The basics of digital privacy simple tools to protect your personal information and your identity online

Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your...

Full description

Bibliographic Details
Main Author: Cherry, Denny
Other Authors: LaRock, Thomas
Format: eBook
Language:English
Published: Waltham, Massachusetts Syngress 2014
Series:The basics
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 05470nmm a2200613 u 4500
001 EB001948164
003 EBX01000000000000001111066
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1306156882 
020 |a 9781306156882 
020 |a 9780128001523 
020 |a 0128001526 
020 |a 0128000112 
050 4 |a QA76.9.A25 
100 1 |a Cherry, Denny 
245 0 0 |a The basics of digital privacy  |b simple tools to protect your personal information and your identity online  |c Denny Cherry ; technical editor, Thomas LaRock 
260 |a Waltham, Massachusetts  |b Syngress  |c 2014 
300 |a 1 online resource  |b color illustrations 
505 0 |a Internet games and downloadsApplication stores; Windows antivirus software; Apple computers need antivirus software; Cell phones and tablets; Summary; Chapter 5: Posting Information Online; Kinds of information that shouldnt be posted online; How to protect information that is posted online; Twitter; Facebook; Securing a specific Facebook post; Setting Facebook privacy settings; Flickr; MySpace; Summary; Chapter 6: Who's Watching What You Do?; How can someone watch what I do?; E-mail; Web browsing traffic; Intercepting traffic directly on your machine; Intercepting traffic on the Internet 
505 0 |a Front Cover; The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online; Copyright; Dedication; Acknowledgments; Contents; Author Biography; Introduction; Chapter 1: Storing Your Personal Information Online; Storing your personal information online; How much information you share with companies; Risks of sharing too much information online; Giving attackers the information that they need; Telling thieves when to break into your house; Knowing how companies protect your information; Cookies and websites; InPrivate Browsing 
505 0 |a Network address translationNetwork firewalls; Securing your Wi-Fi network; AT & T U-Verse router; D-Link router; NetGear routers; Hiding your wireless network; MAC address filtering; Changing the MAC address in Windows; Changing the MAC address in Apple OS X; Letting others onto your Wi-Fi network; Other devices on the network; Summary; Chapter 4: Securing Your Home Computer; Data encryption for the home user; Native Windows data encryption; Encrypting a disk in Windows; Encrypting a disk in Mac OSX; What do those website security logos mean?; When Tech Support calls you 
505 0 |a Turning cookies off in Internet ExplorerTurning cookies off in Firefox; Turning cookies off in Chrome; Turning off cookies in Safari; Summary; Chapter 2: Usernames and Passwords for Websites; Picking a username; Picking a password; How passwords are figured out; Unique passwords; Creating unique passwords; Passphrases; Two-factor authentication; Using fob-based systems; Using software-based two-factor authentication systems; Using a text-messaging-based system; The more important the longer they should be; Summary; Chapter 3: Your Home Network; Securing your home network; Securing your router 
505 0 |a How can a government watch what I do?SSL versus the NSA; How can I stop people from watching what I do?; E-mail; Setting up PGP on Microsoft's Outlook 2013; Sending encrypted e-mails; Importing a public key from another person; Web browsing; Consequences; Ease of use; Government scrutiny; Summary; Chapter 7: Laws and Internet Privacy; The law and changing technology; PRISM; Canadian version of PRISM; Is all this legal?; Is all this moral?; Summary; Index 
653 |a Computer security 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Privatsphäre / gnd / http://d-nb.info/gnd/4123980-5 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Computer networks / Security measures / fast 
653 |a Computers / Access control / fast 
653 |a Computers / Access control / http://id.loc.gov/authorities/subjects/sh85029553 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Datensicherung / gnd 
653 |a Ordinateurs / Accès / Contrôle 
653 |a Computer security / fast 
653 |a Computer Security 
653 |a COMPUTERS / Security / General / bisacsh 
700 1 |a LaRock, Thomas 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a The basics 
500 |a Includes index 
776 |z 9781306156882 
776 |z 1306156882 
776 |z 0128001526 
776 |z 9780128001523 
776 |z 9780128000113 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128000113/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information