Авторизация
Поиск по указателям
Walker A. — Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Автор: Walker A.
Аннотация: Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense.
Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good.
We'll tell you how to immediately cut the risk of being attacked in half in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 384
Добавлена в каталог: 08.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Windows Update
Windows Update, accessing 2nd
Windows Update, importance of
Windows Update, installing
Windows updates
Windows Updates, installing
Windows validation process
Windows validation process, failing
Windows XP
Windows XP firewall
Windows XP firewall, turning on 2nd
Windows XP install CDs
Windows XP install CDs, wiping hard drives 2nd 3rd
Windows XP, product key
Windows XP, product key, recovering
windows, activating
Windows, activating, importance of 2nd
Windows, anti-spyware programs [See Microsoft AntiSpyware]
Windows, clipboards
Windows, clipboards, clearing 2nd
Windows, computer names
Windows, computer names, changing
Windows, File and Settings Transfer Wizard
Windows, File and Settings Transfer Wizard, utilizing 2nd
Windows, My Recent Documents
Windows, My Recent Documents, clearing
Windows, product keys
Windows, product keys, description of
Windows, re-installing
Windows, re-installing, importance of 2nd
Windows, reinstaling
Windows, reinstaling, how to 2nd
Windows, reinstalling
Windows, reinstalling, backing up before 2nd 3rd 4th
Windows, reinstalling, drivers, preserving 2nd 3rd
Windows, reinstalling, supplies required for 2nd
Windows, reinstalling, system recovery CDs 2nd
Windows, reinstalling, unplugging the network
Windows, reinstalling, wiping supplies required for [See also hard drives]
Windows, reinstalling, wiping the hard drive 2nd
Windows, restore points
Windows, restore points, cleaning 2nd
Windows, securing
Windows, securing, trashing unnecessary programs
Windows, Security bar
Windows, Security bar, adding
Windows, startup programs
Windows, startup programs, list of
Windows, startup programs, trashing 2nd
Windows, Temp folders
Windows, Temp folders, contents, erasing
Windows, unnecessary programs
Windows, unnecessary programs, trashing 2nd
Windows, updating
Windows, updating, dangers of 2nd
Windows, updating, overview 2nd
Wired Equavalent Privacy [See WEP]
wireless connections
wireless connections, updating routers through
wireless hackers
wireless hackers, description of
wireless networks
wireless networks, bandwidth theft
wireless networks, bandwidth theft, description of 2nd
wireless networks, dangers
wireless networks, dangers, overview 2nd
wireless networks, DHCP logs
wireless networks, DHCP logs, assessing 2nd
wireless networks, DHCP logs, overview 2nd
wireless networks, file sharing
wireless networks, file sharing, dangers 2nd
wireless networks, file sharing, disabling 2nd
wireless networks, firewalls
wireless networks, firewalls, turning on 2nd
wireless networks, holes
wireless networks, holes, overview 2nd
wireless networks, MAC addresses
wireless networks, MAC addresses, locating
wireless networks, MAC addresses, Mac OS X
wireless networks, MAC addresses, Windows 95, 98, and ME
wireless networks, MAC addresses, Windows XP
wireless networks, overview 2nd
wireless networks, routers
wireless networks, routers, changing IDs and passwords 2nd
wireless networks, routers, default IDs and passwords
wireless networks, routers, reseting IDs and passwords
wireless networks, routers, set-up, accessing
wireless networks, routers, set-ups, accessing
wireless networks, security
wireless networks, security software
wireless networks, security technologies
wireless networks, security technologies, WEP 2nd 3rd
wireless networks, security technologies, WPA 2nd
wireless networks, security, MAC address filtering 2nd 3rd
wireless networks, SSIDs
wireless networks, SSIDs, changing 2nd
wireless networks, turning off 2nd
wireless networks, turning off, advantages of
wireless networks, warchalking
wireless networks, warchalking, description of
wireless networks, wardriving
wireless networks, wardriving, description of 2nd
wireless networks, wardriving, how to 2nd
wireless networks, Wi-Phishing
wireless networks, Wi-Phishing, description of 2nd
worms [See also viruses]
worms, Blaster
worms, Blaster, description of
worms, effects of
worms, KakWorm
worms, KakWorm, description of
worms, overview 2nd
worms, Sasser
worms, Sasser, description of
worms, versus Trojan horses and viruses 2nd
WPA
WPA, overview 2nd
XP Pro
XP Pro, Simple File Sharing
XP Pro, Simple File Sharing, disabling 2nd
XP Pro, user accounts
XP Pro, user accounts, utilizing 2nd
Yahoo! Messenger
Yahoo! Messenger, chat logs
Yahoo! Messenger, chat logs, disabling
zombies
zombies, description of
zombies, hacker's purpose for 2nd
ZoneAlarm
ZoneAlarm, description of
ZoneAlarm, utilizing 2nd 3rd
Реклама