Tabla de Contenidos:
  • How the Internet works
  • How hackers break into your PC and how to protect against them
  • How spyware and anti-spyware work
  • How websites invade your privacy
  • The dangers of Internet search
  • How "phishing" attacks can steal your identity and how to protect against them
  • How Zombies and Trojan Horses attack you and how to protect against them
  • The security dangers in Browsers
  • How Worms and Viruses do their damage and how to protect against them
  • Wi-Fi security dangers and protections
  • Bluetooth security dangers
  • How Instant Messaging pests work
  • How Spam works and how to fight it
  • How Denial-of-Service attacks bring down websites
  • How virtual private networks and encryption keep you safe
  • How Web blocking and parental controls work
  • How personal Firewalls and Proxy Servers protect you
  • How Identity Theft works
  • Credit card security
  • The Dangers of Data Mining
  • The Dangers of workplace surveillance
  • How cell phones can be hacked
  • How Biometrics works
  • How Radio Frequency ID can invade your privacy
  • How location tracking works
  • How DNA matching works
  • How airport scanners and screening systems work
  • The Federal government, privacy, and electronic surveillance
  • How wiretapping and lie detectors work.