Summary


Throughout this chapter, you found out how to increase your privacy with Internet Explorer. Because Internet Explorer records so many pieces of your browsing experience, that information can leave you open to huge threats to your privacy. To fight that, you need to remove histories of sites browsed and addresses entered, as shown in the chapter. Then, you learned how to delete cookies as well as how to set up Internet Explorer to clean up after itself.

The second part of the chapter addressed the privacy concerns of the Windows interface. Just like Internet Explorer, Windows records many of your computer activities. Clearing those records has become an essential part of protecting your privacy. First, you found out how to clean up Windows. Then, you learned about ways to protect your privacy further with the help of permissions. If you follow all the tips that I have outlined in this chapter, you will have a secure system.

You have now finished reading the last chapter of Hacking Windows Vista. I showed you how you can customize everything that can be customized in Windows Vista in Part I. Now you know how to make your computer look and feel completely different. In Part II, you were shown how to speed up all the different components that make up Windows Vista. From the boot to the speed of your applications, the chapter provided tips to optimize the performance of your computer. Part III shifted into the topic of securing your computer. You learned how to protect your computer from attackers; defend against spyware, adware, and viruses; and protect your privacy. Now that you have read this last chapter, you are finished with the most complete guide written to fully optimize and improve your Windows Vista experience.




Hacking Windows Vista
Hacking Windows Vista: ExtremeTech
ISBN: 0470046872
EAN: 2147483647
Year: 2007
Pages: 105
Authors: Steve Sinchak

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net