PC Magazine Fighting Spyware, Viruses, and Malware

PC Magazine Fighting Spyware, Viruses, and Malware

3 (2 ratings by Goodreads)
By (author) 

List price: US$29.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Think there's no malicious software on your computer? "PC Magazine" thinks you should think again. Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer - like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC - along with your wallet.Here's how you can: learn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PC; get the tools that can cure an infection; dig into the Windows Registry to remove the nastiest of bugs; prevent a recurrence with personal firewalls and protective software; deal with the onslaught of spam; keep your defenses up-to-date; and, give it the boot. If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ...since the last time you booted up your computer ...try this. While Windows is first booting up, hit the F8 key ...Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted - that is, before you got infected - From Chapter 4.
show more

Product details

  • Paperback | 382 pages
  • 188 x 230 x 24mm | 580.61g
  • Hungry Minds Inc,U.S.
  • Foster City, United States
  • English
  • 0764577697
  • 9780764577697

Back cover copy

Think there's no malicious software on your computer? PC Magazine thinks you should think again.Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer--like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC--along with your wallet.Here's how you canLearn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PCGet the tools that can cure an infectionDig into the Windows Registry to remove the nastiest of bugsPrevent a recurrence with personal firewalls and protective softwareDeal with the onslaught of spamKeep your defenses up-to-dateGive it the bootIf you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted--that is, before you got infected.
-- From Chapter 4
show more

Table of contents

Preface.Acknowledgments.Part I: Welcome to the Jungle!Chapter 1: Unwelcome Intruders Seeking Entry.Chapter 2: Understanding Malware.Part II: How Good PCs Go Bad.Chapter 3: Methods of Insertion and Delivery.Chapter 4: Detecting and Repairing PC Infestations.Part III: The Particles of Protection.Chapter 5: Personal Firewalls.Chapter 6: Pop-Up Blockers.Chapter 7: Anti-Spyware and Anti-Adware Programs.Chapter 8: Anti-Virus Programs.Chapter 9: Spam Blockers.Part IV: Commonsense Rules for Safe Computing.Chapter 10: Practicing E-mail Safety.Chapter 11: Practicing Web Safety.Chapter 12: Practicing System Safety.Part V: The Habit of Security.Chapter 13: Safety Is a Matter of Routine.Chapter 14: Safety Requires Constant Vigilance.Appendix A: The Security Suite Life.Appendix B: References.Glossary.Index.
show more

About Ed Tittel

Ed Tittel has been writing, researching, and teaching about Windows security topics since 1996. An inveterate tinkerer cursed with incurable curiosity, he's become a connoisseur of protection tools and techniques to battle spyware, adware, and malware.
show more

Rating details

2 ratings
3 out of 5 stars
5 0% (0)
4 50% (1)
3 0% (0)
2 50% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X