Chapter 14. Implementing Internet Security and Privacy
In this chapter, you’ll learn how to:
Guard against e-mail viruses.
Set up Outlook Express to automatically delete spam messages.
Get and use a digital ID for secure e-mail.
Keep intruders at bay with Internet Connection Firewall.
Work with security zones and other Internet Explorer security settings.
Protect online privacy by managing cookies.
If you made a list of the various tenets that constitute the Internet ethos, one tenet would be that information should be free and easily accessible to all. This admirably egalitarian view is one of the reasons the Internet has been so successful. The composition of the Internet’s building blocks (the software that enables the various networks to communicate ...