Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] scams, protecting against scanning engines searchbars security bundles antispyware/antiadware programs, enabling security scans, performing Sedgewick, John selecting antivirus software installation locations destination for file backups 2nd personal software firewalls 2nd Windows XP firewall ZoneAlarm SSIDs self-replication as characteristic of worms signatures active scans, performing detecting updating virus scans, performing social engineering, phishing scams avoiding nature of reporting tools used in software security bundles updating Spare Backup SPI (stateful packet inspection) firewalls deploying in home network Spybot Search & Destroy automated scanning spyware antispyware programs free versions installing as viruses avoiding "cow pattie" model infection, symptoms of popup blockers, installing preventing removal tools Add/Remove Programs panel Windows Defender SSIDs (service set identifiers) changing selecting stocks, pump-and-dump scams storing file backups CD/DVD storage on external hard drives on Flash memory on network storage drives online storage 2nd strong passwords anatomy of creating versus weak passwords Symantec Norton Internet Security 200x Symantec, Bloodhound feature symptoms of spyware/adware infection system files |