Securing Your PC in Easy Steps
Computer Step (Verlag)
978-1-84078-336-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Learn how to protect against viruses, trojan horses, worms, and spyware, see how to force users of your PC to choose "strong" passwords, get hands-on experience of securing your files and folders, learn to configure the Windows Firewall, use local policies to lock-down specific areas of your PC, and see real-life examples of dealing with phishing attempts, amongst many other vital topics. Often-overlooked considerations are also examined, such as start-up security, educating other users of your PC, and deciding how to dispose of your PC in security-conscious fashion. Finally, Securing Your PC In Easy Steps teaches you that self-sufficiency is the key to on-going PC security, advising you how to stay up to speed with security issues. By following the steps diligently, you can close the door to security threats, minimizing the risk of infection from malicious software and intrusion from unwanted parties, leaving you to get on with the most important business of all; enjoying the time you spend using your PC, without worry.
# Introducing PC security * PC security is vital * The history of PC security * Threats to your PC * How hackers operate * The Vista security model * Planning a security strategy # See sections in chapter 2 Physically secure your PC * Physical PC security * Available options * Notebook physical security * Further considerations # See sections in chapter 3 People and security * The greatest security threat? * The Spida worm * Password strength * Enforcing strong passwords # See sections in chapter 4 Security at startup * Security at startup * Setting startup passwords * Disabling the floppy drive # See sections in chapter 5 Security for users * Vista user accounts * User account strategies * Creating a user account * Setting a password * Securing your files * The Public folder * Using local user groups * Over-the-shoulder credentials * Parental controls * Setting time limits * Blocking inappropriate content # See sections in chapter 6 The virus threat * What is a virus? * Installing protection * Scanning your PC * Are you infected? * Preventing virus threats * Hoaxes * Viruses - think laterally # See sections in chapter 7 Security on the Internet * Internet threats * Malware * Vista Internet security * Spyware - educate yourself * Windows Defender * Antispyware alternatives * Internet browsing tips * Online banking services * Clearing your history * Internet certificates * Rogue dialers * IE security settings * IE advanced settings * Using the pop-up blocker * Turning off auto-complete * Disabling add-ons * Windows Firewall * Testing your security level # See sections in chapter 8 Email security * Understanding email security * What is phishing? * Identifying phishing * Dealing with phishing * Reporting phishing attempts * The Vista phishing filter * Marking an email legitimate * Junk email * Deterring junk email * Using an external junk filter * Windows Mail junk filter * Setting a protection level * Adding safe senders * Blocking senders * More mail security options * Using plain text * Using rules * Testing our message rule # See sections in chapter 9 Securing your network * Introducing network security * Early considerations * Password-protect the router * Using a WEP security key * Using a WPA security key * IP addresses * Setting static IP addresses * The router firewall * Preventing access by time * Control by MAC address # See sections in chapter 10 Using policies * The Group Policy Editor * Getting started * Our first policy * Securing removable devices * Restricting hardware installs * Enable administrator access * Enable specific device install # See sections in chapter 11 Securing sensitive data * What is encryption? * Encryption in Vista * Other encryption options # See sections in chapter 12 Securing Vista * Additional Vista security * Disabling services * Remote Desktop * Windows Explorer * File Attributes # See sections in chapter 13 Securing applications * Securing your applications * Disabling macros * Password-protecting files # See sections in chapter 14 Using resources * Security resources * The Microsoft website * Microsoft TechNet * Newsgroups # See sections in chapter 15 Disposing of your PC * Retiring your PC * Preparing to format * Formatting the drive * Destroying your drive # See sections in chapter 16 Staying protected
Erscheint lt. Verlag | 13.12.2007 |
---|---|
Zusatzinfo | Illustrations |
Verlagsort | Southam |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-84078-336-2 / 1840783362 |
ISBN-13 | 978-1-84078-336-0 / 9781840783360 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich