Skip to content

Internet Privacy and Security

Best in textbook rentals since 2012!

ISBN-10: 0028643216

ISBN-13: 9780028643212

Edition: 2002

Authors: Preston Gralla

List price: $19.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Full of sound advice, The Complete Idiot's Guide to Internet Privacy and Security is a practical but comprehensive survey of the pitfalls of the online world and the measures that need to be adopted to safely navigate its sometimes dangerous areas.
Customers also bought

Book details

List price: $19.95
Copyright year: 2002
Publisher: Penguin Publishing Group
Publication date: 1/1/2002
Binding: Paperback
Pages: 384
Size: 7.25" wide x 9.00" long x 1.00" tall
Weight: 1.386
Language: English

Preston Gralla is the author of more than 40 books that have been translated into 20 languages, including Galaxy S 5 The Missing Manual, Windows 8 Hacks, NOOK HD: The Missing Manual, Galaxy Tab: The Missing Manual, The Big Book of Windows Hacks, How the Internet Works, and How Wireless Works. He is a contributing editor to Computerworld, a blogger for ITWorld, and was a founding editor and then editorial director of PC/Computing, executive editor for CNet/ZDNet, and the founding managing editor of PC Week.He has written about technology for many national newspapers and magazines, including USA Today, Los Angeles Times, Dallas Morning News (for whom he wrote a technology column), PC World,…    

The Lowdown on Internet Privacy and Security
Why You Need to Worry About Online Privacy and Security
Why the Internet Can Be Such a Dangerous Place
It's More Than Magic: How the Internet Works
All the Evils That Hackers Can Do
How Your Privacy Can Be Invaded
Viruses, Worms, and Data Theft, Oh My!
Dangers to Cable and DLS Modem Owners
Putting Up Your First Line of Cyberdefense
Making Sure Your ISP Doesn't Invade Your Privacy
Protecting Your Privacy on America Online
How to Create Hacker-Proof Passwords
How to Remove Your Name from Web Databases
What About Microsoft's Windows XP, Passport, and .Net?
How to Protect Yourself Against the Most Common Internet Scams
Recognizing Online Scams
Protecting Yourself Against the Most Common Internet Scams
What to Do If You've Been Scammed
The Best Sites for Consumer Advice and Scams
Hack Attack: How to Protect Yourself Against Hackers
How the Worm Turns: Protecting Yourself Against Worms, the Most Common Internet Danger
What Are Internet Worms?
How Worms Wreak Their Havoc
A Cloudy Outlook: Worms and Microsoft's E-mail Software
How to Protect Yourself Against Worms
How to Protect Your Web Server
How to Keep Your Computer Safe from Viruses
What Are Viruses?
How You Can Get Infected
Safety First: How to Protect Yourself Against Viruses
How Does Anti-Virus Software Work?
Virus Myths, Hoaxes, and Urban Myths
The Ultimate Defense: Keeping Safe with Firewalls
No Asbestos Needed: What Are Firewalls?
Why You Need a Firewall
How Personal Firewalls Work
How to Protect Yourself with Personal Firewalls
Where to Get the Best Firewalls
Keeping Safe from Java, JavaScript, and ActiveX Applets
Java ... Does That Have Something to Do with Coffee?
How Does Java Work--and How Can It Harm Your Computer?
Protecting Yourself Against Rogue Java Applets
Now I Have to Worry About JavaScript, Too?
Does ActiveX Have Something to Do with the X-Files?
How to Protect Your Home Network
What Dangers Are There in Home Networks?
Understanding Your Network's Built-In Protection
What to Do About Printer and File Sharing
Customizing Your Network's Built-In Protection
It's None of Their Business: How to Protect Your Privacy Online
How to Keep Yourself Safe Against Identity Theft
What Is Identity Theft?
What Evil Can Be Done If Your Identity Is Stolen
How to Protect Yourself Against Identity Theft
What to Do If You've Become Victimized
I Spy: How to Protect Yourself Against Spyware and Web Bugs
What Is Spyware?
How to Spot Spyware Before It Gets You
How to Protect Yourself Against Spyware
What Are Web Bugs?
They're Not Very Sweet: What You Can Do About Cookies
What Are Web Cookies?
Why Are Web Sites Serving Cookies?
Fight Back: How to Make Cookies Crumble
Handling Cookies in Microsoft XP and Internet Explorer 6
You Should Really Get a Cookie Killer
How to Selectively Stop Advertising Cookies
How to Make Sure Internet Sites Don't Abuse Your Privacy
Checking Out a Site's Privacy Policies
What Does All That Fine Print Mean?
Using Internet Explorer 6 or Windows XP to Check Out Web Sites
What You Need to Know About Financial and Job Search Web Sites
You Can Trust TRUSTe
Protect Your Privacy When Filling Out Registration Forms
How to Surf Anonymously Without a Trace
All the Information Your Browser Reveals About You
What Your Browser Cache Tells About You
Hiding Your Browsing History
Hiding Your E-mail Address
Keep Newsgroup Information from Prying Eyes
Surfing Anonymously Without a Trace
Protect Your Identity Online--Become Schizophrenic
Snoopers Everywhere: Keeping Safe When Using E-mail, Instant Messaging, and Chatting
Dangerous Delivery: What Dangers Are There in E-mail?
How E-mail Works
How Your E-mail Can Be Read by Others
Your Boss Owns Your E-mail
Why Spam Can Leave a Bad Taste in Your Mouth
Why E-mail Spoofing Is No Joke
Is There Such a Thing As a Mail Bomb?
Can You Get a Virus from an E-mail Message?
Beware of E-mail Web Bugs
Keeping Your E-mail Private with Encryption
What Is Encryption, Anyway?
Here's How Encryption Works--And How to Use It
Using Pretty Good Privacy to Encrypt E-mail
How to Use a Digital Certificate to Encrypt E-mail
Beyond Luncheon Meat: How to Protect Yourself Against Spam
What Is Spam, and How Is It Created?
Hiding Your Name from Spammers
Using Your E-mail Program to Stop Spam in Its Tracks
Use Spam-Fighting Software to Kill Spam
Fight Back! What to Do If You've Been Spammed
Staying Anonymous with Anonymous Remailers
What Is an Anonymous Remailer, Anyway?
Why Would Someone Use an Anonymous Remailer?
Using Anonymous Remailers
Where to Find Anonymous Remailers on the Internet
Keep Yourself Safe and Protect Your Privacy When Chatting and Instant Messaging
What Kinds of Ways Are There to Chat and Instant Message on the Internet?
What Dangers There Are in Chatting
Don't Let IRC Irk You: The Special Dangers of IRC Chat
Protecting Yourself When Using Instant Messengers
Special Issues When Using ICQ
Protecting Your Privacy on Internet Newsgroups and Discussion Areas
What Are Usenet Newsgroups?
Protecting Your Privacy on Newsgroups and Discussion Areas
Your Permanent Profile and What You Can Do About It
Protecting Your Children and Family Online
Online Dangers That Kids Face
The Dangers Children Face Online
Are There Really Stalkers Online?
How Can Kids View Inappropriate Material Online?
How Kids' Privacy Can Be Violated
The Dangers for Kids in E-mail
The Best Rules for Keeping Kids Safe on the Internet
The Best Line of Defense: Good Parenting
Rules for Keeping Kids Safe Online
Protecting Your Children's Privacy Online
What to Watch for on the Web
What to Watch for in Chat and Instant Messaging
Protecting Your Kids from the Evils of E-mail
Should Your Kids View Newsgroups?
Using Site-Blocking Software
Playing It Safe on America Online
What Dangers Are There on America Online?
Taking Control with Parental Controls
What to Do If Your Child Has Been Harassed on America Online
Kids' Safety Tips on America Online
A Final Word to Parents
Even More Privacy and Safety Issues: Work, Cybershopping, and Beyond
Your Life Is Not Your Own: What You Need to Know About Privacy at Work
Do Employers Really Monitor What Employees Do At Work?
What Actions Do Employers Take Against Employees?
Why Your Boss Might Be Snooping on You
What the Laws Say About Work and Online Privacy
Here Comes Da Judge!
What You Can Do About Workplace Monitoring
What Dangers Are There for Online Shoppers?
What to Watch for When Buying Online
How Do I Buy Online?
Dangers of Online Shopping: How to Protect Yourself
What to Do If a Shopping Site Takes Your Money and Goes out of Business
Making Sure You Don't Get Burned When Buying Stock Online
How to Protect Your Credit Card When Buying Over the Internet
How to Know You're Buying Through a Secure Site
Check for the Locked Lock
Failsafe Credit Card Protection--It's Free!
How to Check Out a Site Before Buying
Where You Can Get the Lowdown on Shopping Sites
How to Stay Safe When Buying at Auctions
Sold American! What Are Online Auctions?
Biding Your Time: How Do Online Auctions Work?
What Kinds of Auction Sites Are There?
What Are the Most Common Auction Scams?
Check Out the Auction Site Before Bidding
How to Make Sure You Don't Get Scammed at Auctions
Wireless Insecurity: Protecting Yourself When Using Cellular Devices
What Kinds of Cellular Dangers Are There?
How Do Wireless Communications Work?
How to Protect Your Wireless Network
Watch Out for Wireless Viruses
Beware of Cell Phone Snoopers and Cell Phone Cloners
How to Safeguard Your PC
Protecting Your Laptop Against Theft
How About Password Protecting Your PC?
Password-Protect Your PC with a Screen Saver
How to Encrypt Your Files So That Snoopers Can't Get at Them
How to Permanently Erase Data from Your PC
Three Rules to Keep Your Data Safe: Back Up, Back Up, and Back Up!
Fight Back: Use the Internet to Get Information About Privacy and Security
Using the Internet to Protect Your Privacy and Security
Where to Go to Complain About Privacy and Security Issues
Government Sites That Investigate Your Complaints
Credit Where It's Due: How to Get Your Credit Ratings Online--and Correct Them
How to Get Your Name off Telemarketing and Junk-Mail Lists
Appendixes
Speak Like a Geek: The Complete Archive
The Best Internet Sites for Privacy and Security Issues
Index