Cover image for The Symantec guide to home internet security
Title:
The Symantec guide to home internet security
Personal Author:
Publication Information:
Upper Saddle River, NJ : Addison-Wesley, 2006
ISBN:
9780321356413
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010114903 QA76.9.A25 C664 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Dodge attackers, skip spam, and protect your privacy. Symantec Press shows you how to secure your home front. This book offers comprehensive advice about a broad range of security issues in an accessible style appropriate for the home user, and delves into all of the areas where a computer may be vulnerable to attack: hacking, identity theft, online purchasing, virus attacks, e-mail and Internet scams, and more. This book leverages the power and brand recognition of Symantec and Norton Antivirus. The Symantec Guide to Home Computer Security is a soup-to-nuts guide to safer computing for everyone. This book is a short and sweet primer on the dangers of skinny dipping on the web for anyone who uses a computer to write, shop, download media, and/ or e-mail or send instant messages to friends and family. Most people are aware of the perils of the Internet, but many fewer have a clear understanding of what is and isn't a threat. backed-up, limit the scourge of spam, keep viruses at bay, avoid spyware infestations, recognize a phishing scam, identify reputable e-commerce sites, and keep their kids safe from harm and/ or inappropriate content. This book offers comprehensive advice about a broad range of security issues in an accessible style appropriate for the home user.


Author Notes

Andrew Conry-Murray is the technology editor at IT Architect, an award-winning publication for information technology professionals. He has been writing about computer and network security since 2000.

Vincent Weafer has an extensive range of experience, gained from more than 20 years in the information technology industry, ranging from software development, systems engineering, to security research positions. For the past eight years, he has been the operational leader of the Symantec Global Security Response team, where his mission is to advance the research into new computer security threats and provide security content solutions such as anti-virus, antispam, intrusion and vulnerability response, real-time alerting, content solutions, research, and analysis.

Weafer has also been one of Symantec's main spokespeople on Internet security threats and trends, with national and international press and broadcast media, appearing on CBS, ABC, NBC, CNN, and BBC, among many others. In addition, he has presented at many international conferences on security threats and trends, presenting papers and contributing to technical panels run by the European Institute for Computer AntiVirus Research (EICAR), Virus Bulletin, Association of AntiVirus Asia Researchers (AVAR), and Australian Computer Emergency Response Team (AUSCERT), among many others.


© Copyright Pearson Education. All rights reserved.


Table of Contents

Acknowledgmentsp. xiii
About the Authorp. xv
Introductionp. xvii
1 Understanding Internet Riskp. 1
1.1 Fraudsters and Hijackersp. 2
Identity Theftp. 3
Spamp. 3
Viruses and Wormsp. 4
Spyware, Adware, and Trojan Horsesp. 4
1.2 Why Me?p. 5
Your Computer Is a Resource for Attacking Other Computersp. 5
Your Computer Is a Communication Vehicle for Frauds and Scamsp. 6
2 Preventing Identity Theftp. 9
2.1 How Your Identity Gets Stolenp. 10
Social Engineeringp. 11
Spoofingp. 12
Phishing Attacksp. 12
Keystroke Loggersp. 13
Mail Theft and Dumpster Divingp. 14
2.2 Preventing Identity Theftp. 14
Think Before You Clickp. 14
Tools That Help Prevent Identity Theftp. 15
SSLp. 16
Security Tokensp. 17
SpoofStickp. 18
2.3 Recovering from Identity Theftp. 19
2.4 Checklistp. 20
Dop. 20
Don'tp. 21
2.5 Helpful Resourcesp. 21
3 Firewallsp. 27
3.1 Packets, Protocols, and Portsp. 28
IP and TCPp. 29
HTTP and HTMLp. 30
3.2 What Firewalls Can Dop. 31
Regulate Inbound and Outbound Connectionsp. 31
Security Settingsp. 33
3.3 What Firewalls Can't Dop. 35
3.4 Free Firewallsp. 36
Windows XP Service Pack 2p. 36
Zone Labs' ZoneAlarmp. 39
3.5 Firewalls You Can Buyp. 41
How Should You Choose?p. 43
3.6 Testing Firewallsp. 44
ShieldsUP! (www.grc.com)p. 44
Symantec Security Check (www.symantec.com/homecomputing/)p. 44
McAfee MySecurityStatus (http://us.mcafee.com/MySecurityStatus/)p. 44
PivX PreView (www.pivx.com/preview)p. 45
AuditMyPC (www.auditmypc.com)p. 45
3.7 Checklistp. 45
Dop. 46
Don'tp. 46
3.8 Helpful Resourcesp. 46
4 Getting Rid of Unwanted Guests, Part 1: Viruses and Wormsp. 47
4.1 The Rise of Malwarep. 47
4.2 Viruses and Wormsp. 50
What Can Worms and Viruses Do?p. 53
4.3 Anti-Virus Softwarep. 54
What AV Software Can Dop. 54
What AV Software Can't Dop. 54
4.4 Other Protection Methodsp. 56
Use a Firewallp. 56
Don't Open Strange E-Mailp. 57
Don't Click Links or Programs in E-Mailp. 58
Keep All Your Software Updatedp. 58
4.5 What to Do if You Have a Virus or Wormp. 59
How to Tell if Your Computer Is Infectedp. 59
How to Remove a Worm or Virusp. 59
4.6 How to Choose an Anti-Virus Productp. 60
4.7 Checklistp. 62
Dop. 62
Don'tp. 62
4.8 Helpful Resourcesp. 62
5 Getting Rid of Unwanted Guests, Part 2: Spyware, Adware, and Trojan Horsesp. 67
5.1 What Are Spyware, Adware, and Trojan Horses?p. 67
Defining Spyware and Adwarep. 69
5.2 Technical and Legal Challenges of Detecting and Removing Spyware and Adwarep. 72
Do You Want a Cookie?p. 78
5.3 How Spyware/Adware and Trojan Horses Infect Your Computerp. 80
From a Web Browserp. 80
From Other Softwarep. 81
From E-Mailp. 82
From Social Engineeringp. 82
5.4 How to Protect Yourself from Spyware, Adware, and Trojan Horsesp. 82
Use Anti-Spyware and Anti-Virus Softwarep. 82
Beware of Opportunistsp. 85
Free Anti-Spyware Softwarep. 86
What Anti-Spyware Software Can Dop. 87
What Anti-Spyware Software Can't Dop. 88
Be Suspicious of Free Softwarep. 88
Read the EULAp. 89
Adjust Your Browser Settingsp. 89
Use an Alternative Browserp. 91
Keep Your Software Updatedp. 91
5.5 How to Remove Spyware, Adware, and Trojan Horsesp. 92
How to Tell if Your Computer Is Infectedp. 92
Using Hijack Thisp. 93
Reformatting Your Hard Drivep. 95
5.6 Checklistp. 95
Dop. 95
Don'tp. 95
5.7 Helpful Resourcesp. 96
6 Just Say No to Spamp. 99
6.1 Spamonomicsp. 101
6.2 Spam, Scams, and Phishingp. 102
6.3 How Spammers Operatep. 104
Buying Listsp. 104
E-Mail Scavengersp. 104
Dictionary Attack/Directory Harvestingp. 104
Spoofingp. 105
Spam Proxiesp. 105
Social Engineeringp. 106
Web Beacons/Web Bugsp. 106
6.4 Spam Filtering Methodsp. 106
Content Filters/Keyword Searchesp. 107
Blacklistsp. 108
White Listsp. 108
Heuristics Analysisp. 108
Spam Signaturesp. 109
Challenge/Responsep. 110
Bayesian Filteringp. 110
Reputation Filteringp. 111
6.5 How to Reduce Spamp. 112
Delete Suspicious E-Mail Without Opening Itp. 112
Don't Reply to Spam or Phishing Mailp. 113
Don't Click Any Links in Untrusted Mailp. 113
Read Privacy Policiesp. 113
Don't Post Your E-Mail Addressp. 114
Alter Your E-Mail or Use Multiple E-Mail Addressesp. 114
Don't Buy Anything from Spammersp. 115
Report Spam and Phishingp. 115
6.6 Anti-Spam Toolsp. 115
6.7 Checklistp. 117
Dop. 117
Don'tp. 118
6.8 Helpful Resourcesp. 118
7 Securing Windowsp. 119
7.1 Windows XP Service Pack 2p. 121
Windows Security Centerp. 121
Configuring the Windows Firewallp. 124
Virus Protectionp. 127
Buffer Overflow Protectionp. 128
7.2 Patch Tuesdayp. 128
Turning on Automatic Updatesp. 130
7.3 Securing Internet Explorerp. 131
Internet Explorer Securityp. 132
Dealing with ActiveXp. 132
Privacy Configurationp. 136
Pop-Up Blockerp. 138
7.4 Browser Alternativesp. 139
Firefox (www.mozilla.org)p. 140
Opera (www.opera.com)p. 141
7.5 Security Checksp. 142
ShieldsUP! (www.grc.com)p. 142
PivX PreView (www.pivx.com/preview)p. 142
Symantec Security Check (www.symantec.com/securitycheck/)p. 143
7.6 Internet Explorer 7.0 and Windows Vistap. 143
7.7 Checklistp. 144
Dop. 144
Don'tp. 144
7.8 Helpful Resourcesp. 144
8 Keeping Your Family Safe Onlinep. 147
8.1 Filtering Unwanted Contentp. 148
Human Monitoringp. 149
Search Engine Filteringp. 151
Internet Explorer Filteringp. 153
Alternative Browser Filteringp. 158
Service Provider Controlsp. 158
Spam Controlp. 159
8.2 Sexual Predators and the Internetp. 160
Preventing Unwanted Contactp. 161
Reporting Sexual Solicitationp. 162
Internet Monitoring Softwarep. 162
How Should I Choose?p. 163
8.3 The $3,000 Song and Other File-Sharing Problemsp. 164
How Can They Find Me?p. 168
P2P Security Issuesp. 168
Legal or Illegal?p. 169
8.4 Checklistp. 170
Dop. 170
Don'tp. 170
8.5 Helpful Resourcesp. 170
9 Wireless and VoIP Securityp. 173
9.1 How Wireless Networks Workp. 174
9.2 Security Issues with Home WLANsp. 175
Change the Default SSIDp. 180
Turn Off SSID Broadcastp. 180
Change Default Passwordsp. 180
Turn on MAC Filteringp. 180
Wireless Security Softwarep. 181
9.3 Public Hotspot Safetyp. 182
Unsecured Hotspotsp. 183
Evil Twinsp. 185
Don't Conduct Sensitive Transactions at a Hotspotp. 185
9.4 Cell Phone and PDA Securityp. 185
Mobile Operating Systems and Bluetoothp. 186
Cell Phone Malwarep. 187
Securing Bluetoothp. 188
PDA Securityp. 189
9.5 VoIP Securityp. 190
VoIP and 911p. 191
9.6 Checklistp. 192
Dop. 192
Don'tp. 192
9.7 Helpful Resourcesp. 192
10 Privacy and the Internetp. 195
10.1 Internet Privacy Optionsp. 197
Cryptography Basicsp. 197
Digital Signatures and Digital Certificatesp. 199
E-Mail Encryptionp. 200
File and Folder Encryptionp. 203
Web Anonymizersp. 204
10.2 Dealing with Data Brokersp. 205
Acxiom (www.acxiom.com)p. 206
ChoicePoint (www.choicepoint.com)p. 206
LexisNexis (www.lexisnexis.com)p. 207
10.3 Checklistp. 208
Dop. 208
Don'tp. 208
10.4 Helpful Resourcesp. 209
Conclusionp. 211
Indexp. 213