Like everything else we do in life there are joys and dangers. The digital world is no different. Yes criminals have found ways to exploit cyberspace. Pirates exploit sea vessels, get away drivers exploit cars, drug smugglers exploit air travel, muggers exploit parks, the list of useful life enhancing things villains exploit to hurt society is tremendously large. Criminals will find a way to subvert every new invention. With all of this going on criminals do not stop us from enjoying life. So, cyber criminals should not stop you from enjoying what computers and the internet have to offer.
Reading this book will give you a better understanding of core internet technologies like Broadband, IP Addresses, Network Address Translation and TCP / UDP. You will also learn about the threats to your network such as Viruses, Worms, Botnets, Trojan Horses, Rootkits, Phishing, Denial of Service attacks, Cross-site Scripting, and Email Borne Viruses. Finally you will learn about protecting yourself by disabling things like Hidden Filename Extensions, and using tools such as Firewalls, Antivirus Software and data backups. You will also learn about protecting yourself from risky behavior.
Armed with the knowledge, tools and common sense practices in this book you can have a worry free digital experience. It is no different from being careful of other drivers on the road, not walking in places known to have a history of criminal activity or leaving your purse/wallet on a park bench while you are flying a kite.
Since 1988 I have built a career with computers. The purpose of this book is to give the lay person some understanding of the risks to their home or small business network, as well as the basic means to protect their network. For 9 out of 10 homes with computers and the vast majority of small businesses this book will provide you with the knowledge you need to secure your network. If you fall into one of these groups then read this book.
I hope this book will give you the ability in the cyber world to be safe and enjoy!
Reading this book will give you a better understanding of core internet technologies like Broadband, IP Addresses, Network Address Translation and TCP / UDP. You will also learn about the threats to your network such as Viruses, Worms, Botnets, Trojan Horses, Rootkits, Phishing, Denial of Service attacks, Cross-site Scripting, and Email Borne Viruses. Finally you will learn about protecting yourself by disabling things like Hidden Filename Extensions, and using tools such as Firewalls, Antivirus Software and data backups. You will also learn about protecting yourself from risky behavior.
Armed with the knowledge, tools and common sense practices in this book you can have a worry free digital experience. It is no different from being careful of other drivers on the road, not walking in places known to have a history of criminal activity or leaving your purse/wallet on a park bench while you are flying a kite.
Since 1988 I have built a career with computers. The purpose of this book is to give the lay person some understanding of the risks to their home or small business network, as well as the basic means to protect their network. For 9 out of 10 homes with computers and the vast majority of small businesses this book will provide you with the knowledge you need to secure your network. If you fall into one of these groups then read this book.
I hope this book will give you the ability in the cyber world to be safe and enjoy!