Limit search to available items
Book Cover
Book
Author Danda, Matthew, 1971-

Title Protect yourself online / Matthew Danda
Published Redmond, Wash. : Microsoft Press, [2001]
©2001
Table of Contents
 ForewordXVII
 AcknowledgmentsXXI
 IntroductionXXIII
Part 1Privacy and Security Basics 
 Chapter 1Beginning Your Online Journey3
   Overcoming the Fear3
   What Am I Protecting Myself From?4
   Privacy and Security: The Big Picture6
   Privacy and Security Today8
   Learning to Protect Yourself Online9
   Summary10
 Chapter 2Internet Fundamentals11
   What Is the Internet?11
   The World Wide Web15
   How E-Mail Works16
   TCP/IP Primer18
   Summary23
 Chapter 3A New Breed of Threats25
   General Loss of Privacy25
   New Medium for Old Problems29
   New Ways to Eavesdrop32
   Denial-of-Service Attacks37
   More Efficient Viruses39
   Summary40
 Chapter 4Cryptography and Encryption41
   Cryptography on the Internet41
   Public Key Infrastructure (PKI)52
   Secure Sockets Layer (SSL)54
   Pretty Good Privacy (PGP)55
   Secure/Multipurpose Internet Mail Extensions (S/MIME)58
   Summary58
 Chapter 5Computer Viruses61
   The Evolving Virus72
   Protecting Yourself from Viruses75
   Summary80
Part 2Web Privacy and Security 
 Chapter 6Downloading Stuff from the Web85
   What Are the Dangers?86
   Changing Security Settings in Internet Explorer87
   What Kinds of Files and Programs Is My Browser Downloading?90
   Cookies91
   ActiveX Controls and Java Applets101
   Scripts107
   Plug-ins108
   Tips for Downloading Files Safely109
   Summary110
 Chapter 7Shopping and Trading on the Web111
   E-Commerce and the Web111
   Protecting Your Transactions113
   Spotting Fraud117
   Protecting Your Privacy120
   Tips for Using E-Commerce Safely125
   Summary127
 Chapter 8Mailing Lists, Newsgroups, and Chat Rooms129
   Mailing Lists and Newsgroups129
   Chat Rooms133
   Tips for Using Mailing Lists, Newsgroups, and Chat Rooms Safely134
   Summary138
 Chapter 9Filtering Out Offensive Content139
   Filtering Content in Internet Explorer139
   Other Content Filters145
   Tips for Protecting Children on the Web147
   Summary148
 Chapter 10Web Privacy for the Paranoid149
   Who Is Following You?149
   How Do They Know Where You've Been?152
   Covering Your Tracks154
   Tips for Protecting Your Privacy163
   Summary164
Part 3E-Mail Privacy and Security 
 Chapter 11Encrypting and Signing E-Mail Messages167
   E-Mail Privacy167
   E-Mail Encryption Revisited171
   Getting a Digital ID173
   Protecting Your Digital ID177
   Digitally Signing E-Mail Messages182
   Encrypting E-Mail Messages187
   Trusting Digital IDs190
   Summary193
 Chapter 12Spam195
   What Is Spam?195
   Dealing with Spam201
   Tips for Avoiding Spam210
   Summary211
 Chapter 13E-Mail Privacy for the Paranoid213
   E-Mail Privacy Revisited213
   Cleaning Up Messages on Your Computer215
   Changing Security Zones225
   Impersonation and Anonymity228
   Tips for E-Mail Privacy and Security235
   Summary236
Part 4Desktop Security 
 Chapter 14Understanding Your Computer's Vulnerabilities239
   What Should I Be Worried About?239
   Perimeters of Vulnerability242
   Vulnerability of Your Workplace Computer251
   Summary252
 Chapter 15Using Strong Passwords255
   Creating Passwords255
   Using Passwords Safely259
   Finding Lost Passwords262
   Passwords and Smart Cards266
   Tips for Using Passwords268
   Summary268
 Chapter 16Securing Your Laptop Computer271
   Laptop Theft271
   Securing a Laptop Computer273
   Recovering a Stolen Laptop275
   Tips for Laptop Security277
   Summary277
 Chapter 17Securing Your Connections279
   Security Risks of Connecting to the Internet279
   Scanning for Weaknesses282
   Protecting Your Computer with a Firewall283
   Virtual Private Networks288
   Checklist for Securing Your Internet Connection289
   Summary290
 Chapter 18Securing Your Computer at Work291
   Keeping People Out of Your Computer291
   Using a Password-Protected Screen Saver292
   Encrypting Files on Your Hard Drive294
   Remote Access Software299
   Deleting Files Permanently301
   Tips for Keeping People Out of Your Computer303
   Summary304
 Chapter 19Backing Up Your Files305
   Why Backups Are So Important305
   Making Backups306
   Using Microsoft Backup308
   Tips for Backing Up Your Files314
   Summary315
 Index317

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Dan/Pyo  AVAILABLE
Description xxvi, 337 pages : illustrations ; 24 cm
Notes Includes index
Subject Computer networks -- Security measures.
Computer security.
Author Danda, James.
LC no. 00068098
ISBN 0735611882 paperback