Atjaunināt sīkdatņu piekrišanu

E-grāmata: Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies

4.29/5 (57 ratings by Goodreads)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 11-Sep-2020
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484261897
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 35,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 11-Sep-2020
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484261897
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourselfstep by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and don't know the real threats.

Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our datajust like wearing a seat belt, installing smoke alarms, and putting on sunscreen.









Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. This revised and expanded fourth edition contains more than 170 tips to make you and your family safer. It includes:









Updates for Windows 10 (May 2020) and Mac OS 10.15 (Catalina) Updates for iOS 13 and Android 10 Updated recommendations on the best apps, products, and services More than 170 tips with complete step-by-step instructions and pictures A preview of Mac OS 11 Big Sur and iOS 14



























What You Will Learn









Create killer passwords that you do not have to remember Browse the web safely and with confidence Protect your data and reclaim your privacy Shop and bank online with maximum security Defend against identity theft Protect yourself from viruses and scams Maximize your smartphone security and privacy Safeguard your children online Block online tracking and dangerous ads Send files and messages securely and privately Set up secure home networking Keep your smart devices from spying on you Stop oversharing on social media Create automated backups of all your devices Learn how the Internet actually works And more!























































































































































Who This Book Is For





Those who use computers and mobile devices, but do not know (or care) how they work. The book is for people who want to know what they need to do to protect themselvesstep by step, without judgment, and with as little jargon as possible.
About the Author xvii
About the Technical Reviewer xix
Preface xxi
Chapter 1 Before We Begin
1(16)
"How Worried Should I Be?"
1(6)
Threat Analysis
2(3)
Indirect Threats
5(1)
Privacy vs. Security
6(1)
Summary
7(1)
How to Use This Book
8(7)
Reader Prerequisites
9(1)
Operating Systems Covered
9(1)
Navigating the Checklists
10(1)
Tip 1-1 Simple Tip
10(1)
Tip 1-2 Tip with Steps
11(1)
Tip 1-3 Tip with Variations
11(2)
Web Addresses and Staying Up to Date
13(1)
Always Go to the Source
13(1)
Feedback Welcome
14(1)
Spread the Word
14(1)
Not So Fast
15(2)
Chapter 2 Cybersecurity 101
17(50)
Here Be Dragons
17(6)
I Dub Thee
17(3)
Prevention, Detection, and Recovery
20(3)
Computer Lingo
23(1)
Hardware and Software
24(8)
File Manager
25(1)
Bits and Bytes
25(1)
Storage
26(1)
Networks (Wired and Wireless)
27(1)
Bandwidth
28(1)
Bluetooth
29(1)
Clients and Servers
30(1)
The Cloud
30(1)
Net Neutrality
31(1)
The Internet of Things
32(1)
Know Your Enemy
32(6)
Malware
32(4)
Hardware Bugs
36(1)
Exploit
37(1)
How the Internetworks
38(3)
Tools of the Trade
41(16)
Encryption and Cryptanalysis
42(6)
Modern Cryptography
48(3)
Authentication and Message Integrity
51(5)
Newer Isn't Always Better
56(1)
Privacy and Tracking
57(5)
Who Can You Trust?
62(2)
Summary
64(1)
Checklist
65(2)
Tip 2-1 Know Thyself
65(1)
Tip 2-2 Know What They Know
65(2)
Chapter 3 The Three Ups: Back Up, Clean Up, and Update
67(32)
Backups
67(4)
Spring Cleaning
71(1)
Update Everything
72(2)
Summary
74(1)
Checklist
75(24)
Operating System Configuration
75(2)
Tip 3-1 Back Up to an External Drive
77(7)
Tip 3-2 Back Up to the Cloud
84(6)
Tip 3-3 Buy a UPS
90(1)
Tip 3-4 Clean Up Your Apps
91(3)
Update Everything
94(1)
Tip 3-5 Turn on Auto-Update for Your OS
94(5)
Chapter 4 Passwords
99(48)
How Did We Get Here?
99(4)
Understanding Password Strength
103(7)
Managing Your Passwords
110(2)
Choosing a Master Password
112(2)
Doing the Two-Step
114(1)
Periodically Changing Passwords
115(1)
Summary
116(2)
Checklist
118(29)
Tip 4-1 Choose a Strong Master Password
119(1)
Tip 4-2 Get Started with LastPass
119(2)
Tip 4-3 Install LastPass in Your Web Browser
121(1)
Tip 4-4 Take the LastPass Tour
122(2)
Tip 4-5 Install the LastPass App on Your Smartphone
124(1)
Tip 4-6 Enable Two-Factor Authentication
125(3)
Tip 4-7 Add Passwords to LastPass
128(3)
Tip 4-8 Use LastPass to Fill in Passwords
131(4)
Tip 4-9 Disable Password Saving on Your Browser
135(1)
Tip 4-10 Delete Saved Passwords from Your Browser
136(1)
Tip 4-11 Store Credit Cards in LastPass
137(1)
Tip 4-12 Perform a Security Check in LastPass
137(1)
Tip 4-13 Generate Strong Passwords for Key Accounts
138(3)
Tip 4-14 Generate and Store Offline Passwords
141(1)
Tip 4-15 Create Some One-Time Passwords
142(2)
Tip 4-16 Disallow LastPass Login from Foreign Countries
144(3)
Chapter 5 Computer Security
147(60)
Macs Are Safer Than PCs
147(1)
Non-admin Accounts
148(2)
iCloud and Microsoft Accounts
150(2)
Built-in Security Features
152(3)
The Pros and Cons of Antivirus Software
155(1)
How to Properly Delete a File
156(1)
Summary
157(1)
Checklist
158(49)
Tip 5-1 Choose a New Computer: Think Different
159(1)
Tip 5-2 Require Passwords for Computer Accounts
159(6)
Tip 5-3 Create a Separate Admin Account
165(15)
Tip 5-4 Install Free Antivirus Software
180(5)
Tip 5-5 Restrict Access to Important Files
185(2)
Tip 5-6 Turn on Disk Encryption
187(5)
Tip 5-7 Encrypt Your Backups (Mac OS Only)
192(3)
Tip 5-8 Securely Erase Sensitive Files
195(4)
Tip 5-9 Prepare a Computer for Sale, Donation, or Recycle
199(2)
Tip 5-10 Set Up Find My Mac (Mac OS Only)
201(1)
Tip 5-11 Don't Trust Other Computers
202(1)
Tip 5-12 Avoid Strange USB Devices and Ports
202(1)
Tip 5-13 Don't Use Adobe Reader to Read PDF Files
203(1)
Tip 5-14 Unplug or Cover Webcams When Not in Use
204(1)
Tip 5-15 Beware Cold Calls for Computer Support
204(1)
Tip 5-16 Buy a Paper Shredder
204(3)
Chapter 6 LAN Sweet LAN
207(22)
Network Overview
207(3)
Modem
210(1)
Wi-Fi Router
211(2)
The Internet of Things
213(2)
Virtual Private Network
215(2)
Summary
217(1)
Checklist
218(11)
Tip 6-1 Get Your Own Modem
220(1)
Tip 6-2 Get Your Own Wi-Fi Router
220(1)
Tip 6-3 Lock Down Your Wi-Fi
221(1)
Tip 6-4 Use WPA2 or WPA3
221(1)
Tip 6-5 Set a Strong Password for Your Router Admin Page
221(1)
Tip 6-6 Change Your Default SSID
222(1)
Tip 6-7 Disable External Admin
222(1)
Tip 6-8 Disable External Services
223(1)
Tip 6-9 Use ShieldsUp to Check for Vulnerabilities
223(1)
Tip 6-10 Enable and Use the Guest Network
224(1)
Tip 6-11 Put "Internet of Things" Devices on the Guest Net
224(1)
Tip 6-12 Register Your Devices
224(1)
Tip 6-13 Update Your Router's Firmware
225(1)
Tip 6-14 Disable Auto-Connect to Wi-Fi
225(1)
Tip 6-15 Turn Off Your ISP's Wi-Fi
226(1)
Tip 6-16 Use a VPN
226(3)
Chapter 7 Practice Safe Surfing
229(48)
Tracking Tech
234(10)
The Webs We Weave
235(5)
Enter the Panopticon
240(4)
On the Ethics of Ad Blocking
244(2)
Information Leakage
246(2)
Choose Your Weapon
248(2)
Most Secure Browser
248(1)
Most Private Browser
249(1)
And the Winner Is
250(1)
Beyond the Big Four
250(1)
Summary
250(2)
Checklist
252(25)
Tip 7-1 Install Firefox
252(1)
Tip 7-2 Configure the Security and Privacy Settings on Firefox
253(6)
Tip 7-3 Remove All Unnecessary Add-ons
259(2)
Tip 7-4 Change the Default Search Option to DuckDuckGo
261(1)
Tip 7-5 Install Security and Privacy Add-ons
261(2)
Tip 7-6 Always Go to the Source for Downloads
263(1)
Tip 7-7 Be Careful on "Shady" Sites
263(1)
Tip 7-8 Beware of Pop-Ups Offering/Requiring Plugins
264(1)
Tip 7-9 Opt Out Where You Can
264(1)
Tip 7-10 Use Private Browsing
265(1)
Tip 7-11 Change Your DNS Provider on Your Wi-Fi Router
265(2)
Tip 7-12 Change Your DNS Provider on Your Laptop
267(7)
Tip 7-13 Use DNS Over HTTPS (DoH)
274(3)
Chapter 8 Secure Communication
277(28)
Email
277(2)
Text Messaging
279(2)
Spam and Spoofed Messages
281(3)
How to Recognize a Fake Email
284(1)
"So How Do I Communicate Securely?"
285(2)
Summary
287(1)
Checklist
288(17)
Tip 8-1 Create Email Accounts for Public and Private Uses
288(1)
Tip 8-2 Use an Encrypted Email Service
288(1)
Tip 8-3 Send Sensitive Info Securely
289(6)
Tip 8-4 Send Files Securely Using the Web
295(3)
Tip 8-5 Read Your Email Using the Web
298(1)
Tip 8-6 Don't Abandon Unused Email Accounts
298(1)
Tip 8-7 Keep an Eye on Your Account Activity Info
299(1)
Tip 8-8 Don't Forward Something Without Verifying It First
300(1)
Tip 8-9 Don't Click Links, If Possible
300(1)
Tip 8-10 Don't Open Email Attachments, If Possible
301(1)
Tip 8-11 Check Files Before Sending
301(1)
Tip 8-12 Deal Properly with Spam
301(1)
Tip 8-13 Use Secure Messaging Apps
302(1)
Tip 8-14 Secure Your Video Chats
302(3)
Chapter 9 Online Accounts and Social Media
305(30)
Banking and Shopping Online
305(2)
Credit Bureaus and Identity Theft
307(1)
Cloud Storage Services
308(2)
Social Media
310(2)
Summary
312(1)
Checklist
313(22)
Tip 9-1 Lock Down Your Apple/Microsoft Accounts
313(6)
Tip 9-2 Use Throwaway Email Accounts
319(2)
Tip 9-3 Use Credit Cards Online (Not Debit Cards)
321(1)
Tip 9-4 Use Virtual Credit Card Numbers
321(1)
Tip 9-5 Give Your Credit Card Company a Heads-Up
322(1)
Tip 9-6 Set Up Restrictions on Your Financial Accounts
323(1)
Tip 9-7 Turn On Account Alerts
323(1)
Tip 9-8 Freeze Your Credit
323(1)
Tip 9-9 Use Private Cloud Storage Services
324(1)
Tip 9-10 Don't Broadcast Your Travel Plans
325(1)
Tip 9-11 Scrub Your Files Before Sharing
325(1)
Tip 9-12 Don't Sign In Using Facebook, Google, Etc
326(1)
Tip 9-13 Don't Divulge Too Much Personal Info Online
327(1)
Tip 9-14 Be Wary of Using DNA Services
327(1)
Tip 9-15 Account Recovery Questions: Lie
328(1)
Tip 9-16 Limit Who Can See Your Stuff
328(1)
Tip 9-17 Don't Give Out Your Email Credentials
329(1)
Tip 9-18 Enable Two-Factor Auth Wherever You Can
329(1)
Tip 9-19 Read the Terms of Service (or Not)
330(1)
Tip 9-20 Know What They Know
330(1)
Tip 9-21 Lock Down Your Social Media Accounts
331(1)
Tip 9-22 Close Accounts You Don't Use
332(1)
Tip 9-23 Delete Your Facebook History
333(1)
Tip 9-24 Use Privacy-Respecting Alternatives
333(1)
Tip 9-25 Avoid TikTok Entirely
334(1)
Chapter 10 Parental Guidance
335(16)
The Internet Is Everywhere
335(1)
The Grandmother Rule
336(1)
Cyberbullying
337(1)
Adult Content
338(1)
Don't Panic
338(1)
Summary
338(1)
Checklist
339(12)
Tip 10-1 Create a Dedicated Account for Each Child
339(1)
Tip 10-2 Use Parental Controls for Young Children
339(1)
Tip 10-3 Creating Email Accounts for Children
340(7)
Tip 10-4 Research Before Allowing Your Kids to Sign Up
347(1)
Tip 10-5 Teach Your Kids to Protect Their Identities
347(1)
Tip 10-6 Be Able to Access All Accounts and Devices
348(1)
Tip 10-7 Honor the Age Restrictions
348(1)
Tip 10-8 Friends Must First Be Met in Person
348(1)
Tip 10-9 Lock Down Chromebook Settings
348(1)
Tip 10-10 Remember the Golden Rule
349(1)
Tip 10-11 Keep Computers in a Common Area of the House
349(1)
Tip 10-12 Use Family Friendly DNS
349(1)
Tip 10-13 Use Device Tracking (Judiciously and Fairly)
350(1)
Tip 10-14 Create a Contract for Your Kids
350(1)
Tip 10-15 Parental Resources
350(1)
Chapter 11 Don't Be a Smartphone Dummy
351(24)
iOS Is More Secure Than Android
351(1)
iOS Is More Private Than Android
352(1)
Wireless Madness
353(2)
To Hack or Not to Hack
355(1)
Privacy Matters
356(1)
Summary
357(1)
Checklist
358(17)
Tip 11-1 Back Up Your Phone
358(3)
Tip 11-2 Keep Your Device Up to Date
361(1)
Tip 11-3 Lock Your Device
362(1)
Tip 11-4 Don't Use Biometric Locks for Sensitive Stuff
362(1)
Tip 11-5 Enabling Lockdown Mode
363(1)
Tip 11-6 Restrict Application Permissions
364(1)
Tip 11-7 Limit Ad Tracking
365(1)
Tip 11-8 Remove Unused Apps
365(1)
Tip 11-9 Enable (Self) Tracking
366(1)
Tip 11-10 Use Firefox Browser
367(1)
Tip 11-11 Avoid Cheap Android Phones
367(1)
Tip 11-12 Use Secure Messaging Apps
367(1)
Tip 11-13 Install (and Use) a Mobile VPN
368(1)
Tip 11-14 Disable Wi-Fi Auto-Connect
369(1)
Tip 11-15 Know Your Rights When You Travel
369(1)
Tip 11-16 Don't Hack Your Device
370(1)
Tip 11-17 Disable Bluetooth and NFC When You Can
370(1)
Tip 11-18 Erase Your Device Before Getting Rid of It
370(2)
Tip 11-19 Enable Medical ID
372(1)
Tip 11-20 Use a USB Condom
373(2)
Chapter 12 Odds and Ends
375(18)
When Bad Things Happen
375(5)
Tip 12-1 Email Account Is Hacked
375(2)
Tip 12-2 Website Password Breach
377(1)
Tip 12-3 You Suspect You Have a Virus
377(1)
Tip 12-4 You've Got Ransomware!
378(1)
Tip 12-5 Restoring a Lost or Messed-Up File
379(1)
And When I Die
380(3)
Tip 12-6 Get a Will
380(1)
Tip 12-7 Add a Backup to Your Safety Deposit Box
380(1)
Tip 12-8 Save Your Passwords Somewhere Safe
380(1)
Tip 12-9 Ensure Access to Two-Factor Device
381(1)
Tip 12-10 Appoint a "Digital Executor"
381(1)
Tip 12-11 Stop ID Theft After Death
382(1)
Gold Stars and Tinfoil Hats
383(10)
Tip 12-12 Install NoScript
383(1)
Tip 12-13 Install Haven on an Old Android Phone
383(1)
Tip 12-14 Add a Dedicated Guest Wi-Fi Router
384(1)
Tip 12-15 Install Little Snitch (Mac OS Only)
384(1)
Tip 12-16 Use Top-Shelf Security and Privacy Tools
385(1)
Tip 12-17 Install Custom Wi-Fi Router Software
385(1)
Tip 12-18 Install and Use PGP
386(1)
Tip 12-19 Use Tor to Protect Your Identity
386(1)
Tip 12-20 Need to Blow the Whistle? Use SecureDrop
386(1)
Tip 12-21 Set Up a Virtual Machine
387(1)
Tip 12-22 Use a Dedicated Secure Computer
387(1)
Tip 12-23 Sandbox Your Windows Apps
388(1)
Tip 12-24 Shut Your Pi Hole
388(1)
Tip 12-25 Use Open Source Hardware
389(1)
Tip 12-26 Go Silent
389(1)
Tip 12-27 Completely and Securely Erase a Hard Drive
390(1)
Tip 12-28 Roll the Dice for Security
390(3)
Chapter 13 Parting Thoughts
393(8)
Keep Calm and Carry On
393(1)
The Case for Optimism
394(1)
Don't Take This Lying Down
395(1)
Going Further
396(5)
Books
397(1)
Documentaries and Movies
397(1)
Blogs and Websites
398(1)
Podcasts
399(1)
Fighting the Good Fight
400(1)
Glossary 401(4)
Index 405
Carey Parker, CIPM was born and raised in Indiana, an only child who loved to tear apart his electronic toys and reassemble them in interesting ways. He began programming computers in middle school when personal computers were just starting to become popular. For years, these twin interests percolated until he attended Purdue University and learned that you could get paid to do this stuffit was called electrical engineering! After obtaining both bachelor and master degrees in electrical engineering, Carey launched his career in telecommunications software development at Bell Northern Research (aka the "Big Nerd Ranch"). Over the next 20 years, he wrote software for multiple companies, large and small, and lived in various cities across the southern United States. In recent years, particularly after the Edward Snowden revelations in 2013, Carey became deeply concerned about computer security and privacy. In 2014, he began combining his passion for computers, cybersecurity, and fantasy novels with his long-time desire to write a book, and the result is Firewalls Don't Stop Dragons. This eventually launched a blog, newsletter, and weekly podcast of the same name.