Absolute Beginners Guide to Security, Spam, Spyware & Viruses

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Panda Titanium Antivirus

        overview 2nd

partitioning hard drives 2nd

passphrases (WPA)

        description of

passwords

        creating effectively

        hidden administrator accounts 2nd

payloads (viruses)

        description of 2nd

payware

        overview 2nd

        recommended anti-spyware programs 2nd 3rd

        recommended anti-virus programs 2nd 3rd

        tips for choosing 2nd

PC Tools Spyware Doctor

        overview

PC-Cillin Internet Security Suite

        overview

PestPatrol

        overview

pharming

        overview 2nd

phishing

        dangers of

        description of

       emails

                description of

                identifying 2nd

        key loggers

       NetCraft

                utilizing

       Netcraft anti-phishing toolbar

                downloading

                installing (Firefox users) 2nd

                installing (Internet Explorer users) 2nd

        overview 2nd

       safety tips

                Cloadmark Desktop 2nd

                cut and paste 2nd

                don\#213t ask, don\#213t tell

                identify secure pages

       saftey tips

                updating programs 2nd

       SpoofStick

                description of

        who\#213s at risk

       Wi-Phishing

                description of 2nd

phishing. [See also spoofing]

pop-ups

        dangers of

pop-ups. [See also adware]

privacy

       AutoComplete

                disabling 2nd

       chat logs

                disabling 2nd

       CleanCache

                description of

       clipboards

                clearing 2nd

       cookies

                clearing 2nd

                importance of deleting

       email

                deleted items folder, empyting

                overview 2nd

                saved sent items, disabling 2nd

                servers, deleting from 2nd

       files

                deleting permanetly 2nd

                privatizing 2nd

       history (Internet Explorer)

                clearing

        importance of 2nd

       invasions

                consequences of 2nd

        liabilities to 2nd

       logging off

                importance of

       Microsoft Office

                cleaning

       Mozilla Firefox

                cleaning 2nd

       multimedia players

                cleaning overview

                cleaning Real Player 10

                cleaning Windows Media Player 10

       My Recent Documents

                clearing

       recycle bins

                emptying

       restore points

                cleaning 2nd

       Temp folders

                contents, erasing

        user accounts

                limiting 2nd

       web caches

                clearing 2nd

       Windows Search

                AutoComplete, disabling

privacy snoops

        identities of

       preventing

                with administrator accounts 2nd

                with user accounts 2nd

processlibrary.com

        description of

product key (Windows XP)

        recovering

product keys (Windows)

        description of

programs

       Running Processes

                checking 2nd

       startup programs

                trashing 2nd

        trashing unnecessary programs

       unnecessary programs

                trashing 2nd

PUPs

        description of

Категории