Table of Contents |
| Foreword | XVII |
| Acknowledgments | XXI |
| Introduction | XXIII |
Part 1 | Privacy and Security Basics | |
| Chapter 1 | Beginning Your Online Journey | 3 |
| | | Overcoming the Fear | 3 |
| | | What Am I Protecting Myself From? | 4 |
| | | Privacy and Security: The Big Picture | 6 |
| | | Privacy and Security Today | 8 |
| | | Learning to Protect Yourself Online | 9 |
| | | Summary | 10 |
| Chapter 2 | Internet Fundamentals | 11 |
| | | What Is the Internet? | 11 |
| | | The World Wide Web | 15 |
| | | How E-Mail Works | 16 |
| | | TCP/IP Primer | 18 |
| | | Summary | 23 |
| Chapter 3 | A New Breed of Threats | 25 |
| | | General Loss of Privacy | 25 |
| | | New Medium for Old Problems | 29 |
| | | New Ways to Eavesdrop | 32 |
| | | Denial-of-Service Attacks | 37 |
| | | More Efficient Viruses | 39 |
| | | Summary | 40 |
| Chapter 4 | Cryptography and Encryption | 41 |
| | | Cryptography on the Internet | 41 |
| | | Public Key Infrastructure (PKI) | 52 |
| | | Secure Sockets Layer (SSL) | 54 |
| | | Pretty Good Privacy (PGP) | 55 |
| | | Secure/Multipurpose Internet Mail Extensions (S/MIME) | 58 |
| | | Summary | 58 |
| Chapter 5 | Computer Viruses | 61 |
| | | The Evolving Virus | 72 |
| | | Protecting Yourself from Viruses | 75 |
| | | Summary | 80 |
Part 2 | Web Privacy and Security | |
| Chapter 6 | Downloading Stuff from the Web | 85 |
| | | What Are the Dangers? | 86 |
| | | Changing Security Settings in Internet Explorer | 87 |
| | | What Kinds of Files and Programs Is My Browser Downloading? | 90 |
| | | Cookies | 91 |
| | | ActiveX Controls and Java Applets | 101 |
| | | Scripts | 107 |
| | | Plug-ins | 108 |
| | | Tips for Downloading Files Safely | 109 |
| | | Summary | 110 |
| Chapter 7 | Shopping and Trading on the Web | 111 |
| | | E-Commerce and the Web | 111 |
| | | Protecting Your Transactions | 113 |
| | | Spotting Fraud | 117 |
| | | Protecting Your Privacy | 120 |
| | | Tips for Using E-Commerce Safely | 125 |
| | | Summary | 127 |
| Chapter 8 | Mailing Lists, Newsgroups, and Chat Rooms | 129 |
| | | Mailing Lists and Newsgroups | 129 |
| | | Chat Rooms | 133 |
| | | Tips for Using Mailing Lists, Newsgroups, and Chat Rooms Safely | 134 |
| | | Summary | 138 |
| Chapter 9 | Filtering Out Offensive Content | 139 |
| | | Filtering Content in Internet Explorer | 139 |
| | | Other Content Filters | 145 |
| | | Tips for Protecting Children on the Web | 147 |
| | | Summary | 148 |
| Chapter 10 | Web Privacy for the Paranoid | 149 |
| | | Who Is Following You? | 149 |
| | | How Do They Know Where You've Been? | 152 |
| | | Covering Your Tracks | 154 |
| | | Tips for Protecting Your Privacy | 163 |
| | | Summary | 164 |
Part 3 | E-Mail Privacy and Security | |
| Chapter 11 | Encrypting and Signing E-Mail Messages | 167 |
| | | E-Mail Privacy | 167 |
| | | E-Mail Encryption Revisited | 171 |
| | | Getting a Digital ID | 173 |
| | | Protecting Your Digital ID | 177 |
| | | Digitally Signing E-Mail Messages | 182 |
| | | Encrypting E-Mail Messages | 187 |
| | | Trusting Digital IDs | 190 |
| | | Summary | 193 |
| Chapter 12 | Spam | 195 |
| | | What Is Spam? | 195 |
| | | Dealing with Spam | 201 |
| | | Tips for Avoiding Spam | 210 |
| | | Summary | 211 |
| Chapter 13 | E-Mail Privacy for the Paranoid | 213 |
| | | E-Mail Privacy Revisited | 213 |
| | | Cleaning Up Messages on Your Computer | 215 |
| | | Changing Security Zones | 225 |
| | | Impersonation and Anonymity | 228 |
| | | Tips for E-Mail Privacy and Security | 235 |
| | | Summary | 236 |
Part 4 | Desktop Security | |
| Chapter 14 | Understanding Your Computer's Vulnerabilities | 239 |
| | | What Should I Be Worried About? | 239 |
| | | Perimeters of Vulnerability | 242 |
| | | Vulnerability of Your Workplace Computer | 251 |
| | | Summary | 252 |
| Chapter 15 | Using Strong Passwords | 255 |
| | | Creating Passwords | 255 |
| | | Using Passwords Safely | 259 |
| | | Finding Lost Passwords | 262 |
| | | Passwords and Smart Cards | 266 |
| | | Tips for Using Passwords | 268 |
| | | Summary | 268 |
| Chapter 16 | Securing Your Laptop Computer | 271 |
| | | Laptop Theft | 271 |
| | | Securing a Laptop Computer | 273 |
| | | Recovering a Stolen Laptop | 275 |
| | | Tips for Laptop Security | 277 |
| | | Summary | 277 |
| Chapter 17 | Securing Your Connections | 279 |
| | | Security Risks of Connecting to the Internet | 279 |
| | | Scanning for Weaknesses | 282 |
| | | Protecting Your Computer with a Firewall | 283 |
| | | Virtual Private Networks | 288 |
| | | Checklist for Securing Your Internet Connection | 289 |
| | | Summary | 290 |
| Chapter 18 | Securing Your Computer at Work | 291 |
| | | Keeping People Out of Your Computer | 291 |
| | | Using a Password-Protected Screen Saver | 292 |
| | | Encrypting Files on Your Hard Drive | 294 |
| | | Remote Access Software | 299 |
| | | Deleting Files Permanently | 301 |
| | | Tips for Keeping People Out of Your Computer | 303 |
| | | Summary | 304 |
| Chapter 19 | Backing Up Your Files | 305 |
| | | Why Backups Are So Important | 305 |
| | | Making Backups | 306 |
| | | Using Microsoft Backup | 308 |
| | | Tips for Backing Up Your Files | 314 |
| | | Summary | 315 |
| Index | 317 |