Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense.
Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good.
We'll tell you how to immediately cut the risk of being attacked in half — in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.
Table of contents
- About the Author
- We Want to Hear from You!
- Introduction: Ignore This Book at Your Own Peril!
How This Book Is Organized
- Chapter 1—Viruses: Attack of the Malicious Programs
- Chapter 2—Spyware: Overrun by Advertisers, Hijackers, and Opportunists
- Chapter 3—Hackers: There’s a Man in My Machine
- Chapter 4—Identity Thieves and Phishers: Protect Your Good Name and Bank Account
- Chapter 5—Spam: Unwanted Email from Hell
- Chapter 6—Wireless Network Snoops: Lock Down Your Wi-Fi Network
- Chapter 7—Privacy Snoops: Cover Your Tracks and Your Reputation
- Chapter 8—Let’s Smash-Proof Windows: Tweak Windows XP Nice and Tight
- Chapter 9—Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
- Chapter 10—Ongoing Maintenance: Fend Off Future Threats!
- Chapter 11—Selecting Software: Steals, Deals, and Software Duds
- Chapter 12—Tools of the Trade: Security Products You Should Own
- Special Elements Used in this Book
- Reader Competition...of Sorts
I. Security Basics: Some Very Real Threats
1. Viruses: Attack of the Malicious Programs
- What Is a Computer Virus?
Viruses: As Many Kinds As Sniffles in Kindergarten
- Macro Viruses
- Memory-Resident Viruses
- File Infector Viruses
- Boot Viruses
- Multi-Partite Viruses
- Worms: Network-Savvy Viruses
- Trojan Horses: Hey Helen, the Achaeans Left Us a Present!
- Virus Hoaxes: Fake Viruses that Scare the Heck Out of You
- Who Creates Computer Viruses?
- What Not to Do!
- When Viruses Attack!
- Now I Have Your Attention...
- Antivirus Checkup: 10-Minute Tactics
- Fortify Your Computer: Strong Virus Defense in a Few Hours
- No Worm in My Apple?
- Is That a Virus in Your Pocket?
2. Spyware: Overrun by Advertisers, Hijackers, and Opportunists
- What Is Spyware?
- What Does Spyware Do and Why Is It Bad?
- How Does Spyware Sneak onto My Computer?
Types of Spyware: Snoops, Adware, Cookies, and More
- Spyware: I Spy with My Little App
- Adware: Attack of the Pop-ups
- Snoopware: I Wanna Know What You’re Up To!
- Browser Hijackers: Turn This Browser Around, We’re Going to Cuba.com
- Key Loggers: Snooping on Your Typing Skills
- Dialers: Dial In, Dial Out, Dial Often
- Trojan Horses: Pretty Ponies with Deadly Insides
- Cookies: Does My Oreo Have a Tape Recorder in It?
- Who Is at Risk?
- How Do I Know If I Have Spyware?
- Defend Yourself Against Spyware
Ban All Spies: Strong Spyware Defense in an Afternoon
- Run a Full System Scan
- Install a Second Anti-spyware Program
- Inoculate Your System
- Use Firefox
- Clean Cookies
- Spyware Infection Found! How to Scrub Your System
- How to Fix a Browser Hijack
- Decimate the Little Suckers with CWShredder
- Microsoft Mimics HijackThis: System Explorers
3. Hackers: There’s a Man in My Machine
- What Is a Hacker?
- Who Are the Hackers?
- What Damage Can Hackers Do?
- Targets of a Hack Attack
- Hacker Motivation: I Think Therefore I Hack
- Tools of the Trade: Pass Me a Trojan Horse, Would You?
- Firewall: Shut Out the Hackers
- Software Firewalls: Programs That Stop Hackers
- How to Detect a Hacker Attack
- How to Fix a Hacker Attack
- Batten down the Hatches—10-Minute Tactics
- Wall off the World—Install a Better Firewall in an Afternoon
4. Identity Thieves and Phishers: Protect Your Good Name and Bank Account
- What Is Identity Theft?
- What Is Phishing?
- How Does Phishing Work?
- What Is Pharming?
- What Damage Can Be Done By Phishing?
- Who Is at Risk? Everyone!
- Don’t Get Phished: 10-Minute Tactics to Stay Off the Hook
- Ensure You Are You: Take an Afternoon to Protect Your Identity
5. Spam: Unwanted Email from Hell
- What Is Spam?
- Why Does Spam Keep Coming?
- Why Doesn’t Someone Stop the Spammers?
- How Do Spammers Get My Email Address?
- The Damage Spam Can Do
- Kill More Spam—In an Afternoon
6. Wireless Network Snoops: Lock Down Your Wi-Fi Network
- What Is a Wireless Home Network?
- What Damage Can a Wireless Network Snoop Dish Out?
- Who Are the Snoopers?
- Your Wi-Fi Network Is Full of Holes!
- First Line of Defense: Secure Your Wi-Fi Network
- Detecting a Visit from a Wireless Snoop
- I’m Under Attack! What to Do If You Discover a Wireless Network Snoop
Wireless Security Workup: Quick Tactics and Some That Take a Little More Time
- 10-Minute Tactic: Change the Router’s User ID and Password
- 10-Minute Tactic: Change Your Default SSID
- 10-Minute Tactic: Turn On the Windows Firewall
- 10-Minute Tactic: Turn Off UPnP
- 10-Minute Tactic: Turn Off Your Router When Not in Use
- Time Intensive Tactic: Be Careful with File Sharing
7. Privacy Snoops: Cover Your Tracks and Your Reputation
- Why Your Privacy Is Important
- What You Leave Behind on Your Computer
- Who Are the Privacy Snoops?
- The Consequences of Being Caught
- Emergency Tactics—I Am Being Snooped On!
- Obscure Your Trail—In About 10 Minutes
- Cover Your Tracks—In an Afternoon
Clean Multimedia Players
- Windows Media Player 10
- Real Player 10
- Protect Your Email
- Turn Off Saved Sent Items
- Empty Deleted Items Folder
- Don’t Leave Email on the Server
- Wash Windows
- Scrub Microsoft Office
- Deleted Files Are Not Gone
- Turn Off Chat Logs
- Clean Restore Points
- 1. Viruses: Attack of the Malicious Programs
II. Strategies for safe and secure computing
8. Let’s Smash-Proof Windows: Tweak Windows XP Nice and Tight
If Windows XP Is a Dike, You’re a Little Dutch Boy
- Step 1: Trash Unnecessary Programs
- Step 2: Install Firefox
- Step 3: Install Antivirus Software and Scan for Viruses
- Step 4: Install Anti-Spyware Software and Scan for Spyware
- Step 5: Block Out the Bad Guys and Install a Firewall
- Step 6: Install and Configure Microsoft Updates and Service Pack 2
- Step 7: Install Netcraft’s Anti-Phishing Toolbar
- Step 8: Protect Yourself from Spam
- Step 9: Managing Your File Sharing Security
- If Windows XP Is a Dike, You’re a Little Dutch Boy
9. Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
- Light the Fuse and Stand Back
- Let’s Get Started
- Step 1: Download Drivers and Software You Need for the Re-install
- Step 2: Back Up!
- Step 3: Pull the Plug on the Network
- Step 4: Wipe Away Windows
- Step 5: Re-install Windows
- Step 6: Re-install Your Drivers
- Step 7: Install Protection Against Malware
- Step 8a: Install Windows XP Service Pack 2 (from CD)
- Step 8b: Install SP2 from the Internet
- Step 9: Configure Your Security Settings
- Step 10: Install Firefox
- Step 11: Configure Your Networking
- Step 12: Update Windows with All Recent Security Patches
- Step 13: Update All of Your Security Programs and Security Signatures
- Step 14: Activate Windows
- Step 15: Re-install Your Programs
- Step 16: Other Things You Can Do
10. Ongoing Maintenance: Fend Off Future Threats!
- Note to Self: Keep Computer Secure
- Daily Routines: Walk the Dog, Feed the Kids, and Secure the Computer
- Weekly Routines: How to Never Be Bored on Saturday Morning
- Monthly Routines: Clean the Garage, Trim the Hedge, and Update Windows
- Bathe Once a Year Whether You Need It and Reformat and Re-install, Too
- 8. Let’s Smash-Proof Windows: Tweak Windows XP Nice and Tight
III. Tools for Maintenance and Protection
11. Selecting Software: Steals, Deals, and Software Duds
- Security Software: Nothing in Life Is Free, Except Software
- Weirdware: When It’s Not Payware or Freeware
- What Should I Pay for My Security Toolbox?
- Choosing the Right Security Software
12. Tools of the Trade: Security Products You Should Own
- Which Security Software Is Right for You?
- Antivirus Programs
- 11. Selecting Software: Steals, Deals, and Software Duds
- IV. Appendixes
- Title: Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses
- Release date: November 2005
- Publisher(s): Que
- ISBN: None
You might also like
40 Algorithms Every Programmer Should Know
Learn algorithms for solving classic computer science problems with this concise guide covering everything from fundamental …
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization …
Mastering Python for Networking and Security
Master Python scripting to build a network and perform security operations Key Features Learn to handle …
Head First Design Patterns, 2nd Edition
You know you don’t want to reinvent the wheel, so you look to design patterns—the lessons …