相關主題
商品描述
You shouldn't.
Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.
What is a desktop witness?
Your computer stores a record of every
document you create, every e-mail you write or receive, which sites you visit on
the Internet, even attachments which you don't open.
An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may 'let in' outsiders through your IR port. It 'whispers' behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.
What can you do?
This straight-talking guide, with its easy-to-follow
instructions will enable you to regain control and protect your personal
information. It will show you the virtues of computer-anonymity, by making you
aware of what might motivate people to access your computer in the first place,
and it will help you free-up valuable memory by showing you how to really delete
the files your computer stores without your knowledge.
A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.
Table of Contents
Preface
Acknowledgment
The Need is Very Real: Author's Perspective
So You Want to Encrypt: Don't Hurt Your Own Interests by Doing So
Protect What and From Whom? The Answer Determines What You Should and Should Not Do
Effective Protection for Computers Not Connected to Networks
Effective Protection for Computers Connected to the Internet or other Networks
Encrypted Telephony
Legal Issues
In Conclusion
Appendices
Glossary
Index