Chapter 23. Defending Your Home Network from Attack

As you learned in the previous chapter, a single home computer is an unlikely target for computer attack; what reason would a big-time cracker have to take down your PC? What attackers are interested in, however, are computers they can use to conduct other, more significant activities—such as attacking large networks and websites, or sending out tons of spam email messages. In this regard, your computer is a valued recruit in an army of zombie computers—just one of many, but an important part of the whole.

Of course, it’s also possible that an individual with a specific goal in mind might like to infiltrate your personal computer or home network, malicious intent beforehand. Perhaps this individual ...

Get Is It Safe? Protecting Your Computer, Your Business, and Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.