vigilante justice, 40–41, 107–111,
138–140
Vikings, 115
viral content, 140–141
viruses, 247
virus scanning systems, 247
vocabulary, early Internet, 35
voyeurism, Google, 79–80
war, 77–78
Watterson, Bill, on extortion, 115
Wayback Machine, 213, 232–233
Web 1.0, 9
Web 2.0, 9–11, 46–47
Web browsing, 37–38
Web design, quality of, 48
webmasters, contacting, 219–221, 224,
243–244
Webroot, 247
webservers, 69, 73
websites
for claiming/protecting online identity,
192
for hosting attacks on reputation, 133–134
for spreading attacks, 135
see also specific sites, e.g.: Archive.org
Web spider, 93
Wendy’s, 240–241
West, Jessamyn, 247
Whitepages.com, 180
Whois.net, 221
Wikipedia
claiming/protecting online identity on,
195
echo effect from, 24, 225
finding false/malicious content on,
182–183
fixing false/malicious content on,
225–229
and Google search algorithm, 84
identifying sources of smears on, 216
Windows Update, 247
Wink.com, 179
“wiping” programs, 246
wireless networks, IP addresses and,
70–71
WordPress, 195
World Wide Web, creation of, 32–33
worms, 247
Yahoo!, 93, 177, 180, 212
Ya le D ai ly Ne w s, 51
Yelp, 236
YouTube, 74
Zeran, Ken, 131
Zillow.com, 50
Zittrain, Jonathan, on measures against
Internet abuses, 41
zombie sites, 56
Index264
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.104.5