Absolute Beginners Guide to Security, Spam, Spyware & Viruses

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

identifying

        spyware infections 2nd

identity theft

       credit reports

                checking, importance of 2nd

        identifying

        overview 2nd

       phishing

                overview 2nd

        preventing 2nd

                read statements

                through shredding

        recovering from 2nd

       resources

                consumer.gov

       simple identity theft

                description of

       skimming

                description of

identity theft. [See also privacy]

identity thieves

        how it\#213s done 2nd 3rd

images

       email

                disabling in 2nd

Immunize (Spybot Search & Destroy)

        descripton of

Immunize. [See real-time protection]

inappropriate websites

        dangers of

interactive websites

       dangers

                spam

Internet

        connecting to 2nd

Internet Explorer

       cookies

                backing up

                cleaning

        disadvantages of

       favorites

                backing up

       Netcraft anti-phishing toolbar

                installing 2nd

       security settings

                recommendations

Internet Properties

        recommended security settings

Internet Protocol addresses. [See IP addresses]

IP addresses

        description of 2nd

        number of

ISPs

        security software from

Категории