Hack Proofing Your Identity In The Information Age - 1st Edition - ISBN: 9781931836517, 9780080478081

Hack Proofing Your Identity In The Information Age

1st Edition

Authors: Syngress
eBook ISBN: 9780080478081
Paperback ISBN: 9781931836517
Imprint: Syngress
Published Date: 7th July 2002
Page Count: 512
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.

Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.

Key Features

Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.

Table of Contents


Chapter 1 Identity Theft: Are You At Risk


Defining Identity Theft

Take a Risk Factor Test

Why Do They Do It

How Do They Get Away with It

Recognizing Identity Theft When It Happens

Understanding What Electronic Information Is Private

Striving for Theft Prevention

Keeping Private Information Private

Protecting Your Social Security Number

Taking Advantage of Marketing Opt-Out Programs

Protecting Your Computer


Solutions Fast Track

Frequently Asked Questions

Chapter 2 Protecting Your Hard Drive


Know Your Computer

Temporary Files

Temporary Internet Files

Deleting Files Permanently for Privacy

Other Information that Might be on Your Computer

What Are You Protecting

Antivirus Software:Your First Line of Defense

What You Might Not Know about Antivirus Software

What Kinds of Software Are Available

Performing Signature Updates

Is Your Antivirus Software Working

Updating Your Software

The Number One Mistake People Make

Functionality Vs. Secure Updates

Installing Security Patches

Beware of the Free Stuff

Avoiding Account Sharing

Common Reasons, Risks, and Deterrents for Sharing Accounts

Creating Multiple Accounts in Windows

Creating Multiple Internet Connection Accounts

Creating Multiple E-mail Accounts with Outlook Express

Using Disk and File Encryption

Choosing Strong Passwords

Avoiding Weak Passwords

Tradeoffs: Using Password Storage

Creating Strong Passwords You Can Remember


Solutions Fast Track

Frequently Asked Questions

Chapter 3 Keeping Your E-mail Private


E-mail Privacy Is Not Just about Spam

How E-mail Services Work

Big Brother and Your E-mail

How E-mails Can Get Lost

Understanding Spam

E-mail Attacks Are Not Just about Viruses

E-mail Attachments

How Your E-mail Can Be Hijacked

E-mail Interceptions

Recognizing Mail Scams

Solicitations and Chain Letters

Spam as Social Engineering

Using Antivirus Protection for E-mail

Hiding Your E-mail Identity

Knowing What’s in Your E-mail Headers

Knowing What Your Chat Says about You

Setting Up Anonymous E-mail

E-mail Encryption Made Simple

Using Pretty Good Privacy (PGP) with Microsoft Outlook

Using Personal Certificates with Netscape

Verifying E-mail Senders in Outlook

Importing a Personal Certificate File into Opera

Choosing a Secure E-mail Provider

Using Encrypted Web-based E-mail


Solutions Fast Track

Frequently Asked Questions

Chapter 4 Self Defense on the Web


Understanding Risk on the Web

Learning to Be Street Smart on the Web

Understanding the Privacy Policy

Managing Risk on the Web

Managing Passwords

Protecting Your Purchasing Power

Anonymous Web Surfing

Improving Browser Safety

Updating Your Browser Software

Putting Browser Security Features to Work

Covering Your Internet Footprints

Deleting Hidden Information About You

Opting Out of Ad-ware Cookies


Solutions Fast Track

Frequently Asked Questions

Chapter 5 Connecting to the Internet Safely


Different Connections, Different Risks

Understanding Network Terminology

Dial-up Connections

Always-on Broadband

Understanding Data Interception

Taking Precautions

Setting Permissions for Shared Drives and Files

Registering Your Domain.com

Turning Off Unneeded Services

Securing Your Personal Web Server

Firewalls for the Home

Personal Firewalls for Home Office Use

Network Firewalls for Home Office Use

Using Common Firewall Configuration Features


Solutions Fast Track

Frequently Asked Questions

Chapter 6 Are Your Kids Putting You at Risk


Raising Children in the Digital Age

Keeping Clear Online Identities within Families

Supervising Online Activities

Channeling a Child’s Interest in Hacking

Identifying Risky Software and Risky Behavior

Chat Programs

Web Forums and Newsgroups

Massive Multiplayer Online Games

File-Sharing Software

Hacking Tools

Monitoring Online Activities

Parental Contracts

Application Logging

Browser Activity Logging

Keystroke Logging

Screen Imaging

Avoiding Monitoring Pitfalls


Solutions Fast Track

Frequently Asked Questions

Chapter 7 If You Become a Victim


Taking Immediate Action

Step 1: Filing Police Reports

Step 2: Reporting Fraud and Stolen Accounts

Step 3: Notifying the Federal Trade Commission (FTC)

Managing Other Fraud Situations

Managing the Fallout

Contacting Credit Bureau Services

Knowing When to Seek Legal Help

Keeping Records

Locating Government Resources

Statutes in Your State

Federal Trade Commission

Other Suggested Resources

Privacy Rights Advocates


Solutions Fast Track

Frequently Asked Questions

Chapter 8 Configuring Your Browser and Firewall


Managing Your Web Browser’s Security Features

Internet Explorer Version 6

Netscape 6.2

Opera 6

Configuring Your Home Firewall

BlackICE Defender for Windows

Zone Alarm Pro for Windows

Siemens Speedstream SS2602 DSL/Cable Router

Applications Port List



No. of pages:
© Syngress 2002
eBook ISBN:
Paperback ISBN:

About the Author

Ratings and Reviews