HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
A straightforward, graphic-based reference for securing your home network
Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your vulnerability–is that much greater. Now, with Home Network Security Simplified, you can get illustrated, easy-to-digest information written specifically for your needs.
For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to:
Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. Use this book to find the peace of mind that comes with knowing that your home network and your information are secure.
Jim Doherty is the director of marketing and programs with Symbol Technologies’ industry solutions group. Prior to joining Symbol, Jim worked at Cisco Systems, where he led various marketing campaigns for IP telephony and routing and switching solutions. Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies. Jim is a coauthor of the Networking Simplified series, including Cisco Networking Simplified, Home Networking Simplified, and Internet Phone Services Simplified. He is also the author of the “Study Notes” section of CCNA Flash Cards and Exam Practice Pack (CCNA Self-Study, Exam #640-801), Second Edition. Jim is a former Marine Corps sergeant; he holds a bachelor’s degree in electrical engineering from N.C. State University and a master’s degree in business administration from Duke University.
Neil Anderson is the senior manager of enterprise systems engineering at Cisco Systems. Neil has more than 20 years of engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is a coauthor of the Networking Simplified series, including Home Networking Simplified and Internet Phone Services Simplified. Neil holds a bachelor’s degree in computer science.
This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.
Tip 5: Lock Out Spyware and Adware
Download - 5.1 MB -- Chapter 5: Lock Out Spyware and Adware
Download the sample pages (includes Chapter 5 and Index)
Introduction
Chapter 1 Tip 1: Use Firewalls
Why Do I Need Firewalls?
How Firewalls Work
Stateful Packet Inspection Firewalls
Personal Software Firewalls
Putting Firewalls to Work
Putting a Firewall Between You and the Internet
Enabling Personal Firewalls on Your Computers
Test Driving Your New Protection
What to Do If You Think You’ve Been Hacked
Sometimes, Firewalls Block the Good Stuff
Summary
Where to Go for More Information
Chapter 2 Tip 2: Secure Your Wireless Network
Why Should I Care About Wireless Network Security?
What Do I Do About Wireless Security?
Change Your Password
Do Not Advertise Your Wireless Network
Scramble Your Signal
Disable Ad-Hoc Networking
How to Do It: Securing Your Wireless Network
Change the Router’s Default Password
Stop Advertising Your Wireless Network
Enable Wireless Encryption
Disable Ad-Hoc Networking
Prevent Unintentional Roaming
Wireless Security Checklist
Summary
Where to Go for More Information
Chapter 3 Tip 3: Use Antivirus Protection
What Are Computer Viruses?
Viruses
Worms
Trojan Horses
Commonsense Approach to Computer Viruses
How Antivirus Works
Virus Detection
Virus Prevention
Inoculating Yourself Against Computer Viruses
Turning On Antivirus at Your ISP
Installing Antivirus Software on Your Computers
Windows Live OneCare
What to Do If You Think You’ve Been Infected
Summary
Where to Go for More Information
Chapter 4 Tip 4: Keep Your Software Updated
Why Software Needs to Be Updated
Updating Your Operating System
Enabling Automatic Updates
Manual Operating System Updates
Updating Your Software Programs
Using Windows Restore Points
Creating a Restore Point
Restoring Your Computer to a Restore Point
What to Do If You Think Your Operating System Has Been Compromised
Summary
Where to Go for More Information
Chapter 5 Tip 5: Lock Out Spyware and Adware
What Is Spyware and Adware?
Adware
Spyware
Are Spyware and Adware Viruses?
Preventing Spyware and Adware
Exercising Common Sense
Installing a Popup Blocker
Installing an Antispyware/Antiadware Program
What to Do If You Think You’ve Been Infected
Spyware/Adware-Removal Tools
Removing Spyware and Adware Programs Using the Installed Programs List
Summary
Where to Go for More Information
Chapter 6 Tip 6: Keep an Eye on Your Kids
What Are the Dangers Your Kids Might Encounter Online?
Pornography
Predators
Gambling
Hacking
Illegal Peer-to-Peer Sharing
Maybe I Should Rethink This Internet Thing
Preparing Kids for Being Online
Establish and Communicate the Internet Usage Policy
Making Kids Aware of Online Dangers
Avoid Giving Out Personal Information Online
Policing Kids Online
Browse in Plain Sight
Monitor and Review Your Kids’ Websites and Blogs
Check Out Your Kids’ Blogs
Review Website History
Using Parental Controls
Parental Controls at Your ISP
Parental Controls at Your Home Network Router
Parental Controls on Your Computers
What to Do If You Think Your Child Is Abusing the Rules
Activity Loggers
Summary
Where to Go for More Information
Chapter 7 Tip 7: Recognize and Avoid Phishing Scams
How Phishing Scams Work
Tricks of the Trade
How to Avoid Becoming a Victim
What to Do If You Suspect You Are the Target of a Phishing Scam
Summary
Where to Go for More Information
Chapter 8 Tip 8: Create Strong Passwords
Anatomy of a Lousy Password
Elements of a Strong Password
How to Create a Strong Password That You Can Remember
Additional Password Tips
Summary
Where to Go for More Information
Chapter 9 Tip 9: Back Up Your Files
What Should I Back Up?
Where Do I Back Up To?
How Often Should I Back Up?
Storage Method Overview
Flash Memory
External Hard Drives
Networked Storage
Online Storage
DVD or CD Storage
Summary of Storage Options
Putting It All Together
Using Windows XP Backup
Summary
Where to Go for More Information
Chapter 10 Tip 10: Use Common Sense
Urban Legends
E-Mail Stock Tips (Pump-and-Dump Scams)
Work from Home (Pyramid) Schemes
Money-Exchange Schemes
“Hot” Merchandise Scam
What to Do to Protect Yourself
Summary
Where to Go for More Information
Chapter 11 ”They Couldn’t Hit an Elephant at This Distance”
Glossary
Index
Download - 102 KB -- Index