Авторизация
Поиск по указателям
Walker A. — Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Автор: Walker A.
Аннотация: Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense.
Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good.
We'll tell you how to immediately cut the risk of being attacked in half in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 384
Добавлена в каталог: 08.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Microsoft Office 2003, setting
Microsoft Office 2003, setting, backing up
Microsoft Office, cleaning
Microsoft Office, updating 2nd 3rd
mobile gadgets
mobile gadgets, viruses
motherboard/chipset drivers
motherboard/chipset drivers, preserving during wipes 2nd
Mozilla Firefox [See Firefox]
Mozilla Firefox, cleaning 2nd
MRUs
MRUs, cleaning
MSN Messenger
MSN Messenger, chat logs
MSN Messenger, chat logs, disabling
multi-partite viruses
multi-partite viruses, effects of
multi-partite viruses, overview
Multimedia players
multimedia players, cleaning
multimedia players, cleaning, overview
multimedia players, cleaning, Real Player 10
multimedia players, cleaning, Windows Media Player 10
My Documents
My Documents, backing up
My Recent Documents (Windows)
My Recent Documents (Windows), clearing
NAT
NAT, installing 2nd
NAT, overview 2nd
NAT, stateful inspection
NAT, stateful inspection, description of 2nd
NetCraft
Netcraft anti-phishing toolbar
Netcraft anti-phishing toolbar, downloading
Netcraft anti-phishing toolbar, installing
Netcraft anti-phishing toolbar, installing on Firefox 2nd
Netcraft anti-phishing toolbar, installing on Internet Explorer 2nd
NetCraft, description of
network adapters [See Ethernet ports]
Network Address Translation (NAT) [See NAT]
networks
networks (wireless) [See wireless networks]
networks, importance of inspecting
networks, unplugging
networks, unplugging for back ups
Newsgroups
newsgroups, dangers
newsgroups, dangers, spam
NIC [See Ethernet ports]
Nigeriang 419 scams
Nigeriang 419 scams, avoiding 2nd
NOD32
NOD32, overview
Norton Internet Security AntiSpyware Edition
Norton Internet Security AntiSpyware Edition, overview [See also Symantec]
Norton Personal Firewall
Office
Office, updating 2nd
open source software
open source software, description of
Outlook
Outlook 2003
Outlook 2003, source code
Outlook 2003, source code, viewing
Outlook, backing up
Outlook, images
Outlook, images, disabling
Outlook, Junk filters
Outlook, Junk filters, enabling 2nd
Panda Titanium Antivirus
Panda Titanium Antivirus, overview 2nd
partitioning hard drives 2nd
passphrases (WPA)
passphrases (WPA), description of
Passwords
passwords, creating effectively
passwords, hidden administrator accounts 2nd
payloads (viruses)
payloads (viruses), description of 2nd
payware
payware, overview 2nd
payware, recommended anti-spyware programs 2nd 3rd
payware, recommended anti-virus programs 2nd 3rd
payware, tips for choosing 2nd
PC Tools Spyware Doctor
PC Tools Spyware Doctor, overview
PC-Cillin Internet Security Suite
PC-Cillin Internet Security Suite, overview
PestPatrol
PestPatrol, overview
pharming
pharming, overview 2nd
phishing [See also spoofing]
phishing, dangers of
phishing, description of
phishing, emails
phishing, emails, description of
phishing, emails, identifying 2nd
phishing, key loggers
phishing, NetCraft
phishing, Netcraft anti-phishing toolbar
phishing, Netcraft anti-phishing toolbar, downloading
phishing, Netcraft anti-phishing toolbar, installing (Firefox users) 2nd
phishing, Netcraft anti-phishing toolbar, installing (Internet Explorer users) 2nd
phishing, NetCraft, utilizing
phishing, overview 2nd
phishing, safety tips
phishing, safety tips, Cloadmark Desktop 2nd
phishing, safety tips, cut and paste 2nd
phishing, safety tips, don't ask, don't tell
phishing, safety tips, identify secure pages
phishing, saftey tips
phishing, saftey tips, updating programs 2nd
phishing, SpoofStick
phishing, SpoofStick, description of
phishing, whois at risk
phishing, Wi-Phishing
phishing, Wi-Phishing, description of 2nd
pop-ups [See also adware]
pop-ups, dangers of
Privacy
privacy snoops
privacy snoops, identities of
privacy snoops, preventing
privacy snoops, preventing with administrator accounts 2nd
privacy snoops, preventing with user accounts 2nd
privacy, AutoComplete
privacy, AutoComplete, disabling 2nd
privacy, chat logs
privacy, chat logs, disabling 2nd
privacy, CleanCache
privacy, CleanCache, description of
privacy, clipboards
privacy, clipboards, clearing 2nd
privacy, cookies
privacy, cookies, clearing 2nd
privacy, cookies, importance of deleting
privacy, email
privacy, email, deleted items folder, empyting
privacy, email, overview 2nd
privacy, email, saved sent items, disabling 2nd
privacy, email, servers, deleting from 2nd
privacy, files
privacy, files, deleting permanetly 2nd
privacy, files, privatizing 2nd
privacy, history (Internet Explorer)
privacy, history (Internet Explorer), clearing
privacy, importance of 2nd
privacy, invasions
privacy, invasions, consequences of 2nd
privacy, liabilities to 2nd
privacy, logging off
privacy, logging off, importance of
privacy, Microsoft Office
privacy, Microsoft Office, cleaning
privacy, Mozilla Firefox
privacy, Mozilla Firefox, cleaning 2nd
privacy, multimedia players
privacy, multimedia players, cleaning overview
privacy, multimedia players, cleaning Real Player 10
privacy, multimedia players, cleaning Windows Media Player 10
privacy, My Recent Documents
privacy, My Recent Documents, clearing
privacy, recycle bins
privacy, recycle bins, emptying
privacy, restore points
privacy, restore points, cleaning 2nd
privacy, Temp folders
privacy, Temp folders, contents, erasing
privacy, user accounts
privacy, user accounts, limiting 2nd
privacy, web caches
privacy, web caches, clearing 2nd
privacy, Windows Search
privacy, Windows Search, AutoComplete, disabling
processlibrary.com
processlibrary.com, description of
product key (Windows XP)
product key (Windows XP), recovering
product keys (Windows)
product keys (Windows), description of
Programs
programs, Running Processes
programs, Running Processes, checking 2nd
programs, startup programs
programs, startup programs, trashing 2nd
programs, trashing unnecessary programs
programs, unnecessary programs
programs, unnecessary programs, trashing 2nd
PUPs
PUPs, description of
Real Player 10
Real Player 10, cleaning
real-time protection
Real-time Protection (Microsoft AntiSpyware)
Real-time Protection (Microsoft AntiSpyware), description of
real-time protection, activating 2nd
recycle bins (Windows)
recycle bins (Windows), emptying
reformatting (hard drives)
reformatting (hard drives), how to 2nd
REGEDIT
regedit, accessing
restore points
restore points, cleaning 2nd
restore points, setting
root kits
root kits, description of
routers [See also NAT]
routers, default IDs and passwords
routers, IDs and passwords
routers, IDs and passwords, changing 2nd
routers, IDs and passwords, reseting
routers, set-up
routers, set-up, accessing 2nd
routers, truning off
routers, truning off, advantages of
routers, updating 2nd
routers, versus firewalls
Safe Mode
Safe Mode, scanning in 2nd
Sasser worm
Sasser worm, description of
scans (anti-spyware)
scans (anti-spyware), running
secure web pages
secure web pages, identifying
Security 2nd [See also viruses]
Security Center
Security Center applet (SP2)
Security Center applet (SP2), overview 2nd
Security Center, managing settings 2nd
security settings
security settings, recommendations
security, what not to do 2nd
seeding bots
seeding bots, description of [See also viruses]
Servers
servers, email
servers, email, deleting 2nd
Service Pack 2
Service Pack 2, identifying
Service Set Identifier [See SSID]
Shareware
shareware, overview 2nd
Sharing [See file sharing]
shredding
shredding, importance of
signatures
signatures (anti-spyware)
signatures (anti-spyware), updating
signatures (anti-spyware), updating, importance of
signatures, updating
signatures, updating, importance of 2nd 3rd 4th
Simple File Sharing
Simple File Sharing, disabling 2nd
simple identity theft
simple identity theft, description of
skimming
skimming, description of
sniffers
sniffers, description of
snoopware
snoopware, description of 2nd
Software
software, tips for buying 2nd
SonicWall TZ 150
SonicWall TZ 150, recommendation of
source code
source code, description of
SP2
SP2, advantages of 2nd
SP2, features of 2nd
SP2, installing 2nd [See also Windows security updates]
SP2, installing, preparations for 2nd
SP2, managing settings 2nd
SP2, ordering on CD
SP2, Security Center applet
SP2, Security Center applet, overview 2nd
Spam [See also email]
Spam Arrest
Spam Arrest, overview
spam, anti-spam laws
spam, anti-spam laws, description of
spam, anti-spam programs
spam, anti-spam programs, Cloudmark Desktop
spam, anti-spam programs, overview 2nd
spam, as a spyware source
spam, Cloudmark Desktop
spam, Cloudmark Desktop, overview 2nd
spam, contests
spam, contests, dangers
spam, definition of
spam, effects of 2nd
spam, email forwarding
spam, email forwarding, saftey tips
spam, fighting back 2nd
spam, newsgroups
spam, newsgroups, dangers
Реклама