nav_sap_SWP_6M_fly_beacon Indie for the Holidays egg_2015 Fire TV Stick Grocery Gifts for Her Amazon Gift Card Offer mithc mithc mithc  Amazon Echo Starting at $49.99 Kindle Voyage R6 Siege Outdoor Deals on bgg Automotive Holiday Deals Books Holiday Gift Guide Shop Men's Cyber Monday Deals Week Learn more

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

PC Magazine Fighting Spyware, Viruses, and Malware 1st Edition

5 customer reviews
ISBN-13: 978-0764577697
ISBN-10: 0764577697
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
More Buying Choices
13 New from $14.37 26 Used from $0.08
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Get Up to 80% Back Rent Textbooks

Editorial Reviews

From the Back Cover

Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC—along with your wallet.

Here's how you can

  • Learn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PC
  • Get the tools that can cure an infection
  • Dig into the Windows Registry to remove the nastiest of bugs
  • Prevent a recurrence with personal firewalls and protective software
  • Deal with the onslaught of spam
  • Keep your defenses up-to-date

Give it the boot

If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted—that is, before you got infected.
— From Chapter 4

About the Author

Ed Tittel has been writing, researching, and teaching about Windows security topics since 1996. An inveterate tinkerer cursed with incurable curiosity, he's become a connoisseur of protection tools and techniques to battle spyware, adware, and malware.

Product Details

  • Series: PC Magazine (Book 3)
  • Paperback: 382 pages
  • Publisher: Wiley; 1 edition (December 31, 2004)
  • Language: English
  • ISBN-10: 0764577697
  • ISBN-13: 978-0764577697
  • Product Dimensions: 7.4 x 0.8 x 9.2 inches
  • Shipping Weight: 1.3 pounds
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #620,303 in Books (See Top 100 in Books)

More About the Author

Ed Tittel is a full-time freelance writer, trainer, and consultant who specializes in information security, markup languages, and networking technologies. He is a regular contributor to numerous TechTarget websites; teaches online security and technology courses for HP; and writes regularly for Tom's Hardware and ITExpertVoice.

Ed has contributed to over 100 books on various computing subjects, including a dozen different titles in the ...For Dummies series. He is probably best known for creating the Exam Cram series of IT certification prep books in 1997, and for having edited that series from 1997 until 2006. Ed's best-selling titles include "HTML, XHTML and CSS For Dummies" (soon to go into a 7th edition, for a cumulative total of 13 editions of HTML For Dummies titles he's worked on), "The Guide to TCP/IP" (which he co-authored with protocol expert Laura Chappell), "Windows Server 2008 For Dummies," and "Networking Essentials." He's also written numerous titles on security including the "CISSP Study Guide" (4th edition, with co-authors James Michael Stewart and Mike Chapple), "The PC Magazine Guide to Fighting Spyware, Viruses, and Malware," and the "TISCA Training Guide."

For more information on Ed, please visit his personal Website at You can also visit his profile on LinkedIn at to get information about various blogs and other activities.

Customer Reviews

5 star
4 star
3 star
2 star
1 star
See all 5 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

11 of 13 people found the following review helpful By W Boudville HALL OF FAMEVINE VOICE on August 4, 2005
Format: Paperback
Tittel can certainly unsettle the reader! He warns of the increasing encroachments against your computer. The biggest single danger is that this might be your home computer. Not a computer at your workplace, for which you might be able to ask a sysadmin for help.

So it's you and Tittel against the 3 menaces. Be aware that the terminology in the text and title may vary from what others use. Often, malware is taken to include viruses. I think he chose to break viruses out separately from malware so that the title would outreach to more people. Malware is still somewhat of a techie term, while spyware and viruses have broader recognition.

Naturally, since we're discussing personal computers, the text tends to focus on those running a Microsoft operating system. But in fact, much of his advice applies to Macs and linux/unix machines. Though users of the former 2 types might take heart in knowing that most viruses or worms won't go after their machines.

Tittel explains that increasingly, it's harder to draw clear lines between malware, spyware and adware. But he shows how to use existing anti-malware products that can scan for these and remove them. These products use combinations of signatures of known malware, and also search for "strange" activity that is typical of malware. However, since new variants of malware are continually being developed and found, you should always download the latest sets of signatures from your vendor, before running the tests.

Tittel also gives a succinct description of phishing. A particularly virulent type of malware that has increased enormously in the last 2 years.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
8 of 11 people found the following review helpful By John Matlock on March 4, 2005
Format: Paperback
Any of us connected on-line for even a few minutes has probably been the recipient of at least one virus attack.

Not only viruses, but many other kinds of intrusive software would like to come into your machine for its own purpose. This book talks about the major kinds of invasions you might expect and how to prevent them from entering your machine.

Most of us have learned about viruses the hard way, we cought them and then had to learn how to clean the system. Here in one book is a complete introduction to the problem. It covers all the common types of problems a PC is likely to encounter in one place.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
5 of 7 people found the following review helpful By Music Man on March 16, 2006
Format: Paperback Verified Purchase
This book gives alot of information, probably more than most will want to read. But if you can wade through all of it you will find some very useful information. It is very techinical information. It does however provide an indepth explanation of how viruses, hijackers, etc work and what you can do to protect yourself. Overall it is a great buy with very much useful info.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 3 people found the following review helpful By private on April 7, 2008
Format: Paperback Verified Purchase
I normally like to write some detailed reviews but not on this book.

If you really want a fast read broken down into areas that let you know how the bad guys are screwing with your computer AND you buy this book.

You will learn what spyware, malware, viruses and trojans are and the best ways-products to use. No second guessing and in fact this book should be required reading for all American students.

On average I find about 35 instances of pests per PC I work on so do yourself a favor. If you want to learn more in detail, get this book.

And don't forget as Red Green says, "if the women don't find you handsome they should at least find you handy".

Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By John Boone on October 4, 2015
Format: Paperback Verified Purchase
Old and outdated but does have some useful content / information that can still apply to day's troubleshooting and clean up of malware / viruses.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

What Other Items Do Customers Buy After Viewing This Item?

Want to discover more products? Check out this page to see more: computer security