Absolute Beginner's Guide to Security, Spam, Spyware & Viruses (Absolute Beginner's Guide)

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses (Absolute Beginner's Guide)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 360 p.
  • 言語 ENG
  • 商品コード 9780789734594
  • DDC分類 005.8

Full Description


Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense. Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good. We'll tell you how to immediately cut the risk of being attacked in half - in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.

Contents

Introduction.How This Book Is Organized.Special Elements Used in this Book.Reader Competition...of Sorts.I. SECURITY BASICS: SOME VERY REAL THREATS.1. Viruses: Attack of the Malicious Programs.What Is a Computer Virus?What Is It?Who Triggers a Computer Virus?How Does It Spread?What Damage Can It Do?Viruses: As Many Kinds As Sniffles in KindergartenMacro VirusesMemory-Resident VirusesFile Infector VirusesBoot VirusesMulti-Partite VirusesWorms: Network-Savvy VirusesTrojan Horses: Hey Helen, the Achaeans Left Us a Present!Virus Hoaxes: Fake Viruses that Scare the Heck Out of YouWho Creates Computer Viruses?What Not to Do!When Viruses Attack!Disconnect As Soon As PossibleVirus Infection Found! How to Cleanse Your SystemMy Antivirus Program Won't Update!Now I Have Your Attention...Antivirus Checkup: 10-Minute TacticsInstall Windows Security UpdatesUpdate Your Virus SignaturesFortify Your Computer: Strong Virus Defense in a Few HoursInstall or Upgrade an Antivirus ProgramScan Your Computer for VirusesInstall Service Pack 2 and Enable Virus ProtectionNo Worm in My Apple?Is That a Virus in Your Pocket?2. Spyware: Overrun by Advertisers, Hijackers, and Opportunists.What Is Spyware?What Does Spyware Do and Why Is It Bad?How Does Spyware Sneak onto My Computer?Types of Spyware: Snoops, Adware, Cookies, and MoreSpyware: I Spy with My Little AppAdware: Attack of the Pop-upsSnoopware: I Wanna Know What You're Up To!Browser Hijackers: Turn This Browser Around, We're Going to Cuba.comKey Loggers: Snooping on Your Typing SkillsDialers: Dial In, Dial Out, Dial OftenTrojan Horses: Pretty Ponies with Deadly InsidesCookies: Does My Oreo Have a Tape Recorder in It?Who Is at Risk?How Do I Know If I Have Spyware?Defend Yourself Against SpywareSpyware Countermeasures: 10-Minute TacticsBan All Spies: Strong Spyware Defense in an AfternoonRun a Full System ScanInstall a Second Anti-spyware ProgramInoculate Your SystemUse FirefoxClean CookiesSpyware Infection Found! How to Scrub Your SystemHow to Fix a Browser HijackDecimate the Little Suckers with CWShredderMicrosoft Mimics HijackThis: System Explorers3. Hackers: There's a Man in My Machine.What Is a Hacker?Who Are the Hackers?What Damage Can Hackers Do?Targets of a Hack AttackCorporate NetworksWeb ServersPersonal ComputersHacker Motivation: I Think Therefore I HackTools of the Trade: Pass Me a Trojan Horse, Would You?Firewall: Shut Out the HackersSoftware Firewalls: Programs That Stop HackersWindows Firewall: Built-in DefenseThird-Party Software FirewallsRecommended Firewall FreebiesHardware FirewallsEasy Defense with a NAT FirewallStateful Inspection: The Meticulous Traffic CopHow to Detect a Hacker AttackHow to Fix a Hacker AttackSteps You Can Take Immediately After Being HackedBatten down the Hatches-10-Minute TacticsTurn on Windows FirewallActivate the Firewall on a Mac OS X SystemWall off the World-Install a Better Firewall in an AfternoonInstall a Two-way Software FirewallInstall a Hardware Firewall4. Identity Thieves and Phishers: Protect Your Good Name and Bank Account.What Is Identity Theft?Techniques Thieves Use to Steal Your IdentityHow They Become You: Identity Theft TechniquesPreventative Measures: How to Not Become a VictimSigns You're a VictimWhat to Do If You're an Identity Theft VictimWhat Is Phishing?How Does Phishing Work?Email Address SpoofingLink SpoofingWeb Address SpoofingWhat Is Pharming?What Damage Can Be Done By Phishing?Who Is at Risk? Everyone!Don't Get Phished: 10-Minute Tactics to Stay Off the HookThey Won't Ask, You Don't TellUse Caution and Cut and PasteCommunicate SecurelyInstall an Anti-spam FilterBlock Phishing Sites with NetCraftCarry a Big SpoofstickKeep Your Antivirus and Anti-Spyware Programs Up-to-DateKeep Your Computer Software Up-to-DateEnsure You Are You: Take an Afternoon to Protect Your IdentityCheck Your Credit ReportsShred It Before You Chuck ItRead Your Statements5. Spam: Unwanted Email from Hell.What Is Spam?Why Does Spam Keep Coming?Why Doesn't Someone Stop the Spammers?How Do Spammers Get My Email Address?Website HarvestingDictionary SpammingCommercial Email ListsNewsgroups, Discussion Forums, and Interactive WebsitesContests and Other Free OfferingsEmail ForwardingThe Damage Spam Can DoReduce the Flow-10-Minute Tactics to Reduce SpamDon't RespondDon't Post Your Email Address on the WebWebmasters Shouldn't Use mailtoTurn Off Image Display in Email ProgramsTurn On Junk Mail FilteringKill More Spam-In an AfternoonInstall an Anti-spam ProgramFight Back!6. Wireless Network Snoops: Lock Down Your Wi-Fi Network.What Is a Wireless Home Network?What Damage Can a Wireless Network Snoop Dish Out?Who Are the Snoopers?WardriversBandwidth BanditsWireless HackersYour Wi-Fi Network Is Full of Holes!How to Access Your Router Set-upFirst Line of Defense: Secure Your Wi-Fi NetworkTurn On WEPTurn On WPAMAC Address Filtering: Keep Out the ScottishDetecting a Visit from a Wireless SnoopI'm Under Attack! What to Do If You Discover a Wireless Network SnoopTurn Off Wireless AccessActivate Security MeasuresAssess the DamageWireless Security Workup: Quick Tactics and Some That Take a Little More Time10-Minute Tactic: Change the Router's User ID and Password10-Minute Tactic: Change Your Default SSID10-Minute Tactic: Turn On the Windows Firewall10-Minute Tactic: Turn Off UpnP10-Minute Tactic: Turn Off Your Router When Not in UseTime Intensive Tactic: Be Careful with File Sharing7. Privacy Snoops: Cover Your Tracks and Your Reputation.Why Your Privacy Is ImportantWhat You Leave Behind on Your ComputerWeb BrowserDocumentsMovies and Audio PlayersEmailChat ProgramsWho Are the Privacy Snoops?The Consequences of Being CaughtEmergency Tactics-I Am Being Snooped On!AdministratorLimited UsersGuest AccountsHow to Create PC PrivacyObscure Your Trail-In About 10 MinutesMicrosoft Internet ExplorerMozilla FirefoxCover Your Tracks-In an AfternoonClean Multimedia PlayersWindows Media Player 10Real Player 10Protect Your EmailTurn Off Saved Sent ItemsEmpty Deleted Items FolderDon't Leave Email on the ServerWash WindowsScrub Microsoft OfficeDeleted Files Are Not GoneTurn Off Chat LogsClean Restore PointsII. STRATEGIES FOR SAFE AND SECURE COMPUTING.8. Let's Smash-Proof Windows: Tweak Windows XP Nice and Tight.If Windows XP Is a Dike, You're a Little Dutch BoyStep 1: Trash Unnecessary ProgramsStep 2: Install FirefoxStep 3: Install Antivirus Software and Scan for VirusesStep 4: Install Anti-Spyware Software and Scan for SpywareStep 5: Block Out the Bad Guys and Install a FirewallStep 6: Install and Configure Microsoft Updates and Service Pack 2Step 7: Install Netcraft's Anti-Phishing ToolbarStep 8: Protect Yourself from SpamStep 9: Managing Your File Sharing Security9. Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up.Light the Fuse and Stand BackLet's Get StartedXP Installation CD or System Recovery DiskWindows SP2: The Mother of All Service PacksCollect Your DriversInstallation CDs for Your ProgramsInternet Service Software and SettingsSecurity ProgramsStep 1: Download Drivers and Software You Need for the Re-installGot a Recovery CD? That's Good News!Retail Copy of Windows XP? There's Some Work to DoStep 2: Back Up!OutlookOutlook ExpressMy DocumentsIE Favorites and CookiesFirefox FavoritesSaved GamesPictures, Music, and VideosMicrosoft Office 2003 SettingsWindows Media PlayerOther Odds and EndsStep 3: Pull the Plug on the NetworkStep 4: Wipe Away WindowsUsing a System Recovery CDUsing a Windows XP Install CDStep 5: Re-install WindowsStep 6: Re-install Your DriversStep 7: Install Protection Against MalwareInstall an Antivirus ProgramInstall an Anti-spyware ProgramInstall a FirewallStep 8a: Install Windows XP Service Pack 2 (from CD)Step 8b: Install SP2 from the InternetStep 9: Configure Your Security SettingsStep 10: Install FirefoxStep 11: Configure Your NetworkingHome NetworkDigital Subscriber Line (DSL)Cable InternetDial-upStep 12: Update Windows with All Recent Security PatchesStep 13: Update All of Your Security Programs and Security SignaturesStep 14: Activate WindowsStep 15: Re-install Your ProgramsStep 16: Other Things You Can Do10. Ongoing Maintenance: Fend Off Future Threats!Note to Self: Keep Computer SecureDaily Routines: Walk the Dog, Feed the Kids, and Secure the ComputerUpdate Your Antivirus and Anti-Spyware SignaturesUpdate AVG SignaturesUpdate Microsoft AntiSpywareUpdate Spybot Search & DestroyWeekly Routines: How to Never Be Bored on Saturday MorningScan for Viruses and SpywareCheck for Firefox UpdatesMonthly Routines: Clean the Garage, Trim the Hedge, and Update WindowsWindows UpdatesInspect Other ComputersRouter Firmware UpdatesPatch Microsoft OfficeSoftware UpdatesBathe Once a Year Whether You Need It and Reformat and Re-install, TooWipe Your Hard Drive and Re-install WindowsIII. TOOLS FOR MAINTENANCE AND PROTECTION.11. Selecting Software: Steals, Deals, and Software Duds.Security Software: Nothing in Life Is Free, Except SoftwarePayware: Software You Pay Hard-Earned Cash ForFreeware: Don't Pay a Cent SoftwareWeirdware: When It's Not Payware or FreewareGimpware: Free Software, but Not All the Bits WorkTrialware: It's Free, Until It's NotShareware: I Trust You to Pay MeWhat Should I Pay for My Security Toolbox?Choosing the Right Security SoftwareAntivirusAnti-SpywareFirewallAnti-Spam12. Tools of the Trade: Security Products You Should Own.Which Security Software Is Right for You?Antivirus ProgramsFreewarePaywareAnti-SpywareFreewarePaywareFirewallsAnti-SpamIV. APPENDIXES.A. Glossary.Index.

最近チェックした商品