| | Copyright |
| | About the Author |
| | Foreword |
| | Acknowledgments |
| | We Want to Hear from You! |
| | Introduction: Ignore This Book at Your Own Peril! |
| | How This Book Is Organized |
| | | Chapter 1Viruses: Attack of the Malicious Programs |
| | | Chapter 2Spyware: Overrun by Advertisers, Hijackers, and Opportunists |
| | | Chapter 3Hackers: There's a Man in My Machine |
| | | Chapter 4Identity Thieves and Phishers: Protect Your Good Name and Bank Account |
| | | Chapter 5Spam: Unwanted Email from Hell |
| | | Chapter 6Wireless Network Snoops: Lock Down Your Wi-Fi Network |
| | | Chapter 7Privacy Snoops: Cover Your Tracks and Your Reputation |
| | | Chapter 8Let's Smash-Proof Windows: Tweak Windows XP Nice and Tight |
| | | Chapter 9Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up |
| | | Chapter 10Ongoing Maintenance: Fend Off Future Threats! |
| | | Chapter 11Selecting Software: Steals, Deals, and Software Duds |
| | | Chapter 12Tools of the Trade: Security Products You Should Own |
| | | Glossary |
| | Special Elements Used in this Book |
| | Reader Competition...of Sorts |
| | Part I: Security Basics: Some Very Real Threats |
| | | Chapter 1. Viruses: Attack of the Malicious Programs |
| | | What Is a Computer Virus? |
| | | Viruses: As Many Kinds As Sniffles in Kindergarten |
| | | Who Creates Computer Viruses? |
| | | What Not to Do! |
| | | When Viruses Attack! |
| | | Now I Have Your Attention... |
| | | Antivirus Checkup: 10-Minute Tactics |
| | | Fortify Your Computer: Strong Virus Defense in a Few Hours |
| | | No Worm in My Apple? |
| | | Is That a Virus in Your Pocket? |
| | | Chapter 2. Spyware: Overrun by Advertisers, Hijackers, and Opportunists |
| | | What Is Spyware? |
| | | What Does Spyware Do and Why Is It Bad? |
| | | How Does Spyware Sneak onto My Computer? |
| | | Types of Spyware: Snoops, Adware, Cookies, and More |
| | | Who Is at Risk? |
| | | How Do I Know If I Have Spyware? |
| | | Defend Yourself Against Spyware |
| | | Ban All Spies: Strong Spyware Defense in an Afternoon |
| | | Chapter 3. Hackers: There's a Man in My Machine |
| | | What Is a Hacker? |
| | | Who Are the Hackers? |
| | | What Damage Can Hackers Do? |
| | | Targets of a Hack Attack |
| | | Hacker Motivation: I Think Therefore I Hack |
| | | Tools of the Trade: Pass Me a Trojan Horse, Would You? |
| | | Firewall: Shut Out the Hackers |
| | | Software Firewalls: Programs That Stop Hackers |
| | | How to Detect a Hacker Attack |
| | | How to Fix a Hacker Attack |
| | | Batten down the Hatches10-Minute Tactics |
| | | Wall off the WorldInstall a Better Firewall in an Afternoon |
| | | Chapter 4. Identity Thieves and Phishers: Protect Your Good Name and Bank Account |
| | | What Is Identity Theft? |
| | | What Is Phishing? |
| | | How Does Phishing Work? |
| | | What Is Pharming? |
| | | What Damage Can Be Done By Phishing? |
| | | Who Is at Risk? Everyone! |
| | | Don't Get Phished: 10-Minute Tactics to Stay Off the Hook |
| | | Ensure You Are You: Take an Afternoon to Protect Your Identity |
| | | Chapter 5. Spam: Unwanted Email from Hell |
| | | What Is Spam? |
| | | Why Does Spam Keep Coming? |
| | | Why Doesn't Someone Stop the Spammers? |
| | | How Do Spammers Get My Email Address? |
| | | The Damage Spam Can Do |
| | | Kill More SpamIn an Afternoon |
| | | Chapter 6. Wireless Network Snoops: Lock Down Your Wi-Fi Network |
| | | What Is a Wireless Home Network? |
| | | What Damage Can a Wireless Network Snoop Dish Out? |
| | | Who Are the Snoopers? |
| | | Your Wi-Fi Network Is Full of Holes! |
| | | First Line of Defense: Secure Your Wi-Fi Network |
| | | Detecting a Visit from a Wireless Snoop |
| | | I'm Under Attack! What to Do If You Discover a Wireless Network Snoop |
| | | Wireless Security Workup: Quick Tactics and Some That Take a Little More Time |
| | | Chapter 7. Privacy Snoops: Cover Your Tracks and Your Reputation |
| | | Why Your Privacy Is Important |
| | | What You Leave Behind on Your Computer |
| | | Who Are the Privacy Snoops? |
| | | The Consequences of Being Caught |
| | | Emergency TacticsI Am Being Snooped On! |
| | | Obscure Your TrailIn About 10 Minutes |
| | | Cover Your TracksIn an Afternoon |
| | | Clean Multimedia Players |
| | Part II: Strategies for safe and secure computing |
| | | Chapter 8. Let's Smash-Proof Windows: Tweak Windows XP Nice and Tight |
| | | If Windows XP Is a Dike, You're a Little Dutch Boy |
| | | Chapter 9. Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up |
| | | Light the Fuse and Stand Back |
| | | Let's Get Started |
| | | Step 1: Download Drivers and Software You Need for the Re-install |
| | | Step 2: Back Up! |
| | | Step 3: Pull the Plug on the Network |
| | | Step 4: Wipe Away Windows |
| | | Step 5: Re-install Windows |
| | | Step 6: Re-install Your Drivers |
| | | Step 7: Install Protection Against Malware |
| | | Step 8a: Install Windows XP Service Pack 2 (from CD) |
| | | Step 8b: Install SP2 from the Internet |
| | | Step 9: Configure Your Security Settings |
| | | Step 10: Install Firefox |
| | | Step 11: Configure Your Networking |
| | | Step 12: Update Windows with All Recent Security Patches |
| | | Step 13: Update All of Your Security Programs and Security Signatures |
| | | Step 14: Activate Windows |
| | | Step 15: Re-install Your Programs |
| | | Step 16: Other Things You Can Do |
| | | Chapter 10. Ongoing Maintenance: Fend Off Future Threats! |
| | | Note to Self: Keep Computer Secure |
| | | Daily Routines: Walk the Dog, Feed the Kids, and Secure the Computer |
| | | Weekly Routines: How to Never Be Bored on Saturday Morning |
| | | Monthly Routines: Clean the Garage, Trim the Hedge, and Update Windows |
| | | Bathe Once a Year Whether You Need It and Reformat and Re-install, Too |
| | Part III: Tools for Maintenance and Protection |
| | | Chapter 11. Selecting Software: Steals, Deals, and Software Duds |
| | | Security Software: Nothing in Life Is Free, Except Software |
| | | Weirdware: When It's Not Payware or Freeware |
| | | What Should I Pay for My Security Toolbox? |
| | | Choosing the Right Security Software |
| | | Chapter 12. Tools of the Trade: Security Products You Should Own |
| | | Which Security Software Is Right for You? |
| | | Antivirus Programs |
| | | Anti-Spyware |
| | | Firewalls |
| | | Anti-Spam |
| | Part IV: Appendixes |
| | | Glossary |
| | |
| | | A |
| | | B |
| | | C |
| | | D |
| | | E |
| | | F |
| | | G-H |
| | | I-J |
| | | K-L |
| | | M-N |
| | | O-P |
| | | Q-R |
| | | S |
| | | T-U-V |
| | | W-X-Y-Z |
| | Index |