Protect Yourself Online

Matthew Danda

  • 出版商: MicroSoft
  • 出版日期: 2001-04-28
  • 售價: $700
  • 語言: 英文
  • 頁數: 336
  • 裝訂: Paperback
  • ISBN: 0735611882
  • ISBN-13: 9780735611887
  • 相關分類: 駭客 Hack
  • 下單後立即進貨 (約5~7天)

相關主題

商品描述

Description:

Learn easy ways to keep your PC, your privacy, and your wallet safe on the Internet!

Viruses. Snoops. Scam artists. Thieves. It's a great big Web out there, but it's easier to stay safe with PROTECT YOURSELF ONLINE! Whether you use the Internet from home or the office, this easy-to-read guide can help you disarm the most common threats to your online security and privacy. Discover how to combine good judgment and readily available tools to help bolster your safety–without intruding on your online fun.

Get expert tips and easy checklists to:

• See what your browser is revealing about you and how to minimize your exposure
• Deploy the best line of defense against viruses and data loss
• Learn the security measures that help you shop, bank, or trade stock electronically with confidence
• Help protect your e-mail privacy and block Internet junk mail, or spam
• Spot online opportunists and predators–and know where to file a complaint or report fraud
• Identify security holes in your system and assess whether you need a firewall at home
• Help thwart password-cracking programs and hackers–and keep intruders out of your personal and business information

 

Table of Contents:

Foreword xvii
Acknowledgments xxi
Introduction xxiii
PART 1   PRIVACY AND SECURITY BASICS  
CHAPTER 1   Beginning Your Online Journey 3
    Overcoming the Fear 3
    What Am I Protecting Myself From? 4
    Privacy and Security: The Big Picture 6
    Privacy and Security Today 8
    Learning to Protect Yourself Online 9
    Summary 10
CHAPTER 2   Internet Fundamentals 11
    What Is the Internet? 11
        A Brief History of the Internet 12
        Connecting to the Internet 13
        Internet Services 15
    The World Wide Web 15
    How E-Mail Works 16
    TCP/IP Primer 18
        Protocols 18
        Packet Switching 18
        IP Addresses 19
        Routers and Gateways 22
    Summary 23
CHAPTER 3   A New Breed of Threats 25
    General Loss of Privacy 25
    New Medium for Old Problems 29
        Offensive Content 30
        Threats to Children 30
        Impersonation 31
        Scam Artists and Fraud 32
    New Ways to Eavesdrop 32
        What Does a Packet Smell Like? 32
        Man-in-the-Middle Attacks 34
        Telephone Wiretapping and Modem Connections 36
        Keystroke Monitoring 36
    Denial-of-Service Attacks 37
    More Efficient Viruses 39
    Summary 40
CHAPTER 4   Cryptography and Encryption 41
    Cryptography on the Internet 41
        The Significance of Cryptography 42
        The Basics of Cryptography 42
        The Four Basic Parts of Cryptography 43
        Cracking the Code 44
        Symmetric Encryption 45
        Public Key Encryption 46
        One-Way Hash Algorithms 48
        Digital Signatures 48
        Bits, Keys, and Encryption Strength 50
        Encryption Algorithms 50
        Certification Authorities and Digital Certificates 50
    Public Key Infrastructure (PKI) 52
        Components of PKI 53
        PKI in Action 53
    Secure Sockets Layer (SSL) 54
    Pretty Good Privacy (PGP) 55
    Secure/Multipurpose Internet Mail Extensions (S/MIME) 58
    Summary 58
CHAPTER 5   Computer Viruses 61
        What Is a Virus? 61
        Some Facts About Viruses 62
        How a Virus Can Spread to Your Computer 63
        Essential Tips to Avoid Viruses 64
        Types of Viruses 64
        Virus Survival 69
    The Evolving Virus 72
        Bubbleboy and Kakworm 72
        Loveletter 73
        ExploreZip 74
        Melissa 74
        Chernobyl 74
    Protecting Yourself from Viruses 75
        The Best Defense: Virus-Scanning Programs 75
        Precautions You Must Take 76
        Precautions You Should Take 77
        Keeping Tabs on New Viruses 78
        Recovering from a Virus 79
    Summary 80
PART 2   WEB PRIVACY AND SECURITY  
CHAPTER 6   Downloading Stuff from the Web 85
    What Are the Dangers? 86
    Changing Security Settings in Internet Explorer 87
        Setting Security Levels 89
        Assigning a Web Site to a Security Zone 90
    What Kinds of Files and Programs Is My Browser Downloading? 90
    Cookies 91
        What Is a Cookie? 91
        Some Facts About Cookies 92
        Privacy Threats of Cookies 92
        Viewing Cookies Stored on Your Computer 94
        Deleting Cookies 97
        Blocking Cookies 98
        Anti-Cookie Programs 99
    ActiveX Controls and Java Applets 101
        How to Find Out Whether an ActiveX Control Is Safe 101
        How to Find Out Whether a Java Applet Is Safe 105
    Scripts 107
        Disabling Scripts in Internet Explorer 107
    Plug-ins 108
    Tips for Downloading Files Safely 109
    Summary 110
CHAPTER 7   Shopping and Trading on the Web 111
    E-Commerce and the Web 111
        Benefits of E-Commerce 112
        Risks of E-Commerce 112
    Protecting Your Transactions 113
        How Safe Is My Credit Card? 114
        Verifying That Encryption Is Being Used 114
        Checking the Digital Certificate 115
    Spotting Fraud 117
        Obvious Warning Signs of Fraud 117
        Verifying That an Organization Is Legitimate 118
        Spotting Investment Scams 118
        Where to Turn for Help 120
    Protecting Your Privacy 120
        Seals of Approval on the Internet 121
        Platform for Privacy Preferences (P3P) 124
    Tips for Using E-Commerce Safely 125
        Tips for Shopping Online 125
        Tips for Trading Online 126
        Tips for Online Auctions 126
    Summary 127
CHAPTER 8   Mailing Lists, Newsgroups, and Chat Rooms 129
    Mailing Lists and Newsgroups 129
        The Risks of Mailing Lists and Newsgroups 131
    Chat Rooms 133
        The Risks of Chat Rooms 134
    Tips for Using Mailing Lists, Newsgroups, and Chat Rooms Safely 134
        Tips for Using Mailing Lists and Newsgroups 135
        Tips for Using Chat Rooms 137
    Summary 138
CHAPTER 9   Filtering Out Offensive Content 139
    Filtering Content in Internet Explorer 139
        The RSACi Content Rating System 140
        Setting Limits with Content Advisor 141
    Other Content Filters 145
        Other Resources 147
    Tips for Protecting Children on the Web 147
    Summary 148
CHAPTER 10   Web Privacy for the Paranoid 149
    Who Is Following You? 149
        The Web Sites You Visit 149
        Your Internet Service Provider 150
        Your Employer 151
    How Do They Know Where Youve Been? 152
        Log Files 153
        What Your Browser Reveals 153
        The Evidence on Your Computer 154
    Covering Your Tracks 154
        Deleting Temporary Internet Files 155
        Clearing the History Folder and the AutoComplete List 156
        Disabling AutoComplete for Web Addresses 157
        Deleting Favorites 158
        Disabling Cookies 158
        Clearing the Documents Menu 159
        Disabling Personal Information 160
        Online Services and Third-Party Tools That Provide Anonymity 162
    Tips for Protecting Your Privacy 163
        Before Surfing 163
        While Surfing 163
        After Surfing 163
    Summary 164
PART 3   E-MAIL PRIVACY AND SECURITY  
CHAPTER 11   Encrypting and Signing E-Mail Messages 167
    E-Mail Privacy 167
        Prying Eyes 168
        Social Dangers 170
        Spam 171
    E-Mail Encryption Revisited 171
    Getting a Digital ID 173
        Obtaining a Digital ID Using Outlook Express 173
        Obtaining a Digital ID Using Outlook 2000 175
    Protecting Your Digital ID 177
        Backing Up Your Digital ID 178
        Importing Your Digital ID 181
        Revoking Your Digital ID 182
    Digitally Signing E-Mail Messages 182
        Digitally Signing an E-Mail Message Using Outlook Express 183
        Digitally Signing an E-Mail Message Using Outlook 2000 183
        Receiving a Digitally Signed Message 184
        Adding a Digital ID to Your Address Book or Contacts List 186
    Encrypting E-Mail Messages 187
        Getting Someone Elses Digital ID 187
        Encrypting an E-Mail Message Using Outlook Express 188
        Encrypting an E-Mail Message Using Outlook 2000 188
        Receiving an Encrypted Message 189
    Trusting Digital IDs 190
    Summary 193
CHAPTER 12   Spam 195
    What Is Spam? 195
        Recognizing Spam 197
        Types of Spam 198
        Why Do Companies Use Spam? 199
        How Do Spammers Get Your Address? 200
    Dealing with Spam 201
        Blocking Spam in Outlook Express 203
        Blocking Spam in Outlook 2000 205
        Blocking Spam in Hotmail 208
        Fighting Back 209
        Anti-Spam Resources 210
    Tips for Avoiding Spam 210
    Summary 211
CHAPTER 13   E-Mail Privacy for the Paranoid 213
    E-Mail Privacy Revisited 213
    Cleaning Up Messages on Your Computer 215
        Deleting Messages in Outlook Express 215
        Deleting Messages in Outlook 2000 219
        Protecting Your Personal Folder File in Outlook 2000 222
        Emptying the Recycle Bin 224
    Changing Security Zones 225
    Impersonation and Anonymity 228
        Signing Up for an E-Mail Account Using a False Name 229
        Using a Pseudonymous E-Mail Account 230
        Using an Anonymous Remailer 232
        Anonymous E-Mail Resources 234
    Tips for E-Mail Privacy and Security 235
    Summary 236
PART 4   DESKTOP SECURITY  
CHAPTER 14   Understanding Your Computers Vulnerabilities 239
    What Should I Be Worried About? 239
        Users as a Security Weakness 240
        Security Holes 241
        Backdoors 241
    Perimeters of Vulnerability 242
        File and Folder Vulnerability 243
        Program and Application Vulnerability 244
        Operating System Vulnerability 245
        Physical Vulnerability 249
    Vulnerability of Your Workplace Computer 251
    Summary 252
CHAPTER 15   Using Strong Passwords 255
    Creating Passwords 255
        Cracking Passwords 256
        Creating a Strong Password 257
    Using Passwords Safely 259
        Using a Password Management Tool 260
    Finding Lost Passwords 262
        Network Login Passwords 262
        Web Site Login Passwords 262
        Windows Passwords 263
        File Passwords 263
        BIOS Password 265
        Resources for Downloading Password-Related Software 266
    Passwords and Smart Cards 266
        Smart Cards and Private Keys 267
    Tips for Using Passwords 268
    Summary 268
CHAPTER 16   Securing Your Laptop Computer 271
    Laptop Theft 271
    Securing a Laptop Computer 273
        Reducing Your Risk 273
        Physical Security 274
        Data Security 274
    Recovering a Stolen Laptop 275
        Anti-Theft Software 275
    Tips for Laptop Security 277
    Summary 277
CHAPTER 17   Securing Your Connections 279
    Security Risks of Connecting to the Internet 279
    Scanning for Weaknesses 282
    Protecting Your Computer with a Firewall 283
        Network and Personal Firewalls 284
        What Firewalls Cant Do 285
        Using a Firewall at Home 286
    Virtual Private Networks 288
    Checklist for Securing Your Internet Connection 289
    Summary 290
CHAPTER 18   Securing Your Computer at Work 291
    Keeping People Out of Your Computer 291
    Using a Password-Protected Screen Saver 292
    Encrypting Files on Your Hard Drive 294
        Using Third-Party Encryption Tools 294
        Using the Windows 2000 Encrypting File System 295
    Remote Access Software 299
        Back Orifice 2000 300
        Protecting Yourself from Remote Access Software 301
    Deleting Files Permanently 301
    Tips for Keeping People Out of Your Computer 303
    Summary 304
CHAPTER 19   Backing Up Your Files 305
    Why Backups Are So Important 305
    Making Backups 306
        Deciding Which Files and Information to Back Up 306
        Selecting a Method for Backing Up Files and a Medium for Storing Them 307
        Repeating the Backup Process at Appropriate Intervals 308
    Using Microsoft Backup 308
        Installing Microsoft Backup on a Computer Running Windows 98 309
        Installing Microsoft Backup on a Computer Running Windows Me 309
        Starting Microsoft Backup 310
        Creating a Backup Job 311
        Restoring Data from a Backup 313
    Tips for Backing Up Your Files 314
    Summary 315
INDEX 317

最後瀏覽商品 (20)