Author: | Paul Stafford | ISBN: | 9781476185361 |
Publisher: | Paul Stafford | Publication: | July 16, 2012 |
Imprint: | Smashwords Edition | Language: | English |
Author: | Paul Stafford |
ISBN: | 9781476185361 |
Publisher: | Paul Stafford |
Publication: | July 16, 2012 |
Imprint: | Smashwords Edition |
Language: | English |
Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).
This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.
I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.
Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.
Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).
This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.
I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.
Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.