Absolute Beginners Guide to Security, Spam, Spyware & Viruses

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

warchalking

        description of

wardialing

        description of. [See also wardriving]

wardriving

        description of

        description of. [See also wireless networks]

        how to 2nd

web addresses

       spoofing

                description of

web caches

        clearing 2nd

Webroot Spy Sweeper

        overview

website harvesting

        description of

websites

        anti-spyware programs

        anti-virus freeware 2nd

        BIOS access keys list

        freeware anti-spyware programs 2nd

       MRUs

                cleaning

        payware anti-spyware programs 2nd

        payware antivirus programs 2nd

       product keys (Windows XP)

                recovering

        recommended anti-spam programs 2nd

        recommended firewalls 2nd

        virus hoax list

        virus news stories

        virus removal programs

        Windows startup programs list

        Windows Update

        Windows update reviews

WEP

        overview 2nd 3rd

white-hat hackers

        description of. [See also hackers]

WI-FI

        description of. [See also wireless networks]

        identifying

Wi-Fi Protected Access. [See WPA]

Wi-Phishing

        description of 2nd

Windows

       activating

                importance of 2nd

       anti-spyware programs. [See Microsoft AntiSpyware]

       clipboards

                clearing 2nd

       computer names

                changing

       File and Settings Transfer Wizard

                utilizing 2nd

       My Recent Documents

                clearing

       product keys

                description of

       re-installing

                importance of 2nd

       reinstaling

                how to 2nd

       reinstalling

                backing up before 2nd 3rd 4th

                drivers, preserving 2nd 3rd

                supplies required for 2nd

                system recovery CDs 2nd

                unplugging the network

                wiping the hard drive 2nd

       reinstalling.

                wiping supplies required for [See also hard drives ]

       restore points

                cleaning 2nd

       securing

                trashing unnecessary programs

       Security bar

                adding

       startup programs

                list of

                trashing 2nd

       Temp folders

                contents, erasing

       unnecessary programs

                trashing 2nd

       updating

                dangers of 2nd

                overview 2nd

Windows 98

        updating 2nd

Windows Firewall

        disabling

       non-SP2

                activating

        overview

        overview. [See also firewalls]

Windows Firewall (non-SP2)

        activating

        enabling 2nd

Windows Firewall (SP2)

        optional uses 2nd

Windows Media Player 10

        backing up

        cleaning

Windows recycle bins

        emptying

Windows Search

       AutoComplete

                disabling

Windows security updates

       SP2

                installing

       viruses

                preventing 2nd

Windows security updates. [See also SP2]

Windows Service Pack 2. [See Service Pack 2]

Windows Update

        accessing 2nd

        importance of

        installing

Windows Updates

        installing

Windows validation process

        failing

Windows XP

       product key

                recovering

Windows XP firewall

        turning on 2nd

Windows XP install CDs

        wiping hard drives 2nd 3rd

Wired Equavalent Privacy. [See WEP]

wireless connections

        updating routers through

wireless hackers

        description of

wireless networks

       bandwidth theft

                description of 2nd

       dangers

                overview 2nd

       DHCP logs

                assessing 2nd

                overview 2nd

       file sharing

                dangers 2nd

                disabling 2nd

       firewalls

                turning on 2nd

       holes

                overview 2nd

       MAC addresses

                locating

                Mac OS X

                Windows 95, 98, and ME

                Windows XP

        overview 2nd

       routers

                changing IDs and passwords 2nd

                default IDs and passwords

                reseting IDs and passwords

                set-up , accessing

                set-ups, accessing

       security

                MAC address filtering 2nd 3rd

        security software

       security technologies

                WEP 2nd 3rd

                WPA 2nd

       SSIDs

                changing 2nd

        turning off 2nd

                advantages of

       warchalking

                description of

       wardriving

                description of 2nd

                how to 2nd

       Wi-Phishing

                description of 2nd

worms

       Blaster

                description of

        effects of

       KakWorm

                description of

        overview 2nd

       Sasser

                description of

        versus Trojan horses and viruses 2nd

worms. [See also viruses]

WPA

        overview 2nd

Категории