Home Network Security Simplified

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

effective passwords

     creating

     elements of

email

     phishing scams

         avoiding

     pump-and-dump scams

     worms

enabling

     antispyware/antiadware in security bundles

     antivirus software with ISP

     automatic operating-system updates

     built-in firewalls

     encryption

         WEP 2nd 3rd

         WPA 2nd

     personal software firewalls

         Windows XP firewall

         ZoneAlarm

     popup blocker on IE

encryption

     troubleshooting

     WEP 2nd

         enabling on wireless NIC

         enabling on wireless router

         enabling with Linksys WLAN Monitor 2nd

         enabling with Windows XP

     WPA, enabling 2nd

encryption keys, generating

encryption, enabling

enforcing parental controls

establishing Internet usage policy

external hard drives, storing file backups

eyeballs

Категории