文档介绍:Safe & Secure puting
By D Norris
1 Introduction
2 Background
3 Where you stand: The Security Perspective
4 Just who is this invisible enemy?
5 How do outsiders gain access to puter? (Or, could it be you?)
6 Viruses, Worms & Trojan Horses
7 How can I get a virus?
8 Web Browser Security
9 Why can intruders break into puter?
10 Packet Sniffing
11 Port Scanning
12 work Vulnerability
13 Some General Security Tips for Each Operating System
14 Use of a Firewall
15 ‘Spyware’
16 puting Security (Windows CE 3 and higher)
17 Content Filtering
18 Frequently Asked Questions about Safe Use
19 Backing up the Windows Registry
20 Prepare for the Worst – Risk Management
21 Probe types for a particular port number – what the hacker’s looking for…
puting Security Glossary
NetworkActiv Sniffer ()
Safe & Secure puting Version , December 20, 2002
DISCLAIMER
The information in this document is intended to provide a reasonably in-depth breakdown of the
security issues and implications of connecting to the , hereafter taken to refer to the global data
network, which is otherwise known as the ‘world wide web’. It is intended to explain these issues with
the minimum possible amount of technical jargon; although due to the nature of the subject itself, this
has sometimes proved difficult. It is intended for the ‘novice’ home user through to the ‘moderately
well informed’ home or ‘small office’ user. (Home and small business users are the intended readers.)
Although I have taken reasonable measures to ensure that the information presented (including
remedies for any security related problems involving the reader) is as accurate and up to date as
possible, I assume no liability for any loss or damage caused through following the advice provided
within – or otherwise through any failure to follow it, including miss-implementation of suggested
remedies. For further information, or if you have any issues regardin