2.3. - run anti-spyware to block suspicious installation activities
3. HIDING FILES PURPOSE AND THE TECHNIQUES
3.1. - use NTFS to hide file
4. BUFFER OVERFLOW ATTACK
4.1. - buff
5. PASSWORD CRACKING TECHNIQUES
5.1. RULES OF PASSWORD -password is designed to be something an individual can remember easily but at the same time not something that can be easily guessed or broken -example of weak password 1.use only numbers 2.use only letters 3.use proper name 4.short password
6. TYPE OF PASSWORD ATTACKS
6.1. PASSIVE ONLINE ATTACK -attacker tends to be not engaged or less engaged than they would be during other kinds of attacks.
6.2. ACTIVE ONLINE ATTACK -use a more aggressive form of penetration that is designed to recover passwords.
6.3. OFFLINE ATTACKS -represent yet another form of attack that is very effective and difficult to detect in many cases.
6.4. DEFAULT PASSWORD -Set by the manufacturer when the device or system is built. -They are documented and provided to the final consumer of the product and are intended to be changed.
6.5. GUESSING PASSWORD -locate a valid user. -determine a list of potential password.
7. STEGANOGRAPHY TECHNOLOGIES
7.1. - use to conceal information inside of other information.