Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Walker A. — Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Walker A. — Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses

Автор: Walker A.

Аннотация:

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense.

Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good.

We'll tell you how to immediately cut the risk of being attacked in half in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 384

Добавлена в каталог: 08.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Microsoft Office 2003, setting      
Microsoft Office 2003, setting, backing up      
Microsoft Office, cleaning      
Microsoft Office, updating      2nd 3rd
mobile gadgets      
mobile gadgets, viruses      
motherboard/chipset drivers      
motherboard/chipset drivers, preserving during wipes      2nd
Mozilla Firefox      [See Firefox]
Mozilla Firefox, cleaning      2nd
MRUs      
MRUs, cleaning      
MSN Messenger      
MSN Messenger, chat logs      
MSN Messenger, chat logs, disabling      
multi-partite viruses      
multi-partite viruses, effects of      
multi-partite viruses, overview      
Multimedia players      
multimedia players, cleaning      
multimedia players, cleaning, overview      
multimedia players, cleaning, Real Player 10      
multimedia players, cleaning, Windows Media Player 10      
My Documents      
My Documents, backing up      
My Recent Documents (Windows)      
My Recent Documents (Windows), clearing      
NAT      
NAT, installing      2nd
NAT, overview      2nd
NAT, stateful inspection      
NAT, stateful inspection, description of      2nd
NetCraft      
Netcraft anti-phishing toolbar      
Netcraft anti-phishing toolbar, downloading      
Netcraft anti-phishing toolbar, installing      
Netcraft anti-phishing toolbar, installing on Firefox      2nd
Netcraft anti-phishing toolbar, installing on Internet Explorer      2nd
NetCraft, description of      
network adapters      [See Ethernet ports]
Network Address Translation (NAT)      [See NAT]
networks      
networks (wireless)      [See wireless networks]
networks, importance of inspecting      
networks, unplugging      
networks, unplugging for back ups      
Newsgroups      
newsgroups, dangers      
newsgroups, dangers, spam      
NIC      [See Ethernet ports]
Nigeriang 419 scams      
Nigeriang 419 scams, avoiding      2nd
NOD32      
NOD32, overview      
Norton Internet Security AntiSpyware Edition      
Norton Internet Security AntiSpyware Edition, overview      [See also Symantec]
Norton Personal Firewall      
Office      
Office, updating      2nd
open source software      
open source software, description of      
Outlook      
Outlook 2003      
Outlook 2003, source code      
Outlook 2003, source code, viewing      
Outlook, backing up      
Outlook, images      
Outlook, images, disabling      
Outlook, Junk filters      
Outlook, Junk filters, enabling      2nd
Panda Titanium Antivirus      
Panda Titanium Antivirus, overview      2nd
partitioning hard drives      2nd
passphrases (WPA)      
passphrases (WPA), description of      
Passwords      
passwords, creating effectively      
passwords, hidden administrator accounts      2nd
payloads (viruses)      
payloads (viruses), description of      2nd
payware      
payware, overview      2nd
payware, recommended anti-spyware programs      2nd 3rd
payware, recommended anti-virus programs      2nd 3rd
payware, tips for choosing      2nd
PC Tools Spyware Doctor      
PC Tools Spyware Doctor, overview      
PC-Cillin Internet Security Suite      
PC-Cillin Internet Security Suite, overview      
PestPatrol      
PestPatrol, overview      
pharming      
pharming, overview      2nd
phishing      [See also spoofing]
phishing, dangers of      
phishing, description of      
phishing, emails      
phishing, emails, description of      
phishing, emails, identifying      2nd
phishing, key loggers      
phishing, NetCraft      
phishing, Netcraft anti-phishing toolbar      
phishing, Netcraft anti-phishing toolbar, downloading      
phishing, Netcraft anti-phishing toolbar, installing (Firefox users)      2nd
phishing, Netcraft anti-phishing toolbar, installing (Internet Explorer users)      2nd
phishing, NetCraft, utilizing      
phishing, overview      2nd
phishing, safety tips      
phishing, safety tips, Cloadmark Desktop      2nd
phishing, safety tips, cut and paste      2nd
phishing, safety tips, don't ask, don't tell      
phishing, safety tips, identify secure pages      
phishing, saftey tips      
phishing, saftey tips, updating programs      2nd
phishing, SpoofStick      
phishing, SpoofStick, description of      
phishing, whois at risk      
phishing, Wi-Phishing      
phishing, Wi-Phishing, description of      2nd
pop-ups      [See also adware]
pop-ups, dangers of      
Privacy      
privacy snoops      
privacy snoops, identities of      
privacy snoops, preventing      
privacy snoops, preventing with administrator accounts      2nd
privacy snoops, preventing with user accounts      2nd
privacy, AutoComplete      
privacy, AutoComplete, disabling      2nd
privacy, chat logs      
privacy, chat logs, disabling      2nd
privacy, CleanCache      
privacy, CleanCache, description of      
privacy, clipboards      
privacy, clipboards, clearing      2nd
privacy, cookies      
privacy, cookies, clearing      2nd
privacy, cookies, importance of deleting      
privacy, email      
privacy, email, deleted items folder, empyting      
privacy, email, overview      2nd
privacy, email, saved sent items, disabling      2nd
privacy, email, servers, deleting from      2nd
privacy, files      
privacy, files, deleting permanetly      2nd
privacy, files, privatizing      2nd
privacy, history (Internet Explorer)      
privacy, history (Internet Explorer), clearing      
privacy, importance of      2nd
privacy, invasions      
privacy, invasions, consequences of      2nd
privacy, liabilities to      2nd
privacy, logging off      
privacy, logging off, importance of      
privacy, Microsoft Office      
privacy, Microsoft Office, cleaning      
privacy, Mozilla Firefox      
privacy, Mozilla Firefox, cleaning      2nd
privacy, multimedia players      
privacy, multimedia players, cleaning overview      
privacy, multimedia players, cleaning Real Player 10      
privacy, multimedia players, cleaning Windows Media Player 10      
privacy, My Recent Documents      
privacy, My Recent Documents, clearing      
privacy, recycle bins      
privacy, recycle bins, emptying      
privacy, restore points      
privacy, restore points, cleaning      2nd
privacy, Temp folders      
privacy, Temp folders, contents, erasing      
privacy, user accounts      
privacy, user accounts, limiting      2nd
privacy, web caches      
privacy, web caches, clearing      2nd
privacy, Windows Search      
privacy, Windows Search, AutoComplete, disabling      
processlibrary.com      
processlibrary.com, description of      
product key (Windows XP)      
product key (Windows XP), recovering      
product keys (Windows)      
product keys (Windows), description of      
Programs      
programs, Running Processes      
programs, Running Processes, checking      2nd
programs, startup programs      
programs, startup programs, trashing      2nd
programs, trashing unnecessary programs      
programs, unnecessary programs      
programs, unnecessary programs, trashing      2nd
PUPs      
PUPs, description of      
Real Player 10      
Real Player 10, cleaning      
real-time protection      
Real-time Protection (Microsoft AntiSpyware)      
Real-time Protection (Microsoft AntiSpyware), description of      
real-time protection, activating      2nd
recycle bins (Windows)      
recycle bins (Windows), emptying      
reformatting (hard drives)      
reformatting (hard drives), how to      2nd
REGEDIT      
regedit, accessing      
restore points      
restore points, cleaning      2nd
restore points, setting      
root kits      
root kits, description of      
routers      [See also NAT]
routers, default IDs and passwords      
routers, IDs and passwords      
routers, IDs and passwords, changing      2nd
routers, IDs and passwords, reseting      
routers, set-up      
routers, set-up, accessing      2nd
routers, truning off      
routers, truning off, advantages of      
routers, updating      2nd
routers, versus firewalls      
Safe Mode      
Safe Mode, scanning in      2nd
Sasser worm      
Sasser worm, description of      
scans (anti-spyware)      
scans (anti-spyware), running      
secure web pages      
secure web pages, identifying      
Security      2nd [See also viruses]
Security Center      
Security Center applet (SP2)      
Security Center applet (SP2), overview      2nd
Security Center, managing settings      2nd
security settings      
security settings, recommendations      
security, what not to do      2nd
seeding bots      
seeding bots, description of      [See also viruses]
Servers      
servers, email      
servers, email, deleting      2nd
Service Pack 2      
Service Pack 2, identifying      
Service Set Identifier      [See SSID]
Shareware      
shareware, overview      2nd
Sharing      [See file sharing]
shredding      
shredding, importance of      
signatures      
signatures (anti-spyware)      
signatures (anti-spyware), updating      
signatures (anti-spyware), updating, importance of      
signatures, updating      
signatures, updating, importance of      2nd 3rd 4th
Simple File Sharing      
Simple File Sharing, disabling      2nd
simple identity theft      
simple identity theft, description of      
skimming      
skimming, description of      
sniffers      
sniffers, description of      
snoopware      
snoopware, description of      2nd
Software      
software, tips for buying      2nd
SonicWall TZ 150      
SonicWall TZ 150, recommendation of      
source code      
source code, description of      
SP2      
SP2, advantages of      2nd
SP2, features of      2nd
SP2, installing      2nd [See also Windows security updates]
SP2, installing, preparations for      2nd
SP2, managing settings      2nd
SP2, ordering on CD      
SP2, Security Center applet      
SP2, Security Center applet, overview      2nd
Spam      [See also email]
Spam Arrest      
Spam Arrest, overview      
spam, anti-spam laws      
spam, anti-spam laws, description of      
spam, anti-spam programs      
spam, anti-spam programs, Cloudmark Desktop      
spam, anti-spam programs, overview      2nd
spam, as a spyware source      
spam, Cloudmark Desktop      
spam, Cloudmark Desktop, overview      2nd
spam, contests      
spam, contests, dangers      
spam, definition of      
spam, effects of      2nd
spam, email forwarding      
spam, email forwarding, saftey tips      
spam, fighting back      2nd
spam, newsgroups      
spam, newsgroups, dangers      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте