Windows Internet Security

Seth Fogie, Cyrus Peikari

  • 出版商: Prentice Hall
  • 出版日期: 2001-10-07
  • 定價: $1,320
  • 售價: 6.0$792
  • 語言: 英文
  • 頁數: 400
  • 裝訂: Paperback
  • ISBN: 0130428310
  • ISBN-13: 9780130428318
  • 相關分類: 資訊安全
  • 立即出貨(限量) (庫存=8)



Protect your Windows system against Internet hackers—right now!

  • Protect your Windows computer—NOW!
  • Covers Windows 2000, Me, 98, 95, and Windows XP
  • Stop sharing your files with the world
  • Install your own personal firewall—step by step
  • Block your employer from reading your private email
  • Avoid worms, Trojans, viruses, and hostile Web pages

Whether you're running Windows XP, 2000, Me, 98, or 95, if you're connected to the Internet, you're at risk—especially if you're using an "always-on" cable modem or DSL connection. Now, learn exactly how to defend yourself—even if you know nothing about Internet security!

Windows Internet Security starts by reviewing the threats to your Windows PC: what hackers know about your computer and the Internet, and how they can use that knowledge to attack you. Then, step by step, you'll plan and implement today's most powerful defenses. Discover how to:

  • Stop sharing resources you don't want to expose to the world
  • Choose and implement the right "personal firewall"
  • Protect your e-commerce transactions
  • Avoid viruses, worms, Trojans, and hostile Web pages
  • Protect your privacy and anonymity on the Web
  • Cope with today's new wireless hacking attacks
  • Respond and recover if you've already been hacked
  • Make the most of Windows XP's new computer security features

Windows Internet Security makes security comprehensible, practical-even easy! At home or at work, it's the one indispensable security book for every Windows user and administrator.

Table of Contents

Studying the Battleground.
1. Computer Architecture and Operating System Review.

Understanding the Internals of Your Computer. Size Matters. The Hard Drive. RAM. The Processor (CPU). Cache. The Motherboard. Bus Speed/Size. The Modem. The Network Interface Card. Serial and Parallel Ports. Summary of the Computer versus Library Analogy. The Modem in Detail. Operating Systems and Internet Security. Windows 95/98/ME. Windows NT/2000/XP. Linux. Other UNIX-Based Operating Systems and Macs. Windows CE. Summary.

2. Understanding the Internet.

A Little Byte of History. The Internet Service Provider. What Is an ISP? POPs. ISP Logging. Proxy ISPs. Web Addressing Explained. URIs. URNs. URC. URLs. Internet Protocols. http. https. ftp. Other Protocols. Breaking Down the URL. The Internet Protocol Address. Domain Name Servers. URL Abuse. Web Pages: Inside and Out. Web Servers. HTML. Scripting and Codes. Malicious Coding.

3. TCP/IP.

A Computer: A House. Your Computer Ports: Your Doors and Windows. Roads and Highways: The Internet. TCP/IP: An Overview. TCP/IP: Driving Rules. CEO Analogy. TCP/IP: The Gory Details. Packets. Layers. TCP/IP Handshaking. Knowing the Enemy.

4. Know Your Enemy.

The Hacker versus the Cracker. The Script Kiddie. The Phreaker. Ethical versus Unethical Hackers. Global Hackers.

5. Hacking Techniques for Unauthorized Access.

WetWare. Social Engineering. Social Spying. Garbage Collecting. Sniffing. What is Sniffing? How Does a Sniffer Work? How Hackers Use Sniffers. How Can I Block Sniffers? How to Detect a Sniffer. Spoofing and Session Hijacking. An Example of Spoofing. Buffer Overflows. Character Manipulation and Unexpected Input Exploits. The Normal Search Engine Process. The Hacked Search Engine Process. Exploiting Web Forms.

6. Hacking Techniques for Attacks.

SYN Flooding. Smurf Attacks. System Overloads. DNS Spoofing.

7. Walk-Through of a Hacker Attack.

The Goal Stage. Walk-Through of a Hack. Information Gathering. Planning. Execution. Clean Up. Planning the Defense.

8. Building Your Defense Strategy.

Fortifying Your Defenses. Virus/Trojan Protection. Virus Scanners. Trojan Scanners. Firewalls. Hardware Firewalls. Software Firewalls. Hardware/Software Combination Firewalls. Which Firewall is Best for You? Restricting Access by IP. Restricting Access by Port (Service). Restricting Access by Protocol. Restricting Access by Keyword. Restricting Access by Application. Encryption. Encryption Details. Symmetric Encryption. Asymmetric Encryption. Putting Different Types of Encryption to the Test. Origin Verification. Secure Sockets Layer. Virtual Private Network. Disadvantages of Encryption. What Encryption Does Not Do. Recovery. Summary.

9. Personal Firewalls and Intrusion Detection Systems.

Do Personal Firewalls Really Work? The Fallacy of “Laying Low” . Why Do I Need a Personal Firewall? McAfee Personal Firewall. Norton Personal Firewall. BlackICE Defender. ZoneAlarm. Intrusion Detection Systems. Honeypots.

10. Stop Sharing Your Computer.

Network Shares. Password-Protecting Shares on Windows 95/98/ME. Removing Shares on Windows 95/98/ME. Removing Shares on Windows NT/2000/XP.

11. E-Commerce Security Overview.

Thwarting E-Criminals. Who is the Real Criminal? Stolen Goods Online. Secure Transactions.

12. Mastering Network Tools


13. Viruses, Worms, and Trojan Horses.

Viruses. A Virus Defined. MBR Virus. Macro Virus. File Infectors. Combination Viruses. Worms. Virus and Worm Prevention. I've Been Infected! Now What? Trojans. How a Trojan Works. The Backdoor Blues. Detecting and Removing Trojans. Hostile Web Pages and Scripting.

14. Malicious Code.

Programming Languages. Low-Level Languages. High-Level Languages. Scripting Languages. Programming Concepts. Program Parts. Malicious Client-Side Scripting. Denial of Service Scripts. Intrusive Access Scripts. Malicious Server-Side Scripting. PHP. ASP. Perl. The Virus/Worm. An Example of Viral Code. Moving With Stealth.

15. Privacy and Anonymity.

Cookies. Cookie #1. Cookie #2. Cookie #3. Unpleasant Cookies. Cookie #1. Cookie #2. Controlling Those Cookies. Your Online Identity. Registration Requests and Unique IDs. Online Identification. Hardware IDs. Spyware in the Workplace. Chat Programs. Proxies and Anonymity. Browser Caching.

16. Big Brother is Watching You.

Email Spying. Keeping Your Email Private. Web Page Monitoring. Defeating Corporate Web Filters. Chat Program Monitoring. Keep Your Chats Private. Spyware. Spying on the Employee. Spying on the Consumer. Spying on the Family. Government Spyware. Commentary: Ethics and Privacy. Future Trends.

17. Windows XP: New Security Features.

The Microsoft Internet Connection Firewall. Windows XP Wireless Security. 802.1x—Port-Based Network Access Control. New Windows XP Wireless Features. Microsoft's XP Hacker Test. Test Site Description. File Encryption and User Control.

18. Future Security Threats.

Mobile Computing. Wireless Network Hacking. Automated Hacking. Advanced Topics.

19. Registry Editing.

Introduction to Registry Editing. Purpose of the Registry. Parts of the Registry. Using the Registry. Backing Up the Registry. Restoring the Registry. Manipulating Registry Keys.

20. Disaster Recovery.

Creating a Boot Disk. Down but Not Out (Computer is Infected, but Still Functioning). Down and Out (Computer is Inoperable). Using FDISK/Format.

Appendix A: Common Trojan Ports.


Appendix B: Annotated Bibliography.

On the Web. Books. Internet Search. Hacking/Security Conferences.




  • 立即保護您的Windows電腦!

  • 適用於Windows 2000、Me、98、95和Windows XP

  • 停止與世界共享您的文件

  • 逐步安裝您自己的個人防火牆

  • 阻止您的雇主閱讀您的私人電子郵件

  • 避免蠕蟲、特洛伊木馬、病毒和惡意網頁

無論您使用的是Windows XP、2000、Me、98還是95,只要連接到互聯網,您就面臨風險,尤其是如果您使用的是“始終連接”的有線電纜調制解調器或DSL連接。現在,即使您對互聯網安全一無所知,也可以學習如何保護自己!

《Windows網絡安全》首先回顧了對您的Windows PC的威脅:黑客對您的計算機和互聯網的了解,以及他們如何利用這些知識對您進行攻擊。然後,逐步計劃並實施當今最強大的防禦措施。了解如何:

  • 停止共享您不想向世界展示的資源

  • 選擇並實施適合的“個人防火牆”

  • 保護您的電子商務交易

  • 避免病毒、蠕蟲、特洛伊木馬和惡意網頁

  • 保護您在網絡上的隱私和匿名性

  • 應對當今新的無線網絡攻擊

  • 如果您已經被黑客攻擊,做出回應和恢復

  • 充分利用Windows XP的新計算機安全功能




了解您計算機的內部結構。大小問題。硬盤。內存。處理器(CPU)。緩存。主板。匯流排速度/大小。調制解調器。網絡接口卡。串行和並行端口。計算機與圖書館類比的總結。詳細介紹調制解調器。操作系統和互聯網安全。Windows 95/98/ME。Windows NT/2000/XP。Linux。其他基於UNIX的操作系統和Mac。Windows CE。總結。