Chapter 14. Implementing Internet Security and Privacy

In this chapter, you’ll learn how to:

  • Guard against e-mail viruses.

  • Set up Outlook Express to automatically delete spam messages.

  • Get and use a digital ID for secure e-mail.

  • Keep intruders at bay with Internet Connection Firewall.

  • Work with security zones and other Internet Explorer security settings.

  • Protect online privacy by managing cookies.

If you made a list of the various tenets that constitute the Internet ethos, one tenet would be that information should be free and easily accessible to all. This admirably egalitarian view is one of the reasons the Internet has been so successful. The composition of the Internet’s building blocks (the software that enables the various networks to communicate ...

Get Insider Power Techniques for Microsoft® Windows® XP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.