The Complete Guide to E-Security: Protect Your Privacy on the Internet 0806522798, 9780806522791

The Complete Guide to E-Security: Protect Your Privacy on the Internet. Michael Chesboro. Citadel Press. 2001.

232 115 7MB

English Pages 179 Year 2001

Report DMCA / Copyright

DOWNLOAD FILE

Polecaj historie

The Complete Guide to E-Security: Protect Your Privacy on the Internet
 0806522798, 9780806522791

Citation preview

4

THE

" LI

COMPLETE

oe -

+“. ‘=.

GUIDE

a

TO

a a

cca

4

gg

nn

+ @6O44R4

a

5582"

ae

oe

MICHAEL

CHESBRO

AINA YI |Ih CLUES

pri

ite

VeVi Le Be GUIDE TO

ESecurity

For Joni. Timeless beauty that nothing could improve.

Pee

THE

COMPLETE GUIDE

TO

E-Security PRIVACY ON THE — ee

INTERNET

MICHAEL

_

CHESBRO

Also by Michael E. Chesbro: Privacy for Sale: How Big Brother and Others Are Selling Your Private Secrets for Profit

CITADEL PRESS books are published by Kensington Publishing Corp. 850 Third Avenue New York, NY 10022 Copyright © 2000 Michael E. Chesbro

All rights reserved. No part of this book may be reproduced in any form or by any means without the prior written consent of the publisher, excepting brief quotes used in reviews. All Kensington titles, imprints, and distributed lines are available at special quantity discounts for bulk purchases for sales promotions, premiums, fund-raising, educational, or institutional use. Special book excerpts or customized printings can also be created to fit specific needs. For details, write or phone the office of the Kensington special sales manager: Kensington Publishing Corp., 850 Third Avenue, New York, NY 10022. attn: Special Sales Department, phone 1-800-221-2647.

Citadel Press and the Citadel logo are trademarks of Kensington Publishing Corp. First Citadel printing: October 2001

IK

Soe 7h

0)

Ma ie

8h

al

Printed in the United States of America Cataloging data for this title may be obtained from the Library of Congress. ISBN 0-8065-2279-8

Table of Contents

Chapter |: The Need for Private Communication Chapter 2: Understanding E-Mail and the Internet Internet Protocol E-Mail Traps Trace Route Effective Use of Passwords Junk E-Mail, Pornography, and Spam Anonymous Web-Browsing Online People Finders Chapter 3: Free E-Mail Services HushMail SAFe-mail ZipLip Unencrypted Web-Based E-Mail Juno Chapter 4: Remailers Chapter 5: Understanding Encryption Chapter 6: PGP and Digital Certificates Chapter 7: One-Time Pads Chapter 8: Encryption Programs Norton Secret Stuff Security Box Two Fish Lite—with Key Generator Passwords and Encryption Built into Other Software Steganography Chapter 9: Securely Deleting or Hiding Files Chapter 10: Communications Planning ........ Vv

The Complete

Guide to E-Security

Chapter 11: Online Communications and the Law Privacy in the E-World and the Physical World . .115 GRapter LA ringl Word ©

ef?

IF

YOU

THINK

YOU’RE

ONLINE...THINK

ALONE

AGAIN

- sc

As cutting-edge advances in technology increase at a breathtaking rate, personal privacy is becoming harder to maintain. The fact is, your communica-

— _

tion through e-mail and Web sites can be seen by dozens of unauthorized _ readers—from marketers to nosy coworkers to criminal hackers who can steal your credit card numbers, social security number—and your identity itself. Even the Federal government can secretly monitor you via the Internet.

— "

:

—_

Now, with this eye-opening book, you'll learn how to protect yourself from BP

these unwanted intrusions. Written by a former intelligence agent with the U. S. x Department of Defense, THE COMPLETE GUIDE TO E-SECURITY gives — you the most up-to- date information on:

AF

e Avoiding ennai traps and faked Web sites ¢ Creating an effective, uncrackable password — ¢ Surfing the Net anonymously ¢ Protecting your children from pornographic Web sites

¢ Using encryption (disguising text through use of a code) ° pesegegrame your pee records from seizure

Writtenin diane ienepe free afargued jargon, thisinvaluable resource isa

oa must for anyone who wants to ensure safe, ananymntly use of thInthe ee *

@&@e

penal

“Contains simple techniques and practices| thatwilliincrease4) personal security and safety in the Information. Age.Peeos







—Agent Myah Strong, i. ease Senior Intelligence Officer, U.S. Department of‘Defense ;;; ‘

"

ISBN

ut

ei



e

“2

2

é.2-¢

0-8065-2279 512

a: Zpl-d |

CITADEL PRESS

©|

|UO VALSQ AQT VMUUSY UY

EAN

KENSINGTON U.S. $12.00

CAN $18.00 PRINTED

IN U.S.A.

806"522 on

|