Donation?

Harley Hahn
Home Page

About Harley

Harley Hahn's
Usenet Center

Free Newsletter

Send a Message
to Harley

Harley Hahn's
Internet Yellow
Pages

Search Web Site

FAQ  |  Site Map

Harley Hahn's Internet Insecurity
HARLEY HAHN'S
INTERNET
INSECURITY

•  Read the book online right now
•  How to buy this book now


Display a larger picture of the cover

Do you have a right to privacy at work?

The answer may scare you. See "Why You Are On Your Own" in Chapter 2.

Would you like to know how to protect your personal information at work?

It's easy. Just read "Cleaning Out Your Computer Every Day" in Chapter 4.

Is your spouse having an online affair?

Don't let yourself be fooled. See "8 Signs That Your Spouse is Having an Online Affair" in Chapter 14.

Is that suspicious message real?

Find out for sure by reading "8 Sure-fire Ways to Spot an Email Hoax" in Chapter 8.

Are you concerned about the government monitoring your Internet activities?

You're in for a surprise. See "Is Big Brother Really Watching?" in Chapter 1.

Why are big companies allowed to trample on your rights to privacy?

Find out the real truth by reading "Have the Cowboys Run Amuck?" in Chapter 6.

Are you concerned about your family being exposed to pornography on the Net?

Don't be a victim. See "Net Sex and Pornography" in Chapter 14.

Is there a surefire way to protect your computer from viruses?

Yes! All you need to do is follow the instructions you'll find in "How to Be Safe: 4 Simple Rules" in Chapter 10.

Are you thinking about spending money on the Net?

Don't spend a dime until you have read "6 Ways to Protect Yourself When You Buy Online" in Chapter 13.

How can you safeguard your email address from advertisers and avoid unwanted email (spam)?

It's easier than you think. See "Protecting Your Email Address" in Chapter 8.

You need to protect your children when they use the Net, but what is the best way to do it?

The answer is in "Children and the Net" in Chapter 14.


HARLEY HAHN'S
INTERNET
INSECURITY

   Real Answers to Important Questions   

•  How to buy this book now


  • What Is "Harley Hahn's Internet Insecurity?"
  • Ordering Information
  • List of Chapters
  • Detailed Table of Contents
  • Information About Other Harley Hahn Books

    What is "Harley Hahn's Internet Insecurity?"

    Don't be fooled, this is not just a computer security book.

    To be sure, the book does explain how to protect your privacy — both at work and at home — and how to make sure that your computer is secure from viruses and hackers.

    However, there is more — a lot more.

    The term "Internet Insecurity" refers to the anxiety and confusion we all feel when we contemplate the forces of modern technology and how they shape our lives and control so much of what we do and what we think.

    Has it ever bothered you that corporations have much more power than individuals? Have you ever wondered why, when it comes to privacy, the governments which are supposed to represent us have so much trouble defending our interests (especially in the United States)?

    What about personal relationships, rumors, hoaxes, money, and interpersonal communication?

    What about your rights when you use a computer at work?

    This book is an intelligent person's guide to understanding why things are the way they are and what you can do to take control. Along the way, you will read about society, technology, business, politics, psychology, history, philosophy, relationships and money.

    If you have ever enjoyed any of Harley Hahn's books, you will love this one – and you will be surprised.


    Ordering Information
        Title: Harley Hahn's Internet Insecurity
       Author: Harley Hahn
    Publisher: Prentice Hall PTR
         ISBN: 0-13-033448-0
        Pages: 525
        Price: $19.99 U.S.
      
    List of Chapters

    Introduction  Coming of Age

    Chapter 1 Toward a Grand Unified Theory

    Chapter 2 Is Your Business Their Business?

    Chapter 3 Staying One Step Ahead

    Chapter 4 Taking Control

    Chapter 5 The Psychology of Privacy

    Chapter 6 You Just Think You Have Rights

    Chapter 7 The Politics of Privacy

    Chapter 8 Our Need to Communicate: Email, Chatting and Privacy

    Chapter 9 The Mystery of Viruses: Revealed

    Chapter 10 Protecting Your Stuff: Viruses and Common Sense

    Chapter 11 Protecting Your Stuff: Configuring Your System

    Chapter 12 Understanding Money

    Chapter 13 Protecting Your Money: Shopping and Selling Without Fear

    Chapter 14 Protecting Your Family: Sex, Relationships and Children

    Appendix Abbreviations Used While Talking on the Net


    Table of Contents

    Introduction  Coming of Age

    Chapter 1  Toward a Grand Unified Theory

       • The Roots of the Internet
       • The Internet is Now "The Net"
       • Is Big Brother Really Watching?
       • Carnivore in an Omnivore
       • What the FBI Assistant Director Has to Say
       • When Internet Law Enforcement Runs Amuck
       • What Superintendent Babin Has to Say
       • How the Internet Works: TCP/IP
       • Moving the Data: Routers, MAEs and NAPs
       • Who Runs The Internet?
       • The Nature of the Net
       • Is It Realistic to Have an Expectation of Privacy?

    Chapter 2  Is Your Business Their Business?

       • It's Different at Work
       • The Rules Rule
       • Why You Are on Your Own
       • What Not to Do at Work
       • The Weak Links in the Chain of Privacy
       • It's Worse Than You Think
       • Even Paranoids Have Real Enemies
       • Protecting Yourself
       • Software That Snoops

    Chapter 3  Staying One Step Ahead

       • Some Web Terminology
       • Your Browser History
       • Where the Pictures Are: Your Cache
       • AutoComplete
       • Controlling Your Browser History
       • Controlling AutoComplete
       • Disks and Discs
       • How Data Is Measured on a Disk
       • Strange Metric Terminology
       • Files and Folders
       • Windows Explorer
       • Windows Explorer Options
       • Flushing the Cache

    Chapter 4  Taking Control

       • Some Web Terminology
       • Your Browser History
       • Where the Pictures Are: Your Cache
       • AutoComplete
       • Controlling Your Browser History
       • Controlling AutoComplete
       • Disks and Discs
       • How Data Is Measured on a Disk
       • Strange Metric Terminology
       • Files and Folders
       • Windows Explorer
       • Windows Explorer Options
       • Flushing the Cache

    Chapter 5  The Psychology of Privacy

       • Transition and Ignorance
       • Why Talk About Privacy?
       • What Is Privacy?
       • A Lack of Vocabulary
       • Our Desire for Privacy
       • The Controlling Forces
       • Who Gets Privacy?
       • Our Real Needs

    Chapter 6  You Just Think You Have Rights

       • Do We Have a Right to Privacy?
       • The Highest Law of the Land
       • What the Supreme Court Has to Say
       • Thinking on a Large Scale
       • The American Frontier
       • Why Americans Are Cowboys
       • Have the Cowboys Run Amuck?
       • Why We Let Them Get Away With It

    Chapter 7  The Politics Of Privacy

       • The Rules
       • Privacy Policies
       • How to Think About Privacy Policies
       • Why ID Numbers Are Important
       • U.S. Social Security Numbers
       • Should We Be Worried?
       • What Privacy Commissioner Slane Has to Say
       • Why We Need Regulation

    Chapter 8  Our Need to Communicate: Email, Chatting
    Chapter 8  and Privacy

       • The Biological Urge to Communicate
       • Computing as a Social Activity
       • The Golden Age of Computing
       • The Personal Computer
       • The Reason for Networks
       • Is the Net Enough?
       • Sharing by Email
       • How to Share by Email
       • Emailing Blind Copies
       • Embarrassment and Distress: A True Story
       • Why Is There So Much Misinformation on the Net?
       • 8 Sure-fire Ways to Spot an Email Hoax
       • Hoaxes and Urban Legends
       • The 5 Biggest Email Mistakes
       • Protecting Your Email Address
       • How to Get a Disposable Email Address
       • Protecting Other People's Email Privacy
       • Talk is Cheap (and Not Very Private)
       • Abbreviations and Acronyms

    Chapter 9  The Mystery Of Viruses: Revealed

       • What Are Viruses?
       • The Virus Challenge
       • How a Virus Spreads From One File to Another
       • Who Creates Viruses?
       • The Three Types of Viruses
       • Virus Hoaxes
       • The Trojan Horse
       • Early Computer Viruses
       • Early Worms
       • The Last Days of Innocence
       • The Worm That Brought Down the Net
       • The Internet Worm: Prologue
       • Quick Diversion: A Puzzle

    Chapter 10  Protecting Your Stuff: Viruses and
    Chapter 10  Common Sense

       • Who Needs Special Virus Protection?
       • How Viruses Spread by Sharing Files
       • What to Do About Regular Viruses
       • How Viruses Spread Through Email
       • What Happens When You Open a File?
       • What to Do About Email Viruses
       • Making Sure Attachments Are Really Gone
       • Security Vs. Convenience
       • Macro Viruses
       • Early Macro Viruses
       • What to Do About Macro Viruses
       • Antivirus Programs: The Real Truth
       • What Should You Do If You Get a Virus on Your Computer?
       • How to Be Safe: Four Simple Rules
       • Quick Diversion: The Solution

    Chapter 11  Protecting Your Stuff: Configuring
    Chapter 11  Your System

       • Two Startling Truths
       • Are There Dangerous Web Sites?
       • Scripting Languages
       • Making Your Browser Safe
       • Making Your Email Program Safe
       • Extra Protection Against Evil Scripts
       • How to Remove Windows Scripting Host (Windows 98/ME)
       • How to Remove Dangerous File Extensions (Windows 95)
       • Protecting Your Network: Firewalls
       • Late One Night

    Chapter 12  Understanding Money (Really!)

       • What is Money?
       • The Idea of Money
       • Who Invented Money?
       • Coins
       • Paper Money
       • The First Successful Paper Money
       • Inflation and Hyperinflation
       • The Real Lesson of History
       • How Roosevelt and Nixon Ended the Gold Standard
       • Business Cycles: Why Someone Needs to Be In Charge
       • Who Controls the Money Supply?
       • How Most Money is Created
       • How the Fed Creates and Destroys Money: Part I
       • How the Fed Creates and Destroys Money: Part II
       • Money Desensitization
       • Money and You
       • Money and the Net
       • The Internet Factor

    Chapter 13  Protecting Your Money: Shopping
    Chapter 13  and Selling Without Fear

       • Two True Stories
       • How the Net Affects Buying and Selling
       • What Is It Like to Buy Something On the Net?
       • How to Protect Your Privacy When You Buy Online
       • Why It Is Okay to Specify Fake Information
       • Is It Safe to Buy Online?
       • Will a Hacker Get Your Credit Card Number?
       • What You Really Need to Worry About
       • 6 Ways to Protect Yourself When You Buy Online
       • 5 Ways to Evaluate an Online Vendor
       • Shipping and Handling Charges: The Real Truth
       • How to Find What You Want: Shopping Bots
       • How to Find What You Want: Search Engines
       • Personal Financial Services
       • Several Words to the Wise
       • Online Payment Services
       • What is an Online Auction?
       • Getting Started With Auctions
       • How to Protect Yourself Against Auction Fraud
       • 10 Tips to Make Online Auctions Work for You
       • The Most Important Hint of All

    Chapter 14  Protecting Your Family: Sex, Relationships
    Chapter 14  and Children

       • Understanding Our Basic Nature
       • Evolution and Natural Selection
       • The Secret of Life
       • Sexual and Asexual Reproduction
       • Why We Need Relationships
       • Why We Need Friends and Family
       • What Really Happens When You Talk on the Net
       • The Nature of Friendship
       • A Modern-Day True Love Story
       • Couples and the Net
       • 8 Signs That Your Spouse is Having an Online Affair
       • What to Do If Your Spouse is Having an Online Affair
       • Net Sex and Pornography
       • Children and the Net

    Appendix  Abbreviations Used While Talking on the Net