- Shopping Bag ( 0 items )
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc., spam costs more than $712 per employee in productivity and computing resources each year. Spyware slows computers, ruins files, and can result in stolen information. According to the same Nucleus Research report, businesses lose more than $70 billion annually because of computer viruses — and the cost ...
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc., spam costs more than $712 per employee in productivity and computing resources each year. Spyware slows computers, ruins files, and can result in stolen information. According to the same Nucleus Research report, businesses lose more than $70 billion annually because of computer viruses — and the cost continues to rise as every major company moves to a fully digital workplace.
Every time you download a computer virus or click on a spam e-mail by accident, you are wasting money, endangering your computer, and risking the loss of personal and business information. This complete, revolutionary book has compiled all of the vital information you need to make sure that you are able to combat the billion dollar risk of incursive software infecting your home and work computers.
With How to Stop E-mail Spam, Spyware, and Computer Viruses from Ruining Your Computer, you will learn why there is so much spam in your inbox, how the spammer thinks, and what the goals of spyware and viruses actually are. Then, you will learn how you can start spam-proofing your inbox by never giving away personal information and using secure e-mail clients. You will learn how companies get spyware onto your hard drive and what you can do to block it from appearing. Learn which viruses have caused the most damage and how they can infect your computer. Then, discover which software is most effective at blocking the download and infestation of viruses onto your hard drives.
You will learn the value of a good firewall, what it does to stop the ill will of spammers and hackers, and what actions you can take to block the breach of your firewall and your computer’s defenses. Learn how to remove spyware from your computer and make sure you are not giving away personal or valuable work information. This guide will also teach you how to lock down your inbox and desktop to keep that software from returning. Find out what to do when you do get a virus and how to return your computer to the state of security it was in beforehand.
Most importantly, with the valued input gathered from interviews with computer security and safety experts, you will learn how you became a target for all that spam. Discover what you are doing that makes it so easy for spammers to fill your inbox and how to safeguard your e-mail. Once you have tackled the source of the problems, as outlined in this book, you will have all the tools you need to combat the incursive and destructive effects of spam, spyware, and computer viruses.
Atlantic Publishing is a small, independent publishing company based in Ocala, Florida. Founded over twenty years ago in the company president’s garage, Atlantic Publishing has grown to become a renowned resource for non-fiction books. Today, over 450 titles are in print covering subjects such as small business, healthy living, management, finance, careers, and real estate. Atlantic Publishing prides itself on producing award winning, high-quality manuals that give readers up-to-date, pertinent information, real-world examples, and case studies with expert advice. Every book has resources, contact information, and web sites of the products or companies discussed.
This Atlantic Publishing eBook was professionally written, edited, fact checked, proofed and designed. The print version of this book is 288 pages and you receive exactly the same content. Over the years our books have won dozens of book awards for content, cover design and interior design including the prestigious Benjamin Franklin award for excellence in publishing. We are proud of the high quality of our books and hope you will enjoy this eBook version.
Is This Book for Me? 20
How This Book is Organized 21
Chapter 1 Malware: A Comprehensive Introduction 23
SQL injection 33
Impact of Malware 38
Chapter 2 Computer Viruses: Are You at Risk? 43
Types of Viruses 46
How Viruses Infect Computers 51
Capabilities of a Virus 52
Locations Where a Virus is Most Commonly Found 55
Impact of Viruses on Computer Operating Systems 56
Virus Removal Methods 58
Chapter 3 Antivirus Solutions & Defense 63
Chapter 4 Spam, Spoofing, Phishing, & E-Mail Hoaxes: What They Are and How to Block Them 83
CAN-SPAM Act 92
Spam Virus E-Mails 102
E-Mail Relaying 103
Spam Tools 104
The 10 Most Common E-mail Scams and How to Defend Against Them 109
Chapter 5 Detecting and Countering Malware & Spyware 121
Trojan Horse 127
Denial of Service Attack 137
SQL Injection Attack 139
Cross-Site Scripting (XSS) 140
Cross-Site Forgery Request 141
Relay Attack 142
Chapter 6 Web Browsers, Pop-Up Windows, & How to Surf the Web Safely 153
Web Browsers 158
Windows 7 Parental Controls 162
Chapter 7 Firewalls: A Comprehensive Introduction 165
Basics of Information Security 167
Internet Threats 167
What is a Firewall? 168
How do Firewalls Work? 170
Virtual Private Networks 172
Types of Firewalls 172
Firewalls: Home and Business Networks 174
An Introduction to Hardware and Software Firewall Products 175
Chapter 8 Hackers: How to Defend Against Hacks & Other Attacks 185
Methods Hackers Use to Attack 187
Why do People Hack? 196
Protections Against Hacking 197
Chapter 9 Network Security: How to Protect and Secure your Home or Small-business Network 199
Securing Your Home Network 201
Securing Your Business Network 203
Security in Windows XP Networks 205
Security in WindowsVista Networks 208
Security in Windows 7 Networks 210
How are Windows 7 Networking and Network Security Improved? 212
Hacking into a Network 216
Advanced Network Monitoring and Protection 219
Chapter 10 Wireless Network Security: How to Secure Your Wireless Network 223
Wireless PANs 229
Wireless LANs 229
Wireless WANs 230
Wireless Technologies 230
Wireless Security 233
Security of the Physical System 233
Hacking a Wireless System 238
Securing Your Wireless System 241
Wireless Networking in Windows XP 245
Wireless Networking in Windows Vista 246
Wireless Networking in Windows 7 247
Chapter 11 Software Products to Protect Your Computers & Networks 251
Internet Security Suites 252
Antivirus Software 257
Antispyware Software 261
Antispam Software 263
Specialty Tools and Malware Protection 265
Personal Firewall Software 266
Network Monitoring Software 270
User Activity-Monitoring Software 270
Network Detection and Monitoring (Including Wireless) 272
Author Biography 283
Posted February 4, 2011
The title alone, was the reason why I wanted to review this book. Who hasn't had some kind of e-mail spam in their inbox? In this book, you'll learn how spammers think and what the goals of spyware and virus are.
In the news, you always hear about government and big business being cyber attacked, but you don't hear much about small business or the average person who are attacked everyday. Hackers send out their virus to either test their virus or to try to steal personal and private information from your computer. In other words, hackers are thieves.
In the book, you'll learn all there is to know about malware, spyware, adware, viruses, spam, spoofing, phishing worms, trojans, SQL injection, Hijack, Rootkits, Bots, and the impact of Malware. You'll read about the 10 most Common E-mail Scams and How to Defend Against Them.
Honestly, I already knew quite a bit on the subject matter, and if you are also well informed, then this book might not be for you. Someone new to computers, or has little knowledge about protecting your computer, will find this book interesting. There are plenty of links listed for paying and free firewalls, virus scans, and other useful information to keep your computer safe from cyber attacks.
*I would like to thank the Atlantic Publishing Group for sending me a copy to review.
Posted January 19, 2011
I believe this is the most important book on the market for anyone that has a computer and is connected to the Internet. (Statistics show 7 billion world-wide.) Written in easy, lay-language Bruce C. Brown gives us an understanding of the various terms associated to intrusions and theft of data. He also includes information on detection and gives safe websites for more information or software protection.
Brown states that "...there is no single solution to the issue of protecting against hackers and their nefarious deeds, and it is never possible to be 100 percent hacker-proof." This statement in itself urges us to install a variety of defense mechanisms on our computers.
On a personal note, being previously hacked while using other systems, I was pleased to read that "Windows 7 is without a doubt the most secure and stable version of Windows ever produced." I find it sad that we have to be so aware and protective because of wicked people wanting to hack into our lives for monetary or malicious gain. However, with knowledge gained through books like this we can become cognizant of what we need to do ourselves.