The Internet reveals humanity both at its most glorious heights of achievement and at its downright sleaziest. As you gaze at the new moons of Pluto (as seen from the Hubble Space Telescope at http://hubble.nasa.gov), your email inbox is filling up with viruses awaiting their chance to hop onto your hard drive. Mixed in with those messages are pitches from rip-off artists and identity thieves . Threats from the Internet fall into four broad categories: programs designed to damage the information on your hard drive (viruses, worms, and the like), software that steals personal information from your computer (spyware), hackers who break into and run programs on your computer without your knowledge, and scammers who use the Internet to take advantage of unsuspecting victims (phishing). This chapter shows you how to protect your computer using software that detectsand deletesmalicious software code or blocks unwelcome access. It also shows you how to use your computer's settings to control the information that flows in and out of your machine. And to help you keep your kids safe, the last section deals with parental controls. |