26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Part I: Computer Viruses Learn about the many different types of computer viruses—boot<br />

record, file infector, script, macro, Trojan horses, worms, <strong>and</strong> so on—<strong>and</strong> how to protect your<br />

system against their destructive payloads.<br />

Part II: Internet Attacks Discover the many ways that malicious individuals can target your<br />

computer for data theft <strong>and</strong> attack, <strong>and</strong> how to guard against such online assaults.<br />

Part III: <strong>Privacy</strong> Theft Find out how your privacy can be compromised on the Internet, <strong>and</strong><br />

how to defend yourself against identity theft, online predators, <strong>and</strong> other threats to your<br />

privacy.<br />

Part IV: E-mail Spam Discover where all those unwanted e-mail messages in your in-box<br />

come from, <strong>and</strong> how to keep them out.<br />

Part V: Web-Based Intrusions Find out how to avoid the many major <strong>and</strong> minor<br />

annoyances you find at too many Web sites, including pop-up advertising <strong>and</strong> inappropriate<br />

content.<br />

In addition, any technical terms you may not be familiar with are likely to be listed in the<br />

book’s glossary, following the final chapter.<br />

Which brings up an important point: You don’t have to be a computer wizard to use this book.<br />

In fact, I assume that you’re a casual (Windows) <strong>PC</strong> user <strong>and</strong> aren’t interested in those overly<br />

technical solutions best suited to full-time geeks. That’s why I provide practical solutions—<br />

things you can easily do, without an undue expenditure of time or effort (or money!). And,<br />

surprisingly, you can protect yourself fairly well by doing a few simple things, which you’ll<br />

learn as you read the book.<br />

When the book presents a solution to a problem, I try to do so in as general a fashion as<br />

possible, so that it doesn’t matter whether you’re using Windows 95, Windows 98, Windows<br />

2000, or Windows XP; whether you’re connecting to the Internet via a dial-up or broadb<strong>and</strong><br />

connection; or whether you’re a home, small business, or corporate computer user. Where<br />

specific instructions are necessary, I typically focus on the most recent versions of the<br />

applicable software. And I describe the process of selecting a series of menu options by<br />

saying “select option one > option two > option three”—which means pull down the first<br />

menu, select the next menu item, then select the following menu item. (It’s a nice shorth<strong>and</strong><br />

that saves you a little reading <strong>and</strong> the publisher a little space on the page.)<br />

Throughout the book you’ll find what I like to call “asides” to the main text. These include<br />

notes, time-saving tips, <strong>and</strong> warnings about pitfalls to avoid, as well as the slightly longer<br />

discussions that my publisher calls sidebars. These little asides offer interesting information<br />

that isn’t always essential to the discussion at h<strong>and</strong>; we put them outside the main text for you<br />

to read them as you like.<br />

You’ll also find a lot of Web sites mentioned in the book. That’s because many of the<br />

solutions to these security intrusions are available on the Internet. When I mention a Webbased<br />

solution, I include the Web site address (URL) in a special typeface, like this:<br />

www.sybex.com. I’ve made every attempt to make sure the URLs are all up-to-date; but the<br />

Web being the Web, expect some of this information (<strong>and</strong> some of these addresses) to change<br />

over time.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!