Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] parental controls built-in 2nd enforcing on home computer 2nd on home network router passive scanning mode (Windows Defender) password attacks, brute force passwords changing 2nd creating effective, creating on wireless routers, changing securing strong, anatomy of weak, anatomy of peer-to-peer sharing performing manual operating system updates security scans virus scans active scans scan options, configuring personal information, online security personal software firewalls access control, troubleshooting enabling McAfee Internet Security Suite security scans, performing selecting 2nd Symantec Norton Internet Security 200x Windows XP firewall enabling ZoneAlarm access settings, verifying enabling logging facility, viewing phishing scams 2nd account verification e-mail, example of avoiding nature of reporting tools used in types of phreaking policing children's Internet usage blog sites, monitoring parental controls built-in enforcing on home computers 2nd on home network router popup blockers, installing website history, monitoring with activity loggers 2nd popups port-scanning utilities, performing security scans preventing spyware/adware unintentional roaming viruses protecting children from online dangers Internet usage policy, establishing pump-and-dump scams purchasing, personal software firewalls |