Summer Reading Sale
 
 

Recently Viewed clear list


Original Essays | June 20, 2014

Lauren Owen: IMG The Other Vampire



It's a wild and thundery night. Inside a ramshackle old manor house, a beautiful young girl lies asleep in bed. At the window, a figure watches... Continue »

spacer
Qualifying orders ship free.
$1.75
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Local Warehouse Personal Computers- Using PCs

PC Magazine Fighting Spyware, Viruses, and Malware

by

PC Magazine Fighting Spyware, Viruses, and Malware Cover

 

Synopses & Reviews

Publisher Comments:

"Why does that window keep popping up — I'm not even on the Internet?"
"What do you mean my email sent you a virus?"
"Wait, where did my search page go?" "I didn't ask for this page."
"Does PayPal really want me to update my account information?"
"Where did my files go? Has someone been on my computer?"

Sound familiar? For millions of Internet users it certainly does. With today's always-on high-speed connections, our computers are vulnerable; but not if you know how to stay safe, and bestselling computer author Ed Tittel has the answers. From Trojans to viruses, from pop-ups to spyware, within these 350 pages is everything you need to put up a defensive perimeter around your computer, your home network, and even your wallet! Learn where spyware, pop-ups, toolbars and interface changes come from, and how to recognize if you have a problem. Uncover how to clean up any messes that result from infection or unwanted software or interface changes including cleaning out the nastiest malware by hand. Discover how to implement the tools needed to keep your PCs safe and sound, including personal firewalls, spyware tools and more Get expert tips on battling the spam onslaught, and defending against viruses and trojans.

Book News Annotation:

PC users are vulnerable to a variety of unwanted content and software installing itself on their machines without their knowledge. Tittel, a trainer, writer, and consultant, alerts the ordinary home PC user to the interlopers lurking in everyday Net use (Trojan horses, viruses, adware, spyware), explains the risks and threats they pose, and describes preventative tools and best practices to help avoid them. He also covers how to diagnose potential infections and how to clean up afterward.
Annotation 2005 Book News, Inc., Portland, OR (booknews.com)

Book News Annotation:

PC users are vulnerable to a variety of unwanted content and software installing itself on their machines without their knowledge. Tittel, a trainer, writer, and consultant, alerts the ordinary home PC user to the interlopers lurking in everyday Net use (Trojan horses, viruses, adware, spyware), explains the risks and threats they pose, and describes preventative tools and best practices to help avoid them. He also covers how to diagnose potential infections and how to clean up afterward. Annotation ©2005 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC—along with your wallet.

Here's how you can

  • Learn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PC
  • Get the tools that can cure an infection
  • Dig into the Windows Registry to remove the nastiest of bugs
  • Prevent a recurrence with personal firewalls and protective software
  • Deal with the onslaught of spam
  • Keep your defenses up-to-date

Give it the boot

If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted—that is, before you got infected.

— From Chapter 4

About the Author

Ed Tittel has been writing, researching, and teaching about Windows security topics since 1996. An inveterate tinkerer cursed with incurable curiosity, he's become a connoisseur of protection tools and techniques to battle spyware, adware, and malware.

Table of Contents

Preface.

Acknowledgments.

Part I: Welcome to the Jungle!

Chapter 1: Unwelcome Intruders Seeking Entry.

Chapter 2: Understanding Malware.

Part II: How Good PCs Go Bad.

Chapter 3: Methods of Insertion and Delivery.

Chapter 4: Detecting and Repairing PC Infestations.

Part III: The Particles of Protection.

Chapter 5: Personal Firewalls.

Chapter 6: Pop-Up Blockers.

Chapter 7: Anti-Spyware and Anti-Adware Programs.

Chapter 8: Anti-Virus Programs.

Chapter 9: Spam Blockers.

Part IV: Commonsense Rules for Safe Computing.

Chapter 10: Practicing E-mail Safety.

Chapter 11: Practicing Web Safety.

Chapter 12: Practicing System Safety.

Part V: The Habit of Security.

Chapter 13: Safety Is a Matter of Routine.

Chapter 14: Safety Requires Constant Vigilance.

Appendix A: The Security Suite Life.

Appendix B: References.

Glossary.

Index.

Product Details

ISBN:
9780764577697
Author:
Tittel, Ed
Publisher:
Wiley
Subject:
Computer security
Subject:
Viruses
Subject:
Computer viruses
Subject:
Security - Viruses
Subject:
Internet - Security
Subject:
Networking-Computer Security
Subject:
Internet - General
Copyright:
Edition Description:
WebSite Associated w/Book
Series:
PC Magazine
Series Volume:
3
Publication Date:
20041231
Binding:
Electronic book text in proprietary or open standard format
Grade Level:
General/trade
Language:
English
Illustrations:
Y
Pages:
382
Dimensions:
9.24x7.38x.80 in. 1.24 lbs.

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Networking » Computer Security
Computers and Internet » Personal Computers » Privacy
Computers and Internet » Personal Computers » Using PCs

PC Magazine Fighting Spyware, Viruses, and Malware Used Trade Paper
0 stars - 0 reviews
$1.75 In Stock
Product details 382 pages John Wiley & Sons - English 9780764577697 Reviews:
"Synopsis" by , Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC—along with your wallet.

Here's how you can

  • Learn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PC
  • Get the tools that can cure an infection
  • Dig into the Windows Registry to remove the nastiest of bugs
  • Prevent a recurrence with personal firewalls and protective software
  • Deal with the onslaught of spam
  • Keep your defenses up-to-date

Give it the boot

If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted—that is, before you got infected.

— From Chapter 4

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.