Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] CD/DVD storage charities and phishing scams chat rooms versus IM comparing signature-based and heuristic virus detection weak and strong passwords complacency as security threat components of antivirus software computer viruses [See viruses.] configuring antivirus software, scan options contests prizes, phishing scam example "cow pattie" model Crack creating effective passwords 2nd restore points strong passwords critical files |