| | | Copyright |
| | | About the Authors |
| | | Acknowledgments |
| | | Introduction |
| | | Chapter 1. Tip 1: Use Firewalls |
| | | | Why Do I Need Firewalls? |
| | | | How Firewalls Work |
| | | | Putting Firewalls to Work |
| | | | Test Driving Your New Protection |
| | | | What to Do If You Think You've Been Hacked |
| | | | Sometimes, Firewalls Block the Good Stuff |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 2. Tip 2: Secure Your Wireless Network |
| | | | Why Should I Care About Wireless Network Security? |
| | | | What Do I Do About Wireless Security? |
| | | | How to Do It: Securing Your Wireless Network |
| | | | Wireless Security Checklist |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 3. Tip 3: Use Antivirus Protection |
| | | | What Are Computer Viruses? |
| | | | Commonsense Approach to Computer Viruses |
| | | | How Antivirus Works |
| | | | Inoculating Yourself Against Computer Viruses |
| | | | What to Do If You Think You've Been Infected |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 4. Tip 4: Keep Your Software Updated |
| | | | Why Software Needs to Be Updated |
| | | | Updating Your Operating System |
| | | | Updating Your Software Programs |
| | | | Using Windows Restore Points |
| | | | What to Do If You Think Your Operating System Has Been Compromised |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 5. Tip 5: Lock Out Spyware and Adware |
| | | | What Is Spyware and Adware? |
| | | | Preventing Spyware and Adware |
| | | | What to Do If You Think You've Been Infected |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 6. Tip 6: Keep an Eye on Your Kids |
| | | | What Are the Dangers Your Kids Might Encounter Online? |
| | | | Maybe I Should Rethink This Internet Thing |
| | | | Preparing Kids for Being Online |
| | | | Policing Kids Online |
| | | | What to Do If You Think Your Child Is Abusing the Rules |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 7. Tip 7: Recognize and Avoid Phishing Scams |
| | | | How Phishing Scams Work |
| | | | Tricks of the Trade |
| | | | How to Avoid Becoming a Victim |
| | | | What to Do If You Suspect You Are the Target of a Phishing Scam |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 8. Tip 8: Create Strong Passwords |
| | | | Anatomy of a Lousy Password |
| | | | Elements of a Strong Password |
| | | | How to Create a Strong Password That You Can Remember |
| | | | Additional Password Tips |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 9. Tip 9: Back Up Your Files |
| | | | What Should I Back Up? |
| | | | Where Do I Back Up To? |
| | | | How Often Should I Back Up? |
| | | | Storage Method Overview |
| | | | Putting It All Together |
| | | | Using Windows XP Backup |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 10. Tip 10: Use Common Sense |
| | | | Urban Legends |
| | | | E-Mail Stock Tips (Pump-and-Dump Scams) |
| | | | Work from Home (Pyramid) Schemes |
| | | | Money-Exchange Schemes |
| | | | "Hot" Merchandise Scam |
| | | | What to Do to Protect Yourself |
| | | | Summary |
| | | | Where to Go for More Information |
| | | Chapter 11. "They Couldn't Hit an Elephant at This Distance" |
| | | Glossary |
| | | | Numerals |
| | | | A |
| | | | B |
| | | | C |
| | | | D |
| | | | E |
| | | | F |
| | | | G |
| | | | H |
| | | | I |
| | | | KL |
| | | | MN |
| | | | P |
| | | | R |
| | | | S |
| | | | T |
| | | | U |
| | | | V |
| | | | W |
| | | Index |