Complete Idiots Guide to Internet Privacy and Security

Author(s): Preston Gralla

Computer

A guide to the techniques and tools used to insure online privacy such as spyware diagnostics, encryption methods, anonymizer software and even some tricks of the hacker trade to keep the reader ahead of the next security threat.

45.00 NZD

Stock: 0


Add to Wishlist


Product Information

The Complete IdiotA A*s Guide to Internet Privacy and SecurityAuthor Bio Preston Gralla has been hailed as "one of the WebA A*s true editorial pioneers" by USATODAY.comA A*s technology editor, and is the author of over 20 books, including the best-selling How the Internet Works, as well as How Wireless Works, How to Expand and Upgrade PCs, and The Complete IdiotA A*s Guide to Protecting Your Child Online. He has written about the Internet and computer technology for many magazines, newspapers, and Web sites, including USA Today, PC Magazine, the Los Angeles Times, the Dallas Morning News, Computerworld, CNet, ZDNet, and PC/Computing, among many others. He has won several writing and editing awards, including one for the best feature article in a computer magazine from the Computer Press Association. As a well-known Internet guru, he appears frequently on TV and radio shows such as the ABC World News Now, the CBS Early Show, CNN, MSNBC, and he has done commentary for National Public RadioA A*s All Things Considered. He was the founding managing editor of PC Week, and a founding editor, then editor and editorial director of PC/Computing. Gralla lives in Cambridge, Massachusetts with his wife Lydia, children Gabriel and Mia, a rabbit named Polichinelle, and two gerbils named Dr. Evil and Mini-Me. He also writes the free GrallaA A*s Internet Insider e-mail newsletter. To subscribe to it for free, send e-mail to preston@gralla.com with the words SUBSCRIBE NETINSIDER in the subject line.

I. THE LOWDOWN ON INTERNET PRIVACY AND SECURITY. 1. Why You Need to Worry About Online Privacy and Security. Why the Internet Can Be Such a Dangerous Place. It's More Than Magic: How the Internet Works. All the Evils That Hackers Can Do. How Your Privacy Can Be Invaded. Viruses, Worms, and Data Theft, Oh My! Dangers to Cable and DLS Modem Owners. 2. Putting Up Your First Line of Cyberdefense. Making Sure Your ISP Doesn't Invade Your Privacy. Protecting Your Privacy on America Online. How to Create Hacker-Proof Passwords. How to Remove Your Name from Web Databases. What About Microsoft's Windows XP, Passport, and .Net? 3. How to Protect Yourself Against the Most Common Internet Scams. Recognizing Online Scams. Protecting Yourself Against the Most Common Internet Scams. What to Do If You've Been Scammed. The Best Sites for Consumer Advice and Scams. II. HACK ATTACK: HOW TO PROTECT YOURSELF AGAINST HACKERS. 4. How the Worm Turns: Protecting Yourself Against Worms, the Most Common Internet Danger. What Are Internet Worms? How Worms Wreak Their Havoc. A Cloudy Outlook: Worms and Microsoft's E-mail Software. How to Protect Yourself Against Worms. How to Protect Your Web Server. 5. How to Keep Your Computer Safe from Viruses. What Are Viruses? How You Can Get Infected. Safety First: How to Protect Yourself Against Viruses. How Does Anti-Virus Software Work? Virus Myths, Hoaxes, and Urban Myths. 6. The Ultimate Defense: Keeping Safe with Firewalls. No Asbestos Needed: What Are Firewalls? Why You Need a Firewall. How Personal Firewalls Work. How to Protect Yourself with Personal Firewalls. Where to Get the Best Firewalls. 7. Keeping Safe from Java, JavaScript, and ActiveX Applets. Java...Does That Have Something to Do with Coffee? How Does Java Work-and How Can It Harm Your Computer? Protecting Yourself Against Rogue Java Applets. Now I Have to Worry About JavaScript, Too? Does ActiveX Have Something to Do with the X-Files? 8. How to Protect Your Home Network. What Dangers Are There in Home Networks? Understanding Your Network's Built-In Protection. What to Do About Printer and File Sharing. Customizing Your Network's Built-In Protection. III. IT'S NONE OF THEIR BUSINESS: HOW TO PROTECT YOUR PRIVACY ONLINE. 9. How to Keep Yourself Safe Against Identity Theft. What Is Identity Theft? What Evil Can Be Done If Your Identity Is Stolen. How to Protect Yourself Against Identity Theft. What to Do If You've Become Victimized. 10. I Spy: How to Protect Yourself Against Spyware and Web Bugs. What Is Spyware? How to Spot Spyware Before It Gets You. How to Protect Yourself Against Spyware. What Are Web Bugs? 11. They're Not Very Sweet: What You Can Do About Cookies. What Are Web Cookies? Why Are Web Sites Serving Cookies? Fight Back: How to Make Cookies Crumble. Handling Cookies in Microsoft XP and Internet Explorer 6. You Should Really Get a Cookie Killer. How to Selectively Stop Advertising Cookies. 12. How to Make Sure Internet Sites Don't Abuse Your Privacy. Checking Out a Site's Privacy Policies. What Does All That Fine Print Mean? Using Internet Explorer 6 or Windows XP to Check Out Web Sites. What You Need to Know About Financial and Job Search Web Sites. You Can Trust TRUSTe. Protect Your Privacy When Filling Out Registration Forms. 13. How to Surf Anonymously Without a Trace. All the Information Your Browser Reveals About You. What Your Browser Cache Tells About You. Hiding Your Browsing History. Hiding Your E-mail Address. Keep Newsgroup Information from Prying Eyes. Surfing Anonymously Without a Trace. Protect Your Identity Online-Become Schizophrenic. IV. SNOOPERS EVERYWHERE: KEEPING SAFE WHEN USING E-MAIL, INSTANT MESSAGING, AND CHATTING. 14. Dangerous Delivery: What Dangers Are There in E-mail? How E-mail Works. How Your E-mail Can Be Read by Others. Your Boss Owns Your E-mail. Why Spam Can Leave a Bad Taste in Your Mouth. Why E-mail Spoofing Is No Joke. Is There Such a Thing As a Mail Bomb? Can You Get a Virus from an E-mail Message? Beware of E-mail Web Bugs. 15. Keeping Your E-mail Private with Encryption. What Is Encryption, Anyway? Here's How Encryption Works-And How to Use It. Using Pretty Good Privacy to Encrypt E-mail. How to Use a Digital Certificate to Encrypt E-mail. 16. Beyond Luncheon Meat: How to Protect Yourself Against Spam. What Is Spam, and How Is It Created? Hiding Your Name from Spammers. Using Your E-mail Program to Stop Spam in Its Tracks. Use Spam-Fighting Software to Kill Spam. Fight Back! What to Do If You've Been Spammed. 17. Staying Anonymous with Anonymous Remailers. What Is an Anonymous Remailer, Anyway? Why Would Someone Use an Anonymous Remailer? Using Anonymous Remailers. Where to Find Anonymous Remailers on the Internet. 18. Keep Yourself Safe and Protect Your Privacy When Chatting and Instant Messaging. What Kinds of Ways Are There to Chat and Instant Message on the Internet? What Dangers There Are in Chatting. Don't Let IRC Irk You: The Special Dangers of IRC Chat. Protecting Yourself When Using Instant Messengers. Special Issues When Using ICQ. 19. Protecting Your Privacy on Internet Newsgroups and Discussion Areas. What Are Usenet Newsgroups? Protecting Your Privacy on Newsgroups and Discussion Areas. Your Permanent Profile and What You Can Do About It. V. PROTECTING YOUR CHILDREN AND FAMILY ONLINE. 20. Online Dangers That Kids Face. The Dangers Children Face Online. Are There Really Stalkers Online? How Can Kids View Inappropriate Material Online? How Kids' Privacy Can Be Violated. The Dangers for Kids in E-mail. 21. The Best Rules for Keeping Kids Safe on the Internet. The Best Line of Defense: Good Parenting. Rules for Keeping Kids Safe Online. Protecting Your Children's Privacy Online. What to Watch for on the Web. What to Watch for in Chat and Instant Messaging. Protecting Your Kids from the Evils of E-mail. Should Your Kids View Newsgroups? Using Site-Blocking Software. 22. Playing It Safe on America Online. What Dangers Are There on America Online? Taking Control with Parental Controls. What to Do If Your Child Has Been Harassed on America Online. Kids' Safety Tips on America Online. A Final Word to Parents. VI. EVEN MORE PRIVACY AND SAFETY ISSUES: WORK, CYBERSHOPPING, AND BEYOND. 23. Your Life Is Not Your Own: What You Need to Know About Privacy at Work. Do Employers Really Monitor What Employees Do At Work? What Actions Do Employers Take Against Employees? Why Your Boss Might Be Snooping on You. What the Laws Say About Work and Online Privacy. Here Comes Da Judge! What You Can Do About Workplace Monitoring. 24. What Dangers Are There for Online Shoppers? What to Watch for When Buying Online. How Do I Buy Online? Dangers of Online Shopping: How to Protect Yourself. What to Do If a Shopping Site Takes Your Money and Goes out of Business. Making Sure You Don't Get Burned When Buying Stock Online. 25. How to Protect Your Credit Card When Buying Over the Internet. How to Know You're Buying Through a Secure Site. Check for the Locked Lock. Failsafe Credit Card Protection-It's Free! How to Check Out a Site Before Buying. Where You Can Get the Lowdown on Shopping Sites. 26. How to Stay Safe When Buying at Auctions. Sold American! What Are Online Auctions? Biding Your Time: How Do Online Auctions Work? What Kinds of Auction Sites Are There? What Are the Most Common Auction Scams? Check Out the Auction Site Before Bidding. How to Make Sure You Don't Get Scammed at Auctions. 27. Wireless Insecurity: Protecting Yourself When Using Cellular Devices. What Kinds of Cellular Dangers Are There? How Do Wireless Communications Work? How to Protect Your Wireless Network. Watch Out for Wireless Viruses. Beware of Cell Phone Snoopers and Cell Phone Cloners. 28. How to Safeguard Your PC. Protecting Your Laptop Against Theft. How About Password Protecting Your PC? Password-Protect Your PC with a Screen Saver. How to Encrypt Your Files So That Snoopers Can't Get at Them. How to Permanently Erase Data from Your PC. Three Rules to Keep Your Data Safe: Back Up, Back Up, and Back Up! 29. Fight Back: Use the Internet to Get Information About Privacy and Security. Using the Internet to Protect Your Privacy and Security. Where to Go to Complain About Privacy and Security Issues. Government Sites That Investigate Your Complaints. Credit Where It's Due: How to Get Your Credit Ratings Online-and Correct Them. How to Get Your Name off Telemarketing and Junk-Mail Lists. VII. APPENDIXES. Appendix A. Speak Like a Geek: The Complete Archive. Appendix B. The Best Internet Sites for Privacy and Security Issues. Index.

General Fields

  • : 9780028643212
  • : alpha
  • : alpha
  • : 0.629
  • : 04 January 2002
  • : 232mm X 187mm X 21mm
  • : United States
  • : books

Special Fields

  • : Preston Gralla
  • : Paperback
  • : 005.8
  • : 384
  • : illustrations