Book description
Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense.
Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good.
We'll tell you how to immediately cut the risk of being attacked in half — in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.
Table of contents
- Copyright
- About the Author
- Foreword
- Acknowledgments
- We Want to Hear from You!
- Introduction: Ignore This Book at Your Own Peril!
-
How This Book Is Organized
- Chapter 1—Viruses: Attack of the Malicious Programs
- Chapter 2—Spyware: Overrun by Advertisers, Hijackers, and Opportunists
- Chapter 3—Hackers: There’s a Man in My Machine
- Chapter 4—Identity Thieves and Phishers: Protect Your Good Name and Bank Account
- Chapter 5—Spam: Unwanted Email from Hell
- Chapter 6—Wireless Network Snoops: Lock Down Your Wi-Fi Network
- Chapter 7—Privacy Snoops: Cover Your Tracks and Your Reputation
- Chapter 8—Let’s Smash-Proof Windows: Tweak Windows XP Nice and Tight
- Chapter 9—Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
- Chapter 10—Ongoing Maintenance: Fend Off Future Threats!
- Chapter 11—Selecting Software: Steals, Deals, and Software Duds
- Chapter 12—Tools of the Trade: Security Products You Should Own
- Glossary
- Special Elements Used in this Book
- Reader Competition...of Sorts
-
I. Security Basics: Some Very Real Threats
-
1. Viruses: Attack of the Malicious Programs
- What Is a Computer Virus?
- Viruses: As Many Kinds As Sniffles in Kindergarten
- Who Creates Computer Viruses?
- What Not to Do!
- When Viruses Attack!
- Now I Have Your Attention...
- Antivirus Checkup: 10-Minute Tactics
- Fortify Your Computer: Strong Virus Defense in a Few Hours
- No Worm in My Apple?
- Is That a Virus in Your Pocket?
-
2. Spyware: Overrun by Advertisers, Hijackers, and Opportunists
- What Is Spyware?
- What Does Spyware Do and Why Is It Bad?
- How Does Spyware Sneak onto My Computer?
-
Types of Spyware: Snoops, Adware, Cookies, and More
- Spyware: I Spy with My Little App
- Adware: Attack of the Pop-ups
- Snoopware: I Wanna Know What You’re Up To!
- Browser Hijackers: Turn This Browser Around, We’re Going to Cuba.com
- Key Loggers: Snooping on Your Typing Skills
- Dialers: Dial In, Dial Out, Dial Often
- Trojan Horses: Pretty Ponies with Deadly Insides
- Cookies: Does My Oreo Have a Tape Recorder in It?
- Who Is at Risk?
- How Do I Know If I Have Spyware?
- Defend Yourself Against Spyware
- Ban All Spies: Strong Spyware Defense in an Afternoon
-
3. Hackers: There’s a Man in My Machine
- What Is a Hacker?
- Who Are the Hackers?
- What Damage Can Hackers Do?
- Targets of a Hack Attack
- Hacker Motivation: I Think Therefore I Hack
- Tools of the Trade: Pass Me a Trojan Horse, Would You?
- Firewall: Shut Out the Hackers
- Software Firewalls: Programs That Stop Hackers
- How to Detect a Hacker Attack
- How to Fix a Hacker Attack
- Batten down the Hatches—10-Minute Tactics
- Wall off the World—Install a Better Firewall in an Afternoon
- 4. Identity Thieves and Phishers: Protect Your Good Name and Bank Account
- 5. Spam: Unwanted Email from Hell
-
6. Wireless Network Snoops: Lock Down Your Wi-Fi Network
- What Is a Wireless Home Network?
- What Damage Can a Wireless Network Snoop Dish Out?
- Who Are the Snoopers?
- Your Wi-Fi Network Is Full of Holes!
- First Line of Defense: Secure Your Wi-Fi Network
- Detecting a Visit from a Wireless Snoop
- I’m Under Attack! What to Do If You Discover a Wireless Network Snoop
- Wireless Security Workup: Quick Tactics and Some That Take a Little More Time
-
7. Privacy Snoops: Cover Your Tracks and Your Reputation
- Why Your Privacy Is Important
- What You Leave Behind on Your Computer
- Who Are the Privacy Snoops?
- The Consequences of Being Caught
- Emergency Tactics—I Am Being Snooped On!
- Obscure Your Trail—In About 10 Minutes
- Cover Your Tracks—In an Afternoon
- Clean Multimedia Players
-
1. Viruses: Attack of the Malicious Programs
-
II. Strategies for safe and secure computing
-
8. Let’s Smash-Proof Windows: Tweak Windows XP Nice and Tight
-
If Windows XP Is a Dike, You’re a Little Dutch Boy
- Step 1: Trash Unnecessary Programs
- Step 2: Install Firefox
- Step 3: Install Antivirus Software and Scan for Viruses
- Step 4: Install Anti-Spyware Software and Scan for Spyware
- Step 5: Block Out the Bad Guys and Install a Firewall
- Step 6: Install and Configure Microsoft Updates and Service Pack 2
- Step 7: Install Netcraft’s Anti-Phishing Toolbar
- Step 8: Protect Yourself from Spam
- Step 9: Managing Your File Sharing Security
-
If Windows XP Is a Dike, You’re a Little Dutch Boy
-
9. Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
- Light the Fuse and Stand Back
- Let’s Get Started
- Step 1: Download Drivers and Software You Need for the Re-install
- Step 2: Back Up!
- Step 3: Pull the Plug on the Network
- Step 4: Wipe Away Windows
- Step 5: Re-install Windows
- Step 6: Re-install Your Drivers
- Step 7: Install Protection Against Malware
- Step 8a: Install Windows XP Service Pack 2 (from CD)
- Step 8b: Install SP2 from the Internet
- Step 9: Configure Your Security Settings
- Step 10: Install Firefox
- Step 11: Configure Your Networking
- Step 12: Update Windows with All Recent Security Patches
- Step 13: Update All of Your Security Programs and Security Signatures
- Step 14: Activate Windows
- Step 15: Re-install Your Programs
- Step 16: Other Things You Can Do
-
10. Ongoing Maintenance: Fend Off Future Threats!
- Note to Self: Keep Computer Secure
- Daily Routines: Walk the Dog, Feed the Kids, and Secure the Computer
- Weekly Routines: How to Never Be Bored on Saturday Morning
- Monthly Routines: Clean the Garage, Trim the Hedge, and Update Windows
- Bathe Once a Year Whether You Need It and Reformat and Re-install, Too
-
8. Let’s Smash-Proof Windows: Tweak Windows XP Nice and Tight
-
III. Tools for Maintenance and Protection
- 11. Selecting Software: Steals, Deals, and Software Duds
- 12. Tools of the Trade: Security Products You Should Own
- IV. Appendixes
Product information
- Title: Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses
- Author(s):
- Release date: November 2005
- Publisher(s): Que
- ISBN: None
You might also like
book
Windows Virus and Malware Troubleshooting
Make your PCs as secure as possible and limit the routes of attack and safely and …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition
Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve …
book
Malware: Fighting Malicious Code
Reveals how attackers install malicious code and how they evade detection Shows how you can defeat …