O'Reilly logo

Insider Power Techniques for Microsoft® Windows® XP by Austin Wilson, Scott Andersen, Geoff Winslow, Paul McFedries

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Implementing Internet Security and Privacy

In this chapter, you’ll learn how to:

  • Guard against e-mail viruses.

  • Set up Outlook Express to automatically delete spam messages.

  • Get and use a digital ID for secure e-mail.

  • Keep intruders at bay with Internet Connection Firewall.

  • Work with security zones and other Internet Explorer security settings.

  • Protect online privacy by managing cookies.

If you made a list of the various tenets that constitute the Internet ethos, one tenet would be that information should be free and easily accessible to all. This admirably egalitarian view is one of the reasons the Internet has been so successful. The composition of the Internet’s building blocks (the software that enables the various networks to communicate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required