Blocking Spam & Spyware for Dummies

From the Back Cover
Fight back and save money with these expert tips
Find out what spam and spyware cost your company, and how to stop them

Whether yours is a one-person business or a multi-million dollar corporation, here’s help giving spammers and spies the bum’s rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential.

Discover how to

Understand how spammers get addresses
Calculate the cost of spam and spyware
Re-engineer your business processes
Select spam and spyware filters
Manage implementation and maintenance
About the Author
Peter Gregory, CISA, CISSP, is a career IT guy who has worn just about every hat that could be worn in the Data Processing/Information Systems/Information Technology business. Peter has IT experience in government, banking, nonprofit, legalized gambling, and telecommunications. The Usenet-E-mail-Internet bug bit him in the mid 1980s. He has spent the past eleven years in two wireless telecom companies, working in positions where he develops security policy, security architecture, and security emergency response teams, and is a security consultant in general.
His passion for computers is matched only by his dedication to helping people know how to use information systems — from personal computers to mainframes — more effectively and safely. He achieves this through his speaking appearances at security conferences, in ComputerWorld and other online publications, and through a security consulting company that he cofounded in 2002.
Michael A. Simon works as a computer security consultant in the Seattle area and the northwestern U.S. with clients in banking, e-commerce, health care, and biotechnology. Mike has been working in IT security for around 20 years and wrote his first programs on punched cards for an IBM mainframe in the early 1980s. Although he doesn’t get much chance to exercise his skills in COBOL or Fortran these days, he keeps a deck of blank IBM punch cards around just in case.
For the last 10 years, Mike has been working for the company that he cofounded with Corwin Low when the Internet was more innocent, and convincing people of security’s importance was a difficult task. Mike keeps busy assessing new threats for his clients, lecturing at Seattle University and the University of Washington, and advancing the public service goals of Northwest Security Institute, a non-profit that he helped to found.

Related Articles

Blocking Spam and Spyware for Dummies

Fight back and save money with these expert tips

Find out what spam and spyware cost your company, and how to stop them

Whether yours is a one-person business or a multi-million dollar corporation, here’s help giving spammers and spies the bum’s rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential.

Discover how to

* Understand how spammers get addresses
* Calculate the cost of spam and spyware
* Re-engineer your business processes
* Select spam and spyware filters
* Manage implementation and maintenance

Computer Viruses for Dummies

Computer viruses–just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:

Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

IT Disaster Recovery Planning for Dummies

If you have a business or a nonprofit organization, or if you’re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it’s easy to put it off. After all, where do you start?
IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you’re hit by a tornado or a disgruntled employee with super hacking powers. Here’s how to assess the situation, develop both short-term and long-term plans, and keep your plans updated.

This easy-to-understand guide will help you

Prepare your systems, processes, and people for an organized response to disaster when it strikes
Identify critical IT systems and develop a long-range strategy
Select and train your disaster recovery team
Conduct a Business Impact Analysis
Determine risks to your business from natural or human-made causes
Get management support
Create appropriate plan documents
Test your plan

Some disasters get coverage on CNN, and some just create headaches for the affected organization. With IT Disaster Recovery Planning For Dummies, you’ll be prepared for anything from hackers to hurricanes!

Hacking Wireless Networks For Dummies

Become a cyber-hero – know the common wireless weaknesses
“Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.”
–Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient – not only for you, but also for those nefarious types who’d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network’s armor.

Discover how to:
– Perform ethical hacks without compromising a system
– Combat denial of service and WEP attacks
– Understand how invaders think
– Recognize the effects of different hacks
– Protect against war drivers and rogue devices

Hacking Wireless Networks for Dummies

Become a cyber-hero – know the common wireless weaknesses
“Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.”
–Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient – not only for you, but also for those nefarious types who’d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network’s armor.

Discover how to:

Perform ethical hacks without compromising a system
Combat denial of service and WEP attacks
Understand how invaders think
Recognize the effects of different hacks
Protect against war drivers and rogue devices