Buy Used
Condition: :
Comment: Standard used condition. Thousands of books shipped daily!
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

PC Magazine Fighting Spyware, Viruses, and Malware Paperback – December 31, 2004

ISBN-13: 978-0764577697 ISBN-10: 0764577697 Edition: 1st

Price: $4.34
10 New from $6.99 24 Used from $0.01
Amazon Price New from Used from
"Please retry"
$6.99 $0.01
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Shop the new
New! Introducing the, a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: PC Magazine (Book 3)
  • Paperback: 382 pages
  • Publisher: Wiley; 1 edition (December 31, 2004)
  • Language: English
  • ISBN-10: 0764577697
  • ISBN-13: 978-0764577697
  • Product Dimensions: 7.4 x 0.8 x 9.2 inches
  • Shipping Weight: 1.3 pounds
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #2,122,729 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC—along with your wallet.

Here's how you can

  • Learn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PC
  • Get the tools that can cure an infection
  • Dig into the Windows Registry to remove the nastiest of bugs
  • Prevent a recurrence with personal firewalls and protective software
  • Deal with the onslaught of spam
  • Keep your defenses up-to-date

Give it the boot

If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted—that is, before you got infected.
— From Chapter 4

About the Author

Ed Tittel has been writing, researching, and teaching about Windows security topics since 1996. An inveterate tinkerer cursed with incurable curiosity, he's become a connoisseur of protection tools and techniques to battle spyware, adware, and malware.

Customer Reviews

5.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See all 4 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

11 of 13 people found the following review helpful By W Boudville HALL OF FAMETOP 1000 REVIEWERVINE VOICE on August 4, 2005
Format: Paperback
Tittel can certainly unsettle the reader! He warns of the increasing encroachments against your computer. The biggest single danger is that this might be your home computer. Not a computer at your workplace, for which you might be able to ask a sysadmin for help.

So it's you and Tittel against the 3 menaces. Be aware that the terminology in the text and title may vary from what others use. Often, malware is taken to include viruses. I think he chose to break viruses out separately from malware so that the title would outreach to more people. Malware is still somewhat of a techie term, while spyware and viruses have broader recognition.

Naturally, since we're discussing personal computers, the text tends to focus on those running a Microsoft operating system. But in fact, much of his advice applies to Macs and linux/unix machines. Though users of the former 2 types might take heart in knowing that most viruses or worms won't go after their machines.

Tittel explains that increasingly, it's harder to draw clear lines between malware, spyware and adware. But he shows how to use existing anti-malware products that can scan for these and remove them. These products use combinations of signatures of known malware, and also search for "strange" activity that is typical of malware. However, since new variants of malware are continually being developed and found, you should always download the latest sets of signatures from your vendor, before running the tests.

Tittel also gives a succinct description of phishing. A particularly virulent type of malware that has increased enormously in the last 2 years.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 11 people found the following review helpful By John Matlock on March 4, 2005
Format: Paperback
Any of us connected on-line for even a few minutes has probably been the recipient of at least one virus attack.

Not only viruses, but many other kinds of intrusive software would like to come into your machine for its own purpose. This book talks about the major kinds of invasions you might expect and how to prevent them from entering your machine.

Most of us have learned about viruses the hard way, we cought them and then had to learn how to clean the system. Here in one book is a complete introduction to the problem. It covers all the common types of problems a PC is likely to encounter in one place.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 7 people found the following review helpful By Music Man on March 16, 2006
Format: Paperback Verified Purchase
This book gives alot of information, probably more than most will want to read. But if you can wade through all of it you will find some very useful information. It is very techinical information. It does however provide an indepth explanation of how viruses, hijackers, etc work and what you can do to protect yourself. Overall it is a great buy with very much useful info.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 3 people found the following review helpful By private on April 7, 2008
Format: Paperback Verified Purchase
I normally like to write some detailed reviews but not on this book.

If you really want a fast read broken down into areas that let you know how the bad guys are screwing with your computer AND you buy this book.

You will learn what spyware, malware, viruses and trojans are and the best ways-products to use. No second guessing and in fact this book should be required reading for all American students.

On average I find about 35 instances of pests per PC I work on so do yourself a favor. If you want to learn more in detail, get this book.

And don't forget as Red Green says, "if the women don't find you handsome they should at least find you handy".

Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

More About the Author

Ed Tittel is a full-time freelance writer, trainer, and consultant who specializes in information security, markup languages, and networking technologies. He is a regular contributor to numerous TechTarget websites; teaches online security and technology courses for HP; and writes regularly for Tom's Hardware and ITExpertVoice.

Ed has contributed to over 100 books on various computing subjects, including a dozen different titles in the ...For Dummies series. He is probably best known for creating the Exam Cram series of IT certification prep books in 1997, and for having edited that series from 1997 until 2006. Ed's best-selling titles include "HTML, XHTML and CSS For Dummies" (soon to go into a 7th edition, for a cumulative total of 13 editions of HTML For Dummies titles he's worked on), "The Guide to TCP/IP" (which he co-authored with protocol expert Laura Chappell), "Windows Server 2008 For Dummies," and "Networking Essentials." He's also written numerous titles on security including the "CISSP Study Guide" (4th edition, with co-authors James Michael Stewart and Mike Chapple), "The PC Magazine Guide to Fighting Spyware, Viruses, and Malware," and the "TISCA Training Guide."

For more information on Ed, please visit his personal Website at You can also visit his profile on LinkedIn at to get information about various blogs and other activities.

What Other Items Do Customers Buy After Viewing This Item?