Home Network Security Simplified

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

parental controls

     built-in 2nd

     enforcing

     on home computer 2nd

     on home network router

passive scanning mode (Windows Defender)

password attacks, brute force

passwords

     changing 2nd

     creating

     effective, creating

     on wireless routers, changing

     securing

     strong, anatomy of

     weak, anatomy of

peer-to-peer sharing

performing

     manual operating system updates

     security scans

     virus scans

         active scans

         scan options, configuring

personal information, online security

personal software firewalls

     access control, troubleshooting

     enabling

     McAfee Internet Security Suite

     security scans, performing

     selecting 2nd

     Symantec Norton Internet Security 200x

     Windows XP firewall

         enabling

     ZoneAlarm

         access settings, verifying

         enabling

         logging facility, viewing

phishing scams 2nd

     account verification e-mail, example of

     avoiding

     nature of

     reporting

     tools used in

     types of

phreaking

policing children's Internet usage

     blog sites, monitoring

     parental controls

         built-in

         enforcing

         on home computers 2nd

         on home network router

     popup blockers, installing

     website history, monitoring

     with activity loggers 2nd

popups

port-scanning utilities, performing security scans

preventing

     spyware/adware

     unintentional roaming

     viruses

protecting children from online dangers

     Internet usage policy, establishing

pump-and-dump scams

purchasing, personal software firewalls

Категории