P3P (Platform for Privacy Preferences Project), 78, 185
P3P privacy policy, 74
P3P Public Overview web page, 77
Panda Titanium Antivirus program, 147
parental controls, 91-92
capabilities, 95-96
computer location for, 94
discussions with children, 93-94
enabling, 96-100, 97-100
online risks and dangers, 91-92
overview, 94-95
ratings for, 78
user activity reports, 101-102, 101-102
partitions, formatting and deleting, 257, 257
Password dialog box, 252
Password Must Meet Complexity Requirements option, 37, 40
Password Policy folder, 39
Password Policy settings, 37
Password protected sharing is disabled option, 273
Password protected sharing is enabled option, 273
password reset floppy disks, 23, 43-44, 43
Password Reset Wizard, 44
Password screen, 213, 249
passwords, 29-30
Administrator accounts, 20
BIOS, 47-48, 47
bypassing, 46, 48
certificates, 213, 249
changing, 33-34
Data Recovery Agent, 243
Dekart Private Disk Light, 250-252
e-mail and internet service, 36
files, 36
Guest account, 16
hard disks, 49
hints, 22
management software for, 44-45, 44-45
mistakes, 31-32, 32
policies, 36-42, 39-41
selecting, 30
shared folders, 273
storing, 42-46
Syskey, 49-50, 50
user accounts, 11, 21-23, 21, 34-35
web site, 35, 79
in Windows Vista installation, 319-320
wireless networks, 296-297, 297
WPA, 310
patches. See updates
PC Magazine Antispyware Product Guides and Reviews web site, 179
PC Magazine Security Watch web site, 158, 322
Per Site Privacy Actions screen, 76, 76
Permanently delete suspected junk e-mail instead of moving it to the Junk E-mail folder option, 190
permissions
files, 234-236, 235
printers, 286-287, 286
shared folders, 275-277, 276, 279-280
Personal Firewall Plus firewall, 125
personal folders, 232-233, 233
personal information, disclosing, 93
PGP (Pretty Good Privacy), 224-225
phishing
spam for, 188
Windows Mail for, 194, 194
Phishing Filter, 85-87, 86
physical access to computers, 50-51
Platform for Privacy Preferences Project (P3P), 78, 185
Plugins tab, 152
policies
Local Computer Policy settings, 62-66, 63-65
Local Security Policy settings, 41, 60-61, 60, 62
password, 36-42, 39-41
pop-up ads
in Internet Explorer, 83-84, 84
malware infection through, 166
POPFile program, 197
pornography, online, 93
port scans, 129-131, 130-131
portability, passwords for, 46
ports, firewall, 114
post-installation tasks, 319-320
pre-installation tasks, 317-318
predators, online, 93
Prepare For A Forgotten Password option, 43
Pretty Good Privacy (PGP), 224-225
principle of least privilege, 15
Print permission, 285-286
printers, shared, 271-272, 283
connecting to, 284-285, 285
process, 283-284, 284
securing, 285-287, 286
Privacy Report dialog box, 77, 77
privacy settings in Internet Explorer, 74-78, 75-77
Privacy Summary document, 77, 77
Privacy tab, 75
private disks, 250-253, 251-252
private keys, 207
Private Profile tab, 123
processes, Task Manager for, 53-55, 54
Processes tab, 54-55, 54
product keys, 319
Profile screen, 119, 121
program installations, malware infection through, 165
Program screen, 119
Properties window
for file systems, 230, 230
for Local Computer Policy settings, 65, 65
Protocols and Ports screen, 121
Pseudorandom Data erasing method, 259
Public folders
sharing, 273-274, 274
working with, 232-233, 233
public key cryptography, 205
Certificate Authorities in, 206
certificates in, 205-206
digital signatures in, 207-208
keys in, 207
performance with, 208
Public Key Policies section, 61