相關主題
商品描述
Description:
Learn easy ways to keep your PC, your privacy, and your wallet safe on the Internet!
Viruses. Snoops. Scam artists. Thieves. It's a
great big Web out there, but it's easier to stay safe with PROTECT YOURSELF
ONLINE! Whether you use the Internet from home or the office, this easy-to-read
guide can help you disarm the most common threats to your online security and
privacy. Discover how to combine good judgment and readily available tools to
help bolster your safety–without intruding on your online fun.
Get expert
tips and easy checklists to:
• See what your browser is revealing about
you and how to minimize your exposure
• Deploy the best line of defense
against viruses and data loss
• Learn the security measures that help you
shop, bank, or trade stock electronically with confidence
• Help protect your
e-mail privacy and block Internet junk mail, or spam
• Spot online
opportunists and predators–and know where to file a complaint or report
fraud
• Identify security holes in your system and assess whether you need a
firewall at home
• Help thwart password-cracking programs and hackers–and
keep intruders out of your personal and business information
Table of Contents:
Foreword | xvii |
Acknowledgments | xxi |
Introduction | xxiii |
PART 1 PRIVACY AND SECURITY BASICS | |
CHAPTER 1 Beginning Your Online Journey | 3 |
Overcoming the Fear | 3 |
What Am I Protecting Myself From? | 4 |
Privacy and Security: The Big Picture | 6 |
Privacy and Security Today | 8 |
Learning to Protect Yourself Online | 9 |
Summary | 10 |
CHAPTER 2 Internet Fundamentals | 11 |
What Is the Internet? | 11 |
A Brief History of the Internet | 12 |
Connecting to the Internet | 13 |
Internet Services | 15 |
The World Wide Web | 15 |
How E-Mail Works | 16 |
TCP/IP Primer | 18 |
Protocols | 18 |
Packet Switching | 18 |
IP Addresses | 19 |
Routers and Gateways | 22 |
Summary | 23 |
CHAPTER 3 A New Breed of Threats | 25 |
General Loss of Privacy | 25 |
New Medium for Old Problems | 29 |
Offensive Content | 30 |
Threats to Children | 30 |
Impersonation | 31 |
Scam Artists and Fraud | 32 |
New Ways to Eavesdrop | 32 |
What Does a Packet Smell Like? | 32 |
Man-in-the-Middle Attacks | 34 |
Telephone Wiretapping and Modem Connections | 36 |
Keystroke Monitoring | 36 |
Denial-of-Service Attacks | 37 |
More Efficient Viruses | 39 |
Summary | 40 |
CHAPTER 4 Cryptography and Encryption | 41 |
Cryptography on the Internet | 41 |
The Significance of Cryptography | 42 |
The Basics of Cryptography | 42 |
The Four Basic Parts of Cryptography | 43 |
Cracking the Code | 44 |
Symmetric Encryption | 45 |
Public Key Encryption | 46 |
One-Way Hash Algorithms | 48 |
Digital Signatures | 48 |
Bits, Keys, and Encryption Strength | 50 |
Encryption Algorithms | 50 |
Certification Authorities and Digital Certificates | 50 |
Public Key Infrastructure (PKI) | 52 |
Components of PKI | 53 |
PKI in Action | 53 |
Secure Sockets Layer (SSL) | 54 |
Pretty Good Privacy (PGP) | 55 |
Secure/Multipurpose Internet Mail Extensions (S/MIME) | 58 |
Summary | 58 |
CHAPTER 5 Computer Viruses | 61 |
What Is a Virus? | 61 |
Some Facts About Viruses | 62 |
How a Virus Can Spread to Your Computer | 63 |
Essential Tips to Avoid Viruses | 64 |
Types of Viruses | 64 |
Virus Survival | 69 |
The Evolving Virus | 72 |
Bubbleboy and Kakworm | 72 |
Loveletter | 73 |
ExploreZip | 74 |
Melissa | 74 |
Chernobyl | 74 |
Protecting Yourself from Viruses | 75 |
The Best Defense: Virus-Scanning Programs | 75 |
Precautions You Must Take | 76 |
Precautions You Should Take | 77 |
Keeping Tabs on New Viruses | 78 |
Recovering from a Virus | 79 |
Summary | 80 |
PART 2 WEB PRIVACY AND SECURITY | |
CHAPTER 6 Downloading Stuff from the Web | 85 |
What Are the Dangers? | 86 |
Changing Security Settings in Internet Explorer | 87 |
Setting Security Levels | 89 |
Assigning a Web Site to a Security Zone | 90 |
What Kinds of Files and Programs Is My Browser Downloading? | 90 |
Cookies | 91 |
What Is a Cookie? | 91 |
Some Facts About Cookies | 92 |
Privacy Threats of Cookies | 92 |
Viewing Cookies Stored on Your Computer | 94 |
Deleting Cookies | 97 |
Blocking Cookies | 98 |
Anti-Cookie Programs | 99 |
ActiveX Controls and Java Applets | 101 |
How to Find Out Whether an ActiveX Control Is Safe | 101 |
How to Find Out Whether a Java Applet Is Safe | 105 |
Scripts | 107 |
Disabling Scripts in Internet Explorer | 107 |
Plug-ins | 108 |
Tips for Downloading Files Safely | 109 |
Summary | 110 |
CHAPTER 7 Shopping and Trading on the Web | 111 |
E-Commerce and the Web | 111 |
Benefits of E-Commerce | 112 |
Risks of E-Commerce | 112 |
Protecting Your Transactions | 113 |
How Safe Is My Credit Card? | 114 |
Verifying That Encryption Is Being Used | 114 |
Checking the Digital Certificate | 115 |
Spotting Fraud | 117 |
Obvious Warning Signs of Fraud | 117 |
Verifying That an Organization Is Legitimate | 118 |
Spotting Investment Scams | 118 |
Where to Turn for Help | 120 |
Protecting Your Privacy | 120 |
Seals of Approval on the Internet | 121 |
Platform for Privacy Preferences (P3P) | 124 |
Tips for Using E-Commerce Safely | 125 |
Tips for Shopping Online | 125 |
Tips for Trading Online | 126 |
Tips for Online Auctions | 126 |
Summary | 127 |
CHAPTER 8 Mailing Lists, Newsgroups, and Chat Rooms | 129 |
Mailing Lists and Newsgroups | 129 |
The Risks of Mailing Lists and Newsgroups | 131 |
Chat Rooms | 133 |
The Risks of Chat Rooms | 134 |
Tips for Using Mailing Lists, Newsgroups, and Chat Rooms Safely | 134 |
Tips for Using Mailing Lists and Newsgroups | 135 |
Tips for Using Chat Rooms | 137 |
Summary | 138 |
CHAPTER 9 Filtering Out Offensive Content | 139 |
Filtering Content in Internet Explorer | 139 |
The RSACi Content Rating System | 140 |
Setting Limits with Content Advisor | 141 |
Other Content Filters | 145 |
Other Resources | 147 |
Tips for Protecting Children on the Web | 147 |
Summary | 148 |
CHAPTER 10 Web Privacy for the Paranoid | 149 |
Who Is Following You? | 149 |
The Web Sites You Visit | 149 |
Your Internet Service Provider | 150 |
Your Employer | 151 |
How Do They Know Where Youve Been? | 152 |
Log Files | 153 |
What Your Browser Reveals | 153 |
The Evidence on Your Computer | 154 |
Covering Your Tracks | 154 |
Deleting Temporary Internet Files | 155 |
Clearing the History Folder and the AutoComplete List | 156 |
Disabling AutoComplete for Web Addresses | 157 |
Deleting Favorites | 158 |
Disabling Cookies | 158 |
Clearing the Documents Menu | 159 |
Disabling Personal Information | 160 |
Online Services and Third-Party Tools That Provide Anonymity | 162 |
Tips for Protecting Your Privacy | 163 |
Before Surfing | 163 |
While Surfing | 163 |
After Surfing | 163 |
Summary | 164 |
PART 3 E-MAIL PRIVACY AND SECURITY | |
CHAPTER 11 Encrypting and Signing E-Mail Messages | 167 |
E-Mail Privacy | 167 |
Prying Eyes | 168 |
Social Dangers | 170 |
Spam | 171 |
E-Mail Encryption Revisited | 171 |
Getting a Digital ID | 173 |
Obtaining a Digital ID Using Outlook Express | 173 |
Obtaining a Digital ID Using Outlook 2000 | 175 |
Protecting Your Digital ID | 177 |
Backing Up Your Digital ID | 178 |
Importing Your Digital ID | 181 |
Revoking Your Digital ID | 182 |
Digitally Signing E-Mail Messages | 182 |
Digitally Signing an E-Mail Message Using Outlook Express | 183 |
Digitally Signing an E-Mail Message Using Outlook 2000 | 183 |
Receiving a Digitally Signed Message | 184 |
Adding a Digital ID to Your Address Book or Contacts List | 186 |
Encrypting E-Mail Messages | 187 |
Getting Someone Elses Digital ID | 187 |
Encrypting an E-Mail Message Using Outlook Express | 188 |
Encrypting an E-Mail Message Using Outlook 2000 | 188 |
Receiving an Encrypted Message | 189 |
Trusting Digital IDs | 190 |
Summary | 193 |
CHAPTER 12 Spam | 195 |
What Is Spam? | 195 |
Recognizing Spam | 197 |
Types of Spam | 198 |
Why Do Companies Use Spam? | 199 |
How Do Spammers Get Your Address? | 200 |
Dealing with Spam | 201 |
Blocking Spam in Outlook Express | 203 |
Blocking Spam in Outlook 2000 | 205 |
Blocking Spam in Hotmail | 208 |
Fighting Back | 209 |
Anti-Spam Resources | 210 |
Tips for Avoiding Spam | 210 |
Summary | 211 |
CHAPTER 13 E-Mail Privacy for the Paranoid | 213 |
E-Mail Privacy Revisited | 213 |
Cleaning Up Messages on Your Computer | 215 |
Deleting Messages in Outlook Express | 215 |
Deleting Messages in Outlook 2000 | 219 |
Protecting Your Personal Folder File in Outlook 2000 | 222 |
Emptying the Recycle Bin | 224 |
Changing Security Zones | 225 |
Impersonation and Anonymity | 228 |
Signing Up for an E-Mail Account Using a False Name | 229 |
Using a Pseudonymous E-Mail Account | 230 |
Using an Anonymous Remailer | 232 |
Anonymous E-Mail Resources | 234 |
Tips for E-Mail Privacy and Security | 235 |
Summary | 236 |
PART 4 DESKTOP SECURITY | |
CHAPTER 14 Understanding Your Computers Vulnerabilities | 239 |
What Should I Be Worried About? | 239 |
Users as a Security Weakness | 240 |
Security Holes | 241 |
Backdoors | 241 |
Perimeters of Vulnerability | 242 |
File and Folder Vulnerability | 243 |
Program and Application Vulnerability | 244 |
Operating System Vulnerability | 245 |
Physical Vulnerability | 249 |
Vulnerability of Your Workplace Computer | 251 |
Summary | 252 |
CHAPTER 15 Using Strong Passwords | 255 |
Creating Passwords | 255 |
Cracking Passwords | 256 |
Creating a Strong Password | 257 |
Using Passwords Safely | 259 |
Using a Password Management Tool | 260 |
Finding Lost Passwords | 262 |
Network Login Passwords | 262 |
Web Site Login Passwords | 262 |
Windows Passwords | 263 |
File Passwords | 263 |
BIOS Password | 265 |
Resources for Downloading Password-Related Software | 266 |
Passwords and Smart Cards | 266 |
Smart Cards and Private Keys | 267 |
Tips for Using Passwords | 268 |
Summary | 268 |
CHAPTER 16 Securing Your Laptop Computer | 271 |
Laptop Theft | 271 |
Securing a Laptop Computer | 273 |
Reducing Your Risk | 273 |
Physical Security | 274 |
Data Security | 274 |
Recovering a Stolen Laptop | 275 |
Anti-Theft Software | 275 |
Tips for Laptop Security | 277 |
Summary | 277 |
CHAPTER 17 Securing Your Connections | 279 |
Security Risks of Connecting to the Internet | 279 |
Scanning for Weaknesses | 282 |
Protecting Your Computer with a Firewall | 283 |
Network and Personal Firewalls | 284 |
What Firewalls Cant Do | 285 |
Using a Firewall at Home | 286 |
Virtual Private Networks | 288 |
Checklist for Securing Your Internet Connection | 289 |
Summary | 290 |
CHAPTER 18 Securing Your Computer at Work | 291 |
Keeping People Out of Your Computer | 291 |
Using a Password-Protected Screen Saver | 292 |
Encrypting Files on Your Hard Drive | 294 |
Using Third-Party Encryption Tools | 294 |
Using the Windows 2000 Encrypting File System | 295 |
Remote Access Software | 299 |
Back Orifice 2000 | 300 |
Protecting Yourself from Remote Access Software | 301 |
Deleting Files Permanently | 301 |
Tips for Keeping People Out of Your Computer | 303 |
Summary | 304 |
CHAPTER 19 Backing Up Your Files | 305 |
Why Backups Are So Important | 305 |
Making Backups | 306 |
Deciding Which Files and Information to Back Up | 306 |
Selecting a Method for Backing Up Files and a Medium for Storing Them | 307 |
Repeating the Backup Process at Appropriate Intervals | 308 |
Using Microsoft Backup | 308 |
Installing Microsoft Backup on a Computer Running Windows 98 | 309 |
Installing Microsoft Backup on a Computer Running Windows Me | 309 |
Starting Microsoft Backup | 310 |
Creating a Backup Job | 311 |
Restoring Data from a Backup | 313 |
Tips for Backing Up Your Files | 314 |
Summary | 315 |
INDEX | 317 |