How Personal & Internet Security Works
Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] ICMP (Internet Control Message Protocol) identity theft credit card theft credit repair scams criminal uses for stolen identities mail theft phishing phishing emails protecting against scams protecting against illegal wiretapping IMlogic Real-Time Threat Protection System (RTTPS) inbound-blocking firewalls instant messaging IRC (Internet Relay Chat) pest protection pests sending/receiving instant messages integrators Internet Internet Control Message Protocol (ICMP) Internet passports Internet port Internet Protocol (IP) Internet Relay Chat (IRC) Internet searches with Google blocking Google indexer deep crawling fresh crawls Froogle Gmail Google Desktop Google Local Google Toolbar Googlebot indexer personal information collected by Search History search process stop words Internet security anti-spam software anti-spyware software antivirus software Bluetooth Bluetooth sniffers bonding hacker attacks link controllers piconets spoofing corporate firewalls 2nd cryptosystems 2nd digital certificates 2nd DoS (denial-of-service) attacks ping requests protecting against firewalls inbound-blocking outbound-blocking hackers 2nd instant messaging IRC (Internet Relay Chat) pest protection pests sending/receiving instant messages Internet passports Internet searches intrusion protection systems 2nd NAT (network address translation) parental controls 2nd personal firewalls phishing 2nd 3rd phishing emails protecting against scams pop-up killers proxy servers 2nd script kiddies spam anti-spam software dangers of dictionary attacks laws regulating Nigerian 419 scams open mail relays open proxies public sources of email addresses spammers' methods to hide their identity spammerwocky speed at which spam spreads zombies/bots spyware affiliate programs anti-spyware dialers home page hijackers keyloggers money trail polymorphic spyware privacy issues rootkits search page hijackers Trojan horses 2nd 3rd viruses antivirus software eradication programs virus markers VPNs (virtual private networks) web blocking web browsers buffer overflow attacks drive-by download attacks hacker attacks phishing attacks protecting against browser-based attacks websites cookies personal profiles sniffers 2nd user activity, tracking web bugs 2nd Wi-Fi APs (access points) BSS (basic service set) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) CTS (clear to send) encryption ESS (extended service set) evil twin hacks hacker attacks hotspot hacking hotspot protection hotspots peer-to-peer networks probe request frames RTS (request to send) stations war driving wireless network protection wireless networks workplace surveillance worms 2nd antivirus software eradication program W32.Funner worm W32.Mytob-P worm zombies 2nd intrusion protection systems 2nd IP (Internet Protocol) IRC (Internet Relay Chat) iris scanning |