Hacker Proof - Your Guide To PC Security.pdf
(
979 KB
)
Pobierz
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This eBook Is Provided By
www.PlentyofeBooks.net
Plenty of
eBooks
(Free
eBooks
& Tutorials) is a free
eBooks links library where you can find and
download free books in almost any category without
registering.
For More Free
eBooks
& Tutorials Visit
www.PlentyofeBooks.net
Uploaded By samsexy98
Enjoy...!!!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
HackerProof: Your Guide to PC Security
HackerProof: Your
Guide to PC Security
By: Matt Smith
smidgenpc.com
Edited by: Justin Pot
This manual is intellectual property of MakeUseOf. It must only be published in its original
form. Using parts or republishing altered parts of this guide is prohibited.
http://smidgenpc.com/ | Matt Smith
MakeUseOf.com
Page
2
HackerProof: Your Guide to PC Security
Table of Contents
1. Intro to PC Security .............................................................................................................. 5
What is PC Security? ............................................................................................................ 5
A Brief History of Computer Viruses ................................................................................... 6
Chapter 2: The Malware Gallery ........................................................................................... 8
The Traditional Virus or Trojan ............................................................................................. 8
Trojans .................................................................................................................................... 9
Worms .................................................................................................................................. 10
Rootkits ................................................................................................................................ 11
Phishing and Pharming ..................................................................................................... 13
Malware
–
The Catch All ................................................................................................... 14
Chapter 3: Innocent Civilizations: The Security of Operating Systems ........................... 15
Windows XP......................................................................................................................... 15
Windows 7 ........................................................................................................................... 16
Mac OS X ............................................................................................................................ 18
Linux ..................................................................................................................................... 19
A Summary
–
Which is Best? ............................................................................................. 20
Chapter 4: Good Security Habits ........................................................................................ 21
Avoiding the Email Inbox of Doom ................................................................................. 21
Using Caution for Safe Surfing .......................................................................................... 22
Checking Links
–
Do They Lead Where You Think? ....................................................... 23
Updating Your Software
–
The Most Important Step ..................................................... 24
Use Antivirus Protection ..................................................................................................... 25
Chapter 5: Methods of Protection ...................................................................................... 26
Anti-Malware Software ..................................................................................................... 26
Firewalls ............................................................................................................................... 28
Rootkit Killers ....................................................................................................................... 29
Network Monitoring ........................................................................................................... 30
Phishing Protection ............................................................................................................ 31
Chapter 6: Choosing Security Software ............................................................................. 33
What Products Offer What Protection? .......................................................................... 33
Free vs. Paid Security ......................................................................................................... 34
The Ideal Free Internet Security Suite .............................................................................. 36
http://smidgenpc.com/ | Matt Smith
MakeUseOf.com
Page
3
HackerProof: Your Guide to PC Security
Avast! Free Antivirus or Microsoft Security Essentials ................................................. 36
ZoneAlarm Free Firewall ................................................................................................ 37
BitDefender Anti-Phishing .............................................................................................. 37
Chapter 7: Prepare for the Worst
–
and Backup! ............................................................. 38
The Importance of Backups ............................................................................................. 38
Backup Options.................................................................................................................. 39
External Hard Drives: ...................................................................................................... 39
Optical Formats: ............................................................................................................. 39
Online Backup ................................................................................................................ 40
Securing Files with Encryption .......................................................................................... 41
How Often Should I Backup? ........................................................................................... 42
Chapter 8: Recovering from Malware ............................................................................... 44
Reclaiming Your PC ........................................................................................................... 44
Protecting Your Identity .................................................................................................... 45
Preventing Future Problems .............................................................................................. 47
Chapter 8: Conclusions ........................................................................................................ 48
A Summary of the Issues ................................................................................................... 48
A Note About Mobile Threats ........................................................................................... 49
Additional Reading ........................................................................................................... 50
http://smidgenpc.com/ | Matt Smith
MakeUseOf.com
Page
4
Plik z chomika:
panrusiu
Inne pliki z tego folderu:
Exploiting Web-Based Applications - FREE Video Training Course PART 1.rar
(506812 KB)
Exploiting Web-Based Applications - FREE Video Training Course PART 2.rar
(933817 KB)
50 Android Hacks.pdf
(3465 KB)
50 Reasons For Mastering Penetration Testing.azw3
(171 KB)
610.1 - Malware Analysis Fundamentals.pdf
(31650 KB)
Inne foldery tego chomika:
- ❎ Diagnostyka Pojazdów
Pliki dostępne do 01.06.2025
Pliki dostępne do 21.01.2024
###SERIALE (SF)
[FreeCourseSite.com] Udemy - The Complete Ethical Hacking Masterclass Beginner To Expert
Zgłoś jeśli
naruszono regulamin