Home Network Security Simplified

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

scams, protecting against

scanning engines

searchbars

security bundles

     antispyware/antiadware programs, enabling

security scans, performing

Sedgewick, John

selecting

     antivirus software installation locations

     destination for file backups 2nd

     personal software firewalls 2nd

         Windows XP firewall

         ZoneAlarm

     SSIDs

self-replication as characteristic of worms

signatures

     active scans, performing

     detecting

     updating

     virus scans, performing

social engineering, phishing scams

     avoiding

     nature of

     reporting

     tools used in

software

     security bundles

     updating

Spare Backup

SPI (stateful packet inspection) firewalls

     deploying in home network

Spybot Search & Destroy

     automated scanning

spyware

     antispyware programs

         free versions

         installing

     as viruses

     avoiding

     "cow pattie" model

     infection, symptoms of

     popup blockers, installing

     preventing

     removal tools

         Add/Remove Programs panel

     Windows Defender

SSIDs (service set identifiers)

     changing

     selecting

stocks, pump-and-dump scams

storing file backups

     CD/DVD storage

     on external hard drives

     on Flash memory

     on network storage drives

     online storage 2nd

strong passwords

     anatomy of

     creating

     versus weak passwords

Symantec Norton Internet Security 200x

Symantec, Bloodhound feature

symptoms of spyware/adware infection

system files

Категории