26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the permission of rights holders, although the Copyright Act does permit certain unauthorized<br />

reuse as fair use under 17 U.S.C. Section 107.<br />

Manufactured in the United States of America<br />

10 9 8 7 6 5 4 3 2 1<br />

This book is dedicated to my brother-in-law Dennis <strong>and</strong> my sister-in-law Stephanie, for<br />

putting up with the rest of the family.<br />

Acknowledgments<br />

Thanks to all the Sybex staffers <strong>and</strong> freelancers who have helped to shape <strong>and</strong> shepherd this<br />

project, including but not limited to Brianne Agatep, Franz Baumhackl, Jim Compton, Ellen<br />

Dendy, Joel Fugazzotto, Nancy Guenther, Tony Jonick, Jim Kelly, Mae Lum, <strong>and</strong> my old<br />

friend Jordan Gold.<br />

Introduction<br />

I first conceived of this book when I got an e-mail from a friend—or, to be more accurate,<br />

from her e-mail program. My friend hadn’t sent the message, which had a r<strong>and</strong>om Word<br />

document <strong>and</strong> a virus-infected file attached; the message was sent by the computer virus that<br />

was infecting her system.<br />

It was likely, I thought, that my friend didn’t know her computer had been infected; she’s not<br />

the most technically literate person I know. (She’s a retired music teacher, not a computer<br />

geek.) So I called her, <strong>and</strong> told her that I thought she had a virus. Her immediate reaction was<br />

panic, followed by a question: Did this mean she had to throw away her computer <strong>and</strong> buy a<br />

new one<br />

It didn’t, I replied; then I walked her through what she needed to do to remove the virus from<br />

her system. Unfortunately, I soon discovered that the steps to recovery were harder than they<br />

needed to be, <strong>and</strong> weren’t helped by the unnecessary technospeak employed by the company<br />

that supplied the chosen antivirus software.<br />

How, I wondered, was the average computer user supposed to deal with this sort of problem<br />

on their own<br />

This incident was followed by a similar one, where my brother’s computer became infected.<br />

He is more technically literate than my music-teacher friend, <strong>and</strong> we got the problem fixed<br />

relatively quickly. He also figured out how the virus had entered his system; it was through an<br />

e-mail attachment from a friend that he had unassumingly opened a few days prior. Why had<br />

he opened the attachment, I asked—didn’t he know that’s how viruses are spread Yes, he<br />

answered, but he’s in the habit of clicking everything he receives via e-mail, especially if it<br />

comes from someone he knows.<br />

The virus incident put my brother on alert, however, <strong>and</strong> a few weeks later I received another<br />

call from him. This time he’d received an e-mail from another friend, warning him that his<br />

system was infected with some new virus, <strong>and</strong> instructing him to delete some supposedly

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!