- Series: PC Magazine (Book 3)
- Paperback: 382 pages
- Publisher: Wiley; 1 edition (December 31, 2004)
- Language: English
- ISBN-10: 0764577697
- ISBN-13: 978-0764577697
- Product Dimensions: 7.4 x 0.8 x 9.2 inches
- Shipping Weight: 1.3 pounds
- Average Customer Review: 5 customer reviews
- Amazon Best Sellers Rank: #1,213,736 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
PC Magazine Fighting Spyware, Viruses, and Malware 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
All Books, All the Time
Read author interviews, book reviews, editors picks, and more at the Amazon Book Review. Read it now
From the Back Cover
Think there's no malicious software on your computer? PC Magazine thinks you should think again.
Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computerlike yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PCalong with your wallet.
Here's how you can
- Learn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PC
- Get the tools that can cure an infection
- Dig into the Windows Registry to remove the nastiest of bugs
- Prevent a recurrence with personal firewalls and protective software
- Deal with the onslaught of spam
- Keep your defenses up-to-date
Give it the boot
If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system bootedthat is, before you got infected.
From Chapter 4
About the Author
Ed Tittel has been writing, researching, and teaching about Windows security topics since 1996. An inveterate tinkerer cursed with incurable curiosity, he's become a connoisseur of protection tools and techniques to battle spyware, adware, and malware.
Top customer reviews
If you really want a fast read broken down into areas that let you know how the bad guys are screwing with your computer AND you buy this book.
You will learn what spyware, malware, viruses and trojans are and the best ways-products to use. No second guessing and in fact this book should be required reading for all American students.
On average I find about 35 instances of pests per PC I work on so do yourself a favor. If you want to learn more in detail, get this book.
And don't forget as Red Green says, "if the women don't find you handsome they should at least find you handy".
So it's you and Tittel against the 3 menaces. Be aware that the terminology in the text and title may vary from what others use. Often, malware is taken to include viruses. I think he chose to break viruses out separately from malware so that the title would outreach to more people. Malware is still somewhat of a techie term, while spyware and viruses have broader recognition.
Naturally, since we're discussing personal computers, the text tends to focus on those running a Microsoft operating system. But in fact, much of his advice applies to Macs and linux/unix machines. Though users of the former 2 types might take heart in knowing that most viruses or worms won't go after their machines.
Tittel explains that increasingly, it's harder to draw clear lines between malware, spyware and adware. But he shows how to use existing anti-malware products that can scan for these and remove them. These products use combinations of signatures of known malware, and also search for "strange" activity that is typical of malware. However, since new variants of malware are continually being developed and found, you should always download the latest sets of signatures from your vendor, before running the tests.
Tittel also gives a succinct description of phishing. A particularly virulent type of malware that has increased enormously in the last 2 years. He suggests that you scrutinise the links and be very wary of any message that asks for personal information; either in a reply, or in a web page pointed to from that message. Unfortunately, the phishers continue to refine their tactics and many users simply aren't savvy enough to follow Tittel's suggestions. These users may be a minority, but there are enough of them to make this worthwhile for the phishers.
Not only viruses, but many other kinds of intrusive software would like to come into your machine for its own purpose. This book talks about the major kinds of invasions you might expect and how to prevent them from entering your machine.
Most of us have learned about viruses the hard way, we cought them and then had to learn how to clean the system. Here in one book is a complete introduction to the problem. It covers all the common types of problems a PC is likely to encounter in one place.