O'Reilly logo

The Official CHFI Study Guide (Exam 312-49) by Dave Kleiman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

R

Radio Frequency Identification (RFID) tags, 49
rainbow attack, 374
RAM (random access memory)
image capture of, 292
virtual memory and, 310
volatile evidence on router, 477
rape, 763, 764
raster images, 110–111, 112
RC4 cipher, 492
RDA (Remote Data Acquisition), 592
R-Drive Image, 253, 592
read/write head, 66–67, 68
real-life solutions, 6
RealPlayer, 592
reckless endangerment, 6
reconnaissance
by hacker of wireless network, 500–502
in hacking process, 468, 469
records, 174–175 See also documentation
Recover, 592
Recover CHK Files, 592
Recover It All!, 240
Recover My Files, 219
Recover My iPod, 535
Recover4all, 592
Recover4all Professional, 220
RecoverPlus Pro, 228–229
recovery
data recovery tools, 547–550
of deleted ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required