Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

What is PC Security?
A Brief History of Computer Viruses
Chapter 2: The Malware Gallery
The Traditional Virus or Trojan
Phishing and Pharming
Malware – The Catch All
Chapter 3: Innocent Civilizations: The Security of Operating Systems
Windows XP
Windows 7
Mac OS X
A Summary – Which is Best?
Chapter 4: Good Security Habits
Avoiding the Email Inbox of Doom
Using Caution for Safe Surfing
Checking Links – Do They Lead Where You Think?
Updating Your Software – The Most Important Step
Use Antivirus Protection
Chapter 5: Methods of Protection
Anti-Malware Software
Rootkit Killers
Network Monitoring
Phishing Protection
Chapter 6: Choosing Security Software
What Products Offer What Protection?
Free vs. Paid Security
The Ideal Free Internet Security Suite
Avast! Free Antivirus or Microsoft Security Essentials
Chapter 7: Prepare for the Worst – and Backup!
The Importance of Backups
Backup Options
Securing Files with Encryption
How Often Should I Backup?
Chapter 8: Recovering from Malware
Reclaiming Your PC
Protecting Your Identity
Preventing Future Problems
Chapter 8: Conclusions
A Summary of the Issues
A Note About Mobile Threats
Additional Reading
0 of .
Results for:
No results containing your search query
P. 1
hacker proof pc security

hacker proof pc security

Ratings: (0)|Views: 15 |Likes:
Published by Taranisa
from make use of .com very informative
from make use of .com very informative

More info:

Published by: Taranisa on Dec 27, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 6 to 53 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->