How to do everything to fight spam, viruses, pop-ups & spyware / Ken Feinstein.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | QA76.9 .A25 F45 2004 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000175094 | |
![]() |
Main Library | QA76.9 .A25 F45 2004 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000156802 |
Browsing Female Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9 .A25 C364 2001 Fundamentals of network security / | QA76.9 .A25 D528 2008 Digital privacy : theory, technologies, and practices / | QA76.9 .A25 E5465 2006 Enterprise security : IT security solutions : concepts, practical experiences, technologies / | QA76.9 .A25 F45 2004 How to do everything to fight spam, viruses, pop-ups & spyware / | QA76.9 .A25 G743 2008 Gray hat hacking : the ethical hacker's handbook / | QA76.9 .A25 G7495 2006 Inside network security assessment : guarding your IT infrastructure / | QA76.9 .A25 H322 2006 Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions / |
Includes index.
Provides advice on ridding a computer of spam, pop-ups, viruses, spyware, and adware. NjBwBT
Fight Spam -- Avoid Spam -- How Spammers Operate -- Protect Your E-Mail Address -- Choose a Spam-Resistant E-Mail Address -- Get a Secondary E-Mail Address -- Read the Fine Print Carefully -- Never Publish Your E-Mail Address on a Web Site -- Be Careful with Newsgroups and Message Boards -- Take Care in Chat Rooms and Instant Messaging -- Deal with Spam -- Opt Out--Maybe -- Turn Off Image Display -- Ignore Spam Completely -- Beware of Phishing E-Mail Scams -- Using Spam-Filtering Software -- Limitations of Spam Filters -- Get the Most Out of Spam Filters -- Keep Your Address Book Current -- Mark Spam as Spam -- Check Your Spam Folder Before Deleting Anything -- Carefully Choose Your Options -- Use Built-In Spam Filters -- Filter Spam in AOL -- Filter Spam in MSN -- Filter Spam in Yahoo Mail -- Filter Spam in Outlook 2003 -- Filter Spam Using EarthLink spamBlocker -- Use Add-On Spam Filters -- Filter with Norton AntiSpam -- Filter with McAfee SpamKiller -- Advanced Spam-Fighting Techniques -- Create Custom Mail Filters -- Create Mail Folders -- Create Message Rules -- Make Your Own Spam Filters -- Get Your Own Domain Name -- Choose a Good Domain Name -- Never Use the Same E-mail Address Twice -- Use a Challenge-Response System -- Fight Back Against Spammers -- Track Down the Evildoers -- Report Spam -- Sue 'Em! -- Consider Long-Term Spam Solutions -- Fight Viruses -- Avoid Viruses -- How Viruses Spread -- Who Writes Viruses? -- Protect Your PC -- Keep Windows Updated -- Disable File Sharing -- Recognize Potential Threats Online -- Identify Unsafe E-Mail Attachments -- Don't Get Fooled by Virus E-Mails -- Take Care Downloading Files -- Use Antivirus Software -- The Importance of Up-to-Date Virus Definitions -- Install Antivirus Software -- Update Virus Definitions -- Schedule System Scans -- Configure E-Mail Scanning -- Treat a Virus Infection -- Handle a Virus Encounter -- Deal with an E-Mail Virus Encounter -- Deal with a Direct Virus Encounter -- Handle a Virus Infection -- Know If You Are Infected -- Diagnose Your Infection -- Use System Restore to Remove a Virus -- Fix the System Registry -- Fighting Spyware and Adware -- Avoid Spyware and Adware -- Say No to ActiveX Security Warnings -- Take Care with Shareware and Freeware -- Handle Cookies -- Manage Cookies -- Block Cookies from Specific Sites -- Block Third-Party Cookies -- Delete All Cookies -- Avoid Dialers -- Use Spyware-Removal Utilities and Firewalls -- The Limitations of Spyware Utilities -- Limitations of Firewalls -- Use Ad-aware to Remove Spyware -- Install and Update Ad-aware -- Scan for Spyware with Ad-aware -- Restore Removed Objects with Ad-aware -- Use Spybot--Search & Destroy -- Install and Update Spybot -- Scan for Spyware with Spybot -- Restore Removed Objects with Spybot -- Use the Zone Alarm Firewall -- Install and Configure ZoneAlarm -- Control Which Programs Access the Internet -- Remove Spyware -- Determine If You Have a Spyware Infection -- Recognize the Signs of Spyware -- Research the Source of an Infection -- Remove a Spyware Infection -- Uninstall Suspicious or Unnecessary Programs -- Use System Restore -- Determine Which Programs Are Running -- Fight Pop-Ups -- How Do Pop-Ups Work? -- Determine If a Pop-Up Is Due to Spyware -- Deal with a Pop-Up Crisis -- Manage JavaScript to Block Pop-Ups -- Disable JavaScript for Specific Web Sites -- Enable JavaScript for Only Specific Web Sites -- Use Pop-Up Blocking Software -- What Are the Limitations of Pop-Up Blockers? -- Install and Use Pop-Up Blockers -- Use the Google Toolbar -- Use the Yahoo Companion Toolbar -- Use the MSN Toolbar -- Use the EarthLink Toolbar -- Block Pop-Ups in AOL -- Use Popup Killer -- Block Pop-Ups with Windows XP Service Pack 2 -- Windows XP Service Pack 2 -- Fight Spam in Outlook Express -- Fight Viruses with SP2 -- Use the Windows Security Center -- Configure Automatic Updates -- Use the Windows Firewall -- Fight Spyware with SP2 -- Manage ActiveX Security Warnings -- Control Browser Add-Ons -- Fight Pop-Ups with SP2 -- Disable the Built-In Pop-Up Blocker -- Block Flash-Based Ads -- McAfee Security Center -- Trend Micro PC-cillin Internet Security 2004 -- LavaSoft's Ad-aware Standard Edition -- Spybot--Search & Destroy -- Zone Labs' ZoneAlarm -- AdsGone Popup Killer.
System requirements for computer disc: none given; see individual applications/demos for pertinent requirements.
1 2
There are no comments on this title.