresses 16.3
double DES                              9.2
Double DES                              9.2.1
Downadup worm                           22.6
downloading from server, JavaScript     28.1.2
Drepper, Ulrich                         24.5
DRM                                     14.1, 14.8.1, 14.15
DROP TABLE (MySQL)                      27.4
DROP USER (MySQL)                       27.4
Druschel, Peter                         25.6
DSA                                     12.11, 13.6
DSCP                                    16.3
DS, Differentiated Service              16.3
DS field, IP header                     16.3
dsniff packet sniffer                   23.3
DSS                                     13.6, 20.2
Duncan Watts                            26.3, 26.4
Dunkelman, Orr                          32.5
Durumeric, Zakir                        10.9.4, 12.8
Dynamic Host Configuration Protocol     20.3
dynamic web-content generation          27.1

E
eax, a 32-bit x86 register              21.4
ebp, a 32-bit x86 register              21.4
ECB                                     9.5, 9.5.1
ECC                                     14.11
ECC.py                                  14.8.1
ECDH                                    14.1, 14.12, 20.5
ECDHE                                   14.1, 14.12
ECDH-ECC                                14.1
ECDH-ECDSA                              14.1
ECDHE-ECC                               14.1
ECDHE-RSA                               12.6, 14.1
ECDH-RSA                                14.1
EC Digital Signature Algorithm          14.1
ECDLP                                   14.14
ECDSA                                   14.1, 14.8.1, 14.13
ECDSA for code authentication           14.13
ECDSA, proof                            14.13
ECN field, IP header                    16.3
EDE                                     9.3, 10.6
edge router                             16.14
Edward Knightly                         16.11
edx, a 32-bit x86 register              21.4
EFF                                     3.3, 3.4
EGD                                     20.2.1
egrep                                   31.5
egrep for condition-line matching       31.6
eip, a 32-bit x86 register              21.4
Elad Barkan                             32.5
electromagnetic analysis attack         32.6
Electronic Code Book Mode               9.5, 9.5.1
Electronics Frontiers Foundation        3.3
ElGamal digital signature algorithm     13.6
ElGamal protocol                        13.5, 20.2
Eli Biham                               8.1, 8.9, 32.5
elite HTTP proxy server                 19.3.3
elliptic curve                          14.3
elliptic curve, addition op             14.4
elliptic curve cryptography             14.11
elliptic curve DH base point            14.12
Elliptic Curve Diffie Hellman           20.5
Elliptic Curve Diffie-Hellman           14.1
elliptic curve Diffie-Hellman           14.12
Elliptic Curve Diffie-Hellman Ephemeral 14.12
Elliptic Curve Digital Signature Algo   14.8.1
elliptic curve DSA                      14.13
elliptic curve group law, algebraic     14.6, 14.7
elliptic curve, group operator          14.4
elliptic curve, order of a point        14.12
elliptic curve, order of the curve      14.9, 14.12
elliptic curve over GF(2n)              14.9
elliptic curve point at infinity        14.4
elliptic curve points, group law        14.5
elliptic curve points, notation E(a,b)  14.4
elliptic curves, cyclic                 14.8.1
elliptic curves over Zp for prime p     14.8
elliptic curve, supersingular           14.9
elliptic integrals                      14.3
Elm, an MUA                             31.2
email body                              31.3
email client                            31.2
email envelope                          31.3
email header                            31.3
email headers, alteration of            31.4
email security                          9.4
email structure                         31.3
EM attack                               32.6
Encapsulating Security Payload          20.3, 20.3.3
encoding with Shikata Ga Nai            23.5
Encrypt-Decrypt-Encrypt                 9.3
EncryptForFun.py                        2.11, 2.12
encryption                              2.1
encryption algorithm                    2.1
encryption, classical                   2.2
encryption key, ideal block cipher      3.1
encryption, multi-character             2.7
encyphering                             2.1
endpoint authentication                 12.6
Entangled, Kademlia in Python           25.7
entropy                                 10.8, 20.2.1
entropy accumulation                    10.8
Entropy Gathering Daemon                20.2.1
entropy hole                            10.8, 10.9.4
entropy sources                         10.8
envelope, part of email                 31.3
environment variable LD_PRELOAD         19.2.3
Erdos, Paul                             26.4
Erdos-Renyi random graph                26.4
Eric Engstrom                           19.6
Eric Wustrow                            10.9.4, 12.8
Erik Tews                               9.8.2
ERROR (IRC command)                     29.3
Erwan Le Disez                          32.9
esp, a 32-bit x86 register              21.4
ESP header, IPSec                       20.3, 20.3.3
espionage, cyber                        30.3, 30.4
Essence, a document summarizer          19.5.2
ESTABLISHED, packet state for iptables  18.12
ESTABLISHED, TCP connection state       16.16
E-step (DES)                            3.3.1
/etc/apache2/                           19.4.2, 27.1
/etc/apache2/conf.d/                    27.8
/etc/apache2/mods-enabled               27.3
/etc/bind/                              17.8.1
/etc/bind/named.conf                    17.8.1
/etc/dante.conf                         19.3.2
/etc/danted.conf                        19.3.1
/etc/fail2ban                           24.3
/etc/fail2ban/jail.conf                 24.3
/etc/fail2ban/jail.local                24.3
/etc/hosts                              17.2
/etc/hosts.allow                        24.3
/etc/hosts.deny                         24.3
/etc/mysql/                             27.4
/etc/passwd                             24.3, 27.3
/etc/php5/apache2/php.ini               27.2
/etc/resolv.conf                        17.4
/etc/services                           18.6, 18.13, 21.1
/etc/shadow                             24.5
/etc/snort/rules                        23.4
/etc/snort/snort.conf                   23.4
/etc/squid3/squid.conf                  19.4.1
Ethernet                                16.2
Ethernet, a shared medium               23.3
Ethernet frame                          23.3
Ethernet frame, CRC field               23.3
Ethernet frame, D-addr field            23.3
Ethernet frame, Data field              23.3
Ethernet frame, Frame-type              23.3
Ethernet frame, Preamble field          23.3
Ethernet frame, S-addr field            23.3
Ethernet frame, structure               23.3
Ethernet interface                      16.2
Euclid                                  5.3.2
Euclid's Algorithm, Extended            5.6.5, 5.6.6, 5.7
Euclid's GCD Algorithm                  5.4
Euclid's GCD algorithm, proof           5.4.3
Eudora, an MUA                          31.2
Eugene Spafford                         22.5
Euler's Theorem                         11.4
Euler's Totient Function                11.3
Evans, Nathan                           25.8
Evariste Galois                         7.12
EV Certificate                          13.9
Evolution, an MUA                       31.2
Exchange, an MTA                        31.2
exec, PHP                               27.2
execution stack                         21.4
exfiltration                            22.4
expansion permutation (DES)             3.3.1
Expedited PHB                           16.3
Explicit Congestion Notification        16.3
exploit, amplification                  29.7
exploit, BadUSB                         32.9
exploit, botnet based                   29.2
exploit, DNS amplification              29.7
exploit, heap spray                     28.5
exploiting browser vulnerabilities      28.3
exploit, memory corruption based        28.5
exploit, NTP amplification              29.7
exploits for SQL injection              27.6
exploits with Metasploit Framework      23.5
exploit to spew out spam                27.3
exponential time algorithms             11.5.7
exponentiation, modular                 12.3.2
Extended Euclid's Algorithm             5.6.5, 5.6.6, 5.7, 13.6
Extended Validation Certificate         13.9
extension headers                       20.3.1
extract_sshpubkey_params.py             12.11

F
factorization by Fermat's method        12.9
factorization by Pollard-rho            12.9
factorization by sieve-based methods    12.9
factorization by trial division         12.9
factorization, integer                  12.9
Factorize.py                            12.9
Fail2Ban                                24.3
fake IP address                         16.14
falsifying info in routing table, P2P   25.10
fault injection attack                  12.5, 32.6, 32.7
FaultInjectionDemo.py                   32.7.1
f2b-sshd (Fail2Ban chain for iptables)  24.3
Fedon, Giorgio                          28.1
Feistel function                        3.2.1
Feistel, Horst                          3.2
Feistel structure                       3.2
Fermat's Little Theorem                 11.2
Fermat's method for factorization       12.9
fetchmail email client                  19.6
field                                   4.6, 5.3.1
field, Galois                           5.5
file format, apk                        32.3
file format, dex                        32.3
file transfer with netcat               23.6
filtered port                           23.1
filter (fail2ban)                       24.3
filtering of spam, Bayesian based       31.1
filtering recipe, Procmail              31.6
filtering spam                          31.1
filtering spam, regex based             31.1
filtering specification, iptables       18.11
filter table for firewall               18.2, 18.3
FIN bit, TCP header                     16.4
find_differentials_correlations.pl      8.9
FindMI.py                               5.7, 11.7.1
findtime (Fail2Ban)                     24.3
finger daemon                           22.5
finished message, SSL handshake         20.4.3
finite field                            4.1, 11.8
finite field, order                     7.8, 7.12
finite field, prime                     5.5, 14.8
finite group                            4.2.1, 4.2.3
FIN packet                              16.4
FIN_WAIT_2, TCP connection state        16.7, 16.16
FIN_WAIT_1, TCP connection state        16.7, 16.16
FIN_WAIT Timer, TCP                     16.10
FIN_WAIT_2 Timer, TCP                   16.10
FIPS180                                 15.7.1
FIPS                                    15.1
FIPS 186-3                              13.6
Firefox add-ons                         28.1.1
firewall, application layer             19.1
firewall, packet filtering based        18.1
firewall, proxy-server based            18.1
firewall, session layer                 19.1
firewall, shim layer                    19.1
firewall, transport layer               19.1
firmware                                32.9
Fisher-Yates shuffle                    9.5.1
fixed-sized fingerprint                 15.1
Flags field, IP header                  16.3
flowbits option, snort rule             23.4
flow control, TCP                       16.4, 16.6
flow option, snort rule                 23.4
flow, TCP                               16.11
flow, traffic                           16.11
flushing DNS cache                      17.3
flushing the firewall tables            18.2
FLUSH PRIVILEGES (MySQL)                27.4
FMS attack                              9.8.2
fno-stack-protector option for gcc      21.5
FNV hash                                15.9
FooVirus.pl                             22.2
FooVirus.py                             22.2
formail (a Unix/Linux utility)          31.6
formail, a Unix utility                 31.6
FORWARD chain of filter table           18.4
.forward file entry for procmail        31.6
Forward Secrecy                         12.6
Fowler, Glenn                           15.9
FQDN                                    17.3, 17.4
FQDN, RR                                17.4
fragmentation of datagram               16.3
Fragment Offset field, IP header        16.3
frame, Ethernet                         23.3
Frame-type field, Ethernet frame        23.3
framework, w3af                         28.6
Francois Koeune                         32.8.1
Freenet                                 26.1
Freenet, node identifier                26.2
Freenet, path of trust                  26.2
Freenet, PUT(key,data_object)           26.2
Freenet routing, security issues        26.8
Freenet, TTL for data objects           26.2
Freenet, web of trust                   26.2
Freenode, change password               29.4
Freenode, help commands                 29.4
Freenode IRC Server                     29.4
Freent, GET(key)                        26.2
FTP                                     16.2
full-duplex connection                  16.4
full-period sequence                    10.5
fully connected graph                   26.4
Fully Qualified Domain Name             17.3, 17.4
function, an object type in JavaScript  28.2
function, Feistel                       3.2.1
function, trapdoor                      12.9
Fyodor                                  23.1.3

G
Gaia, Google's passwd/login system      30.5
Galois, Evariste                        7.12
Galois field                            5.5
Galois field, generator                 7.12
game consoles                           14.1
GAO report on mobile security           32.1
gateway host                            16.16
gatherd, a SOIF object server           19.5.2
Gatherer                                19.5.4
Gatherer, an information summarizer     19.5.2
GauthierDickey, Chris                   25.8
gcc compiler                            21.4
GCD                                     5.3.2
GCD algorithm, binary                   5.4.4
gdb, Gnu debugger                       21.6
GDOI protocol                           20.3.4
generating round keys (DES)             3.3.5
generating web pages dynamically        27.1
generator for Galois field              7.12
generator of cyclic group               13.5
generic proxy protocol                  19.2
Generic Routing Encapsulation Protocol  29.7.1
Generic Security Services API           10.3
George Davida                           12.7
getaddrinfo()                           17.2
getElementsByTagName() (JavaScript)     28.2
gethostbyaddr()                         17.2
gethostbyname()                         17.2
getnameinfo()                           17.2
GF(2)                                   6.6
GF(23)                                  7.3, 7.4
GF(28)                                  7.8, 8.5, 8.5.1
GF(2n)                                  7.5
Ghostnet                                30.4
gh0stRAT trojan                         30.1, 30.3
gh0stRAT trojan, a listing of files     30.3
Giorgio Fedon                           28.1
GitHub                                  32.4
Glenn Fowler                            15.9
Glimpse, an indexer                     19.5.3
global channel, IRC                     29.3
GNU                                     27.2
Gnu C library                           32.4
.gnupg directory                        20.2.1
Gnu Privacy Guard                       20.2, 20.2.1, 22.8
gnutls-cli as a command-line TLS client 13.4.1
GnuTLS transport layer security library 13.4.1
Goldberg, Ian                           32.5.1
Google Chrome, heap buffer overflow     21.4
Google Play                             12.1, 32.2
Google Talk                             16.3
Gosling, James                          27.2
gossiping in small-world networks       26.9
Government Accountability Office        32.1
GPG                                     20.2, 20.2.1, 22.8
gpg --gen-key                           20.2.1
GPG passphrase                          20.2.1
grafting IPSec on IPv4                  20.3.1
GRANT ALL (MySQL)                       27.4
greatest common divisor                 5.3.2
greedy quantifiers (regex)              31.5
Greek mythology                         10.3
Greenify (a rooting app for Android)    32.4
GRE protocol                            29.7.1
GRE tunnel                              29.7.1
Grothoff, Christian                     25.8
group                                   4.2, 5.3.1, 11.8
group, abelian                          4.3, 4.4, 14.4
group, cyclic                           13.5
group, finite                           4.2.1
group, infinite                         4.2.1, 4.3
grouping metacharacters (regex)         31.5
grouping nick aliases                   29.4
Grouping.pl                             31.5
Grouping.py                             31.5
group law for elliptic curve points     14.5
group notation                          4.2
group operator                          11.8
group, order                            11.8, 13.5
group, permutation                      4.2.3
Group VPN                               20.3.4
GRUB bootloader                         32.4
Grum botnet                             29.8
GSS-API                                 10.3
gTLD DNS nameserver                     17.3, 17.4
guessing passwords, dictionary attack   24.2
Guido van Rossum                        27.2
gxy domain                              17.1

H
hacktivist                              29.7
Hades, gates of                         10.3
Hadoop                                  15.1
Halchenko, Yaroslav                     24.3
Halderman, J. Alex                      10.9.4, 12.8
handling node failures, DHT             25.3
Handshake Protocol, SSL                 20.4, 20.4.3
handshake, simultaneous-open            16.9
handshaking, TCP                        16.4
Hank van Tilborg                        14.1
Hans Luhn                               15.9, 25.2
Hari Balakrishnan                       25.4
Harry Potter and the Magic of DNS       17.1
Harvest broker, an index server         19.5.1
Harvest, info gatherer and indexer      19.5
Harvest project                         19.4
hash chain                              24.4
hashcode                                15.1
hash function, collision resistance     15.3
hash function, keyed                    15.8
hash function, LM                       24.4
hash function, NTLM                     24.4
hash functions, crypto secure           15.7
hash function, secure                   15.3
hash functions, efficient storage       15.1, 15.9
hash functions for efficient storage    15.1, 15.9
hash functions for message authentication15.1
hash functions, message authentication  15.1
hash functions, simple                  15.4
hash function, Whirlpool                15.7
hash index                              25.2
hashing                                 15.1
hashing for message authentication      15.2
hashing schemes for passwords           24.5
hash, one-way property                  15.3
hash table                              15.4, 25.2
hash table, buckets                     25.2
Hassen Saidi                            22.6
Hasse's Theorem                         14.9
Header Checksum field, IP header        16.3
header, IP                              16.3
header, IPv6                            16.3
header, IPv4                            16.3
header, part of email                   31.3
Header section (DNS)                    17.12
header, TCP                             16.4
header, UDP                             17.3
heap buffer overflow                    21.4
heap spray attack                       28.3
heap spray exploit                      28.5
heap spraying                           28.5
Heartbeat Extension to SSL/TLS          12.6, 20.4.1, 23.2.2
Heartbeat messages                      23.2.2
Heartbeat padding                       20.4.4
Heartbeat payload                       20.4.4
Heartbeat payload length field          20.4.4
Heartbleed bug                          12.6, 20.4.4, 23.2.2
Heatbeat Extension to SSL/TLS           20.4.4
help commands, Freenode IRC             29.4
Heninger, Nadia                         10.9.4, 12.8
hex format                              15.1
Heys, Howard                            3.3.2, 8.9
HID (USB Device Class)                  32.9
high-anonymity proxy server             19.3.3
hijacking, DNS                          17.2
Hill cipher                             2.8
Hiscocks, Steven                        24.3
history, an object in JavaScript        28.2
HMAC                                    15.8
Hoareau, Stephanie Blanchet             32.9
home IP address (mobility)              32.10
home router, port forwarding            23.6
honeynet                                22.6
honeypot                                22.6
Hongbo Yu                               15.7.1
Horst Feistel                           3.2
host for a virus                        22.1
hosting, virtual                        17.2
host key                                12.1
hostname, symbolic                      17.2
host utility                            17.5, 17.8
hotspot                                 9.8
hot swappable                           32.9
Howard Heys                             3.3.2, 8.9
HTML object memory corruption           28.5
HTTP                                    16.2
HTTP/1.1 method CONNECT                 19.6
HTTP/1.1 method DELETE                  19.6
HTTP/1.1 method GET                     19.6
HTTP/1.1 method HEAD                    19.6
HTTP/1.1 method OPTIONS                 19.6
HTTP/1.1 method POST                    19.6
HTTP/1.1 method PUT                     19.6
HTTP/1.1 method TRACE                   19.6
HTTP proxy for tunneling                19.6
HTTP Request If-Modified-Sense          19.4.1
HTTP Response Not-Modified              19.4.1
HTTP Secure                             13.4.1
HTTPS vs. HTTP                          13.4.1
http://thepiratebay.org                 25.9
Hydraq trojan                           30.5
hypertext preprocessor                  27.2
HyperText Transport Protocol            16.2

I
IANA                                    16.3, 18.6
Ian Clarke                              26.1, 26.2
Ian Goldberg                            32.5.1
ICMP                                    16.2
ICMP echo message                       16.2
ICMP scan                               23.1.3
ICMP source quench messages (deprecated)16.2
ICP                                     19.4
ICV                                     9.8
IDA Pro disassembler                    22.6.1
ID (DNS message)                        17.12
IDEA, a block cipher                    20.2
ideal block cipher                      3.1
ideal block cipher encryption key       3.1
Identification field, IP header         16.3
identifier circle, DHT                  25.2
identifier (in a password hash)         24.5
identifier space, DHT                   25.10
identity element, group                 4.2
identity element, integral domain       4.5
identity element, set of remainders     5.3
IDS                                     22.8
IDS, Intrusion Detecsion System         23.4
IEEE 802.15                             16.2
IEEE 802.11                             9.7, 16.2
IEEE 802.11 frame                       9.8
ie0199.exe trojan                       30.2
IETF                                    13.4, 20.4
ifconfg ethX promisc                    23.3
iframe HTML tag for XSS attack          28.3
IGMP                                    16.2
IHL field, IP header                    16.3
IIT Kanpur                              11.6
IKE                                     20.3.4
IKEv2 protocol                          20.3.4
IL (Integrity Level)                    32.4
ImageMagick                             9.5.1
Image (USB Device Class)                32.9
implementing GCD for large numbers in Perl5.4.4
implementing GCD in Perl                5.4.4
implementing GCD in Python              5.4.4
in-addr.arpa domain                     17.3
independence                            10.4.1
Index-Calculus                          13.7
indexing with Glimpse                   19.5.3
index server                            19.5.1
infinite group                          4.2.1, 4.3
INFO attribute, ChanServ server         29.4
INFO (IRC command)                      29.3
information gathering and indexing      19.5
information security                    20.1
ingress filtering                       16.14
initialization vector                   9.5.2, 9.5.3, 9.8, 14.1, 15.7, 20.4.2
Initial Sequence Number generator       16.13
Initial Sequence Number, TCP            16.4
initial ticket (Kerberos)               10.3
INPUT chain of filter table             18.2, 18.4, 24.3
input differential                      8.9
input state array                       8.1
input string (regex matching)           31.5
INRIA                                   20.5
INSERT INTO (MySQL)                     27.4
installing PHP5                         27.1
instruction pointer                     21.4
INTEGER, an ASN.1 keyword               12.11
integer factorization                   12.9
integral domain                         4.5, 4.6, 5.3.1
Integrity Check Value                   9.8
Integrity Level (Windows)               32.4
interface, communications               16.3
intermediate-level CA                   13.4
International Data Encryption Algorithm 20.2
Internet Assigned Numbers Authority     16.3, 18.6
Internet Cache Protocol                 19.4
Internet Control Message Protocol       16.2
Internet Engineering Task Force         13.4, 20.4
Internet Group Management Protocol      16.2
Internet Header Length                  16.3
Internet Key Exchange protocol          20.3.4
Internet Layer, TCP/IP                  16.2, 16.3
internet line terminator                29.3
Internet Protocol                       16.1
Internet Relay Chat Protocol            29.3
internet security: authentication       20.1
internet security: confidentiality      20.1
internet security: key management       20.1
Internet Systems Consortium             17.8
interpolation attack                    8.9
Intrusion Detection System              22.8, 23.4
intrusion prevention by log scanning    24.3
Intrusion Prevention System             22.8
InvAddRoundKey, AES                     8.4
INVALID, packet state for iptables      18.12
inverse, additive                       4.3.1, 5.3.2
inverse element (group)                 4.2
inverse mix columns, AES                8.3
inverse, multiplicative                 4.6, 5.3.2, 5.5, 5.5.1, 5.6, 5.6.2, 8.5.1, 13.6
inverse shift rows, AES                 8.3
inverse substitute bytes, AES           8.3
invisible user, IRC                     29.3
INVITE (IRC command)                    29.3
InvMixColumns, AES                      8.4
InvShiftRows, AES                       8.4
InvSubBytes, AES                        8.4, 8.5, 8.5.1, 8.5.2
IOActive                                17.13
Ion Stoica                              25.4
iOS                                     32.2, 32.4
IP                                      16.1
IP address                              17.2
IP address, fake                        16.14
IP address, host part                   16.16
IP address, network part                16.16
ip_conntrack extension module, iptables 18.12
IP header                               16.3
IP Layer, TCP/IP                        16.2, 16.3
IP, mobile                              32.10
IP mobility support                     32.10
IPS                                     22.8
IPSec                                   15.7.1, 15.8, 20.3
IPSec Authentication Header             20.3
IPSec, ESP header                       20.3
IPSec in Transport Mode                 20.3
IPSec in Tunnel Mode                    20.3
IPSec protocol                          20.1
IP source address spoofing              16.13
IP spoofing attack                      16.13
iptables                                16.3, 18.1, 24.3
iptables command                        18.11
iptables, connection tracking           18.12
iptables extension module limit         18.12
iptables extension module mac           18.12
iptables for port forwarding            18.13
iptables rule target ACCEPT             18.6
iptables rule target DNAT               18.7
iptables rule target DROP               18.6
iptables rule target MASQUERADE         18.7
iptables rule target REDIRECT           18.6, 18.7
iptables rule target REJECT             18.6
iptables rule target RETURN             18.6
iptables rule target SNAT               18.7
iptables to thwart dictionary attack    24.4
IPv4                                    16.2
IPv4 extension headers                  20.3.1
IPv4 header                             16.3
IPv4 packet header                      20.3.1
IPv6                                    16.2
IPv6 address, representations           16.3
IPv6 extension headers                  20.3.1
IPv6 header                             16.3
IPv6 packet header                      20.3.1
IRC                                     22.4
IRC channel                             29.3
IRC, channel registration               29.3
IRC Client in Perl                      29.5
ircClient.pl                            29.5
irc.freenode.net                        29.5
IRC global channel                      29.3
IRC local channel                       29.3
IRC, making a channel secret            29.3
IRC, making a user invisible            29.3
IRC message format                      29.3
IRC MODE command for secrecy            29.3
IRC network as an overlay               29.3
IRC, nick registration                  29.3
IRC PRIVMSG command for sending text    29.3
IRC protocol                            29.3
IRC secret channel                      29.3
irreducible polynomial                  6.11, 7.2, 7.5, 8.5.1
ISAKMP                                  20.3.4
ISA server, Windows web proxy           19.4
ISN                                     16.4
ISN generator                           16.4, 16.13, 16.14
ISON (IRC command)                      29.3
isResumable, SSL Session State          20.4.2
iterative name lookup                   17.6
Itsik Mantin                            9.8.2
IV                                      9.5.2, 9.5.3, 9.8, 14.1, 15.7
iwlist wlan0 scan                       9.8.3

J
Jack Huffard                            23.2.1
Jacob Appelbaum                         13.8
jailbreaking                            32.3
Jakobsen, Thomas                        8.9
J. Alex Halderman                       10.9.4, 12.8
James Bond                              30.1
James Gosling                           27.2
Jaquier, Cyril                          24.3
JavaScript, client-side form processing 28.1.1
JavaScript code for tracking cookies    28.1.1
Javascript for downloading from server  28.1.2
JavaScript highlights                   28.1, 28.2
Jean-Francois Dhem                      32.8.1
Jean-Jacques Quisquater                 32.8.1
Jean-Louis Willems                      32.8.1
Jean-Philippe Anumasson                 15.9
Jin Qian                                16.9
Joan Daemen                             8.1
Joe Stewart                             17.11
John Markoff                            30.5
John Pollard                            12.9
John Roberts, Chief Justice             32.1
Johnson, Don                            14.8.1, 14.13
JOIN (IRC command)                      29.3
join-leave churn attack (P2P)           26.8
Jon Kleinberg                           26.5
Joseph Stein                            5.4.4
JPG image format                        9.5.1
js_getdata_from_server.html             28.1.2
Justice John Roberts                    32.1

K
Kaashoek, M. Frans                      25.4
Kademlia k-bucket, P2P                  25.7
Kademlia node_lookup(key), P2P          25.7
Kademlia protocol, P2P                  25.7
Kademlia replication parameter, P2P     25.7
Karger, David                           25.4
Karsten Nohl                            32.1, 32.6, 32.9
KASUMI cipher                           32.5
k-bucket                                25.7
k-bucket, Kademlia                      25.7
KDC                                     10.1, 10.2, 10.3
KDC hierarchy                           10.2.1
Keepalive timer, TCP                    16.10
Keith Campbell                          9.2.1
Keller, Nathan                          32.5
Kerberos                                10.3
kernel, Android                         32.4
kernel module                           18.1
Kevin Mitnick                           16.13
key distribution center                 10.1, 10.2
keyed hash function                     15.8
key exchange protocol, direct           13.2
key expansion, AES                      8.2, 8.8
key legitimacy, PGP                     20.2.1
key, master                             10.1, 10.2.1
key mixing                              3.3.1
key, one-time                           10.8
key schedule, AES                       8.2
key schedule (DES)                      3.3.5
Key Scheduling Algorithm (RC4)          9.7
key, session                            10.1
key space                               2.1, 3.4
key storage format                      12.11
keystream (RC4)                         9.7
Khashmir, Kademlia in Python            25.7
KICK (IRC command)                      29.3
Kido worm                               22.6
Kiem-Phong Vo                           15.9
KILL (IRC command)                      29.3
Klein attack                            9.8.1
Kleinberg network                       26.7
Knightly, Edward                        16.11
known plaintext attack                  8.9
Knudsen, Lars                           8.1, 8.9
Kocher, Paul                            32.8
Koeune, Francois                        32.8.1
KoreK attack                            9.8.2
KPMG                                    13.4
KSA (RC4)                               9.7
Kuzmanovic, Aleksandar                  16.11

L
label, type (SELinux)                   32.4
LAN                                     9.8.1, 16.2
Landon Curt Noll                        15.9
Larry Wall                              27.2
Lars Knudsen                            8.1
Lars, Knudsen                           8.9
LAST_ACK, TCP connection state          16.7
Layer 7 DDoS attack                     29.7
LD_PRELOAD environment variable         19.2.3
leaking information anonymously         20.5
Le Disez, Erwan                         32.9
leecher, BitTorrent                     25.9
Lee Weinstein                           26.4
lemma, piling up                        8.9
Lenstra, A. K.                          32.7.1
Leonard Adleman                         12.2
Leonhard Euler                          11.3
Lerdorf, Rasmus                         27.2
Leroux, Philippe-Alexandre              32.8.1
level (SELinux)                         32.4
LFSR                                    32.5
liars and witnesses (Miller-Rabin)      11.5.6
libdigest-perl                          15.1
libdigest-sha-perl                      15.1
libdsocks.so                            19.2.3
libnet-rawip-perl package               16.15
libpcap library for packet capture      23.3.1
libssl, a component of OpenSSL          20.4
limit, an iptables extension module     18.12
linear approximation bias               8.9
linear approximation table              8.9
linear_approximation_table_generator.pl 8.9
linear attack                           8.9
linear congruential generator           10.5, 16.13
linear cryptanalysis                    8.9
Linear Feedback Shift Register          32.5
linked list (for hash-table buckets)    15.4
Link Layer, TCP/IP                      16.2
LINKS (IRC command)                     29.3
LinkSys router                          16.8
Linus Torvalds                          18.1
Linux Discretionary Access Control      32.4
Linux kernel                            9.8.3
Linux kernel mainline                   18.1
linuxwireless.org                       9.8.3
Lipton, Richard                         32.7.1
LISTEN, TCP connection state            16.7
LIST (IRC command)                      29.3
LM Hash                                 24.4
loadable kernel module                  18.1
load factor for a Java container        15.9
Local Area Network                      16.2
local channel, IRC                      29.3
local clustering in small worlds        26.4
locale                                  32.2
localhost, as a host name               16.3
location, an object in JavaScript       28.2
logging with iptables                   18.14
log scanning                            24.3
long division, polynomials              6.3
longitudinal parity check               15.4
long-range contacts, small worlds       26.4
lookahead assertions (regex)            31.5
look-behind assertions (regex)          31.5
lookup(key), DHT                        25.2
lookup table attack                     24.4
loopback address                        16.3
loopback address, IPv6                  16.3
loopback IP address                     17.4
lsmod                                   18.5
Lucifer cipher                          3.3

M
MAC address                             9.8.1, 9.8.3, 16.2, 18.12, 23.3
mac, an iptables extension module       18.12
macchanger                              9.8.3
MAC (Mandatory Access Control)          32.4
MAC (Media Access Control)              16.2
MAC (Message Authentication Code)       15.8, 16.8
Mac OS X                                16.2
magnet links, BitTorrent                25.9
Mail Delivery Agent                     31.2
maildrop                                31.2
mail exchange server                    17.2
mail exchange server in Resource Record 17.4
mailsnarf                               23.3
Mail Submission Agent                   31.2
Mail Transfer Agent                     17.2, 22.5, 31.2
Mail User Agent                         31.2
mailutils (a Gnu package)               31.2
managing cookies with JavaScript        28.1.1
Mandatory Access Control (MAC)          32.4
Mandatory Integrity Control             32.4
mangle table for firewall               18.2, 18.3, 18.8
Manindra Agrawal                        11.6
man in the middle attack                13.2, 13.4, 13.5, 13.8
MapReduce                               15.1
MaraDNS                                 17.8
Marc Briceno                            32.5.1
Marc Stevens                            13.8
Mark Baggett                            23.5
Markov-Chain Monte-Carlo estimation     26.7
MARS cipher                             8.1
Martin Roesch                           23.4
Mary Lynn Reed                          26.4
mask, subnet                            16.3
MASQUERADE                              18.7
master key                              10.1, 10.2, 10.2.1
master nameserver, DNS                  17.4
Master Secret, SSL Session State        20.4.2
matching variables (regex)              31.5
match modifiers (regex)                 31.5
MatchObject                             31.5
mathematical attack                     12.9
Matsui, Mitsuru                         8.9
maxentry (Fail2Ban)                     24.3
Maximum Transmission Unit               16.3
Maymounkov, Peter                       25.7
Mazieres, David                         25.7
MCF                                     24.5
MCMC                                    26.7
MCS (SELinux)                           32.4
MDA                                     31.2
md5_crypt                               24.5
MD5 hashing function                    13.8
Media Access Control protocol           16.2
meet in the middle attack               9.2.2
memory corruption exploit               28.5
memory stick malware                    32.9
Menezes, Alfred                         14.8.1, 14.13
message authentication                  12.1, 20.1
message authentication code             15.8
message digest                          15.1
message fingerprint                     15.1
Message Integrity Service, SSL          20.4.2
message padding for hashing             15.4
Mestre, Patrick                         32.8.1
metadata option, snort rule             23.4
Metasploit Framework                    22.8, 23.5
Metasploit Framework, create a shell    23.5
Metasploit Framework, msfencode         23.5
Metasploit Framework, reverse shell     23.5
Metasploit vis-a-vis anti-virus tools   23.5
Metropolis-Hastings (MH) algorithm      26.7
Metropolis_Hastings.pl                  26.7
M. Frans Kaashoek                       25.4
MH, an MUA                              31.2
Michael Wiener                          9.2.1
Michal Zalewski                         16.13
MiC (Mandatory Integrity Control)       32.4
microcontroller                         32.9
microkernel                             18.1
MicrosoftDNS                            17.8
Microsoft Security Bulletin             21.3.1, 22.6
Microsoft Windows                       16.2
Microsoft Windows Media DRM             14.3
middleware for generating web pages     27.1
MI (for Multiplicative Inverse)         5.5
Miller-Rabin algorithm                  11.2, 11.5
Miller-Rabin, computational complexity  11.5.7
MIME::Base64, a Perl module             31.6
MIME-compatible Base64 encoding         24.5
mini-bot bot                            29.6
miniBot.pl                              29.6
MIPS processor architecture             32.4
mIRC client                             29.3
MISTY1 cipher                           32.5
Mitre                                   23.2.2
Mitsuru Matsui                          8.9
mix columns, AES                        8.3
MixColumns, AES                         8.4, 8.7
mkfifo command                          23.6
MLS/MCS Range                           32.4
MLS (SELinux)                           32.4
MMDG, an MTA                            31.2
mobile devices, security                32.1
mobile devices, vulnerabilities         32.1
mobile IP                               32.10
mobile OS                               32.2, 32.4
mobile security, GAO report             32.1
mobility support, IP                    32.10
MODE (IRC command)                      29.3
modern deities and prophets             27.2
MODE_WORLD_READABLE                     32.4
MODE_WORLD_WRITABLE                     32.4
mod operator                            2.3
modprobe                                18.5
mod-security module for Apache server   27.8
modular arithmetic notation             5.1
Modular Crypt Format                    24.5
modular exponentiation                  12.3.2
modular exponentiation algorithm        12.5.1
modular exponentiation, decryption      12.5
modular exponentiation, encryption      12.5
modular inversion                       12.3.3
modular polynomial arithmetic           7.2
modulo addition                         5.3.2
modulo multiplication                   5.3.2
ModulusHarvestor.pl                     13.4.1
modulus polynomial                      7.3
modulus, prime                          10.5
Mohamed Ali Kaafar                      20.5
monoalphabetic cipher                   2.5
monolithic kernel                       18.1
Morris, Robert                          25.4
Morris worm                             22.5
MOV attack                              14.9, 14.10, 14.14
MOV condition                           14.14
movemail                                31.2
mprexe.dll                              30.2
Mr. BigShot                             15.6
Mr. Creepy                              15.6
MS02-004                                21.3.1
MS08-067                                22.6
MS08-067 vulnerability                  22.6
MS10-046 vulnerability                  22.7
MS10-061 vulnerability                  22.7
MSA                                     31.2
MSC (USB Device Class)                  32.9
MS-DOS PE header                        31.4
msfencode, Metasploit Framework         23.5
msfpayload, Metasploit Framework        23.5
MTA                                     17.2, 31.2
MTU                                     16.3
MUA                                     31.2
multicasting                            16.2
Multi-Category Security                 32.4
multi-character encryption              2.7
multi-layer switching                   29.7.1
Multi-Level Security                    32.4
multimedia attachments                  2.4
multiplicative identity element         5.5.1
multiplicative inverse                  4.6, 5.3.2, 5.5, 5.5.1, 5.6, 5.6.2, 8.5.1, 13.6
multiplicative inverse in GF(2^n)       7.11
Munk Center for International Studies   30.4
mutating virus                          22.1
mutex, synchronization primitive        22.6.1
Mutt, an MUA                            31.2
mutual exclusion                        22.6.1
MX record                               17.2
myfirewall.sh                           18.6
mysqladmin command                      27.4
mysql, command-line shell               27.4
MySQL database management system        27.4
mysql, system-supplied admin database   27.4
MySQL views for row-level security      27.4
MySQL with row-level security           27.4
MZ header for MS-DOS exectables         31.4

N
Nadia Heninger                          10.9.4, 12.8
named.conf config file                  17.8.1
named, DNS nameserver                   17.8.1
name resolver                           17.2, 17.3
nameserver, authoritative               17.3
NAMES (IRC command)                     29.3
names, IRC command                      29.4
name=value pairs in a cookie            28.1.1
Napster                                 25.1
Napster, central index server           25.1
NASL                                    23.2.1
NAT                                     18.7, 20.3
Nathan Evans                            25.8
Nathan Keller                           32.5
nat table for firewall                  18.2, 18.3, 18.7
nc command                              23.6
Neal Koblitz                            14.11
Needham-Schroeder protocol              10.2
Neeraj Kayal                            11.6
nessus-adduser                          23.2.2
nessus client                           23.2.1
nessusd server                          23.2.1
Nessus for SYN scanning                 23.2.3
Nessus, installation                    23.2.2
nessus-rmuser                           23.2.2
Nessus scanner                          23.2.1
Nessus scanner plugins                  23.2.1
Nessus SNMP scanning                    23.2.3
nessus-update-plugins                   23.2.1, 23.2.2
Nessus vulnerability scanner            23.2.1
NetBIOS                                 16.2
NetBIOS Share Propagation Mode          22.6
NetBT                                   16.2
netcat                                  23.6
netcat for creating a command shell     23.6
netcat for creating a reverse shell     23.6
netcat for file transfer                23.6
netcat for port redirection             23.6
netcat for port scanning                23.6
netcat for setting a chat link          23.6
netcat.openbsd                          23.6
netcat.traditional                      23.6
Net::DNS, a Perl module                 17.12
netfilter infrastructure                18.1
Net::RawIP, a Perl module               16.15, 17.12
Netscape                                20.4
netstat -n                              16.16
netstat utility                         16.7, 16.16
Network Address Translation             18.7, 20.3
network analyzer                        23.3
Network Attack Scripting Language       23.2.1
Network Basic Input/Output System       16.2
network interface                       18.1
network layer security with IPSec       20.3
Network Layer, TCP/IP                   16.2, 16.3
network security tools                  23.2.1
network shares                          22.6
Network Time Protocol (NTP)             29.7
NEW, packet state for iptables          18.12
nftables                                18.1
nick aliases, Freenode                  29.4
nick aliases, grouping                  29.4
nick authentication, Freenode           29.4
nick, IRC                               29.3
NICK (IRC command)                      29.3
Nick Mathewson                          20.5
nickname, IRC                           29.3
nick registration                       29.4
NickServ, Freenode                      29.4
Nikita Borisov                          25.11
NIST                                    3.3, 8.1, 13.6, 15.1, 15.7.1
Nitin Saxena                            11.6
nmap, a port scanner                    23.1.3
nodeID, DHT                             25.3
node identifier, DHT                    25.3
node identifier, Freenet                26.2
node in a P2P network                   25.1
node_lookup(key), Kademlia              25.7
node proximity issues, P2P              25.5
node proximity metric, Pastry           25.6
nodirect, Firefox add-on                28.1.1
Nohl, Karsten                           32.1, 32.6, 32.9
Noll, Landon Curt                       15.9
noncapturing groupings                  31.5
non-capturing groupings (regex)         31.5
nonce                                   10.2, 10.4, 13.3.1
non-delivering recipe, Procmail         31.6
nonextracting groupings                 31.5
non-greedy quantifiers (regex)          31.5
nop-sled                                28.5
notation, group                         4.2
notation, ring                          4.4
NOTICE (IRC command)                    29.3
NP, exponential-time class              11.5.7
NSCOUNT (DNS message)                   17.12
nslookup utility                        17.3, 17.5, 17.8
NS, nameserver in Resource Record       17.4
NTLM Hash                               24.4
NTLMv2 Hash                             24.4
NTP amplification attack                29.7
NTP (Network Time Protocol)             29.7
Nucrypt botnet                          29.8
null, a primitive type in JavaScript    28.2
number, a primitive type in JavaScript  28.2
number field sieve                      12.9
NXDOMAIN error                          17.2

O
OAEP                                    12.7
Oakley Key-Exchange Protocol            20.3.4
object, an object type in JavaScript    28.2
OBJECT IDENTIFIER, an ASN.1 keyword     12.11
Oecshlin, Phillipe                      24.4
OFB                                     9.5, 9.5.4
OID                                     13.9
one-time key                            10.8
OneWordSub botnet                       29.8
Onion Proxy, Tor                        20.5
Onion Router                            20.5
Onion Router, Tor                       20.5
onsubmit attribute of HTML form element 28.1.1
OPCODE (DNS message)                    17.12
open-ended small-world P2P overlay      26.1
OpenPGP                                 20.2, 20.2.1
open port                               23.1
OpenSSH, an open-source library         20.4
OpenSSL                                 12.11, 23.2.2
OpenSSL, an open-source library         13.4, 13.9, 20.4
openssl command                         13.4, 13.9
openssl genrsa command                  12.11
openssl rsa command                     12.11
Open System Interconnection             16.2
Open Web Application Security Project   28.3
operating system                        18.1
operator, commutative                   4.3
operator, group                         4.2
operator, mod                           2.3
operator, ring                          4.4.1
OPER (IRC command)                      29.3
OP, Onion Proxy                         20.5
opportunistic unchoking, BitTorrent     25.9
Options field, IP header                16.3
Options field, TCP header               16.4
order of a finite field                 7.8, 7.12
order of a group                        11.8, 13.5
order of an element                     13.5
order of an elliptic curve              14.9
order of a point on elliptic curve      14.13, 14.14
origin server                           29.7.1
OR, Onion Router                        20.5
Orr Dunkelman                           32.5
OSI                                     16.2
Oskar Sandberg                          26.7
OS, mobile                              32.2, 32.4
Outlook, an MUA                         31.2
OUTPUT chain of filter table            18.4
output differential                     8.9
output feedback mode                    32.5
output state array                      8.1
overlay network                         20.3, 25.1, 29.3
OWASP                                   28.3
Ozdok botnet                            29.8

P
P, polynomial-time class                11.5.7
P2P based C&C for botnets               29.8
P2P darknet overlay                     26.1
P2P, fault tolerance                    25.1
P2P network, churn                      25.3
P2P network, structured                 25.1, 26.1
P2P network, unstructured               25.1, 26.1
P2P overlay, open-ended small-world     26.1
P2P security, falsifying routing table  25.10
P2P security issues                     25.10
P2P, self-organizing nodes              25.1
P2P sender anonymity                    25.11
P2P, small-world                        26.1
packet filtering firewall               18.1
packet filtering for Windows            18.1
packet header, IPv4                     16.3, 20.3.1
packet header, IPv6                     16.3, 20.3.1
packet layer security with IPSec        20.3
packet sniffer, dsniff                  23.3
packet sniffing                         23.3
packet sniffing with wireshark          23.3.2
packet state ESTABLISHED, iptables      18.12
packet state ESTABLISHED, tracking      18.12
packet state INVALID, iptables          18.12
packet state NEW, connection tracking   18.12
packet state NEW, iptables              18.12
packet state RELATED, iptables          18.12
padding, a Tor control command          20.5
Padding field, ESP header               20.3.3
Padding field, IP header                16.3
Padmini Jaikumar                        29.1
pairwise coprime                        11.7
parentheses for grouping, regex         31.5
parity check                            9.8
parity check, longitudinal              15.4
PART (IRC command)                      29.3
passive CCA                             12.7
passlib (Python)                        24.5
passthru, PHP                           27.2
password change, Freenode               29.4
password cracking                       22.3, 24.4
password cracking with hash chains      24.4
password cracking with rainbow tables   24.4
password hashing schemes                24.5
passwords stored in Conficker worm      24.2
Pastry protocol, P2P                    25.6
Pastry routing table, P2P               25.6
path of trust, Freenet                  26.2
Patrick Mestre                          32.8.1
Paul Erdos                              26.4
Paul Kocher                             32.8
Paul Mockapetris                        17.2
Paul Mutton                             29.5, 29.6
Paul Syverson                           20.5
Paul Vixie                              17.8
Payload Data field, ESP header          20.3.3
payload detection option, snort rule    23.4
P-box (DES)                             3.3.1, 3.3.4
P-Box permutation (DES)                 3.3.4
pcap API                                23.3.1
Peer Certificate, SSL Session State     20.4.2
Peer Exchange protocol, BitTorrent      25.9
peer-to-peer model                      25.1
PE file format                          31.4
PEM format for certificates             13.4, 13.9
penetration testing                     23.5
Pere Manils                             20.5
Perfect Forward Secrecy                 12.6
per hop behavior                        16.3
Perl code: differential_attack_toy_example.pl 8.9
Perl code: find_differentials_correlations.pl 8.9
Perl code for AbraWorm.pl               22.4
Perl code for AES byte substitution     8.5.2
Perl code for a network client          19.3.4
Perl code for an internet server        19.3.4
Perl code for an IRC client             29.5
Perl code for a spam spewing bot        29.6
Perl code for a SYN flood DoS attack    16.15
Perl code for a virus                   22.2
Perl code for Binary GCD                5.4.4
Perl code for block encryption of an image 9.5.1
Perl code for DecryptForFun.pl          2.11
Perl code for DES encryption of an image 9.5.1
Perl code for dns_fake_response.pl      17.12
Perl code for elliptic cuves            14.8.1
Perl code for EncryptForFun.pl          2.11
Perl code for Extended Euclid's algo    5.7
Perl code for GCD                       5.4.4
Perl code for GCD for large numbers     5.4.4
Perl code for harvesting RSA moduli     13.4.1
Perl code for integer factorization     12.9
Perl code for integer factorization with Math::BigInt 12.9
Perl code for Metropolis-Hastings       26.7
Perl code for MI for large numbers      5.7
Perl code for Miller-Rabin test         11.5.5
Perl code for mounting DoS attack       16.15
Perl code for port scanning             16.15
Perl code for primality testing (large ints) 11.5.5
Perl code for SHA-1                     15.7.3
Perl code for small-world simulation    26.4
Perl code: linear_approximation_table_generator.pl 8.9
perlfaq4                                2.12
Perl regular expressions                31.5
Perl's binding operator =~              31.5
Perl's matching operator m//            31.5
permutation                             2.2
Permutation Choice 1 (DES)              3.3.5
Permutation Choice 2 (DES)              3.3.5
permutation cipher                      2.10
permutation group                       4.2.3, 9.2.1
permutation, P-Box (DES)                3.3.4
permutation set                         4.2.1
permutation step in DES                 3.2
Persist Timer, TCP                      16.6, 16.10
Peter Druschel                          25.6
Peter Maymounkov                        25.7
PEX protocol, BitTorrent                25.9
PGP                                     9.4, 15.7.1, 20.2
PGP Authentication Service              20.2
PGP Compatibility Service               20.2
PGP Compression Service                 20.2
PGP Confidentiality Service             20.2
PGP key management issues               20.2.1
PGP Segmentation Service                20.2
PGP's notion of certificate authority   20.2.1
PGP's Web of Trust                      20.2.1
PHA (Potentially Harmful App)           32.3
pharming                                17.10
phase space                             16.13
Phatbot bot                             29.8
PHB                                     16.3
PHB, Assured Forwarding (AF)            16.3
PHB, Default                            16.3
PHB, Expedited                          16.3
PHB, Voice Admit                        16.3
phenomenon, small-world                 26.3
Philip Guenther                         31.6
Philippe-Alexandre Leroux               32.8.1
Phillipe Oecshlin                       24.4
Phillip Porras                          22.6
Phil Schwartz                           24.3
Phil Zimmerman                          20.2
phishing                                17.10
PHP                                     27.1
PHP CLI                                 27.2
PHP code for file uploading             27.3
PHP Command Line Interface              27.2
PHP exploit to spew out spam            27.3
php.ini                                 27.2
PHP5, installation                      27.1
PHP, language support for databases     27.2
PHP+MySQL                               27.5
php5+mysql package                      27.5
PHP, server side scripting              27.2
PHP, system program execution functions 27.2
PHP to retrieve from MySQL database     27.5
Physical Layer, TCP/IP                  16.2, 23.3
piling-up lemma                         8.9
Pine, an MUA                            31.2
PING (IRC command)                      29.3
PKCS                                    13.4
PKCS#v1.5                               12.7
PKCS#1v2.x                              12.7
PKI                                     13.4, 20.2.1
plaintext                               2.1
plaintext-ciphertext attack             9.8.1
plaintext differential                  8.9
Playfair cipher                         2.7
Playfair cipher, security               2.7.4
PlayStation3                            14.1, 14.13
plugins for Nessus scanner              23.2.1
point at infinity, elliptic curve       14.4
pointer in Resource Record              17.4
pointer query, DNS                      17.3
point of attachment (mobility)          32.10
Pollard-lambda                          13.7
Pollard-rho                             13.7
polyalphabetic cipher                   2.9
poly_cipher.pl                          2.12
poly_cipher.py                          2.12
polynomial addition                     6.2
polynomial arithmetic                   6.1
polynomial, constant                    6.1
polynomial division                     6.2, 6.10
polynomial, irreducible                 6.11, 7.2
polynomial multiplication               6.2
polynomial, prime                       6.11
polynomial ring                         6.9, 7.1
polynomial ring over a finite field     11.6.1
polynomials, arithmetic operations      6.2
polynomials over a field                6.5
polynomials over a finite field         6.5
polynomials over GF(2)                  6.6
polynomial subtraction                  6.2
polynomial time algorithms              11.5.7
polynomial, zeroth-degree               6.1
PONG (IRC command)                      29.3
POP3                                    16.2
port 22                                 18.16, 24.1
port 23                                 21.3
port 53                                 17.8
port 113                                18.16
port 139                                16.2
port 443                                13.4.1, 19.6, 30.5
port 445                                16.2
port 848                                20.3.4
port 1080                               19.2
port 3128                               19.4.1
port 6667                               29.5
port 8501                               19.5.3
port 9000                               19.3.4
Portable Executable file format         31.4
port, closed                            16.15, 23.1
port, filtered                          23.1
port forwarding                         19.2
port forwarding on a home router        23.6
port forwarding with iptables           18.13
port, open                              16.15, 23.1
ports and services                      21.1
port scanning                           23.1
port scanning with connect()            23.1.1
port scanning with netcat               23.6
port scanning with nmap                 23.1.3
port scanning with SYN packets          23.1.2
port_scan.pl                            16.15
ports, Private                          21.1
ports, Registered                       21.1
ports, Well Known                       21.1
port unreachable ICMP message           18.2
Postfix, an MTA                         31.2
Potentially Harmful App                 32.3
Poulo-Cazajou, Benoit                   32.9
power analysis attack                   32.6
PPM image format                        9.5.1
PPP                                     16.2
pq-prime                                12.9
Preamble field, Ethernet frame          23.3
predecessor pointer, Chord              25.4
preferential attachment                 26.4
preprocessor, hypertext                 27.2
PREROUTING chain of mangle table        18.2
Presentation Layer, TCP/IP              16.2
Pretty Good Privacy                     20.2
primality testing                       11.2
primality testing, probe                11.2
primary DNS nameserver                  17.6
prime finite field                      5.5, 14.8
PrimeGenerator.py                       12.13
prime modulus                           10.5
prime number, definition                11.1
prime polynomial                        6.11
prime, relative                         5.3.2, 5.5, 11.1
primitive root modulo n                 11.8
Printer (USB Device Class)              32.9
privacy and anonymity                   25.11
Privacy Enhanced Mail                   13.9
Private Key Ring                        20.2.1
private networks                        18.3
private networks, Class A               18.3
private networks, Class C               18.3
PRIVMSG (IRC command)                   29.3
PRNG                                    10.5, 10.8, 16.13
probe for primality testing             11.2
Procmail, an MDA                        31.2
procmail command for testing recipes    31.6
.procmailrc file                        31.2
.procmailrc file composition            31.6
Procmail recipe, the three parts        31.6
/proc/sys/kernel/random/entropy_avail   10.9.1
/proc/sys/kernel/random/poolsize        10.9.1
producer trust, PGP                     20.2.1
product tree                            12.8
program crashing with segfault          21.6
promiscuous mode, interface operation   23.3
prophets                                27.2
protocol analyzer                       23.3
Protocol field, IP header               16.3
protocol field, IPv4                    20.3.1
protocol, GDOI                          20.3.4
protocol number 51                      20.3.1
protocol number 50                      20.3.1
proverbial visitor from Mars            32.1
proxy, anonymizing                      19.1
proxy, circuit-level                    19.2.2
proxy for caching web objects           19.1
proxy protocol, generic                 19.2
proxy, reverse                          19.3.1
proxy server, anonymizing               19.4
proxy-server firewall                   18.1
proxy server, high anonymity            19.3.3
PS3, code authentication                14.13
pseudo header, TCP                      16.4
pseudorandom bit generator              10.7
pseudorandom byte stream                9.6, 9.7
pseudorandom number generator           10.5, 16.13
pseudorandom numbers                    10.4.1
pseudorandom sequence                   9.6
PSH bit, TCP header                     16.4
PS3 (PlayStation3)                      14.1
ptrace                                  32.4
PTW attack                              9.8.1, 9.8.2
public key, authenticated               13.3
public key authentication               13.3
public-key cryptography                 2.1, 12.1
Public Key Cryptography Systems         13.4
Public Key Infrastructure               13.4
Public Key Ring                         20.2.1
pull mode for bot commands              29.2
PurdueCompsec IRC channel               29.4
push mode for bot commands              29.2
Python client code for fetching a single doc 27.7
Python code for AbraWorm.py             22.4
Python code for AES byte substitution   8.5.2
Python code for AES key expansion       8.8.2
Python code for an internet server      19.3.4
Python code for a virus                 22.2
Python code for Binary GCD              5.4.4
Python code for block encryption of an image 9.5.1
Python code for DecryptForFun.py        2.11
Python code for DES encryption of an image 9.5.1
Python code for dns_fake_response.py    17.12
Python code for elliptic curves         14.8.1
Python code for EncryptForFun.py        2.11
Python code for Extended Euclid's algo  5.7
Python code for extracting info from public key 12.11
Python code for GCD                     5.4.4
Python code for generating primes       12.13
Python code for harvesting RSA moduli   13.4.1
Python code for integer factorization   12.9
Python code for MI in GF(2^n)           7.11
Python code for Miller-Rabin test       11.5.5
Python code for network client          19.3.4
Python code for Pollard-rho             12.9
Python code for port scanning           16.15
Python code for prime number generation 12.13
Python code for SHA-1                   15.7.3
Python code for SYN flood DoS attack    16.15

Q
QCLASS (DNS message)                    17.12
QDCOUNT (DNS message)                   17.12
Qmail, an MTA                           31.2
QNAME (DNS message)                     17.12
QR (DNS message)                        17.12
QTYPE (DNS message)                     17.12
quad-dotted notation for IPv4 addresses 16.3
quadratic form                          14.3
quadratic sieve                         12.9
quantifier metacharacters (regex)       31.5
query strings in URL syntax             28.4
Question section (DNS)                  17.12
Quisquater, Jean-Jacques                32.8.1
QUIT (IRC command)                      29.3
quit, IRC command                       29.4
quotient                                6.3

R
RA (DNS message)                        17.12
Rainbow Skip Graph protocol, P2P        25.8
rainbow table attack                    24.4
Ralf-Philipp Weinmann                   9.8.2
Ralph Langner                           22.7
Ralph Merkle                            15.7
random graph, clustering coefficient    26.4
random graph, diameter                  26.4
randomized algorithm                    11.5.7
randomized polynomial time              11.5.7
randomized test                         11.6
random number generation                10.4
random numbers, crypto secure           10.5
random numbers, true                    10.4.1
random seek time                        19.4.1
RA, Registration Authority              13.3
Rasmus Lerdorf                          27.2
RAT management tool                     30.3
RAT, Remote Administration Tool         30.3
raw socket                              16.14, 16.15
raw table for firewall                  18.2, 18.3, 18.9
RBAC (SELinux)                          32.4
rBot/RxBot bot                          29.8
rbp, a 64-bit x86 register              21.4
RC4 algorithm                           9.7
RC6 cipher                              8.1
RCODE (DNS message)                     17.12
RC4 stream cipher                       9.7
RDATA (DNS message)                     17.12
RD (DNS message)                        17.12
RDLENGTH (DNS message)                  17.12
re, a Python module for regex matching  31.5
recipe, Procmail                        31.6
recipes in nested blocks, Procmail      31.6
recording terminal session              12.5.1
Record Protocol, SSL                    20.4, 20.4.2
recursive acronym                       27.2
recursive DNS query                     17.7.1
Recursive Nameserver                    17.4
REDIRECT                                18.7
regex based filtering of spam           31.1
regexp                                  31.5
register                                21.4
registering a channel, IRC              29.3
registering a nick, IRC                 29.3
registration authority                  13.3
regular expressions, Perl               31.5
regular expressions used by Procmail    31.5
REHASH (IRC command)                    29.3
Reka Albert                             26.4
RELATED, packet state for iptables      18.12
relational algebra                      27.4
relational database                     27.4
relation (in a database)                27.4
relationship, affine                    8.9
relatively prime                        5.3.2, 5.5, 11.1
relay connected, Tor                    20.5
relay data, Tor                         20.5
relay end, Tor                          20.5
relay extended, Tor                     20.5
relay extend, Tor                       20.5
relay sendme, Tor                       20.5
relay teardown, Tor                     20.5
relay torpacket                         20.5
relay truncated, Tor                    20.5
relay truncate, Tor                     20.5
reliable protocol                       16.4
remainder, modular arithmetic           5.1
remainders, set of                      5.2
remainder tree                          12.8
remote administration tool, RAT         30.3
Remote Procedure Call                   22.6
remote scripting                        28.1.2
remote security scanner                 23.2.1
remote socket                           16.5
Renaud Deraison                         23.2.1
rendezvous point                        22.6.1
Renyi, Alfred                           26.4
replay attack                           9.8.3, 10.2, 16.17, 20.3.2
replicating content, Chord protocol     25.4
replication parameter, Kademlia         25.7
Reserved field, TCP header              16.4
residue                                 5.2
residues, set of                        5.2
resource exhaustion attack              29.7
Resource Record                         17.4
Resource Record (DNS)                   17.12
RESTART (IRC command)                   29.3
Retransmission Timeout, TCP             16.11
retransmission timer                    16.11
Retransmission Timer, TCP               16.10
RetrieveFromMySQL.php                   27.5
reverse DNS lookup                      17.3
reverse proxy                           19.3.1
reverse record, DNS                     17.4
reverse-shell vs. shell                 23.6
rewiring, small world simulations       26.4
rexec                                   22.3
RFC 792                                 16.2
RFC 793                                 16.4, 16.9
RFC 1421                                13.4
RFC 1459                                29.3
RFC 1918                                17.8.1
RFC 1928                                19.1
RFC 1948                                16.13
RFC 2186                                19.4
RFC 2187                                19.4
RFC 2246                                20.4, 20.4.1
RFC 2581                                16.11
RFC 2597                                16.3
RFC 2671                                29.7
RFC 2810                                29.3
RFC 2827                                16.13, 16.14
RFC 2988                                16.11
RFC 3246                                16.3
RFC 3260                                16.3
RFC 3447                                12.11
RFC 4253                                12.11
RFC 4303                                20.3.3
RFC 4716                                12.11
RFC 4880                                20.2, 20.2.1
RFC 5280                                13.4
RFC 5996                                20.3.4
RFC 6407                                20.3.4
RFC 6520                                20.4.1, 20.4.4
RFC 6582                                16.11
RFC 6633                                16.2
RFC 6818                                13.4
RFC Convert::ASN1, a Perl module        12.11
RFC pyasn1, a Python library            12.11
Richard Brent                           12.9
Richard DeMill                          32.7.1
Richard Lipton                          32.7.1
Richard Stallman                        27.2
Rick Adams                              17.8
Rijmen, Vincent                         8.1
Rijndael cipher                         8.1, 8.9
ring                                    4.4
ring, commutative                       4.4.3, 4.5, 6.9
ring lattice                            26.4
ring notation                           4.4
ring, polynomial                        6.9, 7.1
Ritchie, Dennis                         27.2
rlogin                                  17.3
rlogind server                          17.3
Robert Morris                           25.4
Roger Dingledine                        20.5
Role-Based Access Control               32.4
role (SELinux)                          32.4
Ron Gula                                23.2.1
Ron Rivest                              12.2
root app                                32.4
root CA                                 13.3, 13.4, 13.8
root DNS nameserver                     17.3, 17.4
rooting app                             32.2
root key (WEP)                          9.8, 9.8.1
Ross Anderson                           8.1, 30.2, 30.4
rotated-XOR hash algorithm              15.4
roulette wheel                          10.4.1
round key (AES)                         8.3, 8.8
round key (DES)                         3.2.1, 3.3.5
Round-Trip Time Variation               16.11
Round-Trip Transmission Time, TCP       16.11
router                                  9.8
router, edge                            16.14
routing, anonymized                     20.5
routing table                           16.16, 25.2
routing table, Chord                    25.4
routing table, Pastry                   25.6
row-level database security             27.4
Rowstron, Antony                        25.6
ROXR hash algorithm                     15.4
RPC                                     22.6
RP (randomized polynomial time)         11.5.7
RR (DNS)                                17.4, 17.12
RSA                                     12.2, 20.5
RSA-200                                 12.10
RSA-576                                 12.10
RSA-640                                 12.10
RSA-704                                 12.10.1
RSA-768                                 12.10.1
RSA-896                                 12.10.1
RSA-1024                                12.10.1
RSA-1536                                12.10.1
RSA-2048                                12.10.1
RSA algorithm                           12.2
RSA algorithm, calculating private d    12.3.3
RSA algorithm, choosing public e        12.3.2
RSA algorithm, computational steps      12.3
RSA algorithm, proof                    12.2.3
RSA, a toy example for block encryption 12.4
RSA Factorization Challenge (old)       12.10
RSA Labs                                12.10
RSA scheme                              12.7
RSA security                            12.8, 12.9
RSG protocol, P2P                       25.8
rsh                                     22.3, 22.5
rsp, a 64-bit x86 register              21.4
RST bit, TCP header                     16.4
RST packet                              16.13, 16.14
rsync utility                           19.6
RTO (Retransmission Timeout), TCP       16.11
RTT                                     16.11
RTT (Round Trip Time), TCP              16.11
RTTVAR                                  16.11
rulesets for intrusion detection        23.4
rule specification in inversion         18.11
rumor propagation in P2P networks       26.9
RunGatherd                              19.5.2
RunGatherer                             19.5.2
run-time stack                          21.4
Rustock botnet                          29.1, 29.8

S
S-addr field, Ethernet frame            23.3
Safety Net (Android)                    32.3
SA for a packet                         20.3.2
salt                                    24.5
Samba (SMB protocol)                    16.2
Samy worm                               28.1.2
Sandberg's decentralized routing        26.7
sandbox                                 32.4
sandboxing an app                       32.4
San Diego                               16.13
SA (Security Association)               20.3.4
/sbin/init                              32.4
S-box (DES)                             3.3.1
SCADA for factory control automation    22.7
scale-free graphs                       26.4
scanning for vulneratibilities          23.2
scapy, a python module                  16.15
schema (a database concept)             27.4
scheme, RSA                             12.7
Schneier, Bruce                         8.1
Schwartz, Phil                          24.3
Scott Fluhrer                           9.8.2
Scott Vanstone                          14.8.1, 14.13
screen, an object in JavaScript         28.2
scripting, remote                       28.1.2
Scripting with Objects                  16.15
search.cpan.org                         15.1
SecDev Group                            30.4
secondary DNS nameserver                17.6
secret channel, IRC                     29.3
secret key                              2.1
secret session key                      13.1
Secure Hash Algorithm                   15.1, 15.7.1
secure hashing                          15.3
Secure MIME                             9.4
Secure Socket Layer                     16.2, 20.4
security association                    20.3.4
Security Association                    20.3.2
security by obscurity                   32.1
security, information                   20.1
security issues, DHT routing            25.10
security issues, Freenet routing        26.8
security issues, structurd P2P          25.10
security issues, unstructurd P2P        26.8
Security Parameter Index, AH header     20.3.2
Security Parameter Index, ESP header    20.3.3
security scanner                        23.2
security services, application layer    20.1
security services, packet layer         20.1
security services, transport layer      20.1
security vulnerability scanner          23.2
seed                                    10.5
seeder, BitTorrent                      25.9
segfault                                21.6
Segmentation Service, PGP               20.2
segment, TCP                            16.6
SELECT * FROM (MySQL)                   27.4
SELECT (MySQL)                          27.4
self, an object in JavaScript           28.2
SELF file format                        14.1
self-replicating code, virus            22.2
self-selection mechanism                26.3
SELinux                                 32.4
SELinux context                         32.4
SELinux versus AppArmor                 32.4
semiprime                               12.9
sender anonymity, P2P                   25.11
sender authentication                   20.1
Sender Maximum Segment Size             16.11
sendmail                                17.2, 22.5, 27.3, 31.2
SEQUENCE, an ASN.1 keyword              12.11
sequence, full-period                   10.5
Sequence Number field, AH header        20.3.2
Sequence Number field, TCP header       16.4
Sequence Number, TCP header             16.4
sequence, pseudorandom                  9.6
Serpent cipher                          8.1
server authentication                   12.6
server buffer, WeeChat                  29.4
server-client authentication            20.4
server, daemon                          21.1
server, Dante                           19.2.3
server_hello message, SSL handshake     20.4.3
SERVER (IRC command)                    29.3
server_key message, SSL handshake       20.4.3
server-only authentication              20.4
server-side cross-site                  28.1
server-side cross-site attack           27.3
server-side XSS attack                  27.3
server-to-server synchronization, IRC   29.3
Server Write Key                        20.4.2
Server Write MAC Secret                 20.4.2
services and ports                      21.1
session identifier                      10.2
Session Identifier, SSL Session State   20.4.2
session key                             10.1, 20.2
session key, secret                     13.1
session layer firewall                  19.1
Session Layer Security                  20.4
Session Layer, TCP/IP                   16.2
session state, SSL                      20.4.2
setenforce (SELinix)                    32.4
set of remainders                       5.2
set of residues                         5.2
SET PASSWORD (MySQL)                    27.4
setuid                                  17.9
SHA                                     15.7.1
SHA-1                                   15.1, 15.7.3
SHA-1 for content keys in Chord         25.4
SHA-1 for nodeID in Chord protocol      25.4
SHA-1 (Perl code)                       15.7.3
SHA-1 (Python code)                     15.7.3
SHA-2                                   15.7.1
SHA-384                                 15.7.1
SHA-256                                 15.7.1
SHA-512                                 15.1, 15.7.1, 15.7.2
sha, a Python module                    15.1
sha1_crypt                              24.5
Sha2Crypt.java                          24.6
sha256_crypt                            24.5
sha512_crypt                            24.5
ShadowBT                                25.9
Shadow network                          30.4
Shadows in the Cloud report             30.4
Shamir, Adi                             8.9
SharkPy, Kademlia in Python             25.7
shell-exec command, PHP                 27.2
shell script for recording server timeouts27.7
shell script for terminating processes  27.7
shell vs. reverse-shell                 23.6
Sherman brothers                        26.3
shift rows, AES                         8.3
ShiftRows, AES                          8.4, 8.6
shim layer firewall                     19.1
Shishir Nagaraja                        30.2, 30.4
SHOW GRANTS (MySQL)                     27.4
SHoW TABLES (MySQL)                     27.4
shrew DDoS attack                       29.7
Shrew DoS attack                        16.11
side-channel attack                     12.5, 32.6
sideloading                             32.3
sieve-based method for factorization    12.9
sieve of Eratosthenes                   12.9
Signed Executable and Linkabe Format    14.1
silly_hash2 Perl script                 25.2
silly little bot                        29.6
Simple Network Management Protocol      23.2.3
simultaneous-open handshake             16.9
simultaneous-open handshake for TCP     16.9
singular curves                         14.3
singular elliptic curve                 14.5
siniStar (of IRC4Fun)                   29.8
sinkholes, DNS                          30.4
SipHash                                 15.9
Sirius living incognito                 17.1
six degrees of separation               26.3
Skype                                   16.3
Slammer worm                            22.5
slave nameserver, DNS                   17.4
SLIP                                    16.2
Slowloris DoS attack                    27.7
SlowPOST attack                         27.7
Slow-Start Phase, TCP                   16.11
Slow-Start Treshold, TCP                16.11
Smail, an MTA                           31.2
small-world, computer simulation        26.3
small-world networks, routing           26.5
small-world phenomenon                  26.3
small_world.pl                          26.4
small-world P2P                         26.1
small-world P2P overlays                26.1
small-world simulation, Perl code       26.4
small worlds, local clustering          26.4
small worlds, long-range contacts       26.4
smart cards                             14.1
smart cards, contactless                14.1
Smart Card (USB Device Class)           32.9
SMB                                     16.2
S/MIME                                  9.4, 15.7.1
Smoothed Round-Trip Time, TCP           16.11
SMSS                                    16.11
SMTP                                    16.2, 17.2
SNAT                                    18.7
sndvol.exe                              30.2
sneak ACK attack                        16.9
SNMP                                    23.2.3
snort for intrusion detection           23.4
snort rule, flowbits option             23.4
snort rule, flow option                 23.4
snort rule, metadata option             23.4
snort rule, payload detection option    23.4
snort rulesets                          23.4
SOA (Start of Authority)                17.6
social engineering based attack         30.1
SOCK_DGRAM, socket type                 16.14, 16.15
socket                                  16.5
socket, AF_INET                         16.14, 16.15
socket, AF_UNIX                         16.14, 16.15
socket, a python module                 16.15
socket attributes                       16.14, 16.15
socket domain                           16.14, 16.15
socket number                           21.3
socket protocol                         16.14, 16.15
socket, raw                             16.14, 16.15
socket type                             16.14, 16.15
SOCK_RAW, socket type                   16.14, 16.15
SOCKS5                                  19.2.1
SOCKS                                   19.2
SOCKS4                                  19.2.1
SOCKS client                            19.2
SOCKS, for Windows platform             19.2.3
socksifying a client call               19.2
socksifying an application              19.2.3
SOCKS server                            19.2
SOCK_STREAM, socket type                16.14, 16.15
SOHO                                    9.8
SOIF format                             19.5.2
Source Address field, IP header         16.3
Source Address field, IPv6 header       16.3
source address spoofing                 16.13
source code exposure vulnerability      28.6
source, entropy                         10.8
Source Port, TCP header                 16.4
source quench messages, ICMP (deprecated)16.2
source socket                           16.5
Spafford, Eugene                        22.5
spam, as a source of malware            31.1
spam, Bayesian filters                  31.1
spambot                                 31.1
spam filter effectiveness, definition   31.1
spam filtering                          31.1
spam spewing bot                        29.6
Spamthru botnet                         29.8
spanning tree                           29.3
Spartacus attack                        25.10
specifying alternatives, regex          31.5
SPI                                     20.3.2
split-handshake attack                  16.9
split-handshake for TCP                 16.9
spoofed email with attachment           30.1
spoofing, IP source address             16.13
spoofing set                            16.13, 17.12
SQL injection attack                    27.5, 27.6
SQL injection vulnerability             27.5, 27.6, 28.6
SQlite                                  32.4
SQlite database (Android)               32.4
squid3                                  19.4.1
Squid as anonymizing HTTP proxy         19.4
Squid cache manager                     19.4.2
Squid for web caching                   19.4
Squid proxy server, configuration       19.4.3
Squid, version 3                        19.4.1
SQUIT (IRC command)                     29.3
Srizbi botnet                           29.8
SSH                                     15.7.1, 16.2, 17.3, 22.3, 24.1
SSH, confidentiality                    16.8
ssh-keygen                              12.11
ssh-keygen command                      12.11
SSH, maintaining data integrity         16.8
sshmitm                                 23.3
ssh-proxy                               19.6
SSH, server authentication by client    16.8
SSH tunneling through HTTP proxy        19.6
SSID                                    9.8
SSL                                     15.8, 16.2, 20.4
SSL Alert Protocol                      20.4
SSL Cipher Exchange Protocol            20.4
SSL Connection                          20.4.1
SSL connection state                    20.4.3
SSL handshake, client_hello message     20.4.3
SSL handshake, finished message         20.4.3
SSL Handshake protocol                  20.4
SSL Handshake Protocol                  20.4.3
SSL handshake, server_hello message     20.4.3
SSL handshake, server_key message       20.4.3
SSL, Heartbeat Extension                20.4.1, 20.4.4
SSL, Heartbleed bug                     20.4.4
SSL record                              20.4.2
SSL Record Protocol                     20.4, 20.4.2
SSL Session                             20.4.1
SSL session state                       20.4.2
SSL/TLS                                 9.7, 13.4, 15.7.1, 16.2, 20.4
SSL/TLS, Heartbeat Extension            12.6, 20.4.1, 20.4.4
SSL/TLS, Heartbleed bug                 20.4.4
SSTHRESH                                16.11
stack frame                             21.4
stack pointer                           21.4
Stallman, Richard                       27.2
Stanley Milgram                         26.3
Starbuckaroo coffee shop                17.1
Starbucks coffee shop                   16.14
StartMonitorModeInterface.sh            9.8.3
Start of Authority, DNS                 17.6
state array, AES                        8.1, 8.6
state array, input                      8.1
state array, output                     8.1
state extension module, iptables        18.12
state of a packet, connection tracking  18.12
state transitions, TCP                  16.7
state vector (RC4)                      9.7
statistical attack                      2.6
STATS (IRC command)                     29.3
Stavrou, Angelos                        32.9
stealing cookies with XSS               28.4
Stefano Di Paola                        28.1
Stein's Algorithm                       5.4.4
Stephanie Blanchet Hoareau              32.9
Stephen R. van den Berg                 31.6
Steven Hiscocks                         24.3
Stevens Le Blond                        20.5
Steven Strogatz                         26.3, 26.4
Stoica, Ion                             25.4
stored procedure exploits               27.6
Storm botnet                            29.8
St. Petersburg                          11.3
stream cipher                           2.1, 9.5.3, 9.6, 32.5
stresser, botnet                        29.7
string, a primitive type in JavaScript  28.2
Strogatz, Steven                        26.4
Stroustrup, Bjarne                      27.2
structured P2P overlay                  25.1, 26.1
structure of an email                   31.3
structure of Ethernet frame             23.3
Stuxnet worm                            22.7
SubBytes, AES                           8.4, 8.5, 8.5.1, 8.5.2
subgroup, cyclic                        13.5
subnet                                  9.8
subnet mask                             9.8, 16.3, 16.16
suboption `--limit' for limit module    18.12
suboption `--state', iptables           18.12
substitute bytes, AES                   8.3
substitution                            2.2
substitution box (DES)                  3.3.1
substitution cipher                     2.3
substitution rules, Playfair cipher     2.7.2
substitution step (DES)                 3.2
substitution tables (DES)               3.3.3
successor(key), Chord                   25.4
successor pointer, Chord                25.4
Summary Object Interchange Format       19.5.2
SUMMON (IRC command)                    29.3
Sun Tsu Suan-Ching                      11.7
supersingular elliptic curve            14.9
supersingularity                        14.9
Supreme Court, United States            32.1
svchost.exe                             22.6, 22.6.1
Swahili angle                           2.4
swarm, BitTorrent                       25.9
switching buffers, WeeChat              29.4
Switzerland                             11.3
SwO                                     16.15
Sybil attack                            25.10
symbolic hostname                       17.2
symmetric-key cryptography              2.1, 3.1
SYN/ACK packet                          16.4, 16.13, 16.14
Synaptic Package Manager                9.8.3, 16.15, 27.1, 28.6
SYN bit, TCP header                     16.4
SYN flood attack                        16.12
SYN flooding                            16.12
SYN flooding attack                     16.14
SYN packet                              16.4, 16.13, 16.14, 18.2
SYN_RCVD, TCP connection state          16.16
SYN_RECD, TCP connection state          16.7
SYN scanning                            16.12
SYN_SENT, TCP connection state          16.7, 16.14, 16.16
sys/socket.h header file                23.1.1
SYSTEM account (Windows)                32.4
system command, PHP                     27.2
system program execution functions, PHP 27.2
system restore point                    22.6

T
table, linear approximation             8.9
Taher ElGamal                           13.6
Takedown, a book and movie              16.13
Tanenbaum, Andrew                       18.1
Tapestry protocol, P2P                  25.8
target, action part of iptables rule    18.6
targeted attack                         30.2, 32.1
TBSertificate                           13.4
TC (DNS message)                        17.12
TCP                                     16.1
TCP checksum calculation                16.4
TCP datagram                            16.6
tcpdump                                 16.15
tcpdump command lines                   16.8
tcpdump packet sniffer                  16.8, 17.3, 23.3.1
TCP flow                                16.11
TCP header                              16.4
TCP_HIT                                 19.4.1
TCP/IP protocol stack                   16.1, 16.2
TCP_MISS                                19.4.1
TCP_REFRESH_HIT                         19.4.1
TCP segment                             16.6
TCP, simultaneous-open handshake        16.9
TCP socket                              16.14, 16.15
TCP, split-handshake                    16.9
TCP state exhaustion DDoS attack        29.7
TCP state transitions                   16.7
TCP SYN flood attack                    16.12
TCP timers                              16.10
TCP vs. IP                              16.5
TCP vulnerabilities                     16.12
telnetd daemon                          21.3
telnet service                          21.3
TE (SELinux)                            32.4
test, deterministic                     11.6
testing for primality                   11.2
test, randomized                        11.6
TGS (Kerberos)                          10.3
TGT (Kerberos)                          10.3
The New York Times                      11.6, 30.5
thermal noise                           10.4.1
The Snooping Dragon report              30.4
Thomas Jakobsen                         8.9
three-headed dog                        10.3
three-way handshake, TCP                16.4, 16.7
Thunderbird, an MUA                     31.2
Ticket Granting Server (Kerberos)       10.3
Ticket-Granting Ticket (Kerberos)       10.3
Tim Berners-Lee                         27.2
Time Exceeded, ICMP                     16.2
TIME (IRC command)                      29.3
time-memory tradeoff attack             2.1
timer, retransmission                   16.11
timers, TCP                             16.10
Time To Live                            16.2
Time To Live field, IP header           16.3
TIME_WAIT, TCP connection state         16.7
timing attack                           12.5, 32.6
TimingAttackDemo.py                     32.8
timing attacks                          32.8
TLS                                     16.2
TLS, Heartbeat Extension                20.4.1, 20.4.4
TLS, Heartbleed bug                     20.4.4
/tmp                                    27.3
Tod Beardsley                           16.9
ToorCon Conference                      17.13
TOPIC (IRC command)                     29.3
Top 100 network security tools          23.2.1
topology attack, P2P                    25.10
Tor cell                                20.5
Tor circuit                             20.5
Tor end-to-end circuit                  20.5
torpacket, control                      20.5
torpacket, relay                        20.5
torpacket, Tor                          20.5
Tor protocol                            20.5
torrent file, BitTorrent                25.9
Tor stream                              20.5
Tor torpacket                           20.5
Torvalds, Linus                         18.1
TOS                                     18.8
Total Length field, IP header           16.3
totient                                 11.3, 12.2
totient function                        11.3
TRACE (IRC command)                     29.3
traceroute utility                      16.2, 16.16
tracker, BitTorrent                     25.9
trackerless mode, BitTorrent            25.7
Tracking GhostNet report                30.4
traffic analysis attack                 20.5
traffic flow                            16.11
Transaction ID (DNS)                    17.3, 17.11
transaction identifier                  13.3.1
Transmission Control Protocol           16.1
transport layer firewall                19.1
Transport Layer Security                16.2, 20.4
Transport Layer, TCP/IP                 16.2
Transport Mode for IPSec                20.3
transposition                           2.2
transposition techniques                2.10
trapdoor function                       12.9
tree of zones, DNS                      17.4
Trend Micro                             22.7
Tresys Technologies                     32.4
trigram                                 2.6.1
triple DES                              3.3, 10.6, 20.2
triple DES with three keys              9.4
triple DES with two keys                9.3
TRNG                                    10.8
trojan                                  30.2
trojan, Aurora                          30.5
trojan, embedded                        30.2
trojan, gh0stRAT                        30.1, 30.3
trojan, Hydraq                          30.5
trojan, ie0199.exe                      30.2
troubleshooting networks with netstat   16.16
truly random numbers                    10.4.1
Tsutomu Shimomura                       16.13
TTL (DNS)                               17.4, 17.7.1
TTL (DNS message)                       17.12
TTL for data objects, Freenet           26.2
TTL (IP)                                16.2, 18.8
tunnel, GRE                             29.7.1
tunneling                               19.2
Tunnel Mode for IPSec                   20.3
tuple (in a relational database)        27.4
Twofish cipher                          8.1
TYPE (DNS message)                      17.12
Type Enforcement                        32.4
type labels (SELinux)                   32.4
type of Resource Record                 17.4
Type of Service, IP header              16.3, 18.8
type (SELinux)                          32.4

U
UDP                                     16.1, 17.3
UDP header                              17.3
UDP scan                                23.1.3
Ulrich Drepper                          24.5, 24.6
ultrafast gamma-particle based internet 17.1
uname -a                                21.6
uname -m                                21.6
uniform distribution                    10.4.1
United States Supreme Court             32.1
universal XSS                           28.1
University of Cambridge                 30.2, 30.4
University of Edinburgh                 26.1
University of Toronto                   30.4
Unix                                    16.2
Unix regular expressions                31.5
unreliable protocol                     16.3
unstructured P2P overlay                25.1, 26.1
untargeted attack                       32.1
uploadfile.php                          27.3
UploadYourWebPage.html                  27.3
URG bit, TCP header                     16.4
Urgent Pointer field, TCP header        16.4
urlsnarf                                23.3
URL syntax, query string                28.4
USB                                     16.2
USB device classes                      32.9
USB Hub (USB Device Class)              32.9
USB propagation mode for malware        22.6
US-CERT                                 17.13, 21.3.1, 30.2
USE (MySQL)                             27.4
Usenix Security Symposium 2004          20.5
Usenix Security Symposium 2012          10.9.4, 12.8
User Datagram Protocol                  16.1
USERHOST (IRC command)                  29.3
USER (IRC command)                      29.3
user `nobody'                           17.9, 19.4.2
USERS (IRC command)                     29.3
user `www'                              17.9
US Government Accountability Office     32.1
UsingDevRandom.pl                       10.9.1
using Procmail for spam filtering       31.6
/usr/lib/cgi-bin                        28.4
UXSS                                    28.1

V
van Rossum, Guido                       27.2
Vanstone, Scott                         14.8.1, 14.13
variable key-length cipher              9.7
/var/log/apache2/access.log             27.8
/var/log/auth.log                       24.1
/var/log/denyhosts                      24.3
/var/log/mail.log                       27.3
/var/log/squid3/cache.log               19.4.1
Verify Apps (Android)                   32.3
VeriSign                                13.4, 13.8
version field, IP header                16.3
VERSION (IRC command)                   29.3
Viceroy protocol, P2P                   25.8
Victor Miller                           14.11
view as a result table in MySQL         27.4
view for row-level security in MySQL    27.4
Vigenere cipher                         2.9
Vigenere cipher, security               2.9.1
Vincent Rijmen                          8.1
Vinod Yegneswaran                       22.6
virtual hosting                         17.2
Virtual Private Network                 20.3
virus                                   22.1
virus, anatomy                          22.2
virus, mutating                         22.1
virus payload                           22.1
virus, self-replicating code            22.2
Voice Admit PHB                         16.3
Voice over IP                           16.3
VoIP                                    16.3
Vo, Kiem-Phong                          15.9
volumetric DDoS attack                  29.7
VPN                                     20.3, 20.3.4
vulnerabilities, browser                28.3
vulnerabilities (TCP)                   16.12
vulnerability, buffer overflow          21.2, 22.3, 23.1
vulnerability, MS10-046                 22.7
vulnerability, MS08-067                 22.6
Vulnerability Note VU#881872            21.3.1
vulnerability scanning                  23.2
vulnerability, source code exposure     28.6
vulnerability, split-handshake          16.9
vulnerability, SQL injection            27.5, 27.6, 28.6
vulnerability, Windows shortcut         22.7

W
Wade Alcorn                             28.3
w3af framework                          28.6
w3af-users-guide.pdf                    28.6
Wagner, David                           32.5.1
wakelock                                32.4
Walid Dabbous                           20.5
Wall, Larry                             27.2
WALLOPS (IRC command)                   29.3
Walt Disney Studios                     26.3
Wang, Zhaohui                           32.9
Watts, Duncan                           26.4
Watts-Strogatz simulation (P2P)         26.3
weak keys                               8.8.1
WealthTracker.cgi                       28.4
WealthTracker.html                      28.1.1
web caching                             19.4
web of trust, Freenet                   26.2
web security                            27.1
webspy                                  23.3
WeeChat, channel buffer                 29.4
weechat-curses                          29.4
WeeChat IRC Client                      29.4
WeeChat, server buffer                  29.4
Weierstrass equation                    14.3
Weil descent attack                     14.14
WEP                                     9.7, 9.8, 9.8.3
WEP root key                            9.8.1
WFP                                     18.1
wget()                                  27.3
Whirlpool hash function                 15.7
white listing the DLLs                  22.8
WHO (IRC command)                       29.3
whois (Fail2Ban)                        24.3
WHOIS (IRC command)                     29.3
whois utility                           17.5
WHOWAS (IRC command)                    29.3
WiFi                                    9.7, 9.8, 16.2
WiFi interface                          16.2
WiFi Protected Access                   9.7
Willems, Jean-Louis                     32.8.1
Wilson, Brandon                         32.9
Wincap library for packet capture       23.3.1
window, an object in JavaScript         28.2
Window field, TCP header                16.4, 16.6
Windows .exe file format                14.1
Windows Filtering Platform              18.1
Windows Media framework                 14.15
Windows Phone OS                        32.2, 32.4
Wireless Access Point                   9.8.3
wireless driver                         9.8.3
Wireless Equivalent Privacy             9.7
wireless interface                      9.8.3
wireless LAN                            9.7
wireless range                          9.8
wireless sensor networks                14.1
wireshark for packet sniffing           23.3.2
wlan0                                   9.8.3
WM-DRM                                  14.15
Wopla botnet                            29.8
word, AES                               8.1
word_match.pl                           31.5
word_match.py                           31.5
worm                                    22.3
worm, AbraWorm                          22.4
worm, conficker                         22.6
worm, Downadup                          22.6
worm, Kido                              22.6
worm, Morris                            22.5
worm propagation through USB            22.6
worm, Samy                              28.1.2
worm, Slammer                           22.5
worm, Stuxnet                           22.7
WPA                                     9.7
Wustrow, Eric                           10.9.4, 12.8
www.hostip.info for anonymity check     19.3.3
www.openssl.org                         13.4
www.virustotal.com                      22.8, 31.4

X
x86 architecture                        21.4
X.509 Certificate Format Standard       13.4
Xiaoyun Wang                            15.7.1
XMLHttpRequest(), Ajax                  28.1.2
XOR hash algorithm                      15.4
x86 processor architecture              32.4
XSS attack                              28.1.1
XSS attack, client side                 28.3
XSS attack through iframe HTML tag      28.3
XSS for stealing cookies                28.4

Y
Yaroslav Halchenko                      24.3
Yiqun Lisa Yin                          15.7.1

Z
Zakir Durumeric                         10.9.4, 12.8
zcat to read compressed files           23.4
Z (DNS message)                         17.12
zero-day attack                         28.5
zeroth-degree polynomial                6.1
Zhaohui Wang                            32.9
ZIP algorithm                           20.2
Zmailer, an MTA                         31.2
Zn notation                             5.3, 5.3.1
(Z/NZ)x notation                        11.8
zone file                               17.4
zone files                              17.8.1
zone transfer, DNS                      17.6
Zotob bot                               29.8
Zp notation                             11.8, 13.5, 14.8
Zp* notation                            11.8, 13.5, 14.8, 14.15
(Z/pZ)x notation                        13.5, 14.8, 14.15

                                                                          


                                                                          



Last updated: May 2016

Valid HTML 4.01 Transitional Valid CSS!