Protect Your Family on the Internet!
Teri Bidwell
Michael Cross —Technical Editor
Even though I’ve spent several years studying how criminals break into computer
systems, I thought I was just being paranoid the first time I saw one of those signature
capture devices at the local electronics store.
You know the kind I’m talking
about, where the clerk slides the receipt from your credit card onto a flat pad, and
you sign your name onto it using a pen that writes on the slip in ink but also records
an imprint of your signature electronically. Needless to say my curiosity got the
better of me. I asked the clerk,“What happens to my signature after I sign the slip?” I
figured that my signature was sent to the financial network that approved the charge
on my credit card, in order for it to be compared against my original credit application,
similar to the way banks use the signature cards they keep on file.
=CONTENTS=
Foreword xix
Chapter 1 Identity Theft: Are You At Risk?
Introduction 2
Defining Identity Theft 3
Take a Risk Factor Test 4
Why Do They Do It? 5
How Do They Get Away with It? 6
Dumpster Diving 7
Shoulder Surfing 8
Social Engineering 8
Physical Theft 10
Online Theft 12
Privacy Erosion 14
Limited Enforcement Resources 15
Recognizing Identity Theft When It Happens 15
Unauthorized Credit Cards 16
Unauthorized Phone or Other
Utility Services 16
Bank Fraud 17
Fraudulent Loans 18
Government Documents 18
Other Forms of Identity Theft 18
Understanding What Electronic Information
Is Private 19
Striving for Theft Prevention 22
Keeping Private Information Private 26
Protecting Your Social Security Number 26
Taking Advantage of Marketing Opt-Out
Programs 29
Using Search Engine Opt-Out Services 30
Using the Direct Marketing Association’s
Opt-Out Service 32
Protecting Your Computer 34
Applications 34
E-mail 34
Web Browsing 34
Network 35
Your Family’s Online Activities 36
Summary 37
Solutions Fast Track 38
Frequently Asked Questions 41
Chapter 2 Protecting Your Hard Drive
Introduction 44
Know Your Computer 44
Temporary Files 46
Temporary Internet Files 48
Deleting Files Permanently for Privacy 49
Other Information that Might be on Your
Computer 52
What Are You Protecting? 54
Password Protecting Your Computer 55
Programs and Files 57
Antivirus Software:Your First Line of Defense 59
What You Might Not Know about Antivirus
Software 60
Why Update? 61
What Kinds of Software Are Available? 61
Manually Updated Signatures 62
Automatically Updated Signatures 62
Web-based Software 63
Performing Signature Updates 63
McAfee 63
Norton 64
F-Prot 65
Is Your Antivirus Software Working? 66
Updating Your Software 68
The Number One Mistake People Make 69
Functionality Vs. Secure Updates 70
Installing Security Patches 70
Internet Explorer 71
Outlook 72
IIS 72
Netscape 73
Opera 73
Beware of the Free Stuff 73
Avoiding Account Sharing 74
Common Reasons, Risks, and Deterrents
for Sharing Accounts 75
Creating Multiple Accounts in Windows 76
Setting Up an Account in Windows XP 77
Setting Up an Account in Windows 2000 78
Creating Multiple Internet Connection
Accounts 78
Setting up Multiple Internet
Connection Accounts in Windows 98 79
Setting up Multiple Internet
Connection Accounts in Windows XP 79
Setting up Multiple Internet
Connection Accounts in Windows 2000 81
Creating Multiple E-mail Accounts
with Outlook Express 82
Using Disk and File Encryption 83
Choosing Strong Passwords 86
Avoiding Weak Passwords 87
Protecting PINs 89
Tradeoffs: Using Password Storage 90
Creating Strong Passwords You Can
Remember 93
Summary 98
Solutions Fast Track 99
Frequently Asked Questions 101
Chapter 3 Keeping Your E-mail Private
Introduction 104
E-mail Privacy Is Not Just about Spam 104
How E-mail Services Work 105
Big Brother and Your E-mail 108
How E-mails Can Get Lost 110
Understanding Spam 113
E-mail Attacks Are Not Just about Viruses 114
E-mail Attachments 115
How Your E-mail Can Be Hijacked 116
E-mail Interceptions 116
Recognizing Mail Scams 119
Solicitations and Chain Letters 120
Nigeria 419 Scam 122
Spam as Social Engineering 124
Using Antivirus Protection for E-mail 126
Hiding Your E-mail Identity 128
Knowing What’s in Your E-mail Headers 128
Knowing What Your Chat Says about You 132
Setting Up Anonymous E-mail 133
Free Anonymous E-mail 134
E-mail Encryption Made Simple 135
Using Pretty Good Privacy (PGP) with
Microsoft Outlook 138
Using Personal Certificates with Netscape 140
Verifying E-mail Senders in Outlook 141
Importing a Personal Certificate File into
Opera 143
Choosing a Secure E-mail Provider 144
Using Encrypted Web-based E-mail 144
Summary 146
Solutions Fast Track 146
Frequently Asked Questions 149
Chapter 4 Self Defense on the Web
Introduction 152
Understanding Risk on the Web 152
Learning to Be Street Smart on the Web 154
Understanding the Privacy Policy 155
Managing Risk on the Web 159
Protecting Yourself With SSL Certificates 159
Avoiding Malicious Applets 162
Managing Passwords 164
Using Microsoft’s Passport 165
Protecting Your Purchasing Power 166
PayPal and CyberCash 166
American Express Private Payments 167
Microsoft Wallet 167
Anonymous Web Surfing 168
Improving Browser Safety 169
Updating Your Browser Software 169
Internet Explorer 170
Netscape 170
Opera 170
Putting Browser Security Features to Work 171
Internet Explorer 171
Netscape 171
Opera 171
Covering Your Internet Footprints 171
Deleting Hidden Information About You 172
Opting Out of Ad-ware Cookies 176
Abacus: A Division of DoubleClick 177
ValueClick 178
Advertising.com 179
Summary 181
Solutions Fast Track 182
Frequently Asked Questions 185
Chapter 5 Connecting to the Internet Safely
Introduction 188
Different Connections, Different Risks 189
Understanding Network Terminology 189
Dial-up Connections 190
America Online 192
Employer-Provided Internet Access 194
Always-on Broadband 196
DSL, ISDN, and Cable Modem 197
Cable Modem 198
ISDN Modem 199
Wireless 199
Understanding Data Interception 200
Snooping on a Network with a Sniffer 201
Snooping on Your Network with
Network Neighborhood/My Network
Places 203
Snooping on Your Network with nbtstat 204
Taking Precautions 207
Setting Permissions for Shared Drives
and Files 208
Registering Your Domain.com 211
Turning Off Unneeded Services 212
Securing Your Personal Web Server 215
Firewalls for the Home 216
Personal Firewalls for Home Office Use 219
Network Firewalls for Home Office Use 221
Using Common Firewall Configuration
Features 223
Network Configuration 223
Setting Inbound Filtering 226
Setting Outbound Filtering 227
Virtual Private Networks 228
Connection Alerts 229
Summary 231
Solutions Fast Track 234
Frequently Asked Questions 236
Chapter 6 Are Your Kids Putting You at Risk?
Introduction 240
Raising Children in the Digital Age 241
Keeping Clear Online Identities within
Families 244
Supervising Online Activities 246
Channeling a Child’s Interest in Hacking 247
Identifying Risky Software and Risky Behavior 250
Chat Programs 250
Web Forums and Newsgroups 252
Massive Multiplayer Online Games 253
File-Sharing Software 254
Hacking Tools 256
Monitoring Online Activities 257
Parental Contracts 258
Application Logging 260
Browser Activity Logging 261
Keystroke Logging 264
Screen Imaging 264
Avoiding Monitoring Pitfalls 265
Summary 267
Solutions Fast Track 268
Frequently Asked Questions 270
Chapter 7 If You Become a Victim
Introduction 272
Taking Immediate Action 272
Step 1: Filing Police Reports 273
Step 2: Reporting Fraud and Stolen Accounts 276
Closing Credit Card Accounts 276
Closing Bank and Loan Accounts 277
Reporting and Closing Other
Commercial Accounts 279
Dealing with Compromised Online
Accounts 280
Step 3: Notifying the Federal Trade
Commission (FTC) 281
Managing Other Fraud Situations 282
Reporting Stolen IDs 282
Dealing with Telephone Fraud 283
Dealing with Stolen Wireless Service 284
Managing the Fallout 284
Contacting Credit Bureau Services 285
Obtaining a Report 286
Understanding Your Credit Report:
A Case Study 288
Preparing Your Victim’s Statement 290
Knowing When to Seek Legal Help 292
Keeping Records 292
Locating Government Resources 292
Statutes in Your State 293
Federal Trade Commission 293
Understanding the Fair Credit
Reporting Act 294
Other Suggested Resources 294
Privacy Rights Advocates 295
The Electronic Frontier Foundation 296
The Privacy Rights Clearinghouse 296
The Identity Theft Resource Center 296
Privacy International 296
The Electronic Privacy Information
Center 296
The Privacy Coalition 297
The Global Internet Liberty Campaign 297
Summary 298
Solutions Fast Track 299
Frequently Asked Questions 301
Chapter 8 Configuring Your Browser and Firewall
Introduction 306
Managing Your Web Browser’s Security Features 306
Internet Explorer Version 6 307
Netscape 6.2 313
Opera 6 316
Configuring Your Home Firewall 319
BlackICE Defender for Windows 319
Packet Log Menu 323
Evidence Log Menu 323
Back Trace Menu 323
Intrusion Detection Menu 324
Notifications Menu 326
Prompts Menu 326
Zone Alarm Pro for Windows 328
Firewall Menu 329
Program Control Menu 331
Alerts and Logs Menu 335
Privacy Menu 336
Email Protection Menu 337
Siemens Speedstream SS2602 DSL/Cable
Router 337
Pros and Cons of Using the Siemens
Router 339
Configuring the Router on the Network 339
Configuring Advanced Settings 342
Applications Port List 346
Index 357
Screenshot
about, where the clerk slides the receipt from your credit card onto a flat pad, and
you sign your name onto it using a pen that writes on the slip in ink but also records
an imprint of your signature electronically. Needless to say my curiosity got the
better of me. I asked the clerk,“What happens to my signature after I sign the slip?” I
figured that my signature was sent to the financial network that approved the charge
on my credit card, in order for it to be compared against my original credit application,
similar to the way banks use the signature cards they keep on file.
=CONTENTS=
Foreword xix
Chapter 1 Identity Theft: Are You At Risk?
Introduction 2
Defining Identity Theft 3
Take a Risk Factor Test 4
Why Do They Do It? 5
How Do They Get Away with It? 6
Dumpster Diving 7
Shoulder Surfing 8
Social Engineering 8
Physical Theft 10
Online Theft 12
Privacy Erosion 14
Limited Enforcement Resources 15
Recognizing Identity Theft When It Happens 15
Unauthorized Credit Cards 16
Unauthorized Phone or Other
Utility Services 16
Bank Fraud 17
Fraudulent Loans 18
Government Documents 18
Other Forms of Identity Theft 18
Understanding What Electronic Information
Is Private 19
Striving for Theft Prevention 22
Keeping Private Information Private 26
Protecting Your Social Security Number 26
Taking Advantage of Marketing Opt-Out
Programs 29
Using Search Engine Opt-Out Services 30
Using the Direct Marketing Association’s
Opt-Out Service 32
Protecting Your Computer 34
Applications 34
E-mail 34
Web Browsing 34
Network 35
Your Family’s Online Activities 36
Summary 37
Solutions Fast Track 38
Frequently Asked Questions 41
Chapter 2 Protecting Your Hard Drive
Introduction 44
Know Your Computer 44
Temporary Files 46
Temporary Internet Files 48
Deleting Files Permanently for Privacy 49
Other Information that Might be on Your
Computer 52
What Are You Protecting? 54
Password Protecting Your Computer 55
Programs and Files 57
Antivirus Software:Your First Line of Defense 59
What You Might Not Know about Antivirus
Software 60
Why Update? 61
What Kinds of Software Are Available? 61
Manually Updated Signatures 62
Automatically Updated Signatures 62
Web-based Software 63
Performing Signature Updates 63
McAfee 63
Norton 64
F-Prot 65
Is Your Antivirus Software Working? 66
Updating Your Software 68
The Number One Mistake People Make 69
Functionality Vs. Secure Updates 70
Installing Security Patches 70
Internet Explorer 71
Outlook 72
IIS 72
Netscape 73
Opera 73
Beware of the Free Stuff 73
Avoiding Account Sharing 74
Common Reasons, Risks, and Deterrents
for Sharing Accounts 75
Creating Multiple Accounts in Windows 76
Setting Up an Account in Windows XP 77
Setting Up an Account in Windows 2000 78
Creating Multiple Internet Connection
Accounts 78
Setting up Multiple Internet
Connection Accounts in Windows 98 79
Setting up Multiple Internet
Connection Accounts in Windows XP 79
Setting up Multiple Internet
Connection Accounts in Windows 2000 81
Creating Multiple E-mail Accounts
with Outlook Express 82
Using Disk and File Encryption 83
Choosing Strong Passwords 86
Avoiding Weak Passwords 87
Protecting PINs 89
Tradeoffs: Using Password Storage 90
Creating Strong Passwords You Can
Remember 93
Summary 98
Solutions Fast Track 99
Frequently Asked Questions 101
Chapter 3 Keeping Your E-mail Private
Introduction 104
E-mail Privacy Is Not Just about Spam 104
How E-mail Services Work 105
Big Brother and Your E-mail 108
How E-mails Can Get Lost 110
Understanding Spam 113
E-mail Attacks Are Not Just about Viruses 114
E-mail Attachments 115
How Your E-mail Can Be Hijacked 116
E-mail Interceptions 116
Recognizing Mail Scams 119
Solicitations and Chain Letters 120
Nigeria 419 Scam 122
Spam as Social Engineering 124
Using Antivirus Protection for E-mail 126
Hiding Your E-mail Identity 128
Knowing What’s in Your E-mail Headers 128
Knowing What Your Chat Says about You 132
Setting Up Anonymous E-mail 133
Free Anonymous E-mail 134
E-mail Encryption Made Simple 135
Using Pretty Good Privacy (PGP) with
Microsoft Outlook 138
Using Personal Certificates with Netscape 140
Verifying E-mail Senders in Outlook 141
Importing a Personal Certificate File into
Opera 143
Choosing a Secure E-mail Provider 144
Using Encrypted Web-based E-mail 144
Summary 146
Solutions Fast Track 146
Frequently Asked Questions 149
Chapter 4 Self Defense on the Web
Introduction 152
Understanding Risk on the Web 152
Learning to Be Street Smart on the Web 154
Understanding the Privacy Policy 155
Managing Risk on the Web 159
Protecting Yourself With SSL Certificates 159
Avoiding Malicious Applets 162
Managing Passwords 164
Using Microsoft’s Passport 165
Protecting Your Purchasing Power 166
PayPal and CyberCash 166
American Express Private Payments 167
Microsoft Wallet 167
Anonymous Web Surfing 168
Improving Browser Safety 169
Updating Your Browser Software 169
Internet Explorer 170
Netscape 170
Opera 170
Putting Browser Security Features to Work 171
Internet Explorer 171
Netscape 171
Opera 171
Covering Your Internet Footprints 171
Deleting Hidden Information About You 172
Opting Out of Ad-ware Cookies 176
Abacus: A Division of DoubleClick 177
ValueClick 178
Advertising.com 179
Summary 181
Solutions Fast Track 182
Frequently Asked Questions 185
Chapter 5 Connecting to the Internet Safely
Introduction 188
Different Connections, Different Risks 189
Understanding Network Terminology 189
Dial-up Connections 190
America Online 192
Employer-Provided Internet Access 194
Always-on Broadband 196
DSL, ISDN, and Cable Modem 197
Cable Modem 198
ISDN Modem 199
Wireless 199
Understanding Data Interception 200
Snooping on a Network with a Sniffer 201
Snooping on Your Network with
Network Neighborhood/My Network
Places 203
Snooping on Your Network with nbtstat 204
Taking Precautions 207
Setting Permissions for Shared Drives
and Files 208
Registering Your Domain.com 211
Turning Off Unneeded Services 212
Securing Your Personal Web Server 215
Firewalls for the Home 216
Personal Firewalls for Home Office Use 219
Network Firewalls for Home Office Use 221
Using Common Firewall Configuration
Features 223
Network Configuration 223
Setting Inbound Filtering 226
Setting Outbound Filtering 227
Virtual Private Networks 228
Connection Alerts 229
Summary 231
Solutions Fast Track 234
Frequently Asked Questions 236
Chapter 6 Are Your Kids Putting You at Risk?
Introduction 240
Raising Children in the Digital Age 241
Keeping Clear Online Identities within
Families 244
Supervising Online Activities 246
Channeling a Child’s Interest in Hacking 247
Identifying Risky Software and Risky Behavior 250
Chat Programs 250
Web Forums and Newsgroups 252
Massive Multiplayer Online Games 253
File-Sharing Software 254
Hacking Tools 256
Monitoring Online Activities 257
Parental Contracts 258
Application Logging 260
Browser Activity Logging 261
Keystroke Logging 264
Screen Imaging 264
Avoiding Monitoring Pitfalls 265
Summary 267
Solutions Fast Track 268
Frequently Asked Questions 270
Chapter 7 If You Become a Victim
Introduction 272
Taking Immediate Action 272
Step 1: Filing Police Reports 273
Step 2: Reporting Fraud and Stolen Accounts 276
Closing Credit Card Accounts 276
Closing Bank and Loan Accounts 277
Reporting and Closing Other
Commercial Accounts 279
Dealing with Compromised Online
Accounts 280
Step 3: Notifying the Federal Trade
Commission (FTC) 281
Managing Other Fraud Situations 282
Reporting Stolen IDs 282
Dealing with Telephone Fraud 283
Dealing with Stolen Wireless Service 284
Managing the Fallout 284
Contacting Credit Bureau Services 285
Obtaining a Report 286
Understanding Your Credit Report:
A Case Study 288
Preparing Your Victim’s Statement 290
Knowing When to Seek Legal Help 292
Keeping Records 292
Locating Government Resources 292
Statutes in Your State 293
Federal Trade Commission 293
Understanding the Fair Credit
Reporting Act 294
Other Suggested Resources 294
Privacy Rights Advocates 295
The Electronic Frontier Foundation 296
The Privacy Rights Clearinghouse 296
The Identity Theft Resource Center 296
Privacy International 296
The Electronic Privacy Information
Center 296
The Privacy Coalition 297
The Global Internet Liberty Campaign 297
Summary 298
Solutions Fast Track 299
Frequently Asked Questions 301
Chapter 8 Configuring Your Browser and Firewall
Introduction 306
Managing Your Web Browser’s Security Features 306
Internet Explorer Version 6 307
Netscape 6.2 313
Opera 6 316
Configuring Your Home Firewall 319
BlackICE Defender for Windows 319
Packet Log Menu 323
Evidence Log Menu 323
Back Trace Menu 323
Intrusion Detection Menu 324
Notifications Menu 326
Prompts Menu 326
Zone Alarm Pro for Windows 328
Firewall Menu 329
Program Control Menu 331
Alerts and Logs Menu 335
Privacy Menu 336
Email Protection Menu 337
Siemens Speedstream SS2602 DSL/Cable
Router 337
Pros and Cons of Using the Siemens
Router 339
Configuring the Router on the Network 339
Configuring Advanced Settings 342
Applications Port List 346
Index 357
Screenshot