یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references (pages 333-339) and index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Welcome to the Jungle! -- Unwelcome Intruders Seeking Entry -- It's a Jungle Out There! -- Understanding Spyware -- What Qualifies as Spyware? -- Signs of Potential Spyware Infestation -- Understanding Adware and Pop-Ups -- Using Task Manager to Halt a Pop-up Invasion -- Of Banners and Pop-Ups -- Understanding Spam -- Understanding Malware -- About Viruses, Worms, Trojans, and More -- Viruses -- Worms -- Trojan Horses, or Trojans for Short -- Definitions versus Real Life: Hybrid Viruses or "Blended Threats" -- What Can Malware Do? -- Diagnosing Malware: Watching for Changes on Your System -- How Malware Gets Reported, Rated, and Alerted -- About Vulnerabilities, Threats, and Exploits -- Reporting Malware and Other Unwanted Software -- About Malware Reports, Alerts, and Bulletins -- Where to Go for Malware and Other Alerts -- How Good PCs Go Bad -- Methods of Insertion and Delivery -- How Infection or Infestation Occurs -- More Signs of Infection or Infestation -- E-mail Attachments -- Automatic Invocation -- File Transfers -- Active Web Content -- Media-Based Infections -- By Invitation Only -- Detecting and Repairing PC Infestations -- What Can Go Wrong, Occasionally Will -- How the Pros Do It -- Anatomy of an Infection -- How To Clean Out Your System -- Worm W32. Randex. ATX -- ABetterInternet -- ClientMan.msdaim -- Where To Go for Help and Instruction -- Is Your PC Clean? -- Hoaxes -- The Particles of Protection -- Personal Firewalls -- What Is a Firewall? -- What Is TCP/IP and How Does It Relate to Firewalls? -- How a Firewall Looks at TCP/IP-Literally! -- Top Personal Firewall Picks -- Pondering the XP Default-Internet Connection Firewall/Windows Firewall -- Top Firewall Picks -- Installing and Using a Personal Firewall -- Checking Your Work -- Running Multiple Firewalls -- Other Paths to Firewall Bliss -- Pop-Up Blockers -- What Is a Pop-Up? -- How Do Pop-Ups Work? -- Blocking Pop-Ups with Software -- Top Pop-Up Blockers -- Pondering the XP Default -- Top Pop-Up Blocker Picks -- Checking Your Work -- Running Multiple Pop-Up Blockers -- Anti-Spyware and Anti-Adware Programs -- What Are Spyware and Adware, Really? -- Why Install Anti-Spyware/Anti-Adware? -- Scanning for Adware and Spyware -- Blocking Spyware and Adware -- Top Anti-Spyware/Anti-Adware Picks -- Installing and Using Anti-Spyware -- Checking Your Work -- Using Multiple Spyware/Adware Blockers -- Anti-Virus Programs -- Quick Virus Refresher -- Why Install Anti-Virus Software? -- How Anti-Virus Software Works -- Top Anti-Virus Picks -- Symantec Anti-Virus Products -- McAfee Anti-Virus Products -- Grisoft AVG Anti-Virus -- ALWIL avast! 4 Home Edition -- Installing and Using Anti-Virus Software -- Norton AntiVirus 2005 -- McAfee VirusScan 8.0 -- Grisoft's AVG 6.0 Anti-Virus Free Edition -- ALWIL avast! 4 Home Edition -- Using Multiple Anti-Virus Packages -- Spam Blockers -- Understanding E-mail Basics -- Why Block (or Otherwise Kill) Spam? -- A Brief Taxonomy of Spam -- How (and When) to Block or Filter Spam -- Spam Handling at Your ISP -- Spam Screening and Filtering Services -- Spam Screening and Filtering Software -- Working with Rules in Outlook -- What's New in Outlook 2003 SPl? -- The Sum Is Greater Than the Individual Parts -- If in a Lather, Switch, Don't Fight! -- Top Anti-spam Software and Service Picks -- Checking Your Work -- Using Multiple Spam Blockers -- Commonsense Rules for Safe Computing -- Practicing E-mail Safety -- Never Open Unexpected Attachments -- Blocking Attachments in Outlook -- Screen Your E-mail -- Recognizing Hoaxes and Spoofs -- Hoaxes -- Spoofs -- Beware E-mail Fraud: Phishing, Scams, and More -- Eleven Basic Rules for E-mail Safety -- When in Doubt, Play It Safe! -- Practicing Web Safety -- Understanding Browser Security -- Firefox from Mozilla -- Opera from Opera Software -- Exploring Common IE Security Settings -- Internet Content Zone -- Local Intranet Content Zone -- Trusted Sites Content Zone -- Restricted Sites Content Zone -- Summing up Security Settings -- Customizing Your Security Settings -- Managing Cookies -- Controlling Cookies with Privacy Settings for Web Content Zones -- Viewing Privacy Policy and Cookie Information in IE -- Spending Money Safely Online -- The Importance of Security Updates -- When in Doubt, Be Safe! -- Practicing System Safety -- Baselining Your System -- Creating a Process Inventory -- Understanding What You See -- Rough and Ready Performance Metrics -- Other Snapshots Worth Gathering -- Comparing Differences -- Monitoring System Security -- Proper Password Handling -- Stay Away from Risky Downloads -- When in Doubt, Play It Safe! -- The Habit of Security -- Safety Is a Matter of Routine -- Where to Focus Your Routines -- Cover All the Bases -- Keep Your Software Current -- If It's Important or Valuable, Back It Up! -- Making the Rounds -- Safety Requires Constant Vigilance -- Category 4 Characteristics -- Eyeing Security Events -- Third-Party Threat Information -- Vendor Threat Information -- Avoiding Potential Trouble -- The Personal PC Security Audit -- Staying Subscribed -- Where (or When) Will It End? -- The Security Suite Life -- Security Suite Offerings -- Shopping Advice -- Microsoft Knowledge Base -- Books and Articles -- Safe Download Sites -- Online Security Scanners -- For malware, spyware, and adware -- Spam -- Other online security scanners -- Blocking Software -- Password Management -- Security Issues and Information -- Software -- Virus hoaxes.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
Presents advice on creating a home computer network, covering such topics as designing a network, installing a LAN, configuring a network, Internet access, firewalls, and home entertainment components.
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Computer viruses.
موضوع مستند نشده
Malware (Computer software)
موضوع مستند نشده
Spyware (Computer software)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Computer viruses.
موضوع مستند نشده
Computerbeveiliging.
موضوع مستند نشده
Computervirussen.
موضوع مستند نشده
Malware (Computer software)
موضوع مستند نشده
Spyware (Computer software)
موضوع مستند نشده
Spyware.
رده بندی ديویی
شماره
005
.
8
ويراست
22
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نشانه اثر
T57
2005
سایر رده بندی ها
شماره رده
54
.
32
شماره رده
54
.
32
.
کد سيستم
bcl
کد سيستم
bcl
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )