In this chapter
It's a Cold, Cruel WorldWho Would Be Interested in My Computer?PreparationActive Defenses: Blocking Known Methods of AttackTesting, Logging, and MonitoringDisaster Planning: Preparation for Recovery After an AttackSpecific Configuration Steps for Windows XPConfiguring Windows FirewallMore About SecurityTroubleshooting
It's a Cold, Cruel World
Who Would Be Interested in My Computer?
Preparation
Active Defenses: Blocking Known Methods of Attack
Testing, Logging, and Monitoring
Disaster Planning: Preparation for Recovery After an Attack
Specific Configuration Steps for Windows XP
Configuring Windows Firewall
More About Security
Troubleshooting