Maximum Security: 94 Essential Tips for Staying Safe

 

Passwords
Check Your Password (Microsoft)
The Password Meter
Are Passwords Really Secure?
Passwords and Passphrases

Social Engineering

Social Engineering (defined)
Social Engineering Fundamentals: Hacker Tactics I
Email
  Anti-Virus Protection
Viruses, Worms, and Trojans
Virus/Worm Generated Messages
Email Security Practices
Microsoft: Avoid Viruses In Email Attachments

Email Hoaxes

Symantec's Security Response for Hoaxes
Characteristics of an Email Hoax
Internet Hoaxes, Email Rumors and Urban Legends
  Spam
Anti-Spam Strategies and Tools
Dealing with Spam
Spam Stoppers (from TechLearning)
Spam Prevention Strategies
"Opt-out" Spam Tricks

Opt Out: Direct Marketing Association (DMA) Opt-Out

  Phishing
Phishing Scams
Social Networks

Five Hidden Dangers of Facebook
Spyware
Spyware: Definition
Spybot Spyware Remover Software
Anti-Spyware Guide
Microsoft: Malware Removal Tool
Microsoft: Security at Home--Spyware
Microsoft: Five Steps to Preventing Spyware
Browser Hijacking and Drive-by Downloads

What is Browser Hijacking?
Browser Hijack  or Browser Help Object?
Domain Name Ownership

WhoIs Domain Names Database Search
Browser Advertising
Pop-Ups, Pop-Unders, and Floating Ads
Google Toolbar Pop-Up Blocker
Free Utilities

C-Cleaner

Avast

This page has been viewed Hit Counter times.

Last updated on 07/15/12 08:11 AM

Page copy protected against web site content infringement by Copyscape