Synopses & Reviews
Packed with strategies for foiling Internet information thieves
Safeguard your assets, your identity, and your life
Take charge of your privacy at home and at work on the PC or the phone
Your personal information should be just that personal. This friendly guide shows you how to avoid privacy problems online, with easy-to-follow advice on securing your PC connection, conducting safe transactions, stopping the "e-mail trail," and protecting yourself and your family against viruses, hackers, worms, and other cyberpests.
The Dummies Way
- Explanations in plain English
- "Get in, get out" information
- Icons and other navigational aids
- Tear-out cheat sheet
- Top ten lists
- A dash of humor and fun
Get smart! @www.dummies.com
- Find listings of all our books
- Choose from many different subject categories
- Sign up for daily eTips at www.dummiesdaily.com
"...a great book…to the authors credit...very good stuff..." (Micro Mart, 28 September 2002)
"...a typically high quality guide...comprehensive..." (PC Plus, December 2002)
"…an entertaining and informative to me…(PC Utilities, December 2002)
Titles about online privacy walk a fine line between warning of very real risks and fostering hysteria about unlikely or impossible scenarios. Internet Privacy succeeds admirably. Its balanced tone and practical advice on the protecting yourself and your computer from Internet-borne threats, ranging from virus infection to identify theft, make it useful to beginning to intermediate computer folk. It also includes valuable tips on preserving offline electronic privacy, carrying these protective practices into daily activities. Naked comes from the opposite direction, teaching readers how and where to find personal information (from death records to credit records) online. This knowledge, however, can help them prevent others from finding and/or misusing their information, making this a valuable guide for both researchers and general readers. It highlights valuable legal uses of online pers onal information (including genealogical research and locating lost loved ones) while also addressing privacy concerns. Both are recommended for all public libraries. (Library Journal, February 2003)
Privacy issues come to the news every day. From big time break-ins to corporate and government computers to small time violations of e-mail or credit, there are real privacy concerns in this technology age. No worries This book will show an individual Internet user all they need to know to help maintain personal privacy. Topics include securing a PC and Internet connection, knowing the risks of releasing personal information, cutting back on spam and other e-mail nuisances, and dealing with personal privacy away from the computer.
This title covers what an individual Internet user needs to know to help maintain personal privacy. Topics include securing a PC and Internet connection, knowing the risks of releasing personal information, and cutting back on spam and other e-mail nuisances.
knowing the risks of releasing personal information, cutting back on spam and other e-mail nuisances, and dealing with personal privacy away from the computer.
* Covers the essentials: An individual Internet user needs to know to help maintain personal privacy. Topics include securing a PC and Internet connection, knowing the risks of releasing personal information, cutting back on spam and other e-mail nuisances, and dealing with personal privacy away from the computer.
* Covers the enhanced features of the latest releases of Internet filtering software and privacy tools.
* Series features: The...For Dummies series has always been popular with new Internet users. Internet For Dummies remains the #1 beginning reference for Internet users. This book looks to follow the successes of its predecessors.
About the Author
John R. Levine
is the author of UNIX For Dummies.
Ray Everett-Church is a respected speaker and consultant on Internet privacy.
Gregg Stebben, a former journalist, has appeared on CNN.
Table of Contents
Part I: Electronic Privacy Overview.
Chapter 1: How Private Are You Right Now?
Chapter 2: The Law, the Privacy Industry, and You.
Part II: PCs and Privacy.
Chapter 3: Safety Check: Looking under the Hood of Your Computer.
Chapter 4: Privacy for Computers and Networks with Multiple Users.
Chapter 5: Privacy for Laptops and Handheld Devices.
Part III: Privacy on the Internet.
Chapter 6: You and Your Internet Service Provider (ISP).
Chapter 7: Fighting Back against Hackers.
Chapter 8: Viruses, Worms, Macro Viruses, and Trojan Horses.
Chapter 9: "Help! There's a Hole in My Browser!".
Chapter 10: Why the E in E-Mail Stands for Easy-to-Intercept.
Chapter 11: Spam: Why It's Not Just a Funny Lunch Meat Any More.
Chapter 12: Safely Shopping Online.
Chapter 13: Safe Banking and Investing Online.
Part IV: Beyond the PC: Offline Electronic Privacy.
Chapter 14: Protecting Your E-Money, E-Credit, and E-Dentity.
Chapter 15: Your Telephone and Your Privacy.
Chapter 16: Protecting Your Privacy at Work.
Chapter 17: The Government Is Here to Help - or Not.
Part V: The Part of Tens.
Chapter 18: Ten Privacy Freedom Fighters Who Fight for You.
Chapter 19: Ten Ways to Fight Back for Fun and Profit.
Chapter 20: Ten Easy Tricks for Cutting Down on Spam.
Chapter 21: Ten Reliable Sources for Computer Virus Information.
Chapter 22: Ten Great Privacy Books (Other than This One!).