Site hosted by Angelfire.com: Build your free website today!

 

Table of Contents:

-Title Page
-Introduction
-Bibliography


Threats:
-Viruses
-Trojans
-Spyware
-Phishing


-Basic Security
-Free Programs



Bibliography


Nichols, Randall. Defending your digital assets against Hackers, Crackers, Spies and Thieves. New York: McGraw Hill, 2000.

Masci, David. Internet Privacy. Available at: CQResearcher website. March 1st 2005.

Maximum PC Staff The Ultimate Trouble Shooting Guide. August 2004.

Feinstein, Ken. How to Do Everything to Fight Spam, Viruses, Pop-Ups and Spyware New York: McGraw Hill, 2004.

Delio, Michelle. "Spyware on My Machine? So What?" Available at: www.wired.com/news/technology/0,1282,65906,00.html. March 1st 2005.

Edelman, Ben. "Who Profits from Security Holes?" Available at: http://www.benedelman.org/news/111804-1.html. March 1st 2005

Liston, Tom. "Handler's Diary" Available at: http://isc.sans.org/diary.php?date=2004-07-23&isc=00ee9070d060393ec1a20ebfef2b48b7. March 1st 2005.

Kolla, Patrick. "Spybot: Search & Destroy" Available at: http://www.safer-networking.org/en/news/index.html. March 1st 2005.

"Adware, Spyware and other unwanted malware - and how to remove them." Available at: http://www.cexx.org/adware.htm. March 1st 2005.

Consortium of Anti-Spyware Technology Vendors. "C.O.A.S.T." Available at: http://www.coast-info.org/index.htm. March 1st 2005.

Brown, Ann. Cyber Snoops; How to keep them out of your Computer New York: Proquest, 2005.

Goklaborough, Reid. The Benefits and Fear of Cookie Technology New York: Proquest, 2005.

Brain, Marshall. "How Computer Viruses Work." Available at: http://computer.howstuffworks.com/virus1.htm. March 1st 2005.




Important Links

Spybot: Search and Destroy
Hi-Jack This
Handler's Diary
Spyware Guide Database
Microsoft Anti-Spyware
Norton Anti-virus