Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.
What is a desktop witness?
Your computer stores a record of every document you create, every e–mail you write or receive, which sites you visit on the Internet, even attachments which you don′t open.
An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may ′let in′ outsiders through your IR port. It ′whispers′ behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.
What can you do?
This straight–talking guide, with its easy–to–follow instructions will enable you to regain control and protect your personal information. It will show you the virtues of computer–anonymity, by making you aware of what might motivate people to access your computer in the first place, and it will help you free–up valuable memory by showing you how to really delete the files your computer stores without your knowledge.
A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.
The Need is Very Real: Author′s Perspective
So You Want to Encrypt: Don′t Hurt Your Own Interests by Doing So
Protect What and From Whom? The Answer Determines What You Should and Should Not Do
Effective Protection for Computers Not Connected to Networks
Effective Protection for Computers Connected to the Internet or other Networks
" this book is fascinating will provide some very valuable information, and an alternative perspective " (M2 Best Books, 29 August 2002)