Warehouse Stock Clearance Sale

Grab a bargain today!


Hack Proofing Your Identity in the Information Age
By

Rating

Product Description
Product Details

Table of Contents

Foreword
Chapter 1 Identity Theft: Are You At Risk
Introduction
Defining Identity Theft
Take a Risk Factor Test
Why Do They Do It
How Do They Get Away with It
Recognizing Identity Theft When It Happens
Understanding What Electronic Information Is Private
Striving for Theft Prevention
Keeping Private Information Private
Protecting Your Social Security Number
Taking Advantage of Marketing Opt-Out Programs
Protecting Your Computer
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2 Protecting Your Hard Drive
Introduction
Know Your Computer
Temporary Files
Temporary Internet Files
Deleting Files Permanently for Privacy
Other Information that Might be on Your Computer
What Are You Protecting
Antivirus Software:Your First Line of Defense
What You Might Not Know about Antivirus Software
What Kinds of Software Are Available
Performing Signature Updates
Is Your Antivirus Software Working
Updating Your Software
The Number One Mistake People Make
Functionality Vs. Secure Updates
Installing Security Patches
Beware of the Free Stuff
Avoiding Account Sharing
Common Reasons, Risks, and Deterrents for Sharing Accounts
Creating Multiple Accounts in Windows
Creating Multiple Internet Connection Accounts
Creating Multiple E-mail Accounts with Outlook Express
Using Disk and File Encryption
Choosing Strong Passwords
Avoiding Weak Passwords
Tradeoffs: Using Password Storage
Creating Strong Passwords You Can Remember
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3 Keeping Your E-mail Private
Introduction
E-mail Privacy Is Not Just about Spam
How E-mail Services Work
Big Brother and Your E-mail
How E-mails Can Get Lost
Understanding Spam
E-mail Attacks Are Not Just about Viruses
E-mail Attachments
How Your E-mail Can Be Hijacked
E-mail Interceptions
Recognizing Mail Scams
Solicitations and Chain Letters
Spam as Social Engineering
Using Antivirus Protection for E-mail
Hiding Your E-mail Identity
Knowing What’s in Your E-mail Headers
Knowing What Your Chat Says about You
Setting Up Anonymous E-mail
E-mail Encryption Made Simple
Using Pretty Good Privacy (PGP) with Microsoft Outlook
Using Personal Certificates with Netscape
Verifying E-mail Senders in Outlook
Importing a Personal Certificate File into Opera
Choosing a Secure E-mail Provider
Using Encrypted Web-based E-mail
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4 Self Defense on the Web
Introduction
Understanding Risk on the Web
Learning to Be Street Smart on the Web
Understanding the Privacy Policy
Managing Risk on the Web
Managing Passwords
Protecting Your Purchasing Power
Anonymous Web Surfing
Improving Browser Safety
Updating Your Browser Software
Putting Browser Security Features to Work
Covering Your Internet Footprints
Deleting Hidden Information About You
Opting Out of Ad-ware Cookies
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5 Connecting to the Internet Safely
Introduction
Different Connections, Different Risks
Understanding Network Terminology
Dial-up Connections
Always-on Broadband
Understanding Data Interception
Taking Precautions
Setting Permissions for Shared Drives and Files
Registering Your Domain.com
Turning Off Unneeded Services
Securing Your Personal Web Server
Firewalls for the Home
Personal Firewalls for Home Office Use
Network Firewalls for Home Office Use
Using Common Firewall Configuration Features
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6 Are Your Kids Putting You at Risk
Introduction
Raising Children in the Digital Age
Keeping Clear Online Identities within Families
Supervising Online Activities
Channeling a Child’s Interest in Hacking
Identifying Risky Software and Risky Behavior
Chat Programs
Web Forums and Newsgroups
Massive Multiplayer Online Games
File-Sharing Software
Hacking Tools
Monitoring Online Activities
Parental Contracts
Application Logging
Browser Activity Logging
Keystroke Logging
Screen Imaging
Avoiding Monitoring Pitfalls
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7 If You Become a Victim
Introduction
Taking Immediate Action
Step 1: Filing Police Reports
Step 2: Reporting Fraud and Stolen Accounts
Step 3: Notifying the Federal Trade Commission (FTC)
Managing Other Fraud Situations
Managing the Fallout
Contacting Credit Bureau Services
Knowing When to Seek Legal Help
Keeping Records
Locating Government Resources
Statutes in Your State
Federal Trade Commission
Other Suggested Resources
Privacy Rights Advocates
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8 Configuring Your Browser and Firewall
Introduction
Managing Your Web Browser’s Security Features
Internet Explorer Version 6
Netscape 6.2
Opera 6
Configuring Your Home Firewall
BlackICE Defender for Windows
Zone Alarm Pro for Windows
Siemens Speedstream SS2602 DSL/Cable Router
Applications Port List
Index

About the Author

Neal O'Farrell is CEO of Hackademia, a firm focused on security education. He's a twenty-year veteran of information security, former hacker, and original Code Rebel. He's also editor of The Zone, the security newsletter publishedby Internet security firm Zone Labs, where his unique take on cybercrime is dispensed to nearly 3 million subscribers across more than 100 countries every month. Neal is host of the Breach of Trust Security Briefings for Lawyers and speaks on Internet security issues to audiences around the nation. Neal lives in San Ramon, CA.

Ask a Question About this Product More...
 
Look for similar items by category
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top