did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470046562

PC Magazine Windows Vista Security Solutions

by
  • ISBN13:

    9780470046562

  • ISBN10:

    0470046562

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2007-01-23
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.99

Summary

The average user has little idea of the severity of security threats to the Windows Vista OS or how those threats could impact their personal privacy; this book educates readers on the simple steps they can take to prepare for potential threats Providing the knowledge and wisdom that end-users need in order to protect themselves, this detailed guide offers step-by-step instructions to installing programs and configuring settings related to securing Windows Vista Aimed at the home and small office user who wants to learn different ways to avoid or lessen the risk of security threats Examines viruses, spyware, firewalls, browser security, password management, data protection, network security, and Vista updates

Author Biography

Dan DiNicolo holds a variety of certifications and contributes to numerous PC-related publications in the U.S., Australia, and the U.K. His work has appeared in The Official Windows Vista Magazine as well as PC Magazine. Dan operates 2000Trainers.com, an online learning site for IT professionals pursuing certifications.

Table of Contents

Acknowledgmentsp. xvii
Introductionp. xix
Getting Down to the Business of Securing Windows Vista
A Short Introduction to Securing Windows Vistap. 3
The Five Golden Rules of Windows Securityp. 4
The Security Mapp. 5
No Excuses!p. 5
Got a Network?p. 6
Nice to Knowp. 7
For Those Who Want to Take Things Up a Notchp. 8
Summaryp. 9
Implementing User Accounts and Logon Securityp. 11
Exploring User Accountsp. 11
Benefits of User Accountsp. 12
User Account Typesp. 13
Creating User Accountsp. 16
Creating User Accounts in Control Panelp. 17
Managing User Accountsp. 18
Changing User Account Typesp. 18
Renaming User Accountsp. 19
Managing User Account Passwordsp. 21
Deleting User Accountsp. 23
User Account Control and the Run As Commandp. 24
Summaryp. 27
Implementing Password Securityp. 29
Password Securityp. 29
Choosing Good Passwordsp. 30
Common Password Mistakesp. 31
Changing Passwords Regularlyp. 33
Windows Vista Passwordsp. 34
User Account Passwordsp. 34
Web Site Passwordsp. 35
E-mail and Internet Service Passwordsp. 36
File Security Passwordsp. 36
Implementing Password and Account Lockout Policiesp. 36
Configuring Password Policy Settingsp. 38
Configuring Account Lockout Policy Settingsp. 40
Storing Passwords Securelyp. 42
Password Reset Diskp. 43
Password Management Softwarep. 44
Implementing Additional Password Security Optionsp. 46
BIOS Passwordsp. 47
Hard Disk Passwordsp. 49
Syskey Passwordp. 49
Summaryp. 51
Using Built-in Tools and Settings to Improve Windows Vista Securityp. 53
Exploring Running Processes with Task Managerp. 53
Reviewing the Security Event Logp. 55
Using Windows Security Centerp. 58
Configuring Local Security and Policy Settingsp. 60
Local Security Policyp. 60
Local Computer Policyp. 62
Summaryp. 66
Making Surfing Safer
Securing Your Web Browserp. 69
Securing Internet Explorerp. 69
Configuring IE Zone Security Settingsp. 70
Configuring IE Privacy Settingsp. 74
Managing Access to Web Contentp. 78
Internet Explorer Security Featuresp. 80
Using Other Web Browsersp. 87
Summaryp. 89
Implementing Parental Controlsp. 91
Keeping Children Safe Onlinep. 92
Understanding Online Risks and Dangersp. 92
Practical Tips for Parentsp. 93
Restricting Internet Access Using Parental Controlsp. 95
Enabling Parental Control Restrictionsp. 96
Review Reportsp. 101
Using Content Filtering in Business Environmentsp. 102
Summaryp. 103
Protecting Windows Vista Against Internet Threats
Protecting Windows Vista with a Firewallp. 107
Understanding the Role of a Firewallp. 108
Inbound Filteringp. 108
Outbound Filteringp. 109
Configuring Windows Firewallp. 109
Check Windows Firewall Statusp. 110
Enabling or Disabling a Specific Connectionp. 112
Configuring Exceptionsp. 113
Using Windows Firewall with Advanced Securityp. 117
Blocking Inbound and Outbound Connectionsp. 117
Setting Logging and Scope Settingsp. 122
Implementing Third-Party Firewall Softwarep. 125
Testing Your Firewallp. 128
Summaryp. 131
Keeping Windows Vista Patched and Protectedp. 133
Windows Vista Security Updatesp. 133
Security Updatesp. 134
Service Packsp. 134
Windows Vista Update Optionsp. 135
Using Windows Updatep. 136
Installing Service Packs and Security Updates Manuallyp. 139
Patching Beyond Vistap. 141
Summaryp. 142
Protecting Against Virusesp. 143
Understanding Virusesp. 143
Types of Virusesp. 144
Virus Risksp. 145
Protecting Against Virusesp. 146
Installing Antivirus Softwarep. 146
Updating Virus Definitionsp. 149
Configuring Virus Scanning Optionsp. 150
Scanning for Virusesp. 153
Beyond Antivirus Softwarep. 155
Removing Virusesp. 156
Summaryp. 159
Fighting Malware: Protecting Against Spyware, Adware, and Browser Hijackersp. 161
Understanding Malwarep. 161
Types of Malwarep. 162
How Malware Infects Your PCp. 165
Signs of Infectionp. 166
Malware Risksp. 167
Protecting Against Malwarep. 168
Installing Anti-Spyware Softwarep. 168
Updating Spyware Definition Files and Scanning for Malwarep. 170
Windows Defender Toolsp. 172
Beyond Anti-Spyware Softwarep. 174
Removing Malwarep. 175
Using Spyware Removal Toolsp. 176
Eliminating Browser Hijacksp. 178
Summaryp. 180
Messaging Your Way to E-mail Security
The Dark Side of Spamp. 183
Understanding Spamp. 183
How Spam Finds Youp. 184
Why Spam Can Be a Security Threatp. 185
Fighting Spamp. 189
Fighting Spam with Windows Mailp. 189
Filtering Spam with Anti-Spam Softwarep. 196
Defeating Spam with Good Ol' Common Sensep. 199
Summaryp. 202
Securing E-mail Messages Using Encryption and Digital Signaturesp. 203
The Need for E-mail Securityp. 204
Secure E-mail Componentsp. 205
Certificatesp. 205
Certificate Authoritiesp. 206
Public and Private Keysp. 207
How Secure E-mail Worksp. 207
Digital Signaturesp. 207
Encryptionp. 208
Digital Signatures and Encryption in Actionp. 209
Obtaining, Installing, and Managing Digital Certificatesp. 210
Obtaining and Installing a Personal Digital Certificatep. 210
Managing a Personal Digital Certificatep. 211
Signing and Encrypting E-mail Messagesp. 215
Sending and Receiving Signed E-mail Messagesp. 215
Sending and Receiving Encrypted E-mail Messagesp. 219
Secure E-mail Alternativesp. 224
Summaryp. 225
Protecting Your Files
Controlling Access to Your Personal Filesp. 229
Understanding File System Securityp. 229
Differences between FAT, FAT32, and NTFSp. 230
Converting FAT or FAT32 to NTFSp. 231
Using Personal and Public Foldersp. 232
Configuring File and Folder Security Settings Manuallyp. 234
Summaryp. 238
Improving File Security Using Encryptionp. 239
Encryption Optionsp. 239
Encrypting File Systemp. 240
Third-Party Encryption Programsp. 240
Protecting Files with EFSp. 241
How EFS Worksp. 241
Designating a Data Recovery Agentp. 242
Encrypting Files and Foldersp. 244
Managing EFS Encryption Keysp. 248
Using a Third-Party Encryption Solutionp. 250
Dekart Private Disk Lightp. 250
Dekart Private Diskp. 253
Summaryp. 254
Erasing Files and Hard Drives Securelyp. 255
Traditional Ways of Deleting Filesp. 255
Using the Recycle Binp. 256
Formatting and Deleting Partitionsp. 257
Erasing Files Securelyp. 259
Setting Eraser Defaultsp. 259
Erasing a File with Eraserp. 261
Covering Your Internet Tracksp. 264
Erasing Hard Drives Securelyp. 266
Summaryp. 268
Securing Your Home Network
Securing Shared Folders and Printersp. 271
Sharing Network Resourcesp. 272
Sharing and Securing Foldersp. 272
Sharing and Securing the Public Folderp. 273
Securing and Sharing Any Folderp. 274
Advanced Sharing and Securityp. 276
Connecting to Shared Foldersp. 280
Connecting to a Shared Folder Using Networkp. 281
Mapping a Network Drivep. 281
Browsing for the Folder Using the Networkp. 282
Sharing and Securing Printersp. 283
Sharing Existing Printersp. 283
Connecting to Shared Printersp. 284
Securing Shared Printersp. 285
Summaryp. 287
Securing Windows Vista on Wireless Networksp. 289
Windows Vista and Wireless Networkingp. 289
Windows Vista Wireless Settingsp. 291
Security Risks on Wireless Networksp. 294
Securing Wireless Access Pointsp. 295
Changing the Default Administrator Access Passwordp. 296
Changing the Default Wireless Network Namep. 298
Limiting Access to Wireless Networksp. 299
Disabling SSID Broadcastp. 299
Implementing MAC Address Securityp. 303
Securing Wireless Network Traffic with Encryptionp. 305
Wired Equivalent Privacyp. 305
Implementing WEP Securityp. 306
Wi-Fi Protected Accessp. 308
Implementing WPA Securityp. 310
Summaryp. 314
Appendixes
Reinstalling Windows Vistap. 317
Pre-Installation Tasksp. 317
Installing Windows Vistap. 318
Post-Installation Tasksp. 319
Helpful Windows Vista Security Web Sitesp. 321
Windows Vista Home Pagep. 321
Windows Help and Support Pagep. 321
Microsoft Security Home Pagep. 321
TechNet Security Home Pagep. 322
Windows Vista Security and Protectionp. 322
Windows Vista Communityp. 322
PC Magazine Security Watchp. 322
The Elder Geek on Windows Vistap. 322
Indexp. 323
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program