| | Copyright |
| | About the Authors |
| | Acknowledgments |
| | Introduction |
| | Chapter 1. Tip 1: Use Firewalls |
| | | Why Do I Need Firewalls? |
| | | How Firewalls Work |
| | | Putting Firewalls to Work |
| | | Test Driving Your New Protection |
| | | What to Do If You Think You've Been Hacked |
| | | Sometimes, Firewalls Block the Good Stuff |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 2. Tip 2: Secure Your Wireless Network |
| | | Why Should I Care About Wireless Network Security? |
| | | What Do I Do About Wireless Security? |
| | | How to Do It: Securing Your Wireless Network |
| | | Wireless Security Checklist |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 3. Tip 3: Use Antivirus Protection |
| | | What Are Computer Viruses? |
| | | Commonsense Approach to Computer Viruses |
| | | How Antivirus Works |
| | | Inoculating Yourself Against Computer Viruses |
| | | What to Do If You Think You've Been Infected |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 4. Tip 4: Keep Your Software Updated |
| | | Why Software Needs to Be Updated |
| | | Updating Your Operating System |
| | | Updating Your Software Programs |
| | | Using Windows Restore Points |
| | | What to Do If You Think Your Operating System Has Been Compromised |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 5. Tip 5: Lock Out Spyware and Adware |
| | | What Is Spyware and Adware? |
| | | Preventing Spyware and Adware |
| | | What to Do If You Think You've Been Infected |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 6. Tip 6: Keep an Eye on Your Kids |
| | | What Are the Dangers Your Kids Might Encounter Online? |
| | | Maybe I Should Rethink This Internet Thing |
| | | Preparing Kids for Being Online |
| | | Policing Kids Online |
| | | What to Do If You Think Your Child Is Abusing the Rules |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 7. Tip 7: Recognize and Avoid Phishing Scams |
| | | How Phishing Scams Work |
| | | Tricks of the Trade |
| | | How to Avoid Becoming a Victim |
| | | What to Do If You Suspect You Are the Target of a Phishing Scam |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 8. Tip 8: Create Strong Passwords |
| | | Anatomy of a Lousy Password |
| | | Elements of a Strong Password |
| | | How to Create a Strong Password That You Can Remember |
| | | Additional Password Tips |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 9. Tip 9: Back Up Your Files |
| | | What Should I Back Up? |
| | | Where Do I Back Up To? |
| | | How Often Should I Back Up? |
| | | Storage Method Overview |
| | | Putting It All Together |
| | | Using Windows XP Backup |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 10. Tip 10: Use Common Sense |
| | | Urban Legends |
| | | E-Mail Stock Tips (Pump-and-Dump Scams) |
| | | Work from Home (Pyramid) Schemes |
| | | Money-Exchange Schemes |
| | | "Hot" Merchandise Scam |
| | | What to Do to Protect Yourself |
| | | Summary |
| | | Where to Go for More Information |
| | Chapter 11. "They Couldn't Hit an Elephant at This Distance" |
| | Glossary |
| | | Numerals |
| | | A |
| | | B |
| | | C |
| | | D |
| | | E |
| | | F |
| | | G |
| | | H |
| | | I |
| | | KL |
| | | MN |
| | | P |
| | | R |
| | | S |
| | | T |
| | | U |
| | | V |
| | | W |
| | Index |