Cargando…

Degunking your email, spam, and viruses /

"Organize you email so that it works for you! Protect yourself from nasty spam, viruses, and worms."

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Duntemann, Jeff
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Scottsdale, Ariz. : Paraglyph Press, ©2004.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocm61492355
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 050913s2004 azua of 001 0 eng d
040 |a VVN  |b eng  |e pn  |c VVN  |d OCLCQ  |d OCLCE  |d OCLCQ  |d DKDLA  |d OCLCQ  |d ADU  |d E7B  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCL  |d EBLCP  |d DEBSZ  |d OCLCQ  |d NOC  |d AZK  |d LOA  |d CNNOR  |d MOR  |d PIFBR  |d ZCU  |d MERUC  |d OCLCQ  |d OCLCA  |d U3W  |d OCLCA  |d INARC  |d BRL  |d STF  |d WRM  |d OCLCQ  |d NRAMU  |d ICG  |d VT2  |d OCLCQ  |d AU@  |d OCLCQ  |d A6Q  |d OCLCQ  |d DKC  |d K6U  |d OCLCQ  |d CEF  |d CNCEN  |d HS0  |d OCLCQ  |d UWK  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 474639455  |a 478361247  |a 607445396  |a 614783317  |a 638238686  |a 638238711  |a 646732116  |a 722357101  |a 728027156  |a 961658800  |a 962572864  |a 966220066  |a 975777561  |a 988038349  |a 988511749  |a 992072500  |a 1005638729  |a 1018035895  |a 1029025400  |a 1037423950  |a 1037905804  |a 1038685839  |a 1041913969  |a 1045502778  |a 1055317891  |a 1058959168  |a 1081213552  |a 1083558286  |a 1089709106  |a 1090121241  |a 1091684403  |a 1097098630  |a 1100524097  |a 1103549181  |a 1105779003  |a 1109094230  |a 1110295819  |a 1112796750  |a 1119036185  |a 1121022755  |a 1135961002  |a 1224401952  |a 1228527191  |a 1257366052  |a 1273944446  |a 1274130360 
020 |z 193211193X 
020 |z 9781932111934 
029 1 |a AU@  |b 000053013437 
029 1 |a DEBBG  |b BV044109756 
029 1 |a DEBSZ  |b 449753476 
029 1 |a NZ1  |b 12021126 
029 1 |a AU@  |b 000073081907 
035 |a (OCoLC)61492355  |z (OCoLC)474639455  |z (OCoLC)478361247  |z (OCoLC)607445396  |z (OCoLC)614783317  |z (OCoLC)638238686  |z (OCoLC)638238711  |z (OCoLC)646732116  |z (OCoLC)722357101  |z (OCoLC)728027156  |z (OCoLC)961658800  |z (OCoLC)962572864  |z (OCoLC)966220066  |z (OCoLC)975777561  |z (OCoLC)988038349  |z (OCoLC)988511749  |z (OCoLC)992072500  |z (OCoLC)1005638729  |z (OCoLC)1018035895  |z (OCoLC)1029025400  |z (OCoLC)1037423950  |z (OCoLC)1037905804  |z (OCoLC)1038685839  |z (OCoLC)1041913969  |z (OCoLC)1045502778  |z (OCoLC)1055317891  |z (OCoLC)1058959168  |z (OCoLC)1081213552  |z (OCoLC)1083558286  |z (OCoLC)1089709106  |z (OCoLC)1090121241  |z (OCoLC)1091684403  |z (OCoLC)1097098630  |z (OCoLC)1100524097  |z (OCoLC)1103549181  |z (OCoLC)1105779003  |z (OCoLC)1109094230  |z (OCoLC)1110295819  |z (OCoLC)1112796750  |z (OCoLC)1119036185  |z (OCoLC)1121022755  |z (OCoLC)1135961002  |z (OCoLC)1224401952  |z (OCoLC)1228527191  |z (OCoLC)1257366052  |z (OCoLC)1273944446  |z (OCoLC)1274130360 
037 |n Title subscribed to via ProQuest Academic Complete 
042 |a dlr 
043 |a n-us--- 
050 4 |a TK5105.73  |b .D86 2004eb 
082 0 4 |a 004.692  |2 22 
049 |a UAMI 
100 1 |a Duntemann, Jeff. 
245 1 0 |a Degunking your email, spam, and viruses /  |c Jeff Duntemann. 
260 |a Scottsdale, Ariz. :  |b Paraglyph Press,  |c ©2004. 
300 |a 1 online resource (xxv, 334 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
380 |a Handbook 
500 |a "Organize your email so that it works for you! Protect yourself from nasty snam, viruses, and worms." 
500 |a Includes index. 
505 0 |a Why Is Your Computer Suffering from Email and Virus Gunk? -- What the Experts Know -- Understanding How You Got So Gunked Up -- The 10 Key Causes of Email Gunk -- The 10 Key Causes of Virus Gunk -- Identity Theft -- The Strategy Behind Degunking -- Important Questions to Ask Yourself -- Email Management 101 -- Combating Spam with Filtering Techniques -- Setting Up a Virus Protection System -- Preventing the Installation of Spyware and Adware -- Protecting Yourself from Identity Theft -- Setting Up a Firewall to Protect Against Internet Worms -- Oh, and Don't Forget Your Backups! -- The Email and Malware 12-Step Degunking Program -- Gunk Be Gone -- Creating Your Email Degunking Strategy -- What's Your Email Profile? -- The Public Professional -- The Private Professional -- The Student-Enthusiast -- The Casual Communicator -- Pick Your Profile -- The Three Kinds of Email Addresses -- Using Your Primary Email Address(es) -- Using Your Backup Email Address -- Using Disposable Email Addresses -- Understand Where Email Addresses Come From -- ISP Internet Accounts -- Your Employer's Email System -- Web Hosting Service Email Accounts -- Free Web Mail Accounts -- Freenets and Community Networks -- Back Up Your Internet Access -- Register Your Own Internet Domain -- Obtain and Use "Evaporating" Email Addresses -- Using the Right Email Client -- What Makes a Good Email Client? -- Easy to Learn and Use -- Multiple Mail Accounts -- Hierarchical Folders or Mailboxes -- Binary Attachments -- HTML and Plain-Text Mail -- Protection Against "Spam Beacon" Image Downloads -- Protection Against Scripts in HTML Messages -- Imports Mail from Many Email Clients -- Exports Mail to Standard Formats -- Uses the Windows Address Book -- User-Defined Message Filters -- Easy Backup of Your Mailbase -- Support for POP and IMAP Mailboxes -- Cheap or Free -- Not Too Popular -- The Problem of Software Monoculture -- POP or IMAP? -- My Recommendations -- Protocols: POP vs. IMAP -- Protocols: Client Choices -- Clients and Your Experience Level -- Clients and the Nature of your Work -- Summing Up-Have Client, Will Email! -- Developing Good Email Habits -- Sort Your Email: Keep, Hold, or Pitch? -- Beware the Fold! -- The 100-Message Rule -- Prioritize Your Email with Email Notifiers -- Notifiers: Your Silent Email Partner -- POPTray: Free and Easy -- Install POPTray -- Create POPTray Rules for Critical Senders -- Let POPTray Prioritize Your Mail -- Back Up Your Email -- Have an Email Backup Strategy -- Find Your Mailbase -- Backup Media -- Use Backup Utility Software -- Summing Up-The Habits of Highly Effective Emailers -- Read and Degunk Your Email from Anywhere -- Get Reliable Access to the Net and Your Mail Server -- Understand the Port 25 Blocking Problem -- Using the Local Network for Outbound Mail -- Don't Fork Your Mailbase! -- Leaving Mail on the Server -- Synchronization and the "Holes Don't Travel" Problem -- Traveling with IMAP -- Traveling with Web Mail -- POP Interfaces to Web Mail -- Web Mail Interfaces to POP Accounts -- Use a Client on a Key Chain: Poco EmailVoyager -- Handing Off a Mailbase Between Poco Mail and EmailVoyager -- Use Google's Gamil: "Deep Storage" Web Mail -- Gmail and the Privacy Issue -- Pop Goes the Gmail -- Gmail Loader -- Competitive Pressures -- Summing Up-Traveling Smart -- Cleaning and Organizing Your Mailbase -- Understand the Two Faces of Mailbase Gunk -- Create a Folder Hierarchy -- Apply the Single-Screen Rule -- Use Folders for Topics, not Senders -- Keep Your Time-Delimited Mail in Separate Folders -- Use Folders within Folders Carefully -- Sort Your Email into Folders -- Clean Your Attachments Folder -- The Trouble with Attachments -- File Extensions and File Types -- Clean Up the Odds and Ends -- Watch Out for Abandoned Drafts -- Delete Obsolete or Duplicate Copies of Your Mailbase -- Outlook's Mailbase and Windows Address Book -- Remove Outlook Express Email Gunk from the Windows Registry -- Editing the Registry with REGEDIT32 -- Email Spring Cleaning -- Summing Up-Clean Me Now ... or Clean Me Later! -- Avoid Becoming a Spam Magnet! -- Understand the Prime Directive Against Spam -- Don't Buy from Spammers! -- Don't Respond to Sneaky Spam Messages -- Friends Don't Let Friends Buy from Spammers! -- Why Is Stopping Spam So Hard? -- Choose a Spam-Resistant Email Address -- Avoid Dictionary Attacks -- More Advice on Choosing an Email Address -- Don't Hand Your Email Address to Spammers! -- Never Post Your Email Address on the Web -- Never Unsubscribe from a Spammer Mailing List -- Check to See if Listservs ARe Archived to the Web -- Obfuscate Your Email Address on Newsgroups and Discussion Boards -- Use Disposable Email Addresses for E-Commerce -- Don't Complain to a Spammer's ISP -- Avoid Triggering Other People's Spam Filters -- Summing Up-From Prevention to Cure -- Understand the Spam Filtering Conundrum -- Understand Spam Filtering Jargon -- Develop a Good Spam-Fighting Philosophy -- Love Your Address Book-and Use It! -- Use Your Address Book as Your Whitelist -- Use Content Filtering -- Automatic or Manual Filtering? -- Filtering on Sender Addresses and Domains -- Is It a Spammer Domain? -- Filtering on Key Words in the Subject -- Filtering on Key Words or Domains in the Message Body -- Watch Out for False Positives when Creating Filters! -- Run Your Spam Filters in the Correct Order -- "Inbox Thinning" with POPTray -- Defining Spam Filters in POPTray -- Deep-Clean Your Spam Using Bayesian Spam Filtering -- Degunk Your Spam with Statistics -- The Bayesian Regimen -- The Bayesian Downside -- Learn about POPFile -- Why Is POPFile So Good? -- Install POPFile -- Selecting POPFile's Install-Time Buckets -- Configuring Your Email Client to Use POPFile -- What Happens When POPFile Checks Mail -- Train and Use POPFile -- Training POPFile -- Setting Up a Spam Category Filter in Your Email Client -- Use POPFile's Magnets -- Creating Magnets in POPFile -- Back Up and Share POPFile's Corpus Data -- Finding the Corpus -- "Borrowing" a Corpus -- Use Outclass to Access POPFile from Outlook -- Installing Outclass -- Configuring and Using Outclass -- More Outclass Training Tips -- Using Safe View to Inspect Message Source Text -- Avoid Spam Control Methods That Don't Work -- Understand How Antispam Technologies Fail -- Be Careful with Server-Side Spam Filtering -- Watch Out for IP Black Holes -- Malicious Spam Reporting and "Joe Jobs" -- SpamCop -- Peer-to-Peer Collaborative Spam Filtering -- Challenge-Response Spam Blocking -- Captchas: Riddle Me This to Email Me! -- Whitelists Are Everything -- Other Problems With C-R Email Systems -- Why Spamming Should Not Be Illegal -- Keep a Cool Head and Win the War -- Protect Yourself Against Viruses, Trojans, and Worms -- Develop a Malware Master Plan -- Understand the PC Malware Bestiary -- Malware -- Viruses -- Worms -- Trojan Horses -- Back Doors -- Adware -- Spyware -- Social Engineering -- Phishing -- Hackers and Crackers and the Colors of Hats -- Security Holes in Software -- Where the Risks Are -- Malware Defense: From a Height -- Defeat Those Viruses -- Understand What Viruses Are and What They Do -- How You Contract PC Viruses -- Watch Out for "Dangerous" Files and Their Extensions -- Microsoft Office Files and File Extensions -- Havoc from Hiding Windows File Extensions -- How Viruses "Space-Shift Right" to Hide File Extensions -- Disable Microsoft Office Macros -- Macro Viruses in Office Add-Ins and Templates -- Choose an Antivirus Utility -- Using Software Reviews for Purchasing Decisions -- What All Good Antivirus Utilities Should Have -- Things to Watch Out For -- Do You Need Multiple Antivirus Utilities? -- What I Recommend -- Using Trial Products -- Installing a Typical Antivirus Product -- Using a One-Off Virus Removal Utility -- Summing Up-Use Good Virus Hygiene Daily -- Avoid Adware, Spyware, and Browser Bugaboos -- Adware vs.  
505 0 |a Spyware -- The Two Kinds of Free -- Know What You're Installing! -- Good Adware/Spyware Research Sites -- Use Anti-Spyware Software -- Installing and Using Spybot Search & Destroy -- Why Keep Adware? -- Installing and Using Ad-Aware -- Watch Out for Phony Spyware or Adware Removers -- Implement an Adware/Spyware Strategy -- Be Mindful of Browser Bugaboos -- The Hazards of Internet Explorer -- Drive-By Installs -- Disabling Install On Demand in Internet Explorer -- Beefing Up Security in the Internet Zone -- Disabling Install on Demand in Mozilla Firefox -- Block Pop-Ups! -- Use Limited Windows Accounts for Web Surfing -- Creating a Limited User Account in Windows -- Fast User Switching in Windows XP -- Summing Up-Peddlers Not Invited -- Use Firewalls to Stop Those Worms -- Understand That Worms Are Viruses with Legs -- The Nature of Worm Gunk -- Worms with a Mission -- The Life Cycle of a Worm -- Interfering with the Worm Life Cycle -- Your Worm Defense Strategy -- The Prime Directive in Worm Defense -- Learn the Essentials about Firewalls -- Using Software Firewalls -- Using NAT Firewalls -- Install and Use ZoneAlarm -- Getting ZoneAlarm -- Installing ZoneAlarm -- Understanding ZoneAlarm Zones -- Software Package Permissions -- Deciding Whether to Grant or Deny -- Install and Use the Linksys BEFSR41 Router -- Installing the BEFSR41 -- MAC Address Authentication -- Cloning Your MAC Address -- Tricky: MAC Cloning on an Older Router -- Summing Up-Turning Worms Away -- Degunk Nigerian Rhapsodies, Hoaxes, and Other Smelly Phish -- Degunk Those Viral Hoaxes -- Social Engineering Viruses -- So Why Are Harmless Social Engineering Viruses Wrong? -- Avoid the Nigerian 419 Scams -- Don't Be Victim to Identity Theft Because of Phishing Expeditions -- The New Scourge of the Internet -- Impersonating a Web Site -- "Bait and Switch" Web Links -- How Not to Get Hooked -- Degunking After a Malware Attack -- Understand the Five PC Defense Conditions -- Was It Really Malware? -- Is It Simply Plain Old Windows Gunk? -- How to Handle DefCon 1. 
520 |a "Organize you email so that it works for you! Protect yourself from nasty spam, viruses, and worms." 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Spam (Electronic mail) 
650 0 |a Computer viruses  |x Prevention. 
650 0 |a Computer security  |z United States  |v Handbooks, manuals, etc. 
650 6 |a Pourriels. 
650 6 |a Sécurité informatique  |z États-Unis  |v Guides, manuels, etc. 
650 7 |a Computer security  |2 fast 
650 7 |a Computer viruses  |x Prevention  |2 fast 
650 7 |a Spam (Electronic mail)  |2 fast 
651 7 |a United States  |2 fast  |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 
655 2 |a Handbook 
655 7 |a handbooks.  |2 aat 
655 7 |a Handbooks and manuals  |2 fast 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf 
758 |i has work:  |a Degunking your email, spam, and viruses (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGYvmdfBpQvD6937MxbfdP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Duntemann, Jeff.  |t Degunking your email, snam, and viruses.  |d Scottsdale, Ariz. : Paraglyph Press, ©2004  |w (OCoLC)57015388 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3384731  |z Texto completo 
938 |a ebrary  |b EBRY  |n ebr10080004 
938 |a Internet Archive  |b INAR  |n degunkingyourema00dunt 
994 |a 92  |b IZTAP