Chapter 14. Implementing Internet Security and Privacy

In this chapter, you’ll learn how to:

  • Guard against e-mail viruses.

  • Set up Outlook Express to automatically delete spam messages.

  • Get and use a digital ID for secure e-mail.

  • Keep intruders at bay with Internet Connection Firewall.

  • Work with security zones and other Internet Explorer security settings.

  • Protect online privacy by managing cookies.

If you made a list of the various tenets that constitute the Internet ethos, one tenet would be that information should be free and easily accessible to all. This admirably egalitarian view is one of the reasons the Internet has been so successful. The composition of the Internet’s building blocks (the software that enables the various networks to communicate ...

Get Insider Power Techniques for Microsoft® Windows® XP now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.