Admin مدير المنتدى
عدد المساهمات : 19001 التقييم : 35505 تاريخ التسجيل : 01/07/2009 الدولة : مصر العمل : مدير منتدى هندسة الإنتاج والتصميم الميكانيكى
| موضوع: كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy السبت 3 فبراير 2024 - 23:17 | |
|
أخواني في الله أحضرت لكم كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy John Sammons, Michael Cross
و المحتوى كما يلي :
What is cyber safety? 1 CHAPTER INFORMATION IN THIS CHAPTER ● What Is Cyber Safety? ● Paying Attention to What’s Out There ● Privacy ● Encryption ● Monitoring Online Activity ● Identifying the Devices You Use, and Where You Use Them ● Using Different Windows Accounts ● Physical Security e connecting to the Internet 2 CHAPTER INFORMATION IN THIS CHAPTER ● Securing Your Web Browser ● Wi-Fi Security and Safety ● Passwords ● Firewalls ● Physical Security ● Identifying the Devices You Use, and Where You Use Them are problems and solutions 3 CHAPTER INFORMATION IN THIS CHAPTER ● Malware and Viruses ● Antivirus ● Antimalware ● Staying Up-To-Date ● Disaster Recovery Email safety and security 4 CHAPTER INFORMATION IN THIS CHAPTER ● Email Protection ● Limiting What Your Email Reveals ● Choosing an Email Client ● Free Email Sites ● Security Settings on Email Sites Cybercrime 5 CHAPTER INFORMATION IN THIS CHAPTER ● What Is a Cybercriminal? ● Identity Theft ● Social Engineering ● Hacking ● Scams social media 6 CHAPTER INFORMATION IN THIS CHAPTER ● What Is Social Media? ● Securing Social Media ● Securing Facebook ● Securing Twitter ● Securing YouTube Finding a job online 7 CHAPTER INFORMATION IN THIS CHAPTER ● Looking for Work Online ● Online Resumes ● Work-at-Home Scams ● Securing LinkedIn Protecting your reputation 8 CHAPTER INFORMATION IN THIS CHAPTER ● Think Twice, Post Once ● The Real World and Cyberspace ● What to Do After a Security Breach ● Digital Legacies Beyond technology—dealing with people 9 CHAPTER INFORMATION IN THIS CHAPTER ● Netiquette ● Anonymity ● Annoying and Abusive People ● Online Chat ● Online Dating ● Meeting People in Person ● Protecting Yourself ● Creating a New Identity Protecting your kids 10 CHAPTER INFORMATION IN THIS CHAPTER ● Protecting Your Kids ● Filtering and Blocking ● Parental Controls ● Browsers for Kids ● Kid-Orientated Search Engines ● Limiting Time and the Times They’re Allowed Online ● Location ● Talking About What’s Inappropriate ● Cyberbulling ● Online Predators ● Privacy Settings ● Monitoring Online Activity Index Note: Page numbers followed by “b” and “f” refer to boxes and figures, respectively. A About section of profile, 130–131 Abusive people, 184–192 blocking people, 189–190 creeping, 186–187 cyberstalking, 187 losing anonymity, 190–191 online harassment, 185 preventative measures, 187–188 reporting abuse, 190–191 thinning herd, 188 trolls and flamers, 186 unfriend, unfollow, unjoin, 188–189 Activity Log, 119–120 Ad-aware, 62 Administrator account, 23 Advanced Encryption Standard (AES), 38 Advertising-supported software (Adware), 54 AES. See Advanced Encryption Standard (AES) Alias, 77, 99, 192–193 Annoying people, 184–192 blocking people, 189–190 creeping, 186–187 cyberstalking, 187 losing anonymity, 190–191 online harassment, 185 preventative measures, 187–188 reporting abuse, 190–191 thinning herd, 188 trolls and flamers, 186 unfriend, unfollow, unjoin, 188–189 Anonymity, 77, 181–184 being wary of others and yourself, 182–183 falsehood, 183 flip side, 183–184 losing, 190–191 Antimalware, 40, 62–63, 108–109, 114 Antitheft software, 210–213 apps and sites, 212 Antivirus, 56–57 App Passwords section, 124 AppBugs, 104–105 Apple Cloud services, 11 Apple Mail, 77 Asymmetric cryptography, 12 Attachment, 75 dangers, 80–81 AutoComplete, 48 Automated Filters settings, 136 Automatic updates, 64–68 Windows 10 peer-to-peer updates, 67–68 in Windows 10, 65–67 Avast antivirus, 57 AVG antivirus, 56 B Backdoors, 54–55 Backing up files, 70–73 backing up phones and tablets, 72–73 online backups, 71–72 Baiting, 95–96 Bank account, monitoring, 16 Biometrics, 24–25 BitLocker, 13 BitTorrent technology, 183 Black hats, 96 Blackberry Blend program, 73 Blackberry devices, 73 Blacklist section, 83, 136 Blocking, 207–209, 208f people, 189–190, 189f Bogus companies, 142 Bookmarking, 117 Botnets, 55 tools, 104–105 Bots, 104 Bots. See Robots (Bots) Bring Your Own Device (BYOD), 17 Browser hijackers, 55 Bulletin Board Systems, 180 Business computers, 16–22 BYOD. See Bring Your Own Device (BYOD) C Cache clearance, 160–161 CCleaner, 163, 164f Changing passwords, 42 Channel link, 136–137 Chat rooms, 193–194 Chatiquette, 193–194230 Index Checkpoint. See Restore point Child identity theft, 90–91 Child’s safety, 210 ChildScan service, 91 Cipher tool, 163–164 Ciphertext, 12 Click jacking method, 100–101 Client authentication, 14 Clone phishing, 94 Cloud storage. See Online storage Cloud, 2 services, 165–166 Code generator, 123–124 Comments and Ratings section, 137 Communication, 192 methods, 185 online, 192 online chat, 192–196 security on Internet, 192–196 Community link, 135–136 Cookies, 30–32 tracking, 7, 30–31, 55–56 Copycat site, 94 Cracker, 96 Cracking passwords, 42 Creator Studio, 135–137 blocking and reporting, 137 channel link, 136–137 community link, 135–136 restricted mode, 137 Creeping, 186–187 Critical updates, 64 Cumulative update, 63 Cyber safety, 1, 76, 95. See also Cybercrime device identification, 16–22 computer use in public places, 18 Internet of Things, 22 mobile devices, 18–20 separating home and business computers, 16–22 smart TVs and game systems, 21–22 encryption, 12–15 Internet, 2–3 Internet privacy, 7–12 data importance, 10 expectations and reality, 7–8 files storage, 10 information importance, 11–12 ownership, 8–9 issues, 3 monitoring online activity, 15–16 paying attention, 3–7 reading URLs, 4–7 thinking before clicking, 4 validating information, 3–4 physical security, 25–26 in physical world, 1–2 using Windows accounts, 22–25 biometrics, 24–25 Cyberbullying, 221–223 prank calls, 222–223 Cybercrime, 87–88. See also Cyber safety cybercriminal, 87–88 criminals choosing targets, 88 hacking, 96–109 common methods, 99–103 defaced sites, 99 hijacking/hacked accounts, 97–98 tools, 103 ransomware, 114 scams, 109–115 advanced fee scams, 109 intimidation and extortion, 110 offers on Internet, 110–112 online charities, 112–113 tax scams, 113 scareware, 114 social engineering, 91–96 baiting, 95–96 suspicious emails and SPAM, 94–95 technology and, 93–94 theft identification, 88–91 child identity theft, 90–91 controlling provides information, 89–90 Cybercriminals, 5–6, 105, 170 criminals choosing targets, 88 Cybersafety, 168–169 Cyberspace, 168–174 Internet-based issues, 169–172 Do Not Call registry, 171 online “support”, 171 preventing mail theft, 172 telephone and mail scams, 170 Cyberstalking, 187 D Data deletion, 163–167 account activation and deactivation, 167 data sharing, 165 online storage, 165–166 tools, 163–165 Data encryption, 15 Data sharing, 165 Decryption, 86 Defaced sites, 99Index 231 Default Settings section, 136 Defer upgrades option, 66 Device activity & notifications link, 84–85 Device history section, 121 Digital legacies, 176–177 Facebook memorial page, 177 Disaster recovery, 69–74 backing up files, 70–73 backing up phones and tablets, 72–73 online backups, 71–72 copy of passwords, 70 setting and restoring restore points, 73–74 Discoverability setting, 133 Distributed Denial of Service attack, 104 Do Not Call Registry, 171 Domain name, 5 Dox, 101 Doxing, 101 Dumpster diving, 103, 169 E Egosurfing, 153 Email, 75, 120, 122 email settings, 82 email sites, security settings on, 81–83 Email protection, 76–83 email client selection, 77–79 block remote content, 79–80 dangers of attachment, 80–81 hiding message pane, 80 securing Thunderbird, 77–79 limiting email reveals, 76–77 nonidentifying email, 77b Email safety and security email protection, 76–83 choosing email client, 77–79 limiting email reveals, 76–77 nonidentifying Email, 77b free email sites, 81 Gmail security, 83–86 checking Gmail security and privacy, 85b encryption, 85–86 Other Google Account settings link, 84 password recovery features, 83–84 ISP, 75 security settings on email sites, 81–83 Mail. com security, 82–83 Encryption, 12–15, 85–86 encrypting storage, 13–14 encrypting mobile devices, 14 secure communication on Internet, 14–15 site using HTTPS, 15f Equifax service, 91 Ethernet, 35 Experian service, 91 Exploits, 55 Extramarital dating sites, 196–197 F Facebook, 3, 98, 101, 118–120, 177. See also Twitter; LinkedIn; YouTube memorial page, 177 securing, 121–131 General settings page, 122–123 lists, 129–130 Privacy settings and tools page, 125–128 About section, 130–131 Security settings page, 123–125 Timeline and Tagging settings, 128–129, 128f Facial recognition feature, 24–25 Faking sites with URLs, 5–7 Family Secure service, 91 Federal Trade Commission (FTC), 89 File Transfer Protocol (FTP), 5 Filter Anonymous Internet Requests, 52 Filter Internet NAT Redirection, 52 Filter Multicast, 52 Filtering, 207–209 Finding job online background and credit checks, 143 fraudulent job posts, 140–141 Internet, 141 interviews, 143–144 job search sites, 139–140 online resumes, 144–146 clean up our digital presence, 145–146 online applications, 145 professional social networks, 140 recruiters, 142–143 researching company, 141–142 bogus companies, 142 social media, 142 securing LinkedIn, 147–151 work-at-home scams, 146–147 Fingerprint readers, 24 Firewalls, 50–52. See also Encryption Linksys firewall, 51f on router, 50–52 Firmware, 21–22 Flamebait, 186 Flamers, 186 Forgot Password link, 90 Forums and blog comments, 117 Fraudulent job posts, 140–141232 Index Free email sites, 81 Freeware, 54 FTC. See Federal Trade Commission (FTC) FTP. See File Transfer Protocol (FTP) G General settings page, 122–123 Generic account, 76 Gmail, 75, 81 security, 83–86 checking Gmail security and privacy, 85b encryption, 85–86 Google Account settings, 84 password recovery features, 83–84 Google, 3 Google Smart Lock, 49–50 Other Google Account settings link, 84 Google mail. See Gmail Graphical user interface (GUI), 29 Gray hats, 96 Guest account, 23 Guest network, setting up, 40–41 GUI. See Graphical user interface (GUI) H Hackers, 2, 10–11, 37, 39, 88, 96–97, 99, 103, 156 Hacking, 96–109 common methods, 99–103 groups, 101–102 inside jobs, 102 low tech method, 102–103 defaced sites, 99 hijacking/hacked accounts, 97–98 tools, 103 botnets and rootkits tools, 104–105 keylogger tool, 105 password cracking tool, 104–105 portable tools, 108–109 protection, 107–109 realizing sites, 105–107 Hacktivists, 97 Hashing, 12 hashtag, 132 Headhunters, 142 Hijacking, 98 Hijacking/hacked accounts, 97–98 History deletion, 160–161 Home computers, 16–22 Hotmail, 81 HTTP. See Hypertext Transfer Protocol (HTTP) HTTPS, 15, 15f, 108 Hyperlinks, 4 Hypertext Transfer Protocol (HTTP), 5, 15 I IC3. See Internet Crime Complaint Center (IC3) iCloud, 73 Identity theft, 88–91 child identity theft, 90–91 controlling provides information, 89–90 IE. See Internet Explorer (IE) IM. See Instant Messaging (IM) Image search, 199–200 IMEI. See International Mobile Equipment Identity (IMEI) Inbox, 75 Infoencrypt, 85 InfoSecurity Europe, 92 Instant Messaging (IM), 193 Integrity checks, 15 Internal recruiters, 142 Internal Revenue Service (IRS), 92 International Mobile Equipment Identity (IMEI), 215 Internet, 2–3, 35, 141, 146, 153, 180, 202 before connecting firewalls, 50–52 passwords, 41–50 securing Web browser, 29–34 Wi-Fi security and safety, 34–41 jargon, 181 secure communication, 14–15 social media site, 119 of Things, 22 Internet Crime Complaint Center (IC3), 87–88 Internet Explorer (IE), 29 Internet Explorer 8, 108 Internet privacy, 7–12 data importance, 10 expectations and reality, 7–8 files storage, 10 information importance, 11–12 ownership, 8–9 Internet Service Provider (ISP), 34, 57, 75, 93, 181 Interviews, 143–144 iOS device, 166 IP address, 5, 80, 183 IRS. See Internal Revenue Service (IRS) ISP. See Internet Service Provider (ISP) K Keylogger tool, 105 L Likejacking, 101 LinkedIn, 140. See also Facebook; Twitter; YouTubeIndex 233 securing, 147–151 history, 148 privacy controls, 148–150, 149f securing our profile, 150–151 two-step verification, 147–148 Linksys firewall, 51f router, 38, 40, 50 changing default password on, 36f Lists, 129–130 Local Security Policy, 43f Location controls, 133 Login Approvals feature, 124 Login history section, 121 Login verification checkbox, 132 M Mail server, 75 Mailbox, 75 Malicious software (Malware), 53–56, 79 Malware. See Malicious software (Malware) Malwarebytes Anti-Malware, 62 Malwarebytes Anti-Malware Mobile, 19–20 Malwarebytes app manager, 20f Malwarebytes privacy manager, 21f McAffee, 57 Media sharing, 117 Metadata, 158 Microblogging, 117 Microsoft, 62 account, 23–24 Microsoft Outlook, 75, 77, 81 operating systems, 63–64 Mobile apps, 19, 63–64 Mobile device encryption, 14 Mobile devices, 18–20 information sharing and collection by apps, 19–20 location features, 20–21 Malwarebytes app manager, 20f privacy manager, 21f Mobile apps, 19 updates, 68–69 Modem, 35 Moderators, 193–194 Monitoring activity, 119–121 N National identity number, 144 National Security Agency (NSA), 8 Netiquette (Network etiquette), 179–181 emoticons, 179–181 Lingo, 181 Network, 35 Network etiquette. See Netiquette (Network etiquette) “Nigerian 419 scam”, 109 NoScripting, 108 NSA. See National Security Agency (NSA) O Offsite storage, 72 Online backups, 71–72 Online chat, 192–196 alias, 192–193 chat rooms, 193–194 IM, 193 online games, 195–196 Web cams, 194–195 Online communication, 208 Online dating, 196–198 apps, 197–198 sites, 197 traditional vs. extramarital, 196–197 Online games, 195–196 romance scams, 195 Online harassment, 185 sexual harassment, 187 Online predators, 223–225 Online reputation protection digital legacies, 176–177 Facebook memorial page, 177 finding yourself in Internet, 153–156 Google alerts, 155, 155f problems in searching, 156 restriction, 154–155 tools, 156 precaution to post personals, 167–168 oversharing, 168 privacy maintenance, 156–167 deleting and retrieving data, 163–167 privacy of search, 157–158 private browsing, 158–163 untag yourself, 158 real world and cyberspace, 168–174 security breach, 174–176 Online resumes, 144–146 clean up our digital presence, 145–146 online applications, 145 Online storage, 165–166 Online surveys, 7 P P2P method. See Peer-to-peer method (P2P method) Panda, 57234 Index Parental controls, 204–210, 205f deciding on age appropriate limitations, 210 filtering and blocking, 207–209, 208f location of computer, 210 time limits, 209–210 understanding kids activities, 205 in Windows, 206–209, 207f Passphrases, 37, 41 Password managers. See Password—vaults Passwords, 36, 41–50, 134. See also Encryption changing, 42 cracking, 42 tool, 104–105 generators, 46 Local Security Policy, 43f Password section, 123 policies, 42–44 remembering passwords, 45–46 setting security questions, 44–45 storing in Chrome, 49 in IE, 48–49 strong, 41–42 tools, 46–50 Google Smart Lock, 49–50 RoboForm, 47f vaults, 46–47 Pastebin sites, 101 Patches, 63–64, 68–69 Peer-to-peer method (P2P method), 67 Permanent cookies. See Persistent cookies Persistent cookies, 30 Personal identification numbers (PIN), 89 Pew Research Center, 135 Pharming process, 95 “Phish”, 94 Phishing process, 93–94 Photo tagging setting, 133 Physical security, 25–26 PIN. See Personal identification numbers (PIN) Plaintext, 12 Polymorphism, 54 Pop-ups, disabling and managing, 33–34 POP3 options, 82 Potentially unwanted programs (PUPs), 59 Precaution to post personals, 167–168 oversharing, 168 Pretexting method, 91–92 Privacy Checkup menu, 127 Privacy controls in LinkedIn, 148–150, 149f shortcuts, 126–127 in Twitter, 133–134 Privacy maintenance, 156–167 deleting and retrieving data, 163–167 data and account maintenance, 167 data existence, 165 online storage, 165–166 tools, 163–165 privacy of search, 157–158 private browsing, 158–163 untag yourself, 158 Privacy Rights Clearinghouse’s Chronology of Data Breaches, 156 Privacy settings and tools page, 125–128, 125f audiences in Facebook, 127f privacy shortcuts, 126–127 Private browsing, 158–163 automatically clearing private data, 161 clearing cache, 160–161 deleting history, 160–161 tools, 162–163 Tor browser, 161–162 VPN, 162 Private data clearance, 161 Private-key cryptography. See Symmetric cryptography Profiles review, 199 Protecting kids from technology, 201–202 cyberbullying, 221–223 prank calls, 222–223 location, 210–218 antitheft, 211–213 blacklists, 215–216 finding device, 213–214, 213f finding safely, 214 lost or stolen, 210–211 remote wiping, 216 report it stolen, 214–216 resale, 216–218, 217f online predators, 223–225 parental controls, 204–210, 205f deciding on age appropriate limitations, 210 filtering and blocking, 207–209, 208f location of computer, 210 time limits, 209–210 understanding kids activities, 205 in Windows, 206–209, 207f passwords for kids, 202–203 privacy, 225–226 search engines, 203–204 kid-orientated search engines, 203–204 talking about inappropriate factor, 218–221 conduct, 219–220 contact, 220–221 content, 220 setting expectations, 219–221Index 235 Protocol, 5 Public key cryptography. See Asymmetric cryptography Public places, computer use in, 18 PUPs. See Potentially unwanted programs (PUPs) Q Questionnaires, 7 R Ransomware, 55, 114 RAT. See Remote Access Trojan (RAT) Real world, 168–174 avoiding online records, 173–174 delivery, 172–173 Internet and non-Internet based factors, 169–172 Do Not Call registry, 171 online “support”, 171 preventing mail theft, 172 telephone and mail scams, 170 Real-time protection, 59 Realizing sites, 105–107 Reconnaissance, 99–100 Remote Access Trojan (RAT), 54–55, 194–195 Remote wiping, 216 Reporting abuse, 190–191 Restore point, 73–74 RoboForm, 47, 47f Robots (Bots), 55 Rogue antivirus, 61 Rootkits tools, 55, 104–105 Router, 35 firewalls on, 50–52 S SafeSearch filters section, 203 Scams, 109–115 advanced fee scams, 109 intimidation and extortion, 110 offers on Internet, 110–112 contests and sweepstakes, 111–112 free offers and downloads, 110–111 online charities, 112–113 tax scams, 113 Scareware, 55, 114 Script kiddies, 101 SD cards, 216–217 Search engines, 154, 157, 203–204 kid-orientated search engines, 203–204 Secure Sockets Layer (SSL), 14–15 Security breach, 174–176 mode, 37–38 in Twitter, 132–133 updates, 64 Security alerts settings, 84–85 Security and privacy page, 133–134 Security Settings page, 119–121, 120f, 123–125 Service packs, 63–64 Service set identifier (SSID), 37 passphrase, 38 Session cookies, 30 Shareware, 54 Shoulder surfing method, 103 Signature files, 60–61 SIM card, 216–217 SkyDrive, 166 Smart TVs and game systems, 21–22 SmartScreen Filter, 108 Social engineering, 91–96 baiting, 95–96 suspicious emails and SPAM, 94–95 technology and, 93–94 Social media, 117–118, 142, 183–184, 206 email, 76 securing, 118–121 monitoring activity, 119–121 social media site on Internet, 119 securing Facebook, 121–131 securing Twitter, 131–134 Social networking, 118 Social news, 118 Software problems and solutions antimalware, 62–63 antivirus, 56–57 disaster recovery, 69–74 malware, 53–56 natural disaster, 53 updates, 63–69 automatic updates, 64–68 mobile device updates, 68–69 other device updates, 69 types, 63–64 viruses, 53–56 Windows Defender, 57–62 SPAM, 76, 81, 83, 94–95, 174 Spambot, 94–95, 104 Spammer, 94–95, 98 Spear phishing, 94 Spybot, 62 Spyware, 55–56 SSID. See Service set identifier (SSID) SSL. See Secure Sockets Layer (SSL) Standard account, 23 Stored cookies. See Persistent cookies Strong passwords, 41–42236 Index Subdomains, 5–6 Suspicious emails, 94–95 Symantec, 57 Symmetric cryptography, 12 T Tailgating, 103 Tax scams, 113 Technological factors annoying and abusive people, 184–192 blocking people, 189–190 creeping, 186–187 cyberstalking, 187 lose anonymity, 190–191 online harassment, 185 preventative measures, 187–188 reporting abuse, 190–191 thinning herd, 188 trolls and flamers, 186 unfriend, unfollow, unjoin, 188–189 anonymity, 181–184 being wary of others and yourself, 182–183 falsehood, 183 flip side, 183–184 netiquette, 179–181 emoticons, 180 Lingo, 181 online chat, 192–196 alias, 192–193 chat rooms, 193–194 IM, 193 online games, 195–196 Web cams, 194–195 online dating, 196–198 apps, 197–198 sites, 197 traditional vs. extramarital, 196–197 online entity, 198 protection, 198–200 criminal background check, 199 image search, 199–200 reviewing profiles, 199 Teen’s phone, 210 Teens, 206, 220 Thinning herd, 188 Thunderbird, 77 securing, 77–79 Timeline and Tagging settings, 128–129, 128f Tor browser, 161–162 Tracking cookies, 7, 30–31, 55–56 protection, 32–33 Traditional dating sites, 196–197 Transport layer security, 14–15 TransUnion service, 91 Trojan. See Trojan Horse Trojan Horse, 56 Trolls, 186 Trusted Contacts section, 124–125 Twitter, 102, 121. See also Facebook; LinkedIn; YouTube securing, 131–134 passwords, 134 privacy, 133–134 security, 132–133 tweeter, 131 tweets, 131 Two-step verification, 84, 147–148 U Uniform Resource Locator (URL), 4–5, 145 parts, 6f reading URLs, 4–7 domain name, 5 faking sites with, 5–7 shortening services on, 6 Updates, 63–69 automatic updates, 64–68 mobile device updates, 68–69 other device updates, 69 types, 63–64 updating, 60–61 URL. See Uniform Resource Locator (URL) Username, 36 Username section, 122 V View As feature, 127 Virtual Private Network (VPN), 99, 162 Virus, 53–56 VPN. See Virtual Private Network (VPN) W Web browser security, 29–34 Chrome privacy settings, 31f cookies, 30–32 disabling and managing pop-ups, 33–34 “Microsoft shops”, 30 tracking protection, 32–33 Web cams, 194–195 Web Filter, 52 Web-based technology, 179 WEP. See Wired Encryption Protocol (WEP) Whaling process, 94 White hats, 96 Whitelist, 82Index 237 Whois sites, 99 Wi-Fi components to connecting internet, 35 configuring router, 36–38 changing administrator username/password, 36–37 changing default password on Linksys router, 36f security mode, 37–38 SSID, 37 SSID passphrase, 38 network, 12 using other people’s Wi-Fi, 38–39 security and safety, 34–41 sharing Wi-Fi with others, 39–41 setting guest network, 40–41 supporting older devices, 41 Wi-Fi Protected Access (WPA), 38 wifi. See Wi-Fi Windows accounts, 22–25 biometrics, 24–25 parental controls in, 206–209, 207f Windows 8 x and 10, 48–49 Windows 10, automatic updates in, 65–67 Windows Defender, 57–62, 58f Advanced section of Settings tab, 60 History tab, 58 Rogue antivirus, 61 scheduling regular scans, 61 settings, 59f updating, 60–61 Windows Hello feature, 24–25 Wired Encryption Protocol (WEP), 37 Wireless Security, 37–38 Work email, 76 Work-at-home scams, 146–147 Worms, 56 WPA. See Wi-Fi Protected Access (WPA) WPA2, 38 Y YouTube, 117. See also Facebook; LinkedIn; Twitter securing, 134–137 Creator Studio button, 135–137 Z Zombie (attacker), 104 Zombie army, 104
كلمة سر فك الضغط : books-world.net The Unzip Password : books-world.net أتمنى أن تستفيدوا من محتوى الموضوع وأن ينال إعجابكم رابط من موقع عالم الكتب لتنزيل كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy رابط مباشر لتنزيل كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy
|
|