How To Do Everything With Windows XP Home Networking- P4
Số trang: 50
Loại file: pdf
Dung lượng: 1.46 MB
Lượt xem: 7
Lượt tải: 0
Xem trước 5 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Tham khảo tài liệu how to do everything with windows xp home networking- p4, công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
Nội dung trích xuất từ tài liệu:
How To Do Everything With Windows XP Home Networking- P4 CHAPTER 5: Keep Your Internet Connections Secure 129 Network Antivirus When the number of protected systems rises above 10, many organizations opt for network antivirus applications. These applications differ from the desktop versions in that there is usually a server program that maintains settings and updates for all the units. These settings and updates are downloaded into each system over the network. Antivirus Services Some e-mail services offer antivirus scanning as a feature of their service. Web mail providers such as Hotmail and Yahoo! scan user’s e-mail for viruses and spam, helping ensure their users get clean e-mail. 5 Use Antispyware Applications to Terminate Spyware Privacy gurus have made much of the spyware revolution in recent months. There is now an arms race of sorts going on between “online marketers” and privacy advocates. Software, bordering on malicious, has been spread around the Internet, and software to protect your systems has sprung up to meet it. What Spyware Does to Your Computer These programs range from simple tracking files called cookies to virus-like applications that spread copies of themselves to other computers and take control of your system, directing you to web sites you never intended. Some even partner with viruses and worms to further propagate themselves. Many sites use cookies to keep track of your preferences for formats and colors or your name and address data. Blocking all cookies might result in the site not being usable, or at the least hamper its ability to retain your preferences. You will most likely need to find a balance between privacy and usability. Determine Your Spyware Risk Level If you regularly browse mainstream sites like those of the major news outlets and periodicals, you will probably not be exposed to more than third-party cookies designed to record your clickstream. A clickstream is the path you take as you surf the web. Third-party cookies can keep track of your path through a web site and record where you went as you left. If the same marketer has a deal with the next site, they see you arrive and can track your patterns.Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 130 How to Do Everything with Windows XP Home Networking If you go to the more out-of-the-way places, however, you run the risk of more insidious contacts. Some spyware authors use advanced hacking techniques to implant spybots in your system that take control of your browsing (Browser “Helper” Objects) and send you where they want or capture your keystrokes and passwords. A Browser Helper Object (BHO) is an application embedded into the Internet Explorer environment that “helps” you use Internet Explorer. These can actually be helpful (Spybot Search & Destroy installs a protective BHO to block spyware), or they can be malicious. Many malicious BHOs will watch your keystrokes and open additional windows to search sites with your keywords already entered. The result is an annoyance to you and a few pennies to the BHO author who gets paid per click by the site they just sent you to. Select an Antispyware Application Antispyware comes in several flavors. Some applications include all the features we will discuss; some specialize in only one or two. Pop-Up Blockers Pop-up blockers block the pop-up and pop-under ads you see when you enter web sites. The extra windows these sites open simply never appear when the blocker is running. Some tools that do this are the free Google toolbar; later versions of the Mozilla, Firefox, and Opera browsers; and Internet Explorer (with Windows XP Service Pack 2). Ill 5-13 Cookie Management Most antispyware applications will allow you to block or manage cookies. This can range from blocking third-party cookies to blocking or ...
Nội dung trích xuất từ tài liệu:
How To Do Everything With Windows XP Home Networking- P4 CHAPTER 5: Keep Your Internet Connections Secure 129 Network Antivirus When the number of protected systems rises above 10, many organizations opt for network antivirus applications. These applications differ from the desktop versions in that there is usually a server program that maintains settings and updates for all the units. These settings and updates are downloaded into each system over the network. Antivirus Services Some e-mail services offer antivirus scanning as a feature of their service. Web mail providers such as Hotmail and Yahoo! scan user’s e-mail for viruses and spam, helping ensure their users get clean e-mail. 5 Use Antispyware Applications to Terminate Spyware Privacy gurus have made much of the spyware revolution in recent months. There is now an arms race of sorts going on between “online marketers” and privacy advocates. Software, bordering on malicious, has been spread around the Internet, and software to protect your systems has sprung up to meet it. What Spyware Does to Your Computer These programs range from simple tracking files called cookies to virus-like applications that spread copies of themselves to other computers and take control of your system, directing you to web sites you never intended. Some even partner with viruses and worms to further propagate themselves. Many sites use cookies to keep track of your preferences for formats and colors or your name and address data. Blocking all cookies might result in the site not being usable, or at the least hamper its ability to retain your preferences. You will most likely need to find a balance between privacy and usability. Determine Your Spyware Risk Level If you regularly browse mainstream sites like those of the major news outlets and periodicals, you will probably not be exposed to more than third-party cookies designed to record your clickstream. A clickstream is the path you take as you surf the web. Third-party cookies can keep track of your path through a web site and record where you went as you left. If the same marketer has a deal with the next site, they see you arrive and can track your patterns.Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 130 How to Do Everything with Windows XP Home Networking If you go to the more out-of-the-way places, however, you run the risk of more insidious contacts. Some spyware authors use advanced hacking techniques to implant spybots in your system that take control of your browsing (Browser “Helper” Objects) and send you where they want or capture your keystrokes and passwords. A Browser Helper Object (BHO) is an application embedded into the Internet Explorer environment that “helps” you use Internet Explorer. These can actually be helpful (Spybot Search & Destroy installs a protective BHO to block spyware), or they can be malicious. Many malicious BHOs will watch your keystrokes and open additional windows to search sites with your keywords already entered. The result is an annoyance to you and a few pennies to the BHO author who gets paid per click by the site they just sent you to. Select an Antispyware Application Antispyware comes in several flavors. Some applications include all the features we will discuss; some specialize in only one or two. Pop-Up Blockers Pop-up blockers block the pop-up and pop-under ads you see when you enter web sites. The extra windows these sites open simply never appear when the blocker is running. Some tools that do this are the free Google toolbar; later versions of the Mozilla, Firefox, and Opera browsers; and Internet Explorer (with Windows XP Service Pack 2). Ill 5-13 Cookie Management Most antispyware applications will allow you to block or manage cookies. This can range from blocking third-party cookies to blocking or ...
Tìm kiếm theo từ khóa liên quan:
thủ thuật máy tính công nghệ thông tin tin học quản trị mạng computer networkGợi ý tài liệu liên quan:
-
52 trang 430 1 0
-
24 trang 354 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 313 0 0 -
Làm việc với Read Only Domain Controllers
20 trang 301 0 0 -
74 trang 296 0 0
-
96 trang 291 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 289 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 279 0 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 275 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 269 1 0