Geeks On Call Security and Privacy: 5-Minute Fixes
Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers--Geeks On Call. Now they're helping you build that all-important first line of defense, with quick, easy-to-follow solutions to the most common security problems, plus simple steps you can take to protect your computer, your privacy, and your personal information--today.
* Keep your virus protection up to date
* Identify and remove spyware
* Recognize phishing scams
* Practice safe chatting and instant messaging
* Learn to encrypt data for security
* Protect your laptop and wireless connection
* Create secure passwords
* Safely use public computers
Geeks On Call(r) is the premier provider of on-site computer services. The certified, trained and tested technicians from Geeks On Call provide expert computer installation and networking services, on-site repairs, security solutions and system upgrades for residential and commercial customers numbering in the hundreds of thousands each year. Founded in 1999, Geeks On Call began franchising in 2001. For more information, call 1-800-905-GEEK or visit www.geeksoncall.com. Geeks On Call franchises are independently owned and operated.
Part I: Windows Security.
Chapter 1: Update Windows and Microsoft Office.
Chapter 2: Safeguard Windows.
Part II: E-Mail Security.
Chapter 3: Protect Outlook Express.
Chapter 4: Protect Outlook.
Part III: Digital Threats.
Chapter 5: Viruses and Worms.
Chapter 6: Spyware.
Chapter 7: Wireless Threats.
Chapter 8: Phishing Scams.
Chapter 9: Spam.
Chapter 10: Cookies.
Part IV: Internet Security.
Chapter 11: Safe Web Surfing.
Chapter 12: Safe Instant Messaging.
Chapter 13: Safe Chatting.
Chapter 14: Safe E-Shopping.
Chapter 15: Web Safety for Kids.
Part V: Data Security.
Chapter 16: Passwords and Privacy.
Chapter 17: Data Deletion.
Chapter 18: Data Encryption.
Chapter 19: Data Backup.
Part VI: Privacy Protection.
Chapter 20: Safely Use Public Computers.
Chapter 21: Protect Laptops.
Chapter 22: Identity Theft.