Flylib.com
Absolute Beginners Guide to Security, Spam, Spyware & Viruses
Absolute Beginners Guide to Security, Spam, Spyware & Viruses
ISBN: 0789734591
EAN: 2147483647
Year: 2005
Pages: 168
Authors:
Andy Edward Walker
BUY ON AMAZON
Absolute Beginner s Guide To: Security, Spam, Spyware Viruses
Table of Contents
Copyright
About the Author
Foreword
Acknowledgments
We Want to Hear from You
Introduction: Ignore This Book at Your Own Peril
How This Book Is Organized
Chapter 1Viruses: Attack of the Malicious Programs
Chapter 2Spyware: Overrun by Advertisers, Hijackers, and Opportunists
Chapter 3Hackers: There s a Man in My Machine
Chapter 4Identity Thieves and Phishers: Protect Your Good Name and Bank Account
Chapter 5Spam: Unwanted Email from Hell
Chapter 6Wireless Network Snoops: Lock Down Your Wi-Fi Network
Chapter 7Privacy Snoops: Cover Your Tracks and Your Reputation
Chapter 8Let s Smash-Proof Windows: Tweak Windows XP Nice and Tight
Chapter 9Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
Chapter 10Ongoing Maintenance: Fend Off Future Threats
Chapter 11Selecting Software: Steals, Deals, and Software Duds
Chapter 12Tools of the Trade: Security Products You Should Own
Glossary
Special Elements Used in this Book
Reader Competition...of Sorts
Part I: Security Basics: Some Very Real Threats
Chapter 1. Viruses: Attack of the Malicious Programs
What Is a Computer Virus?
Viruses: As Many Kinds As Sniffles in Kindergarten
Who Creates Computer Viruses?
What Not to Do
When Viruses Attack
Now I Have Your Attention...
Antivirus Checkup: 10-Minute Tactics
Fortify Your Computer: Strong Virus Defense in a Few Hours
No Worm in My Apple?
Is That a Virus in Your Pocket?
Chapter 2. Spyware: Overrun by Advertisers, Hijackers, and Opportunists
What Is Spyware?
What Does Spyware Do and Why Is It Bad?
How Does Spyware Sneak onto My Computer?
Types of Spyware: Snoops, Adware, Cookies, and More
Who Is at Risk?
How Do I Know If I Have Spyware?
Defend Yourself Against Spyware
Ban All Spies: Strong Spyware Defense in an Afternoon
Chapter 3. Hackers: There s a Man in My Machine
What Is a Hacker?
Who Are the Hackers?
What Damage Can Hackers Do?
Targets of a Hack Attack
Hacker Motivation: I Think Therefore I Hack
Tools of the Trade: Pass Me a Trojan Horse, Would You?
Firewall: Shut Out the Hackers
Software Firewalls: Programs That Stop Hackers
How to Detect a Hacker Attack
How to Fix a Hacker Attack
Batten down the Hatches10-Minute Tactics
Wall off the WorldInstall a Better Firewall in an Afternoon
Chapter 4. Identity Thieves and Phishers: Protect Your Good Name and Bank Account
What Is Identity Theft?
What Is Phishing?
How Does Phishing Work?
What Is Pharming?
What Damage Can Be Done By Phishing?
Who Is at Risk? Everyone
Don t Get Phished: 10-Minute Tactics to Stay Off the Hook
Ensure You Are You: Take an Afternoon to Protect Your Identity
Chapter 5. Spam: Unwanted Email from Hell
What Is Spam?
Why Does Spam Keep Coming?
Why Doesn t Someone Stop the Spammers?
How Do Spammers Get My Email Address?
The Damage Spam Can Do
Kill More SpamIn an Afternoon
Chapter 6. Wireless Network Snoops: Lock Down Your Wi-Fi Network
What Is a Wireless Home Network?
What Damage Can a Wireless Network Snoop Dish Out?
Who Are the Snoopers?
Your Wi-Fi Network Is Full of Holes
First Line of Defense: Secure Your Wi-Fi Network
Detecting a Visit from a Wireless Snoop
I m Under Attack What to Do If You Discover a Wireless Network Snoop
Wireless Security Workup: Quick Tactics and Some That Take a Little More Time
Chapter 7. Privacy Snoops: Cover Your Tracks and Your Reputation
Why Your Privacy Is Important
What You Leave Behind on Your Computer
Who Are the Privacy Snoops?
The Consequences of Being Caught
Emergency TacticsI Am Being Snooped On
Obscure Your TrailIn About 10 Minutes
Cover Your TracksIn an Afternoon
Clean Multimedia Players
Part II: Strategies for safe and secure computing
Chapter 8. Let s Smash-Proof Windows: Tweak Windows XP Nice and Tight
If Windows XP Is a Dike, You re a Little Dutch Boy
Chapter 9. Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
Light the Fuse and Stand Back
Let s Get Started
Step 1: Download Drivers and Software You Need for the Re-install
Step 2: Back Up
Step 3: Pull the Plug on the Network
Step 4: Wipe Away Windows
Step 5: Re-install Windows
Step 6: Re-install Your Drivers
Step 7: Install Protection Against Malware
Step 8a: Install Windows XP Service Pack 2 (from CD)
Step 8b: Install SP2 from the Internet
Step 9: Configure Your Security Settings
Step 10: Install Firefox
Step 11: Configure Your Networking
Step 12: Update Windows with All Recent Security Patches
Step 13: Update All of Your Security Programs and Security Signatures
Step 14: Activate Windows
Step 15: Re-install Your Programs
Step 16: Other Things You Can Do
Chapter 10. Ongoing Maintenance: Fend Off Future Threats
Note to Self: Keep Computer Secure
Daily Routines: Walk the Dog, Feed the Kids, and Secure the Computer
Weekly Routines: How to Never Be Bored on Saturday Morning
Monthly Routines: Clean the Garage, Trim the Hedge, and Update Windows
Bathe Once a Year Whether You Need It and Reformat and Re-install, Too
Part III: Tools for Maintenance and Protection
Chapter 11. Selecting Software: Steals, Deals, and Software Duds
Security Software: Nothing in Life Is Free, Except Software
Weirdware: When It s Not Payware or Freeware
What Should I Pay for My Security Toolbox?
Choosing the Right Security Software
Chapter 12. Tools of the Trade: Security Products You Should Own
Which Security Software Is Right for You?
Antivirus Programs
Anti-Spyware
Firewalls
Anti-Spam
Part IV: Appendixes
Glossary
A
B
C
D
E
F
G-H
I-J
K-L
M-N
O-P
Q-R
S
T-U-V
W-X-Y-Z
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Y
Z
Page #178 (Index)
Absolute Beginners Guide to Security, Spam, Spyware & Viruses
ISBN: 0789734591
EAN: 2147483647
Year: 2005
Pages: 168
Authors:
Andy Edward Walker
BUY ON AMAZON
Java I/O
Pack200
File Dialogs and Choosers
Reading and Writing Files
Buffered Readers and Writers
Files
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk-Assessment Methodologies
Choosing the Best Risk-Assessment Approach
Level I Assessments
IT Security Architecture and Framework
Statement of Work
Building Web Applications with UML (2nd Edition)
Web Applications
Discussion
Activities
Number Store Main Control Mechanism
Design Model
Cisco Voice Gateways and Gatekeepers
Case Study: Configuring an H.323 Gateway
Voice Translation Rules and Profiles
Dial Plan Considerations
Configuring the Gateway to Use a Tcl Script
Cisco Multiservice IP-to-IP Gateway
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 360 Flexible Metallic Tubing Type FMT
Article 386 Surface Metal Raceways
Article 404: Switches
Tables 12(A) and 12(B)
Example No. D5(b) Optional Calculation for Multifamily Dwelling Served at 208Y/120 Volts, Three Phase
.NET System Management Services
Handling WMI Events
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies