Hack Proofing Your Identity In The Information Age book cover

Hack Proofing Your Identity In The Information Age

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.


Published: July 2002

Imprint: Syngress

ISBN: 978-1-931836-51-7


  • Foreword

    Chapter 1 Identity Theft: Are You At Risk


    Defining Identity Theft

    Take a Risk Factor Test

    Why Do They Do It

    How Do They Get Away with It

    Recognizing Identity Theft When It Happens

    Understanding What Electronic Information Is Private

    Striving for Theft Prevention

    Keeping Private Information Private

    Protecting Your Social Security Number

    Taking Advantage of Marketing Opt-Out Programs

    Protecting Your Computer


    Solutions Fast Track

    Frequently Asked Questions

    Chapter 2 Protecting Your Hard Drive


    Know Your Computer

    Temporary Files

    Temporary Internet Files

    Deleting Files Permanently for Privacy

    Other Information that Might be on Your Computer

    What Are You Protecting

    Antivirus Software:Your First Line of Defense

    What You Might Not Know about Antivirus Software

    What Kinds of Software Are Available

    Performing Signature Updates

    Is Your Antivirus Software Working

    Updating Your Software

    The Number One Mistake People Make

    Functionality Vs. Secure Updates

    Installing Security Patches

    Beware of the Free Stuff

    Avoiding Account Sharing

    Common Reasons, Risks, and Deterrents for Sharing Accounts

    Creating Multiple Accounts in Windows

    Creating Multiple Internet Connection Accounts

    Creating Multiple E-mail Accounts with Outlook Express

    Using Disk and File Encryption

    Choosing Strong Passwords

    Avoiding Weak Passwords

    Tradeoffs: Using Password Storage

    Creating Strong Passwords You Can Remember


    Solutions Fast Track

    Frequently Asked Questions

    Chapter 3 Keeping Your E-mail Private


    E-mail Privacy Is Not Just about Spam

    How E-mail Services Work

    Big Brother and Your E-mail

    How E-mails Can Get Lost

    Understanding Spam

    E-mail Attacks Are Not Just about Viruses

    E-mail Attachments

    How Your E-mail Can Be Hijacked

    E-mail Interceptions

    Recognizing Mail Scams

    Solicitations and Chain Letters

    Spam as Social Engineering

    Using Antivirus Protection for E-mail

    Hiding Your E-mail Identity

    Knowing What’s in Your E-mail Headers

    Knowing What Your Chat Says about You

    Setting Up Anonymous E-mail

    E-mail Encryption Made Simple

    Using Pretty Good Privacy (PGP) with Microsoft Outlook

    Using Personal Certificates with Netscape

    Verifying E-mail Senders in Outlook

    Importing a Personal Certificate File into Opera

    Choosing a Secure E-mail Provider

    Using Encrypted Web-based E-mail


    Solutions Fast Track

    Frequently Asked Questions

    Chapter 4 Self Defense on the Web


    Understanding Risk on the Web

    Learning to Be Street Smart on the Web

    Understanding the Privacy Policy

    Managing Risk on the Web

    Managing Passwords

    Protecting Your Purchasing Power

    Anonymous Web Surfing

    Improving Browser Safety

    Updating Your Browser Software

    Putting Browser Security Features to Work

    Covering Your Internet Footprints

    Deleting Hidden Information About You

    Opting Out of Ad-ware Cookies


    Solutions Fast Track

    Frequently Asked Questions

    Chapter 5 Connecting to the Internet Safely


    Different Connections, Different Risks

    Understanding Network Terminology

    Dial-up Connections

    Always-on Broadband

    Understanding Data Interception

    Taking Precautions

    Setting Permissions for Shared Drives and Files

    Registering Your Domain.com

    Turning Off Unneeded Services

    Securing Your Personal Web Server

    Firewalls for the Home

    Personal Firewalls for Home Office Use

    Network Firewalls for Home Office Use

    Using Common Firewall Configuration Features


    Solutions Fast Track

    Frequently Asked Questions

    Chapter 6 Are Your Kids Putting You at Risk


    Raising Children in the Digital Age

    Keeping Clear Online Identities within Families

    Supervising Online Activities

    Channeling a Child’s Interest in Hacking

    Identifying Risky Software and Risky Behavior

    Chat Programs

    Web Forums and Newsgroups

    Massive Multiplayer Online Games

    File-Sharing Software

    Hacking Tools

    Monitoring Online Activities

    Parental Contracts

    Application Logging

    Browser Activity Logging

    Keystroke Logging

    Screen Imaging

    Avoiding Monitoring Pitfalls


    Solutions Fast Track

    Frequently Asked Questions

    Chapter 7 If You Become a Victim


    Taking Immediate Action

    Step 1: Filing Police Reports

    Step 2: Reporting Fraud and Stolen Accounts

    Step 3: Notifying the Federal Trade Commission (FTC)

    Managing Other Fraud Situations

    Managing the Fallout

    Contacting Credit Bureau Services

    Knowing When to Seek Legal Help

    Keeping Records

    Locating Government Resources

    Statutes in Your State

    Federal Trade Commission

    Other Suggested Resources

    Privacy Rights Advocates


    Solutions Fast Track

    Frequently Asked Questions

    Chapter 8 Configuring Your Browser and Firewall


    Managing Your Web Browser’s Security Features

    Internet Explorer Version 6

    Netscape 6.2

    Opera 6

    Configuring Your Home Firewall

    BlackICE Defender for Windows

    Zone Alarm Pro for Windows

    Siemens Speedstream SS2602 DSL/Cable Router

    Applications Port List



advert image