Limit search to available items
E-book
Author Duntemann, Jeff.

Title Degunking your email, spam, and viruses / Jeff Duntemann
Published Scottsdale, Ariz. : Paraglyph Press, ©2004

Copies

Description 1 online resource (xxv, 334 pages) : illustrations
Contents Why Is Your Computer Suffering from Email and Virus Gunk? -- What the Experts Know -- Understanding How You Got So Gunked Up -- The 10 Key Causes of Email Gunk -- The 10 Key Causes of Virus Gunk -- Identity Theft -- The Strategy Behind Degunking -- Important Questions to Ask Yourself -- Email Management 101 -- Combating Spam with Filtering Techniques -- Setting Up a Virus Protection System -- Preventing the Installation of Spyware and Adware -- Protecting Yourself from Identity Theft -- Setting Up a Firewall to Protect Against Internet Worms -- Oh, and Don't Forget Your Backups! -- The Email and Malware 12-Step Degunking Program -- Gunk Be Gone -- Creating Your Email Degunking Strategy -- What's Your Email Profile? -- The Public Professional -- The Private Professional -- The Student-Enthusiast -- The Casual Communicator -- Pick Your Profile -- The Three Kinds of Email Addresses -- Using Your Primary Email Address(es) -- Using Your Backup Email Address -- Using Disposable Email Addresses -- Understand Where Email Addresses Come From -- ISP Internet Accounts -- Your Employer's Email System -- Web Hosting Service Email Accounts -- Free Web Mail Accounts -- Freenets and Community Networks -- Back Up Your Internet Access -- Register Your Own Internet Domain -- Obtain and Use "Evaporating" Email Addresses -- Using the Right Email Client -- What Makes a Good Email Client? -- Easy to Learn and Use -- Multiple Mail Accounts -- Hierarchical Folders or Mailboxes -- Binary Attachments -- HTML and Plain-Text Mail -- Protection Against "Spam Beacon" Image Downloads -- Protection Against Scripts in HTML Messages -- Imports Mail from Many Email Clients -- Exports Mail to Standard Formats -- Uses the Windows Address Book -- User-Defined Message Filters -- Easy Backup of Your Mailbase -- Support for POP and IMAP Mailboxes -- Cheap or Free -- Not Too Popular -- The Problem of Software Monoculture -- POP or IMAP? -- My Recommendations -- Protocols: POP vs. IMAP -- Protocols: Client Choices -- Clients and Your Experience Level -- Clients and the Nature of your Work -- Summing Up-Have Client, Will Email! -- Developing Good Email Habits -- Sort Your Email: Keep, Hold, or Pitch? -- Beware the Fold! -- The 100-Message Rule -- Prioritize Your Email with Email Notifiers -- Notifiers: Your Silent Email Partner -- POPTray: Free and Easy -- Install POPTray -- Create POPTray Rules for Critical Senders -- Let POPTray Prioritize Your Mail -- Back Up Your Email -- Have an Email Backup Strategy -- Find Your Mailbase -- Backup Media -- Use Backup Utility Software -- Summing Up-The Habits of Highly Effective Emailers -- Read and Degunk Your Email from Anywhere -- Get Reliable Access to the Net and Your Mail Server -- Understand the Port 25 Blocking Problem -- Using the Local Network for Outbound Mail -- Don't Fork Your Mailbase! -- Leaving Mail on the Server -- Synchronization and the "Holes Don't Travel" Problem -- Traveling with IMAP -- Traveling with Web Mail -- POP Interfaces to Web Mail -- Web Mail Interfaces to POP Accounts -- Use a Client on a Key Chain: Poco EmailVoyager -- Handing Off a Mailbase Between Poco Mail and EmailVoyager -- Use Google's Gamil: "Deep Storage" Web Mail -- Gmail and the Privacy Issue -- Pop Goes the Gmail -- Gmail Loader -- Competitive Pressures -- Summing Up-Traveling Smart -- Cleaning and Organizing Your Mailbase -- Understand the Two Faces of Mailbase Gunk -- Create a Folder Hierarchy -- Apply the Single-Screen Rule -- Use Folders for Topics, not Senders -- Keep Your Time-Delimited Mail in Separate Folders -- Use Folders within Folders Carefully -- Sort Your Email into Folders -- Clean Your Attachments Folder -- The Trouble with Attachments -- File Extensions and File Types -- Clean Up the Odds and Ends -- Watch Out for Abandoned Drafts -- Delete Obsolete or Duplicate Copies of Your Mailbase -- Outlook's Mailbase and Windows Address Book -- Remove Outlook Express Email Gunk from the Windows Registry -- Editing the Registry with REGEDIT32 -- Email Spring Cleaning -- Summing Up-Clean Me Now ... or Clean Me Later! -- Avoid Becoming a Spam Magnet! -- Understand the Prime Directive Against Spam -- Don't Buy from Spammers! -- Don't Respond to Sneaky Spam Messages -- Friends Don't Let Friends Buy from Spammers! -- Why Is Stopping Spam So Hard? -- Choose a Spam-Resistant Email Address -- Avoid Dictionary Attacks -- More Advice on Choosing an Email Address -- Don't Hand Your Email Address to Spammers! -- Never Post Your Email Address on the Web -- Never Unsubscribe from a Spammer Mailing List -- Check to See if Listservs ARe Archived to the Web -- Obfuscate Your Email Address on Newsgroups and Discussion Boards -- Use Disposable Email Addresses for E-Commerce -- Don't Complain to a Spammer's ISP -- Avoid Triggering Other People's Spam Filters -- Summing Up-From Prevention to Cure -- Understand the Spam Filtering Conundrum -- Understand Spam Filtering Jargon -- Develop a Good Spam-Fighting Philosophy -- Love Your Address Book-and Use It! -- Use Your Address Book as Your Whitelist -- Use Content Filtering -- Automatic or Manual Filtering? -- Filtering on Sender Addresses and Domains -- Is It a Spammer Domain? -- Filtering on Key Words in the Subject -- Filtering on Key Words or Domains in the Message Body -- Watch Out for False Positives when Creating Filters! -- Run Your Spam Filters in the Correct Order -- "Inbox Thinning" with POPTray -- Defining Spam Filters in POPTray -- Deep-Clean Your Spam Using Bayesian Spam Filtering -- Degunk Your Spam with Statistics -- The Bayesian Regimen -- The Bayesian Downside -- Learn about POPFile -- Why Is POPFile So Good? -- Install POPFile -- Selecting POPFile's Install-Time Buckets -- Configuring Your Email Client to Use POPFile -- What Happens When POPFile Checks Mail -- Train and Use POPFile -- Training POPFile -- Setting Up a Spam Category Filter in Your Email Client -- Use POPFile's Magnets -- Creating Magnets in POPFile -- Back Up and Share POPFile's Corpus Data -- Finding the Corpus -- "Borrowing" a Corpus -- Use Outclass to Access POPFile from Outlook -- Installing Outclass -- Configuring and Using Outclass -- More Outclass Training Tips -- Using Safe View to Inspect Message Source Text -- Avoid Spam Control Methods That Don't Work -- Understand How Antispam Technologies Fail -- Be Careful with Server-Side Spam Filtering -- Watch Out for IP Black Holes -- Malicious Spam Reporting and "Joe Jobs" -- SpamCop -- Peer-to-Peer Collaborative Spam Filtering -- Challenge-Response Spam Blocking -- Captchas: Riddle Me This to Email Me! -- Whitelists Are Everything -- Other Problems With C-R Email Systems -- Why Spamming Should Not Be Illegal -- Keep a Cool Head and Win the War -- Protect Yourself Against Viruses, Trojans, and Worms -- Develop a Malware Master Plan -- Understand the PC Malware Bestiary -- Malware -- Viruses -- Worms -- Trojan Horses -- Back Doors -- Adware -- Spyware -- Social Engineering -- Phishing -- Hackers and Crackers and the Colors of Hats -- Security Holes in Software -- Where the Risks Are -- Malware Defense: From a Height -- Defeat Those Viruses -- Understand What Viruses Are and What They Do -- How You Contract PC Viruses -- Watch Out for "Dangerous" Files and Their Extensions -- Microsoft Office Files and File Extensions -- Havoc from Hiding Windows File Extensions -- How Viruses "Space-Shift Right" to Hide File Extensions -- Disable Microsoft Office Macros -- Macro Viruses in Office Add-Ins and Templates -- Choose an Antivirus Utility -- Using Software Reviews for Purchasing Decisions -- What All Good Antivirus Utilities Should Have -- Things to Watch Out For -- Do You Need Multiple Antivirus Utilities? -- What I Recommend -- Using Trial Products -- Installing a Typical Antivirus Product -- Using a One-Off Virus Removal Utility -- Summing Up-Use Good Virus Hygiene Daily -- Avoid Adware, Spyware, and Browser Bugaboos -- Adware vs. Spyware -- The Two Kinds of Free -- Know What You're Installing! -- Good Adware/Spyware Research Sites -- Use Anti-Spyware Software -- Installing and Using Spybot Search & Destroy -- Why Keep Adware? -- Installing and Using Ad-Aware -- Watch Out for Phony Spyware or Adware Removers -- Implement an Adware/Spyware Strategy -- Be Mindful of Browser Bugaboos -- The Hazards of Internet Explorer -- Drive-By Installs -- Disabling Install On Demand in Internet Explorer -- Beefing Up Security in the Internet Zone -- Disabling Install on Demand in Mozilla Firefox -- Block Pop-Ups! -- Use Limited Windows Accounts for Web Surfing -- Creating a Limited User Account in Windows -- Fast User Switching in Windows XP -- Summing Up-Peddlers Not Invited -- Use Firewalls to Stop Those Worms -- Understand That Worms Are Viruses with Legs -- The Nature of Worm Gunk -- Worms with a Mission -- The Life Cycle of a Worm -- Interfering with the Worm Life Cycle -- Your Worm Defense Strategy -- The Prime Directive in Worm Defense -- Learn the Essentials about Firewalls -- Using Software Firewalls -- Using NAT Firewalls -- Install and Use ZoneAlarm -- Getting ZoneAlarm -- Installing ZoneAlarm -- Understanding ZoneAlarm Zones -- Software Package Permissions -- Deciding Whether to Grant or Deny -- Install and Use the Linksys BEFSR41 Router -- Installing the BEFSR41 -- MAC Address Authentication -- Cloning Your MAC Address -- Tricky: MAC Cloning on an Older Router -- Summing Up-Turning Worms Away -- Degunk Nigerian Rhapsodies, Hoaxes, and Other Smelly Phish -- Degunk Those Viral Hoaxes -- Social Engineering Viruses -- So Why Are Harmless Social Engineering Viruses Wrong? -- Avoid the Nigerian 419 Scams -- Don't Be Victim to Identity Theft Because of Phishing Expeditions -- The New Scourge of the Internet -- Impersonating a Web Site -- "Bait and Switch" Web Links -- How Not to Get Hooked -- Degunking After a Malware Attack -- Understand the Five PC Defense Conditions -- Was It Really Malware? -- Is It Simply Plain Old Windows Gunk? -- How to Handle DefCon 1
Summary "Organize you email so that it works for you! Protect yourself from nasty spam, viruses, and worms."
Notes "Organize your email so that it works for you! Protect yourself from nasty snam, viruses, and worms."
Includes index
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
English
Print version record
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject Spam (Electronic mail)
Computer viruses -- Prevention
Computer security -- United States -- Handbooks, manuals, etc
Computer security.
Computer viruses -- Prevention.
Spam (Electronic mail)
United States.
Genre/Form Handbooks and manuals.
Handbooks and manuals.
Guides et manuels.
Form Electronic book