Авторизация
Поиск по указателям
Walker A. — Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Автор: Walker A.
Аннотация: Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense.
Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good.
We'll tell you how to immediately cut the risk of being attacked in half in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 384
Добавлена в каталог: 08.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
spam, origin of name
spam, overview
spam, protecting against
spam, reasons for 2nd
spam, responding
spam, responding, dangers
spam, safety tips
spam, safety tips, antivirus programs
spam, safety tips, guard your address
spam, safety tips, images 2nd
spam, safety tips, Junk filtering 2nd
spam, saftey tips
spam, saftey tips, mailto, avoiding
spam, sources of 2nd
spam, unstoppablity of 2nd
SpamCop.net
SpamCop.net, utilizing
spamming
spamming, commercial email lists
spamming, commercial email lists, description of
spamming, dictionary spamming
spamming, dictionary spamming, description of 2nd
spamming, website harvesting
spamming, website harvesting, description of
SpectorSoft
SpectorSoft, website
Spoofing
spoofing, description of
spoofing, email addresses
spoofing, email addresses, description of 2nd
spoofing, links
spoofing, links, description of 2nd
spoofing, web addresses
spoofing, web addresses, description of
Spoofstick
Spoofstick, description of
Spy Sweeper
Spy Sweeper, overview
Spybot
Spybot Search & Destroy
Spybot Search & Destroy, Immunize
Spybot, description of
Spybot, scanning for viruses
Spybot, updating 2nd
spyware
Spyware Doctor
Spyware Doctor, overview
spyware, anti-spyware programs
spyware, anti-spyware programs, Ad-Aware SE Personal 2nd
spyware, anti-spyware programs, installing more than one
spyware, anti-spyware programs, Microsoft AntiSpyware
spyware, anti-spyware programs, real-time portection, activating 2nd
spyware, anti-spyware programs, websites
spyware, dangers of 2nd 3rd 4th
spyware, definition of
spyware, etymology of
spyware, Macs
spyware, Macs, immune to spyware
spyware, overview 2nd
spyware, preventing
spyware, preventing, tips
spyware, removing
spyware, removing with Microsoft AntiSpyware 2nd 3rd
spyware, scanning for 2nd
spyware, symptoms of 2nd
spyware, who it effects
SSIDs
SSIDs, changing [See also wireless networks]
startup programs
startup programs, list of
startup programs, trashing 2nd
stateful inspection
stateful inspection, description of 2nd
statements
statements, reading
statements, reading, importance of
suites
suites, advantages and disadvantages 2nd
Sygate Personal Firewall Standard
Sygate Personal Firewall Standard, description of
Symantec Norton AntiVirus
Symantec Norton AntiVirus, overview [note] may be same as Symantec
symptoms
symptoms, spyware 2nd
System Explorers (Microsoft AntiSpyware)
System Explorers (Microsoft AntiSpyware), description of 2nd
system recovery CDs
system recovery CDs, utilizing 2nd
System Restore points
System Restore Points, setting
Temp folders (Windows)
Temp folders (Windows), contents
Temp folders (Windows), contents, erasing
TimeBombs
TimeBombs, description of [See also hackers]
tombstone shopping
tombstone shopping, description of
TrendMicro
TrendMicro, PC-Cillin Internet Security Suite
TrendMicro, PC-Cillin Internet Security Suite, overview
trialware
trialware, overview 2nd
Trojan horses [See also worms]
Trojan horses, as spyware
Trojan horses, effects of
Trojan horses, overview 2nd
Trojan horses, versus viruses and worms 2nd
two-way firewalls
two-way firewalls, utilizing 2nd 3rd
unsubscribing (email)
updates
updates (Windows)
updates (Windows), accessing 2nd
updates, automatic updates
updates, Automatic Updates, activating
updates, Microsoft Office
updates, security programs
updates, security programs, importance of
updates, Windows Update
updates, Windows Update, installing
updates, Windows Updates
updates, Windows Updates, installing
Updating
updating, anti-spyware programs
updating, anti-spyware programs, importance of
updating, antivirus/spyware signatures 2nd 3rd 4th
updating, Firefox 2nd
updating, Microsoft Office 2nd
updating, recommended programs to update 2nd
updating, routers 2nd
updating, Windows 2nd
updating, Windows, importance of
user accounts
user accounts, administrator
user accounts, administrator accounts
user accounts, administrator accounts, privacy snoops, preventing 2nd
user accounts, administrator, description of
user accounts, Guest accounts
user accounts, Guest accounts, disabling
user accounts, guests
user accounts, guests, description of
user accounts, hidden administrator accounts
user accounts, hidden administrator accounts, password protecting 2nd
user accounts, limited users
user accounts, limited users, descripiton of 2nd
user accounts, limiting 2nd
user accounts, logging off
user accounts, logging off, importance of
user accounts, privacy snoops
user accounts, privacy snoops, preventing 2nd
user accounts, XP Pro accounts 2nd
variants (viruses)
variants (viruses), description of
video drivers
video drivers, preserving during wipes
virus hoaxes
virus hoaxes, deleting files
virus hoaxes, effects of
virus hoaxes, identifying 2nd 3rd
virus hoaxes, overview
Viruses [See also Trojan horses]
viruses, antivirus programs
viruses, antivirus programs, failure updating 2nd
viruses, antivirus programs, free trials
viruses, antivirus programs, Grisoft's AVG 2nd
viruses, antivirus programs, heuristics description of
viruses, antivirus programs, importance of
viruses, antivirus programs, installing 2nd
viruses, antivirus programs, system scans
viruses, antivirus programs, virus signatures
viruses, as spam generators
viruses, authors of description of 2nd
viruses, boot viruses
viruses, boot viruses, effects of
viruses, boot viruses, overview
viruses, Cabir
viruses, computer versus biological
viruses, DDoS attacks
viruses, DDoS attacks, description of
viruses, definition of
viruses, disconnecting when infected 2nd
viruses, droppers
viruses, droppers, definition of
viruses, etymology of 2nd
viruses, file infector viruses
viruses, file infector viruses, effects of
viruses, file infector viruses, overview
viruses, macro viruses
viruses, macro viruses, effects of 2nd
viruses, macro viruses, Melissa 2nd
viruses, macro viruses, overview 2nd
viruses, macro viruses, preventing
viruses, Macs
viruses, Macs, overview 2nd
viruses, memory-resident viruses
viruses, memory-resident viruses, effects of
viruses, memory-resident viruses, overview
viruses, mobile gadget viruses
viruses, multi-partite viruses
viruses, multi-partite viruses, effects
viruses, multi-partite viruses, overview
viruses, overview 2nd
viruses, payloads
viruses, payloads, description of 2nd
viruses, prevention tips
viruses, prevention tips, Windows security updates 2nd
viruses, removing 2nd
viruses, removing, free programs for
viruses, scanning for 2nd
viruses, SP2
viruses, SP2, installing 2nd
viruses, spreading 2nd 3rd
viruses, symptoms 2nd
viruses, system scans
viruses, triggering
viruses, variants
viruses, variants, description of
viruses, versus worms and Trojan horses 2nd
viruses, virus signatures
viruses, virus signatures, updating 2nd
viruses, waht not to do 2nd
viruses, zombies
viruses, zombies, description of
virutal private networks [See VPNs]
VPNs
VPNs, dangers
vulnerability scanners
vulnerability scanners, description of
warchalking
warchalking, description of
wardialing
wardialing, description of [See also wardriving]
wardriving
wardriving, description of [See also wireless networks]
wardriving, how to 2nd
Web addresses
web addresses, spoofing
web addresses, spoofing, description of
web caches
web caches, clearing 2nd
Webroot Spy Sweeper
Webroot Spy Sweeper, overview
website harvesting
website harvesting, description of
websites
websites, anti-spyware programs
websites, anti-virus freeware 2nd
websites, BIOS access keys list
websites, freeware anti-spyware programs 2nd
websites, MRUs
websites, MRUs, cleaning
websites, payware anti-spyware programs 2nd
websites, payware antivirus programs 2nd
websites, product keys (Windows XP)
websites, product keys (Windows XP), recovering
websites, recommended anti-spam programs 2nd
websites, recommended firewalls 2nd
websites, virus hoax list
websites, virus news stories
websites, virus removal programs
websites, Windows startup programs list
websites, Windows Update
websites, Windows update reviews
WEP
WEP, overview 2nd 3rd
white-hat hackers
white-hat hackers, description of [See also hackers]
Wi-Fi
Wi-Fi Protected Access [See WPA]
WI-FI, description of [See also wireless networks]
WI-FI, identifying
Wi-Phishing
Wi-Phishing, description of 2nd
Windows
Windows 98
Windows 98, updating 2nd
Windows Firewall
Windows Firewall (non-SP2)
Windows Firewall (non-SP2), activating
Windows Firewall (non-SP2), enabling 2nd
Windows Firewall (SP2)
Windows Firewall (SP2), optional uses 2nd
Windows Firewall, disabling
Windows Firewall, non-SP2
Windows Firewall, non-SP2, activating
Windows Firewall, overview [See also firewalls]
Windows Media Player 10
Windows Media Player 10, backing up
Windows Media Player 10, cleaning
Windows recycle bins
Windows recycle bins, emptying
Windows Search
Windows Search, AutoComplete
Windows Search, AutoComplete, disabling
Windows security updates [See also SP2]
Windows security updates, SP2
Windows security updates, SP2, installing
Windows security updates, viruses
Windows security updates, viruses, preventing 2nd
Windows Service Pack 2 [See Service Pack 2]
Реклама