Desktop Witness: The Do's and Don'ts of Personal Computer Security / Edition 1

Desktop Witness: The Do's and Don'ts of Personal Computer Security / Edition 1

5.0 1
by Michael A. Caloyannides
     
 

Do you trust your computer?
You shouldn't.

Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and

See more details below

Overview

Do you trust your computer?
You shouldn't.

Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.

What is a desktop witness?
Your computer stores a record of every document you create, every e-mail you write or receive, which sites you visit on the Internet, even attachments which you don't open.

An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may 'let in' outsiders through your IR port. It 'whispers' behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.

What can you do?
This straight-talking guide, with its easy-to-follow instructions will enable you to regain control and protect your personal information. It will show you the virtues of computer-anonymity, by making you aware of what might motivate people to access your computer in the first place, and it will help you free-up valuable memory by showing you how to really delete the files your computer stores without your knowledge.

A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.

Read More

Product Details

ISBN-13:
9780471486572
Publisher:
Wiley
Publication date:
07/02/2002
Pages:
384
Product dimensions:
9.25(w) x 7.50(h) x 0.80(d)

Related Subjects

Table of Contents

Preface

Acknowledgment

The Need is Very Real: Author's Perspective

So You Want to Encrypt: Don't Hurt Your Own Interests by Doing So

Protect What and From Whom? The Answer Determines What You Should and Should Not Do

Effective Protection for Computers Not Connected to Networks

Effective Protection for Computers Connected to the Internet or other Networks

Encrypted Telephony

Legal Issues

In Conclusion

Appendices

Glossary

Index

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >