did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789734594

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

by
  • ISBN13:

    9780789734594

  • ISBN10:

    0789734591

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2005-11-09
  • Publisher: Que Publishing
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $26.99

Summary

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back?Absolute Beginner's Guide to Security, Spam, Spyware and Virusesis your first line of defense. Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good. We'll tell you how to immediately cut the risk of being attacked in half - in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of theAbsolute Beginner's Guide to Security, Spam, Spyware and Viruses.

Author Biography

Andy Walker is one of North America's top technology journalists. Since 1995, he has written about personal computer technology for dozens of newspapers, magazines, and websites. His personal technology advice column was syndicated across the Southam Newspaper chain and today the body of work is published at Cyberwalker.com where more than 5 million unique visitors read the advice annually. Andy has appeared as a tech expert on hundreds of TV and radio broadcasts and now co-hosts hosted the internationally syndicated TV show Call for Help with Leo Laporte and Amber MacArthur. Andy was born in the United Kingdom, educated and raised in Canada, and now lives in Toronto with a two cats and a really secure personal computer.

Table of Contents

Introduction 1(1)
How This Book Is Organized 2(2)
Special Elements Used in this Book 4(1)
Reader Competition...of Sorts 5(2)
I. Security Basics: Some Very Real Threats
7(214)
Viruses: Attack of the Malicious Programs
9(32)
What Is a Computer Virus?
10(4)
What Is It?
11(1)
Who Triggers a Computer Virus?
11(1)
How Does It Spread?
11(2)
What Damage Can It Do?
13(1)
Viruses: As Many Kinds As Sniffles in Kindergarten
14(8)
Macro Viruses
15(2)
Memory-Resident Viruses
17(1)
File Infector Viruses
17(1)
Boot Viruses
17(1)
Multi-Partite Viruses
18(1)
Worms: Network-Sawy Viruses
18(1)
Trojan Horses: Hey Helen, the Achaeans Left Us a Present!
19(1)
Virus Hoaxes: Fake Viruses that Scare the Heck Out of You
20(2)
Who Creates Computer Viruses?
22(2)
What Not to Do!
24(1)
When Viruses Attack!
25(4)
Disconnect As Soon As Possible
26(1)
Virus Infection Found! How to Cleanse Your System
27(1)
My Antivirus Program Won't Update!
28(1)
Now I Have Your Attention
29(1)
Antivirus Checkup: 10-Minute Tactics
29(3)
Install Windows Security Updates
29(2)
Update Your Virus Signatures
31(1)
Fortify Your Computer: Strong Virus Defense in a Few Hours
32(5)
Install or Upgrade an Antivirus Program
32(2)
Scan Your Computer for Viruses
34(1)
Install Service Pack 2 and Enable Virus Protection
35(2)
No Worm in My Apple?
37(1)
Is That a Virus in Your Pocket?
38(3)
Spyware: Overrun by Advertisers, Hijackers, and Opportunists
41(44)
What Is Spyware?
42(1)
What Does Spyware Do and Why Is It Bad?
42(1)
How Does Spyware Sneak onto My Computer?
43(1)
Types of Spyware: Snoops, Adware, Cookies, and More
44(7)
Spyware: I Spy with My Little App
44(1)
Adware: Attack of the Pop-ups
44(1)
Snoopware: I Wanna Know What You're Up To!
45(1)
Browser Hijackers: Turn This Browser Around, We're Going to Cuba.com
46(2)
Key Loggers: Snooping on Your Typing Skills
48(1)
Dialers: Dial In, Dial Out, Dial Often
48(1)
Trojan Horses: Pretty Ponies with Deadly Insides
49(1)
Cookies: Does My Oreo Have a Tape Recorder in It?
49(2)
Who Is at Risk?
51(1)
How Do I Know If I Have Spyware?
51(1)
Defend Yourself Against Spyware
52(9)
Spyware Countermeasures: 10-Minute Tactics
52(9)
Ban All Spies: Strong Spyware Defense in an Afternoon
61(24)
Run a Full System Scan
61(1)
Install a Second Anti-spyware Program
62(1)
Inoculate Your System
62(1)
Use Firefox
63(1)
Clean Cookies
64(2)
Spyware Infection Found! How to Scrub Your System
66(5)
How to Fix a Browser Hijack
71(8)
Decimate the Little Suckers with CWShredder
79(1)
Microsoft Mimics Hijack This: System Explorers
80(5)
Hackers: There's a Man in My Machine
85(28)
What Is a Hacker?
86(1)
Who Are the Hackers?
86(1)
What Damage Can Hackers Do?
87(1)
Targets of a Hack Attack
87(2)
Corporate Networks
87(1)
Web Servers
88(1)
Personal Computers
88(1)
Hacker Motivation: I Think Therefore I Hack
89(1)
Tools of the Trade: Pass Me a Trojan Horse, Would You?
89(1)
Firewall: Shut Out the Hackers
90(1)
Software Firewalls: Programs That Stop Hackers
91(6)
Windows Firewall: Built-in Defense
91(1)
Third-Party Software Firewalls
92(2)
Recommended Firewall Freebies
94(1)
Hardware Firewalls
94(1)
Easy Defense with a NAT Firewall
95(1)
Stateful Inspection: The Meticulous Traffic Cop
96(1)
How to Detect a Hacker Attack
97(1)
How to Fix a Hacker Attack
98(3)
Steps You Can Take Immediately After Being Hacked
99(2)
Batten down the Hatches---10-Minute Tactics
101(2)
Turn on Windows Firewall
101(1)
Activate the Firewall on a Mac OS X System
102(1)
Wall off the World---Install a Better Firewall in an Afternoon
103(10)
Install a Two-way Software Firewall
103(6)
Install a Hardware Firewall
109(4)
Identity Thieves and Phishers: Protect Your Good Name and Bank Account
113(22)
What Is Identity Theft?
114(4)
Techniques Thieves Use to Steal Your Identity
114(1)
How They Become You: Identity Theft Techniques
115(1)
Preventative Measures: How to Not Become a Victim
116(1)
Signs You're a Victim
116(1)
What to Do If You're an Identity Theft Victim
117(1)
What Is Phishing?
118(2)
How Does Phishing Work?
120(3)
Email Address Spoofing
120(1)
Link Spoofing
121(1)
Web Address Spoofing
122(1)
What Is Pharming?
123(3)
What Damage Can Be Done By Phishing?
126(1)
Who Is at Risk? Everyone!
126(1)
Don't Get Phished: 10-Minute Tactics to Stay Off the Hook
126(5)
They Won't Ask, You Don't Tell
127(1)
Use Caution and Cut and Paste
127(1)
Communicate Securely
127(1)
Install an Anti-spam Filter
128(1)
Block Phishing Sites with NetCraft
129(1)
Carry a Big Spoofstick
130(1)
Keep Your Antivirus and Anti-Spyware Programs Up-to-Date
131(1)
Keep Your Computer Software Up-to-Date
131(1)
Ensure You Are You: Take an Afternoon to Protect Your Identity
131(4)
Check Your Credit Reports
131(2)
Shred It Before You Chuck It
133(1)
Read Your Statements
133(2)
Spam: Unwanted Email from Hell
135(16)
What Is Spam?
136(1)
Why Does Spam Keep Coming?
137(1)
Why Doesn't Someone Stop the Spammers?
138(1)
How Do Spammers Get My Email Address?
139(3)
Website Harvesting
139(1)
Dictionary Spamming
139(1)
Commercial Email Lists
140(1)
Newsgroups, Discussion Forums, and Interactive Websites
141(1)
Contests and Other Free Offerings
141(1)
Email Forwarding
141(1)
The Damage Spam Can Do
142(1)
Reduce the Flow---10-Minute Tactics to Reduce Spam
143(4)
Don't Respond
143(1)
Don't Post Your Email Address on the Web
144(1)
Webmasters Shouldn't Use mailto
144(1)
Turn Off Image Display in Email Programs
144(2)
Turn On Junk Mail Filtering
146(1)
Kill More Spam---In an Afternoon
147(4)
Install an Anti-spam Program
147(2)
Fight Back!
149(2)
Wireless Network Snoops: Lock Down Your Wi-Fi Network
151(36)
What Is a Wireless Home Network?
152(2)
What Damage Can a Wireless Network Snoop Dish Out?
154(1)
Who Are the Snoopers?
155(5)
Wardrivers
155(4)
Bandwidth Bandits
159(1)
Wireless Hackers
160(1)
Your Wi-Fi Network Is Full of Holes!
160(4)
How to Access Your Router Set-up
161(3)
First Line of Defense: Secure Your Wi-Fi Network
164(9)
Turn On WEP
164(3)
Turn On WPA
167(2)
MAC Address Filtering: Keep Out the Scottish
169(4)
Detecting a Visit from a Wireless Snoop
173(2)
I'm Under Attack! What to Do If You Discover a Wireless Network Snoop
175(1)
Turn Off Wireless Access
175(1)
Activate Security Measures
176(1)
Assess the Damage
176(1)
Wireless Security Workup: Quick Tactics and Some That Take a Little More Time
176(11)
10-Minute Tactic: Change the Router's User ID and Password
177(1)
10-Minute Tactic: Change Your Default SSID
178(2)
10-Minute Tactic: Turn On the Windows Firewall
180(1)
10-Minute Tactic: Turn Off UPnP
181(1)
10-Minute Tactic: Turn Off Your Router When Not in Use
182(1)
Time Intensive Tactic: Be Careful with File Sharing
182(5)
Privacy Snoops: Cover Your Tracks and Your Reputation
187(34)
Why Your Privacy Is Important
188(1)
What You Leave Behind on Your Computer
189(1)
Web Browser
189(1)
Documents
189(1)
Movies and Audio Players
189(1)
Email
189(1)
Chat Programs
190(1)
Who Are the Privacy Snoops?
190(1)
The Consequences of Being Caught
190(1)
Emergency Tactics---I Am Being Snooped On!
191(10)
Administrator
192(1)
Limited Users
192(1)
Guest Accounts
193(1)
How to Create PC Privacy
194(7)
Obscure Your Trail---In About 10 Minutes
201(6)
Microsoft Internet Explorer
201(5)
Mozilla Firefox
206(1)
Cover Your Tracks---In an Afternoon
207(1)
Clean Multimedia Players
207(14)
Windows Media Player 10
207(1)
Real Player 10
208(1)
Protect Your Email
209(1)
Turn Off Saved Sent Items
209(1)
Empty Deleted Items Folder
210(1)
Don't Leave Email on the Server
210(2)
Wash Windows
212(3)
Scrub Microsoft Office
215(2)
Deleted Files Are Not Gone
217(1)
Turn Off Chat Logs
217(2)
Clean Restore Points
219(2)
II. Strategies for Safe and Secure Computing
221(92)
Let's Smash-Proof Windows: Tweak Windows XP Nice and Tight
223(26)
If Windows XP Is a Dike, You're a Little Dutch Boy
224(25)
Step 1: Trash Unnecessary Programs
224(4)
Step 2: Install Firefox
228(1)
Step 3: Install Antivirus Software and Scan for Viruses
229(1)
Step 4: Install Anti-Spyware Software and Scan for Spyware
230(4)
Step 5: Block Out the Bad Guys and Install a Firewall
234(2)
Step 6: Install and Configure Microsoft Updates and Service Pack 2
236(4)
Step 7: Install Netcraft's Anti-Phishing Toolbar
240(3)
Step 8: Protect Yourself from Spam
243(2)
Step 9: Managing Your File Sharing Security
245(4)
Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
249(48)
Light the Fuse and Stand Back
250(1)
Let's Get Started
250(5)
XP Installation CD or System Recovery Disk
250(1)
Windows SP2: The Mother of All Service Packs
251(1)
Collect Your Drivers
252(1)
Installation CDs for Your Programs
253(1)
Internet Service Software and Settings
254(1)
Security Programs
255(1)
Step 1: Download Drivers and Software You Need for the Re-install
255(4)
Got a Recovery CD? That's Good News!
255(1)
Retail Copy of Windows XP? There's Some Work to Do
255(4)
Step 2: Back Up!
259(5)
Outlook
260(1)
Outlook Express
260(1)
My Documents
260(1)
IE Favorites and Cookies
260(1)
Firefox Favorites
261(1)
Saved Games
261(1)
Pictures, Music, and Videos
261(1)
Microsoft Office 2003 Settings
261(1)
Windows Media Player
261(1)
Other Odds and Ends
262(2)
Step 3: Pull the Plug on the Network
264(1)
Step 4: Wipe Away Windows
264(8)
Using a System Recovery CD
267(1)
Using a Windows XP Install CD
267(5)
Step 5: Re-install Windows
272(2)
Step 6: Re-install Your Drivers
274(2)
Step 7: Install Protection Against Malware
276(5)
Install an Antivirus Program
277(1)
Install an Anti-spyware Program
278(2)
Install a Firewall
280(1)
Step 8a: Install Windows XP Service Pack 2 (from CD)
281(2)
Step 8b: Install SP2 from the Internet
283(1)
Step 9: Configure Your Security Settings
284(4)
Step 10: Install Firefox
288(1)
Step 11: Configure Your Networking
289(1)
Home Network
289(1)
Digital Subscriber Line (DSL)
289(1)
Cable Internet
289(1)
Dial-up
289(1)
Step 12: Update Windows with All Recent Security Patches
290(2)
Step 13: Update All of Your Security Programs and Security Signatures
292(1)
Step 14: Activate Windows
292(1)
Step 15: Re-install Your Programs
293(1)
Step 16: Other Things You Can Do
294(3)
Ongoing Maintenance: Fend Off Future Threats!
297(16)
Note to Self: Keep Computer Secure
298(1)
Daily Routines: Walk the Dog, Feed the Kids, and Secure the Computer
298(4)
Update Your Antivirus and Anti-Spyware Signatures
298(1)
Update AVG Signatures
299(1)
Update Microsoft AntiSpyware
299(1)
Update Spybot Search & Destroy
300(2)
Weekly Routines: How to Never Be Bored on Saturday Morning
302(2)
Scan for Viruses and Spyware
302(1)
Check for Firefox Updates
303(1)
Monthly Routines: Clean the Garage, Trim the Hedge, and Update Windows
304(6)
Windows Updates
304(2)
Inspect Other Computers
306(1)
Router Firmware Updates
306(2)
Patch Microsoft Office
308(1)
Software Updates
309(1)
Bathe Once a Year Whether You Need It and Reformat and Re-install, Too
310(3)
Wipe Your Hard Drive and Re-install Windows
310(3)
III. Tools for Maintenance and Protection
313(30)
Selecting Software: Steals, Deals, and Software Duds
315(12)
Security Software: Nothing in Life Is Free, Except Software
316(2)
Payware: Software You Pay Hard-Earned Cash For
316(1)
Freeware: Don't Pay a Cent Software
316(2)
Weirdware: When It's Not Payware or Freeware
318(2)
Gimpware: Free Software, but Not All the Bits Work
318(1)
Trialware: It's Free, Until It's Not
319(1)
Shareware: I Trust You to Pay Me
319(1)
What Should I Pay for My Security Toolbox?
320(1)
Choosing the Right Security Software
321(6)
Antivirus
321(1)
Anti-Spyware
322(1)
Firewall
323(1)
Anti-Spam
324(3)
Tools of the Trade: Security Products You Should Own
327(16)
Which Security Software Is Right for You?
328(1)
Antivirus Programs
328(5)
Freeware
328(2)
Payware
330(3)
Anti-Spyware
333(4)
Freeware
333(2)
Payware
335(2)
Firewalls
337(2)
Anti-Spam
339(4)
IV. Appendixes
343(10)
A. Glossary
345(8)
Index 353

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Excerpts

Introduction Introduction: Ignore This Book at Your Own Peril!Viruses.Spyware.Spam.Phishers.War drivers.Snoops.Hackers.Salad cream.And identity thieves.These are eight good reasons why you should buy this book, plus one arbitrary reference to a British salad condiment from Heinz that I love, just to keep the list interesting.If you run Windows XP, the most insecure computer operating system ever invented, these eight nasty threats will rob you blind and torment you within an inch of your digital life and make your glorious and shiny minivan existence starkly miserable and mud splattered.These computer nasties are a big fat plague. Good thing salad cream was invented.And the worst of it is that very few computer owners know how bad it really is. No salad cream jokes here. In all seriousness, the state of computer security today is just ugly.Here's the good news, however. I can help. And not only will I help, but I'll do it without forcing you to spend much more money than you already have spent on your computer. Almost everything I'll teach you in this book is done using mostly free software, easy-to-understand techniques, and analogies that often use small furry, chittering creatures.Not convinced? Okay, put this book down if you haven't bought it already, go home, download the free Microsoft AntiSpyware from http://www.microsoft.com/spyware/ , and run it on your computer. If you don't find at least one nasty program that shouldn't be on your computer, come back and buy Danielle Steele's latest novel over in the romance section because you don't need my help.In this book, I'll show you how to cleanse your computer, halt further infections, do major damage control, and lock down the most insecure computer operating system you have ever seen. I know I said that earlier, but XP is just awful. You'll also enjoy 1,329 other really good bits of information that will be equally compelling.When you're done with this book, you'll want to dance until you wear out your pants. And in fact I encourage it often in these pages. Then you'll want to go help your grandma because you'll know that if you're at risk, she's in deep grandma trouble with her computer. Then I want you to tell your neighbors and help them. And become the gal or guy who everyone goes to for help on home computer security. And here's the kicker: You don't even have to be a geek. Nope, you can continue to dress fashionably; eat good, wholesome food; and hold eye contact with handsome men and pretty women in elevators. Geeks are actually cool. But you don't have to become one to learn about personal computer security.All I ask is that you read one chapter at a time. Start with the first seven, which detail the key threats you'll face in computer security. I'll scare the socks off you and then make it all better with easy-to-understand, geek-free help. How This Book Is Organized Chapter 1--Viruses: Attack of the Malicious ProgramsIn this first and vividly exciting chapter, I tell you what viruses are, why they are a problem, and how to get rid of them. Plus learn secrets, such as the real reason people write them in the first place. Chapter 2--Spyware: Overrun by Advertisers, Hijackers, and OpportunistsThis is a modern day computer pandemic. Your computer is probably rife with this malware. Bad companies are making money with it learning what you do on your computer. At the same time, spyware is also slowing your computer down. Most people experience a 30%-50% performance boost when they get rid of

Rewards Program