Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $1.98
Standard view
Full view
of .
Look up keyword or section
Like this
5Activity

Table Of Contents

Introduction
Connecting to the Internet
How Your Computer Finds Web Sites
Internet Hardware and Software
Email and Spam
Your Web Browser
Instant Messaging and Chat
Your Computer’s Operating System
Shared Files on Networks
Chapter 2 Give your PC a Security Checkup
Chapter 3 Email Spam and How to Manage It
Why Does Spam Exist?
Controlling Email Spam
Chapter 4 Facebook, MySpace, Twitter and Social Networking
Dating Sites
Internet 2.0 Social Networking Sites
Public Information
Privacy Controls
Facebook Privacy Settings
Types of Relationships on Facebook
Individual User Privacy
Privacy Options
Search Results
Twitter Privacy Settings
Other Social Networking Sites
Chapter 5 Malicious Software
Spyware
File Attachments
Chapter 6 Scams and Fraud
Phishing
Auction Sites, eBay and Craigslist Scams
How to Report Scams and Fraud
Chat Room Scams and Fraud
Blogs
Identity Theft
Chapter 7 Network Security
Typical Home and Small Office Networks
Router Setup
Router Security
Wireless Security Settings
File Sharing
Chapter 8 Laptops and Mobile Data
Theft
Infection
Inspection and Confiscation
Appendix B Software Tools
Security Software for Virus and Spyware Protection
Appendix C Quick Reference for Internet Fraud
Tips for different types of Fraud and Scams
Auction Fraud
Counterfeit Cashier's Check
Credit Card Fraud
Debt Elimination
DHL/UPS
Employment/Business Opportunities
Escrow Services Fraud
Internet Extortion
Investment Fraud
Lotteries
Nigerian Letter or "419"
Phishing/Spoofing
Ponzi/Pyramid
Reshipping
Spam
Third Party Receiver of Funds
Charitable Donation Fraud
Appendix D Chat Room Abbreviations
Index
P. 1
A Beginner's Guide to Internet Safety

A Beginner's Guide to Internet Safety

Ratings: (0)|Views: 163|Likes:
Published by Bob Cohen
Computers, networks, and the Internet are essential resources we use everyday. But these critical tools can expose us to possible identity theft, scams, virus attacks, damaged data files, and computer "hijacking."

Written in easy-to-understand language, this definitive guide explains practical preventive security measures you can put in place to protect yourself. You'll learn how-to be a "Cyber-Sleuth," able to recognize, identify, and eliminate threats when they occur.
Computers, networks, and the Internet are essential resources we use everyday. But these critical tools can expose us to possible identity theft, scams, virus attacks, damaged data files, and computer "hijacking."

Written in easy-to-understand language, this definitive guide explains practical preventive security measures you can put in place to protect yourself. You'll learn how-to be a "Cyber-Sleuth," able to recognize, identify, and eliminate threats when they occur.

More info:

Published by: Bob Cohen on Jul 20, 2010
Copyright:Traditional Copyright: All rights reserved
List Price: $1.98 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

05/24/2012

$1.98

USD

pdf

You're Reading a Free Preview
Pages 4 to 9 are not shown in this preview.
You're Reading a Free Preview
Pages 13 to 16 are not shown in this preview.
You're Reading a Free Preview
Pages 20 to 109 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Bob Cohen liked this
Bob Cohen liked this
Bob Cohen liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->