E-mail has been the frequent target of malware writers. Malicious e-mail attachments, embedded content, rogue URL links, and other techniques have been used to exploit clients. Users can take many steps to significantly improve their e-mail security. Defense steps, including converting all e-mail to plain-text, running dangerous content in the Restricted zone, blocking dangerous file attachments by default, protecting passwords, and enabling anti-malware software.
Chapter 11 covers Windows Vista's much-improved Windows Firewall.