| |
| |
| |
The Lowdown on Internet Privacy and Security | |
| |
| |
| |
Why You Need to Worry About Online Privacy and Security | |
| |
| |
Why the Internet Can Be Such a Dangerous Place | |
| |
| |
It's More Than Magic: How the Internet Works | |
| |
| |
All the Evils That Hackers Can Do | |
| |
| |
How Your Privacy Can Be Invaded | |
| |
| |
Viruses, Worms, and Data Theft, Oh My! | |
| |
| |
Dangers to Cable and DLS Modem Owners | |
| |
| |
| |
Putting Up Your First Line of Cyberdefense | |
| |
| |
Making Sure Your ISP Doesn't Invade Your Privacy | |
| |
| |
Protecting Your Privacy on America Online | |
| |
| |
How to Create Hacker-Proof Passwords | |
| |
| |
How to Remove Your Name from Web Databases | |
| |
| |
What About Microsoft's Windows XP, Passport, and .Net? | |
| |
| |
| |
How to Protect Yourself Against the Most Common Internet Scams | |
| |
| |
Recognizing Online Scams | |
| |
| |
Protecting Yourself Against the Most Common Internet Scams | |
| |
| |
What to Do If You've Been Scammed | |
| |
| |
The Best Sites for Consumer Advice and Scams | |
| |
| |
| |
Hack Attack: How to Protect Yourself Against Hackers | |
| |
| |
| |
How the Worm Turns: Protecting Yourself Against Worms, the Most Common Internet Danger | |
| |
| |
What Are Internet Worms? | |
| |
| |
How Worms Wreak Their Havoc | |
| |
| |
A Cloudy Outlook: Worms and Microsoft's E-mail Software | |
| |
| |
How to Protect Yourself Against Worms | |
| |
| |
How to Protect Your Web Server | |
| |
| |
| |
How to Keep Your Computer Safe from Viruses | |
| |
| |
What Are Viruses? | |
| |
| |
How You Can Get Infected | |
| |
| |
Safety First: How to Protect Yourself Against Viruses | |
| |
| |
How Does Anti-Virus Software Work? | |
| |
| |
Virus Myths, Hoaxes, and Urban Myths | |
| |
| |
| |
The Ultimate Defense: Keeping Safe with Firewalls | |
| |
| |
No Asbestos Needed: What Are Firewalls? | |
| |
| |
Why You Need a Firewall | |
| |
| |
How Personal Firewalls Work | |
| |
| |
How to Protect Yourself with Personal Firewalls | |
| |
| |
Where to Get the Best Firewalls | |
| |
| |
| |
Keeping Safe from Java, JavaScript, and ActiveX Applets | |
| |
| |
Java ... Does That Have Something to Do with Coffee? | |
| |
| |
How Does Java Work--and How Can It Harm Your Computer? | |
| |
| |
Protecting Yourself Against Rogue Java Applets | |
| |
| |
Now I Have to Worry About JavaScript, Too? | |
| |
| |
Does ActiveX Have Something to Do with the X-Files? | |
| |
| |
| |
How to Protect Your Home Network | |
| |
| |
What Dangers Are There in Home Networks? | |
| |
| |
Understanding Your Network's Built-In Protection | |
| |
| |
What to Do About Printer and File Sharing | |
| |
| |
Customizing Your Network's Built-In Protection | |
| |
| |
| |
It's None of Their Business: How to Protect Your Privacy Online | |
| |
| |
| |
How to Keep Yourself Safe Against Identity Theft | |
| |
| |
What Is Identity Theft? | |
| |
| |
What Evil Can Be Done If Your Identity Is Stolen | |
| |
| |
How to Protect Yourself Against Identity Theft | |
| |
| |
What to Do If You've Become Victimized | |
| |
| |
| |
I Spy: How to Protect Yourself Against Spyware and Web Bugs | |
| |
| |
What Is Spyware? | |
| |
| |
How to Spot Spyware Before It Gets You | |
| |
| |
How to Protect Yourself Against Spyware | |
| |
| |
What Are Web Bugs? | |
| |
| |
| |
They're Not Very Sweet: What You Can Do About Cookies | |
| |
| |
What Are Web Cookies? | |
| |
| |
Why Are Web Sites Serving Cookies? | |
| |
| |
Fight Back: How to Make Cookies Crumble | |
| |
| |
Handling Cookies in Microsoft XP and Internet Explorer 6 | |
| |
| |
You Should Really Get a Cookie Killer | |
| |
| |
How to Selectively Stop Advertising Cookies | |
| |
| |
| |
How to Make Sure Internet Sites Don't Abuse Your Privacy | |
| |
| |
Checking Out a Site's Privacy Policies | |
| |
| |
What Does All That Fine Print Mean? | |
| |
| |
Using Internet Explorer 6 or Windows XP to Check Out Web Sites | |
| |
| |
What You Need to Know About Financial and Job Search Web Sites | |
| |
| |
You Can Trust TRUSTe | |
| |
| |
Protect Your Privacy When Filling Out Registration Forms | |
| |
| |
| |
How to Surf Anonymously Without a Trace | |
| |
| |
All the Information Your Browser Reveals About You | |
| |
| |
What Your Browser Cache Tells About You | |
| |
| |
Hiding Your Browsing History | |
| |
| |
Hiding Your E-mail Address | |
| |
| |
Keep Newsgroup Information from Prying Eyes | |
| |
| |
Surfing Anonymously Without a Trace | |
| |
| |
Protect Your Identity Online--Become Schizophrenic | |
| |
| |
| |
Snoopers Everywhere: Keeping Safe When Using E-mail, Instant Messaging, and Chatting | |
| |
| |
| |
Dangerous Delivery: What Dangers Are There in E-mail? | |
| |
| |
How E-mail Works | |
| |
| |
How Your E-mail Can Be Read by Others | |
| |
| |
Your Boss Owns Your E-mail | |
| |
| |
Why Spam Can Leave a Bad Taste in Your Mouth | |
| |
| |
Why E-mail Spoofing Is No Joke | |
| |
| |
Is There Such a Thing As a Mail Bomb? | |
| |
| |
Can You Get a Virus from an E-mail Message? | |
| |
| |
Beware of E-mail Web Bugs | |
| |
| |
| |
Keeping Your E-mail Private with Encryption | |
| |
| |
What Is Encryption, Anyway? | |
| |
| |
Here's How Encryption Works--And How to Use It | |
| |
| |
Using Pretty Good Privacy to Encrypt E-mail | |
| |
| |
How to Use a Digital Certificate to Encrypt E-mail | |
| |
| |
| |
Beyond Luncheon Meat: How to Protect Yourself Against Spam | |
| |
| |
What Is Spam, and How Is It Created? | |
| |
| |
Hiding Your Name from Spammers | |
| |
| |
Using Your E-mail Program to Stop Spam in Its Tracks | |
| |
| |
Use Spam-Fighting Software to Kill Spam | |
| |
| |
Fight Back! What to Do If You've Been Spammed | |
| |
| |
| |
Staying Anonymous with Anonymous Remailers | |
| |
| |
What Is an Anonymous Remailer, Anyway? | |
| |
| |
Why Would Someone Use an Anonymous Remailer? | |
| |
| |
Using Anonymous Remailers | |
| |
| |
Where to Find Anonymous Remailers on the Internet | |
| |
| |
| |
Keep Yourself Safe and Protect Your Privacy When Chatting and Instant Messaging | |
| |
| |
What Kinds of Ways Are There to Chat and Instant Message on the Internet? | |
| |
| |
What Dangers There Are in Chatting | |
| |
| |
Don't Let IRC Irk You: The Special Dangers of IRC Chat | |
| |
| |
Protecting Yourself When Using Instant Messengers | |
| |
| |
Special Issues When Using ICQ | |
| |
| |
| |
Protecting Your Privacy on Internet Newsgroups and Discussion Areas | |
| |
| |
What Are Usenet Newsgroups? | |
| |
| |
Protecting Your Privacy on Newsgroups and Discussion Areas | |
| |
| |
Your Permanent Profile and What You Can Do About It | |
| |
| |
| |
Protecting Your Children and Family Online | |
| |
| |
| |
Online Dangers That Kids Face | |
| |
| |
The Dangers Children Face Online | |
| |
| |
Are There Really Stalkers Online? | |
| |
| |
How Can Kids View Inappropriate Material Online? | |
| |
| |
How Kids' Privacy Can Be Violated | |
| |
| |
The Dangers for Kids in E-mail | |
| |
| |
| |
The Best Rules for Keeping Kids Safe on the Internet | |
| |
| |
The Best Line of Defense: Good Parenting | |
| |
| |
Rules for Keeping Kids Safe Online | |
| |
| |
Protecting Your Children's Privacy Online | |
| |
| |
What to Watch for on the Web | |
| |
| |
What to Watch for in Chat and Instant Messaging | |
| |
| |
Protecting Your Kids from the Evils of E-mail | |
| |
| |
Should Your Kids View Newsgroups? | |
| |
| |
Using Site-Blocking Software | |
| |
| |
| |
Playing It Safe on America Online | |
| |
| |
What Dangers Are There on America Online? | |
| |
| |
Taking Control with Parental Controls | |
| |
| |
What to Do If Your Child Has Been Harassed on America Online | |
| |
| |
Kids' Safety Tips on America Online | |
| |
| |
A Final Word to Parents | |
| |
| |
| |
Even More Privacy and Safety Issues: Work, Cybershopping, and Beyond | |
| |
| |
| |
Your Life Is Not Your Own: What You Need to Know About Privacy at Work | |
| |
| |
Do Employers Really Monitor What Employees Do At Work? | |
| |
| |
What Actions Do Employers Take Against Employees? | |
| |
| |
Why Your Boss Might Be Snooping on You | |
| |
| |
What the Laws Say About Work and Online Privacy | |
| |
| |
Here Comes Da Judge! | |
| |
| |
What You Can Do About Workplace Monitoring | |
| |
| |
| |
What Dangers Are There for Online Shoppers? | |
| |
| |
What to Watch for When Buying Online | |
| |
| |
How Do I Buy Online? | |
| |
| |
Dangers of Online Shopping: How to Protect Yourself | |
| |
| |
What to Do If a Shopping Site Takes Your Money and Goes out of Business | |
| |
| |
Making Sure You Don't Get Burned When Buying Stock Online | |
| |
| |
| |
How to Protect Your Credit Card When Buying Over the Internet | |
| |
| |
How to Know You're Buying Through a Secure Site | |
| |
| |
Check for the Locked Lock | |
| |
| |
Failsafe Credit Card Protection--It's Free! | |
| |
| |
How to Check Out a Site Before Buying | |
| |
| |
Where You Can Get the Lowdown on Shopping Sites | |
| |
| |
| |
How to Stay Safe When Buying at Auctions | |
| |
| |
Sold American! What Are Online Auctions? | |
| |
| |
Biding Your Time: How Do Online Auctions Work? | |
| |
| |
What Kinds of Auction Sites Are There? | |
| |
| |
What Are the Most Common Auction Scams? | |
| |
| |
Check Out the Auction Site Before Bidding | |
| |
| |
How to Make Sure You Don't Get Scammed at Auctions | |
| |
| |
| |
Wireless Insecurity: Protecting Yourself When Using Cellular Devices | |
| |
| |
What Kinds of Cellular Dangers Are There? | |
| |
| |
How Do Wireless Communications Work? | |
| |
| |
How to Protect Your Wireless Network | |
| |
| |
Watch Out for Wireless Viruses | |
| |
| |
Beware of Cell Phone Snoopers and Cell Phone Cloners | |
| |
| |
| |
How to Safeguard Your PC | |
| |
| |
Protecting Your Laptop Against Theft | |
| |
| |
How About Password Protecting Your PC? | |
| |
| |
Password-Protect Your PC with a Screen Saver | |
| |
| |
How to Encrypt Your Files So That Snoopers Can't Get at Them | |
| |
| |
How to Permanently Erase Data from Your PC | |
| |
| |
Three Rules to Keep Your Data Safe: Back Up, Back Up, and Back Up! | |
| |
| |
| |
Fight Back: Use the Internet to Get Information About Privacy and Security | |
| |
| |
Using the Internet to Protect Your Privacy and Security | |
| |
| |
Where to Go to Complain About Privacy and Security Issues | |
| |
| |
Government Sites That Investigate Your Complaints | |
| |
| |
Credit Where It's Due: How to Get Your Credit Ratings Online--and Correct Them | |
| |
| |
How to Get Your Name off Telemarketing and Junk-Mail Lists | |
| |
| |
Appendixes | |
| |
| |
| |
Speak Like a Geek: The Complete Archive | |
| |
| |
| |
The Best Internet Sites for Privacy and Security Issues | |
| |
| |
Index | |