Chapter 1: Spies, Spams, Scams — They’re Out to Get You
In This Chapter
Determining which hazards and hoaxes to look out for
Keeping up to date with reliable sources
Figuring out whether you’re infected
Windows XP had more holes than a prairie-dog field. Vista was built on top of Windows XP, and the holes were hidden better. Windows 7 included truly innovative security capabilities; it represented the first really significant break from XP’s lethargic approach to security.
Windows 8 includes marginal security improvements to Windows itself, but better safety nets to keep you from shooting yourself in the foot. Also a fully functional, very capable antivirus program is built in. That’s important.
In this chapter, I explain the ...