Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
✍ Scribed by Carey Parker
- Publisher
- Apress
- Year
- 2023
- Tongue
- English
- Leaves
- 390
- Edition
- 5
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible.
Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world.
Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes:
- Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13.
- Updated recommendations for most secure and private products.
- Over 200 tips with complete step-by-step instructions and screenshots.
What You Will Learn
- Maximize your computer and smartphone security.
- Minimize your vulnerabilities and data footprint.
- Solve your password problems and use two-factor authentication.
- Browse the web safely and confidently with a secure, private browser.
- Shop and bank online with maximum security and peace of mind.
- Defend against identity theft, ransomware and online scams.
- Safeguard your children online, at home and in school.
- Block online tracking, data mining and malicious online ads.
- Send files and messages with end-to-end encryption.
- Secure your home network and keep your smart devices from spying on you.
- Create automated backups of all your devices.
- Learn how to deal with account hacks, data. breaches and viruses.
- Understand how computers, the internet, VPNs and encryption really work
- And much more!
✦ Table of Contents
Table of Contents
About the Author
About the Technical Reviewer
Preface
Chapter 1: Here Be Dragons
I Dub Thee…
An Ounce of Prevention
How Worried Should I Be?
What Should I Be Worried About?
Indirect Threats
A Few Final Thoughts Before We Begin
How to Use This Book
Reader Prerequisites
Operating Systems Covered
Navigating the Checklists
Tip 1-1. Simple Tip
Tip 1-2. ★ Tip with Stars
Tip 1-3. Tip with Variations
Tip 1-3a. Windows
Tip 1-3b. Windows 10
Tip 1-3c. macOS
Tip 1-3d. macOS Monterey
Objects in the Book May Seem Larger Than They Appear
Always Go to the Source
Updates and Bonus Content
Other Resources
Feedback Welcome
Summary
Going Further
Checklist
Tip 1-1. Take Good Notes
Tip 1-2. Determine Your Computer Type and Version
Tip 1-2a. Windows
Tip 1-2b. macOS
Tip 1-3. Determine Your Mobile Device Type and Version
Tip 1-3a. Apple iOS
Tip 1-3b. Android
Chapter 2: Privacy Matters
Privacy vs. Security
Why Privacy Matters for You
Why Privacy Matters for All of Us
Enter the Panopticon
Selling Privacy by the Pound
Ever Feel Like You’re Being Watched?
Solving the Privacy Problem
Who Can You Trust?
Step Away from the Ledge
Summary
Going Further
Checklist
Tip 2-1. Know What They Know
Tip 2-2. See What Your IP Address Reveals
Tip 2-3. Opt Out Where You Can
Tip 2-4. Investigate Your Own Public Information
Tip 2-5. Get Your Stories Straight
Tip 2-6. Operate on a Need-to-Know Basis
Chapter 3: Castle Guard Certification
Castle Guard in Training
Computer Lingo
Hardware and Software
File Manager
Bits and Bytes
Storage
Networks (Wired and Wireless)
Bandwidth
Bluetooth
Computer and Internet Buzzwords
Clients and Servers
The Cloud
Net Neutrality
The Internet of Things (IoT)
Know Your Enemy
Zero-Day Exploit
Malware
Hardware Bugs
Cryptic Codes and Confidential Communications
How the Internet Works
How Encryption Works
Encryption
Cryptanalysis
Modern Cryptography
Authentication and Message Integrity
Cryptographic Hashing
Message Integrity
Asymmetric Locks
Putting It All Together
Newer Isn’t Always Better
Quantum Computing
Graduation Ceremony
Summary
Going Further
Checklist
Tip 3-1. ⭑ Don’t Click Links, If Possible
Tip 3-2. Watch Out for Shortened URLs
Tip 3-3. ⭑ Don’t Open Email Attachments, If Possible
Chapter 4: Get Your Castle in Order
Backups
External Hard Drive Method
Cloud Backup Method
Cloud Drive Method
Choosing Your Best Backup Solution
Keeping the Lights On
Minimization: Less Is More
Spring Cleaning
Data Minimization
Update All the Things
Major Software Updates
Minor Software Updates
Summary
Going Further
Checklist
Tip 4-1. How to Change Computer Settings
Tip 4-1a. Microsoft Windows 11
Tip 4-1b. Microsoft Windows 10
Tip 4-1c. macOS Ventura
Tip 4-1d. macOS Monterey
Tip 4-2. ★ Back Up to an External Drive
Buy an External Hard Drive
Connect the Drive to Your Computer
Disconnecting the Backup Drive
Configure Your Backup
Tip 4-2a. Windows 11
Tip 4-2b. Windows 10
Tip 4-2c. macOS Ventura
Tip 4-2d. macOS Monterey
Tip 4-3. ★ Back Up to the Cloud
Tip 4-3a. Windows
Tip 4-3b. macOS Ventura
Tip 4-3c. macOS Monterey
Tip 4-4. Buy a UPS
Tip 4-5. ★ Clean Up Your Apps
Tip 4-5a. Windows
Tip 4-5b. macOS
Tip 4-6. ★ Turn on Auto-Update for Your OS
Tip 4-6a. Windows
Tip 4-6b. macOS Ventura
Tip 4-6c macOS Monterey
Tip 4-7. ★ Turn on Auto-Update for Your Applications
Tip 4-7a. Windows
Tip 4-7b. macOS
Tip 4-8. Download Software Safely
Tip 4-9. Scan Your Paper Documents
Tip 4-10. Shred Your Paper Documents
Chapter 5: Who Goes There?
How Did We Get Here?
May I See Some ID?
Something You Are
Something You Have
Passwordless
Understanding Password Strength
How to Crack a Password
Doing the Password Math
Using a Password Manager
Choosing a Master Password
Using a Passphrase
Doing the Two-Step
Periodically Changing Passwords
A Rose by Any Other Name
Summary
Checklist
Tip 5-1. ★ Choose a Strong Master Password
Tip 5-2. ★ Sign Up for Bitwarden
Tip 5-3. ★ Install the Bitwarden Browser Plugin
Tip 5-4. ★ Transfer Existing Passwords to Bitwarden
Tip 5-5. ★ Enable Two-Factor Authentication
Tip 5-6. Take a Tour of Bitwarden
Tip 5-7. ★ Install the Bitwarden App on Your Smartphone
Tip 5-8. Use Bitwarden to Fill in Passwords
Tip 5-9. Disable Password Saving on Your Browser
Edge:
Safari:
Chrome:
Firefox:
Tip 5-10. Delete Saved Passwords from Your Browser
Edge:
Safari:
Chrome:
Firefox:
Tip 5-11. Store Credit Cards in Bitwarden
Tip 5-12. Store Personal Info in Bitwarden
Tip 5-13. Run a Vault Health Report
Tip 5-14. ★ Generate Strong Passwords for Key Accounts
Tip 5-15. Generate and Store Offline Passwords
Tip 5-16. Peppering Your Passwords
Tip 5-17. Guard Your True Identity
Chapter 6: Raise the Drawbridge!
Macs Are Safer Than PCs
Non-admin Accounts
iCloud and Microsoft Accounts
Built-in Security Features
The Pros and Cons of Antivirus Software
Sticky Bits
Summary
Checklist
Tip 6-1. Upgrade Your Computer
Tip 6-2. ⭑ Require Passwords for Computer Accounts
Tip 6-2a. Microsoft Windows
Tip 6-2b. macOS Ventura
Tip 6-2c. macOS Monterey
Tip 6-3. ⭑ Create a Separate Admin Account
Tip 6-3a. Microsoft Windows 11
Tip 6-3b. Microsoft Windows 10
Tip 6-3c. macOS Ventura
Tip 6-3d. macOS Monterey
Tip 6-4. Install Free Antivirus Software
Tip 6-4a. Windows
Tip 6-4b. macOS
Tip 6-5. Restrict Access to Important Files
Tip 6-5a. Windows
Tip 6-5b. macOS Ventura
Tip 6-5c. macOS Monterey
Tip 6-6. Disable Unneeded Startup Software
Tip 6-6a. Windows
Tip 6-6b. macOS Ventura
Tip 6-6c. macOS Monterey
Tip 6-7. Don’t Install Apps That Come with Peripherals
Tip 6-8. ⭑ Turn on Disk Encryption
Tip 6-8a. Windows
Tip 6-8b. macOS Ventura
Tip 6-8c. macOS Monterey
Tip 6-9. Securely Erase Sensitive Files
Tip 6-9a. Windows
Tip 6-9b. macOS
Tip 6-10. ⭑ Prepare a Computer for Sale, Donation, or Recycle
Tip 6-10a. Windows
Tip 6-10b. macOS
Tip 6-11. Prepare Printers for Sale, Donation, or Recycle
Tip 6-12. Enable Laptop Location Tracking
Tip 6-12a. Windows
Tip 6-12b. macOS Ventura
Tip 6-12c. macOS Monterey
Tip 6-13. Use Lockdown Mode (macOS Only)
Tip 6-14. Don’t Trust Other Computers
Tip 6-15. Avoid Strange USB Devices and Ports
Tip 6-16. Restart Your Computer Periodically
Tip 6-17. Don’t Use Adobe Reader to Read PDF Files
Tip 6-18. Unplug or Cover Webcams When Not in Use
Tip 6-19. Beware Cold Calls for Computer Support
Chapter 7: Guard the Castle Gate
Network Overview
Modem
Wi-Fi Router
Network Address Translation (NAT)
Firewall
Wireless Connections and Quality of Service
Keep Your Gatekeeper on Your Payroll
The Internet of Things
IoT Security (or Lack Thereof)
IoT Privacy (or Lack Thereof)
A Note About Virtual Assistants
Virtual Private Network (VPN)
What a VPN Is
What a VPN Isn’t
When Should I Use a VPN?
Summary
Going Further
Checklist
Tip 7-1. Get Your Own Modem
Tip 7-2. Get Your Own Wi-Fi Router
Tip 7-3. ★ Change Your Default Router Password
Tip 7-4. ★ Update Your Router’s Firmware
Tip 7-5. ★ Lock Down Your Wi-Fi
Tip 7-6. Use the Guest Network
Tip 7-7. Create a QR Code for Easy Guest Network Access
Tip 7-8. Put Internet of Things Devices on the Guest Net
Tip 7-9. Disable External Admin
Tip 7-10. Disable WPS
Tip 7-11. Disable Universal Plug and Play (UPnP)
Tip 7-12. Probe Your Router for Vulnerabilities
Tip 7-13. Disable IPv6
Tip 7-14. Change Your Default SSID
Tip 7-15. Register Your Devices
Tip 7-16. Periodically Reboot Modem, Router
Tip 7-17. Disable Network Sharing Features
Tip 7-18. Change Virtual Assistant Privacy Settings
Tip 7-19. Use a VPN
Tip 7-20. Avoid Public Wi-Fi and Use Cellular Data
Tip 7-21. Disable Auto-Connect to Wi-Fi
Tip 7-22. Dumb Down Your Smart TV
Glossary
Index
📜 SIMILAR VOLUMES
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably do
<span>Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect your
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You pro
<div><p>Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now?