Bug-Free Computing: Stop Viruses, Squash Worms, and Smash Trojan HorsesIn Bug-Free Computing you will discover simple techniques anyone can use to protect your computer against attacks from viruses, worms, Trojan horses, spyware and more. Unless you know enough to stay ahead of these threats, you are at risk. |
Wat mensen zeggen - Een review schrijven
We hebben geen reviews gevonden op de gebruikelijke plaatsen.
Inhoudsopgave
Why You Need To Read This Book | 1 |
Facts About the Current Generation of Viruses | 5 |
What the AntiVirus Software Vendors Wont Tell You | 11 |
Definitions Common Viruses Evolution of the Threat | 13 |
Who Writes Viruses and Why? | 23 |
The Importance of Backups | 33 |
Kinds of Damage Viruses May Cause | 47 |
How Viruses Are Spread | 53 |
AntiVirus and Firewall Software | 107 |
Reading EMail Headers | 113 |
Preventive Measures | 119 |
Recognizing Virus Behavior | 131 |
What to Do if Your Computer Is Infected | 157 |
Country Codes Listed Alphabetically | 163 |
Unsafe File List from Microsoft | 167 |
Keeping This Information Current | 169 |
Overige edities - Alles weergeven
Bug-Free Computing: Stop Viruses, Squash Worms, and Smash Trojan Horses Ken Dwight Gedeeltelijke weergave - 2005 |
Veelvoorkomende woorden en zinsdelen
Address Book anti-virus program anti-virus software attachment backup media become infected Blaster worm Boot Browser Hijackers cause CD-RW Chapter computer users contains specific words cookies Critical Updates damage data files Desciiption detected dialog box e-mail address e-mail headers e-mail message e-mail program entry example file name filtering floppy disk forms of malware hackers hard drive hoaxes identify included infect your computer infected computer infected file installed Internet Explorer Internet Service Provider Mail Rule Mail Server Microsoft Outlook modern viruses Msconfig multiple Norton AntiVirus Operating System option Outlook Express prevent Preview Pane problem procedure protect Quarantine receive recipient remove repair running screen Scumware sender shown in Figure software firewall software vendors spam messages spammers spread spyware Startup tab steps Symantec symptoms target technique threat tool virus definitions virus infection virus writers Windows 98 Windows XP zombie