Chapter 14: Implementing Internet Security and Privacy


Overview

In this chapter, you’ll learn how to:

  • Guard against e-mail viruses.

  • Set up Outlook Express to automatically delete spam messages.

  • Get and use a digital ID for secure e-mail.

  • Keep intruders at bay with Internet Connection Firewall.

  • Work with security zones and other Internet Explorer security settings.

  • Protect online privacy by managing cookies.

If you made a list of the various tenets that constitute the Internet ethos, one tenet would be that information should be free and easily accessible to all. This admirably egalitarian view is one of the reasons the Internet has been so successful. The composition of the Internet’s building blocks (the software that enables the various networks to communicate with each other and exchange data) is public knowledge, so it’s relatively easy to write software that performs functions over the Internet. The downside to all this openness is that it also makes it easy for the malicious and the malevolent to get into all kinds of mischief. By studying the published standards for how the Internet works, crackers (as hackers who’ve succumbed to the dark side of the Force are called) can apply their knowledge of programming and computer systems to compromise these systems and bypass the normal Internet operating procedures.

In other words, although being online is generally quite secure and relatively private, you should never take your security and privacy for granted. In this chapter, we show you how to wield various Microsoft Windows XP tools to enhance your online safety and privacy without slowing you down or making the entire online experience more trouble than it’s worth.




Insider Power Techniques for Microsoft Windows XP
Insider Power Techniques for Microsoft Windows XP (Bpg-Other)
ISBN: 0735618968
EAN: 2147483647
Year: 2005
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net