Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover Page
Title Page
Copyright
Dedication
Foreword
Disclaimer
Apocalyptic Assumptions
About this Book
About the Author
Author’s Statement
About the use of “Pathogens”, “Contagions” and “Contaminants”
About the use of the term ‘anti-virus software’
About “Identity Theft” and “Identity Fraud”
About the use of “Piracy”, “Cracking”, “Ripping” and “Warez”
About the use of ‘Safer’ Computing?
About the ACME Corporation
About the Zombie Apocalypse
About Baron Samedi
The Tao of Information
The Reality Behind Zombies—It Can Happen to You
Godfathers, Zombie Masters and Magic: The World of Cybercrime
Basic Internet and Computing Terms used in this Book (a must read)
Hackers and Botmasters: the Minds behind the Zombies
White Hat and Black Hat Hackers
The Magic Behind Cybercrime
The Architects of Spam
The Zombie Attack Examined
The Immunity Myth—Why Mac has joined the PC on the Zombie Menu
Stealing from the Matrix
Chasin’ Strange in Cyberspace
My Computer Caught a Virus—How did this happen?
The Carrier Website
Porn, Piracy and Minors
Porn—The Unstoppable Guilty Pleasure
The Truth Behind Popular Misconceptions about Viruses
The Key Secrets to Freeing your Computer from a Zombie Infection
Zombie Infection: Understanding Rescue and Recovery
Zombie Infection: Rescue Discs and Rescuing your Data
Zombie Infection: Data Recovery
Lost Microsoft Word Documents
Zombie Outbreak Classifications
Zombie-Possessed—How Will I Know When My Computer is Infected?
The Dangers of Dead Computers
A Computer’s Life: From New to Disposal
When is it time to get a new computer?
New Life for Old Computers
Cybercrime Potluck: Dangerous Secrets from Dead Computers
The Bizarre Afterlife of Data
Shoot it in The Head—Safe Data Destruction (digital)
Wiping your Hard Drive Clean (non-destructive, for selling or donating)
Microsoft Windows hard-drive wipe:
Mac OS X hard-drive wipe:
Data Shredders
Sell the Computer or Give it Away
Donate or Obliterate—What to do with that old computer
Corporate Zombies: Living, Dead and Unemployed
The Truth about Digital Privacy in the Office
The Company IT Policy: A Necessary Evil
Saved by Zombies
BYOD—Bring Your Own Device Policy
BYOD Policy Challenges
Fortifying your Network against Attacks (Basic Network Security)
Maintaining the Fort (Working Business Network Security Plan)
Starting your Company’s Security Policy In-house
Extra Crispy Drama—When Ignored Policies Go Bad
Keeping Zombies at the Gate: The Network Operations Center
Lock the NOC
Securing your Website
Small Business Servers
Workstations—Desktops & Laptops
Do Not Feed the Animals—Protection against Disgruntled Employees
Shoot it in The Head—Safe Data Destruction, Part II (print)
Dumpster Diving—A Phishing Tale
Social Engineering—The Unfixable Flaw in Most Security Standards
Social Engineering and Senior Citizens
The X-Factor—When the Ex Turns Zombie
Social Networks—The Zombie’s Gourmet Buffet
Adversary Targeting—Facebook, Unseen Enemies and You
Remote Access to your Small Business Network
Remote Access
Remote Access Software (Free-n-Cheap)
Remote Access Software (Commercial)
Cloud-Based Remote Access Services
Remote Access over a VPN
SSL VPN
Server-Based Remote Access
The Cloud: Sanctuary or Sacrificial Altar?
Types of Clouds
The Bright Side of Cloud Computing
Titanium or Tulips—The Realities of Cloud Computing
The Rookie Mistake—First Burn in the Cloud
Venturing into the Cloud—The Top
Private Cloud
Disaster Recovery for Home and Office
Disaster Recovery—The Plan
Disaster Recovery—Backups
Different types of backups
Full, Incremental, and Differential
Backup Software versus Imaging Software
Backups for Business
Quickie Overview of the Backup Process
Inexpensive SOHO and Home Backups
When Plan B Fails—A Final Caution about Backup Solutions
Protecting your Investment—The Happy Audit
License Key Finders
Home Backup Solutions
Apocalyptic Emergency Identity Recovery Kit
What about using The Cloud?
Dirty Secrets about your Computer
Dirty Secret #1: Your Computer is a Rat
Dirty Secret #2: Your Computer Storage has a Lifespan
Dirty Secret #3: Your Burned CDs and DVDs are Not Permanent
Dirty Secret #4: SSDs are NOT the Wave of the Future
General Defense Tactics Against Zombies
The Joys of Bulletproof Passwords
Keep it Movin’—Routine Password Changes
Password Management
Zombies Don’t Play—Gaming Console Security
I think my [game console] has a virus!
My webmail got hacked—how come my anti-virus didn’t catch it?
Spoofed Email
Cracked Email
Safer Web Browsing Habits
I heard that _____ is safer than Internet Explorer? Is this true?
What is Java? And should I let it update?
Evading Zombies at the Mall: Steps to Safer Online Shopping
Live CDs: The Secret to Worry-Free Web Browsing
Travel Tips: Smarter, Safer computing while on the go
The Pros and Cons of USB Flash Drives
Mobile Devices: The New Trend in Organic Dining for Zombies
SMiShing
The Frankenstein Lie: “Fix-My-PC-for-Cheap” websites
The Big Question: Is there any Hope?
Zombie Trivia Answers
Acknowledgements
Bibliography
← Prev
Back
Next →
← Prev
Back
Next →