Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] effective passwords creating elements of phishing scams avoiding pump-and-dump scams worms enabling antispyware/antiadware in security bundles antivirus software with ISP automatic operating-system updates built-in firewalls encryption WEP 2nd 3rd WPA 2nd personal software firewalls Windows XP firewall ZoneAlarm popup blocker on IE encryption troubleshooting WEP 2nd enabling on wireless NIC enabling on wireless router enabling with Linksys WLAN Monitor 2nd enabling with Windows XP WPA, enabling 2nd encryption keys, generating encryption, enabling enforcing parental controls establishing Internet usage policy external hard drives, storing file backups eyeballs |