Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You pro
Firewalls don't stop dragons: a step-by-step guide to computer security for non-techies
✍ Scribed by Parker, Carey
- Publisher
- Apress
- Year
- 2018
- Tongue
- English
- Leaves
- 411
- Edition
- Third edition
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself--step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats.
Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data--just like wearing a seat belt, installing smoke alarms, and putting on sunscreen.
Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes:
Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra
Expanded coverage on mobile device safety
Expanded coverage on safety for kids online
More than 150 tips with complete step-by-step instructions and pictures
What You'll Learn
Solve your password problems once and for all
Browse the web safely and with confidence
Block online tracking and dangerous ads
Choose the right antivirus software for you
Send files and messages securely
Set up secure home networking
Conduct secure shopping and banking online
Lock down social media accounts
Create automated backups of all your devices
Manage your home computers
Use your smartphone and tablet safely
Safeguard your kids online
And more!
Who This Book Is For
Those who use computers and mobile devices, but don't really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves--step by step, without judgment, and with as little jargon as possible.
✦ Table of Contents
Table of Contents......Page 5
About the Author......Page 15
About the Technical Reviewer......Page 16
Preface......Page 17
“How Worried Should I Be?”......Page 20
Threat Analysis......Page 21
Indirect Threats......Page 24
Privacy vs. Security......Page 25
How to Use This Book......Page 26
Reader Prerequisites......Page 27
Navigating the Checklists......Page 28
Tip 1-3a. Microsoft Windows 7......Page 29
Tip 1-3c. Mac OS......Page 30
Web Addresses and Staying Up-to-Date......Page 31
Always Go to the Source......Page 32
Not So Fast......Page 33
I Dub Thee…......Page 35
Prevention, Detection, and Recovery......Page 38
Computer Lingo......Page 41
Hardware and Software......Page 42
Bits and Bytes......Page 43
Storage......Page 44
Networks (Wired and Wireless)......Page 45
Bandwidth......Page 46
Bluetooth......Page 47
Net Neutrality......Page 48
The Internet of Things......Page 49
Malware......Page 50
Hardware Bugs......Page 54
Exploit......Page 55
How the Internet Works......Page 56
Encryption and Cryptanalysis......Page 59
Modern Cryptography......Page 66
Authentication and Message Integrity......Page 69
Triple-A......Page 74
Newer Isn’t Always Better......Page 75
Privacy and Tracking......Page 76
Who Can You Trust?......Page 80
Summary......Page 82
Tip 2-1. Know Thyself......Page 83
Tip 2-2. Know What They Know......Page 84
Backups......Page 86
Spring Cleaning......Page 90
Update Everything......Page 91
Summary......Page 92
Microsoft Windows 7......Page 93
Microsoft Windows 8.1......Page 94
Microsoft Windows 10......Page 95
Mac OS......Page 96
Buy an External Hard Drive......Page 97
Connect the Drive to Your Computer......Page 98
Tip 3-1a. Microsoft Windows 7......Page 99
Tip 3-1b. Microsoft Windows 8.1......Page 103
Tip 3-1c. Microsoft Windows 10......Page 105
Tip 3-1d. Mac OS......Page 106
Tip 3-2. Back Up to the Cloud......Page 108
Tip 3-4. Clean Up Your Apps......Page 111
Tip 3-4a. Microsoft Windows 7......Page 112
Tip 3-4b. Microsoft Windows 8.1......Page 113
Tip 3-4c. Microsoft Windows 10......Page 115
Tip 3-4d. Mac OS......Page 116
Update Everything......Page 117
Tip 3-5a. Microsoft Windows 7......Page 118
Tip 3-5b. Microsoft Windows 8.1......Page 120
Tip 3-5c. Microsoft Windows 10......Page 121
Tip 3-5d. Mac OS......Page 123
Tip 3-6. Update Adobe Flash (If You Really Need It)......Page 124
Tip 3-7. Update Java (If You Really Need It)......Page 127
How Did We Get Here?......Page 129
Understanding Password Strength......Page 131
Managing Your Passwords......Page 137
Choosing a Master Password......Page 140
Doing the Two-Step......Page 141
Periodically Changing Passwords......Page 143
Summary......Page 144
Checklist......Page 146
Tip 4-2. Install LastPass on Your Computer......Page 147
Tip 4-3. Install the LastPass App on Your Smartphone......Page 148
Tip 4-4. Enable Two-Factor Authentication......Page 149
Tip 4-5. Disallow LastPass Login from Foreign Countries......Page 151
Tip 4-7. Disable Password Saving on Your Browser......Page 152
Tip 4-8. Perform a Security Check in LastPass......Page 154
Tip 4-9. Generate Strong Passwords for Key Accounts......Page 155
Tip 4-10. Use LastPass to Store Secure Notes......Page 158
Tip 4-11. Generate and Store Offline Passwords......Page 160
Tip 4-12. Use Throwaway Accounts......Page 162
Macs Are Safer Than PCs......Page 163
Nonadmin Accounts......Page 164
iCloud and Microsoft Accounts......Page 166
Built-in Security Features......Page 168
The Pros and Cons of Antivirus Software......Page 171
How to Properly Delete a File......Page 172
Summary......Page 173
Checklist......Page 174
Tip 5-2. Require Passwords for Computer Accounts......Page 175
Tip 5-2a. Microsoft Windows 7......Page 176
Tip 5-2b. Microsoft Windows 8.1......Page 180
Tip 5-2c. Microsoft Windows 10......Page 185
Tip 5-2d. Mac OS......Page 189
Tip 5-3. Create a Separate Admin Account......Page 190
Tip 5-3a. Microsoft Windows 7......Page 191
Tip 5-3b. Microsoft Windows 8.1......Page 195
Tip 5-3c. Microsoft Windows 10......Page 199
Tip 5-3d. Mac OS......Page 205
Tip 5-4. Install Free Antivirus Software......Page 209
Tip 5-4a. Microsoft Windows 7......Page 210
Tip 5-4b. Microsoft Windows 8.1......Page 212
Tip 5-4c. Microsoft Windows 10......Page 214
Tip 5-4d. Mac OS......Page 216
Tip 5-5. Enable Controlled Folder Access (Windows 10 Only)......Page 217
Tip 5-6a. Mac OS......Page 219
Tip 5-7. Encrypt Your Backups (Mac OS Only)......Page 222
Tip 5-8. Securely Erase Sensitive Files......Page 224
Tip 5-8b. Mac OS......Page 225
Tip 5-9a. Microsoft Windows......Page 226
Tip 5-9b. Mac OS......Page 227
Tip 5-10. Buy a Paper Shredder......Page 228
Tip 5-11. Set Up Find My Mac (Mac OS Only)......Page 229
Tip 5-12. Don’t Trust Other Computers......Page 230
Tip 5-13. Avoid Foreign/Unknown USB Devices......Page 231
Tip 5-15. Unplug or Cover Webcams When Not in Use......Page 233
Tip 5-16. Beware Cold Calls for Computer Support......Page 234
Network Overview......Page 235
Modem......Page 238
Wi-Fi Router......Page 239
The Internet of Things......Page 241
Virtual Private Network......Page 242
Summary......Page 244
Checklist......Page 245
Tip 6-2. Get Your Own Router......Page 247
Tip 6-5. Set a Strong Password for Your Router Admin Page......Page 248
Tip 6-9. Enable and Use the Guest Network......Page 249
Tip 6-11. Register Your Devices......Page 250
Tip 6-14. Turn Off Your ISP’s Wi-Fi......Page 251
Tip 6-16. Use a VPN......Page 252
Chapter 7: Practice Safe Surfing......Page 254
The Webs We Weave......Page 259
Enter the Panopticon......Page 264
On the Ethics of Ad Blocking......Page 266
Information Leakage......Page 268
Most Secure Browser......Page 270
Beyond the Big Four......Page 271
Summary......Page 272
Tip 7-1. Install Firefox and Chrome......Page 273
Tip 7-2a. Firefox......Page 274
Tip 7-2b. Chrome......Page 278
Tip 7-3. Remove (or Disable) All Unnecessary Add-ons......Page 280
Tip 7-3a. Firefox......Page 281
Tip 7-3b. Chrome......Page 282
Tip 7-4. Change the Default Search Option to DuckDuckGo......Page 283
Tip 7-5a. Firefox......Page 284
Tip 7-5b. Chrome......Page 285
Tip 7-7. Beware of Pop-ups Offering/Requiring Plugins......Page 286
Tip 7-9. Use Private or Incognito Browsing......Page 287
Tip 7-9b. Chrome......Page 288
Tip 7-11. Change Your DNS Provider on Your Laptop......Page 289
Tip 7-11a. Windows 7/8.1......Page 290
Tip 7-11b. Windows 10......Page 291
Tip 7-11c. Mac OS......Page 295
E-mail......Page 298
Text Messaging......Page 300
Spam and Spoofed Messages......Page 301
“So How Do I Communicate Securely?”......Page 304
Summary......Page 306
Tip 8-2. Use an Encrypted E-mail Service......Page 307
Tip 8-3. Send Sensitive Info Securely......Page 308
Tip 8-3a. Windows......Page 309
Tip 8-3b. Mac OS......Page 311
Tip 8-4. Send Files Securely Using the Web......Page 312
Tip 8-5. Read Your E-mail Using the Web......Page 314
Tip 8-6. Don’t Abandon Unused E-mail Accounts......Page 315
Tip 8-8. Don’t Forward Something Without Verifying It First......Page 316
Tip 8-10. Don’t Open E-mail Attachments, If Possible......Page 317
Tip 8-13. Use Secure Messaging Apps......Page 318
Banking and Shopping Online......Page 319
Credit Bureaus and Identity Theft......Page 321
Cloud Storage Services......Page 322
Social Media......Page 323
Summary......Page 325
Tip 9-1. Lock Down Your Apple/Microsoft Accounts......Page 326
Tip 9-1a. Microsoft Windows 7/8.1......Page 327
Tip 9-1b. Microsoft Windows 10......Page 328
Tip 9-1c. Mac OS......Page 329
Tip 9-2. Use Throwaway E-mail Accounts......Page 332
Tip 9-5. Give Your Credit Card Company a Heads-Up......Page 334
Tip 9-8. Freeze Your Credit......Page 335
Tip 9-9. Use Secure Cloud Services......Page 336
Tip 9-12. Don’t Divulge Too Much Personal Info Online......Page 337
Tip 9-14. Account Recovery Questions: Lie......Page 338
Tip 9-17. Enable Two-Factor Auth Wherever You Can......Page 339
Tip 9-19. Know What They Know......Page 340
Tip 9-20. Lock Down Your Social Media Accounts......Page 341
Tip 9-21. Close Accounts You Don’t Use......Page 342
The Internet Is Everywhere......Page 343
The Grandmother Rule......Page 344
Adult Content......Page 345
Summary......Page 346
Tip 10-2. Use Parental Controls for Young Children......Page 347
Tip 10-2a. Microsoft Windows 7......Page 348
Tip 10-2b. Microsoft Windows 8.1......Page 349
Tip 10-2d. Mac OS......Page 353
Tip 10-6. Honor the Age Restrictions......Page 356
Tip 10-10. Keep Computers in a Common Area of the House......Page 357
Tip 10-13. Create a Contract for Your Kids......Page 358
Tip 10-14. Parental Resources......Page 359
iOS Is More Secure Than Android......Page 360
iOS Is More Private Than Android......Page 361
Wireless Madness......Page 362
To Hack or Not to Hack......Page 363
Privacy Matters......Page 364
Summary......Page 366
Tip 11-1a. iOS......Page 367
Tip 11-2b. Android......Page 368
Tip 11-5. Dial Down What Your Apps Can Access......Page 369
Tip 11-6a. iOS......Page 370
Tip 11-8. Enable (Self) Tracking......Page 371
Tip 11-10. Use the LastPass Browser, Too......Page 372
Tip 11-13. Install (and Use) a Mobile VPN......Page 373
Tip 11-16. Disable Bluetooth and NFC When You Can......Page 374
Tip 11-17a. iOS......Page 375
Tip 11-16b. Android......Page 376
Tip 12-1. E-mail Account Is Hacked......Page 377
Tip 12-2. Web Site Password Breach......Page 378
Tip 12-3. You Suspect You Have a Virus......Page 379
Tip 12-5. Restoring a Lost or Messed-Up File......Page 380
Tip 12-7. Add a Backup to Your Safety Deposit Box......Page 381
Tip 12-10. Appoint a “Digital Executor”......Page 382
Tip 12-11. Install NoScript......Page 383
Tip 12-13. Add a Dedicated Guest Wi-Fi Router......Page 384
Tip 12-16. Install Custom Wi-Fi Router Software......Page 385
Tip 12-19. Need to Blow the Whistle? Use SecureDrop......Page 386
Tip 12-21. Use a Dedicated Secure Computer......Page 387
Tip 12-23. Completely and Securely Erase a Hard Drive......Page 388
Keep Calm and Carry On......Page 389
The Case for Optimism......Page 390
Don’t Take This Lying Down......Page 391
Going Further......Page 392
Documentaries......Page 393
Podcasts......Page 394
Fighting the Good Fight......Page 395
Glossary......Page 396
Index......Page 398
✦ Subjects
Nonfiction
📜 SIMILAR VOLUMES
<div><p>Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now?
Насколько защищен ваш компьютер прямо сейчас? Я думаю, что вы, наверное, на самом деле не знаете. Компьютеры и Интернет совершили революцию в современном мире, но если вы похожи на большинство людей, то вы понятия не имеете, как это работает и какие несет реальные угрозы.<br>Just how secure is your
<span>Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect your
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably do