| |
| |
Introduction | |
| |
| |
| |
Introducing Personal Firewalls | |
| |
| |
| |
Why Do You Need a Personal Firewall? | |
| |
| |
The New Age of High-Speed Internet Access Protecting | |
| |
| |
Yourself with a Personal Firewall | |
| |
| |
The Typical Internet Connection | |
| |
| |
Who Are Hackers Anyway? | |
| |
| |
What Do They Want from You? | |
| |
| |
| |
High-Speed Internet Connections Equal Increased Vulnerability | |
| |
| |
Selecting a High-Speed Connection: Cable Versus DSL | |
| |
| |
Cable and DSL Modems | |
| |
| |
Setting Up Your Cable or DSL Connection | |
| |
| |
Pre-Installation Tasks | |
| |
| |
NIC Installation | |
| |
| |
Installing the Software Driver | |
| |
| |
| |
Firewalls Explained | |
| |
| |
Understanding Personal Firewalls | |
| |
| |
Networking Overview | |
| |
| |
Understanding How Firewalls Operate | |
| |
| |
Firewall Functions | |
| |
| |
Firewall Classifications | |
| |
| |
| |
Tightening Your Security | |
| |
| |
| |
Locking Down Windows Networking | |
| |
| |
An Overview of Microsoft Networking | |
| |
| |
Improving Your Security | |
| |
| |
Why You Should Still Get a Personal Firewall | |
| |
| |
| |
Hardware Firewalls | |
| |
| |
Hardware Firewalls | |
| |
| |
The BEFSR41 EtherFast Cable/DSL Router | |
| |
| |
Installing the Hardware Firewall | |
| |
| |
Configuration via the Web Browser | |
| |
| |
Other Cable/DSL Router Functions | |
| |
| |
Using the Linksys BEFSR41 EtherFast Cable/DSL Router As a Personal Firewall | |
| |
| |
Other Cable/DSL Routers | |
| |
| |
| |
McAfee Personal Firewall | |
| |
| |
Overview of McAfee | |
| |
| |
System Requirements | |
| |
| |
Installation and Setup | |
| |
| |
Working with the Configuration Wizard | |
| |
| |
Normal Operation | |
| |
| |
Working with Report Logs | |
| |
| |
Limitations | |
| |
| |
Testing the McAfee Personal Firewall | |
| |
| |
| |
BlackICE Defender | |
| |
| |
Overview | |
| |
| |
System Requirements | |
| |
| |
Installation and Setup | |
| |
| |
Configuring BlackICE Defender | |
| |
| |
Keeping BlackICE Defender's Defenses Up to Date | |
| |
| |
Normal Operation | |
| |
| |
BlackICE Defender's Limitations | |
| |
| |
Testing the BlackICE Defender Personal Firewall | |
| |
| |
| |
ZoneAlarm | |
| |
| |
Overview | |
| |
| |
System Requirements | |
| |
| |
Installation and Setup | |
| |
| |
Getting Started with ZoneAlarm | |
| |
| |
Working with ZoneAlarm | |
| |
| |
Working with the ZoneAlarm Desk Band Toolbar | |
| |
| |
ZoneAlarm's Alerts and Log File | |
| |
| |
Working with ZoneAlarm Alerts | |
| |
| |
ZoneAlarm's Limitations | |
| |
| |
Testing Your Zone Labs Personal Firewall | |
| |
| |
| |
How Secure Is Your Computer? | |
| |
| |
Testing Your Vulnerability to Internet Hackers | |
| |
| |
Testing with Your Personal Firewall Up and Running | |
| |
| |
Testing Security from the Inside Out | |
| |
| |
A Final Analysis | |
| |
| |
| |
Habits of Security-Conscious Surfers | |
| |
| |
Updating Your Personal Firewall | |
| |
| |
Keeping Your Microsoft Operating System Up-to-Date | |
| |
| |
Keeping Your Operating System Locked Down Tight | |
| |
| |
Using Antivirus Software | |
| |
| |
Beware Cookies | |
| |
| |
Backing Up Your Data | |
| |
| |
Be Vigilant and Test Often | |
| |
| |
| |
Home Networks and Internet Connection Sharing | |
| |
| |
What Is a Home Network? Putting Your Network Together | |
| |
| |
Network Software Configuration | |
| |
| |
Network Administration | |
| |
| |
Connecting Your Home Network to the Internet | |
| |
| |
Tightening Things Up with a Second Line of Firewalls | |
| |
| |
Microsoft's Internet Connection Sharing | |
| |
| |
Securing Home Networks with NetBEUI | |
| |
| |
Appendix A. Other Firewall Products | |
| |
| |
Aladdin Knowledge Systems eSafe Desktop 3.0 | |
| |
| |
Norton Personal Firewall 2001 | |
| |
| |
PGP Desktop Security 7.0 | |
| |
| |
Symantec Desktop Firewall 2.0 | |
| |
| |
Sygate Personal Firewall | |
| |
| |
ConSeal PC Firewall | |
| |
| |
Tiny Personal Firewall | |
| |
| |
Appendix B. Other Web Sites | |
| |
| |
That Will Test Your Security | |
| |
| |
HackerWhacker | |
| |
| |
Gibson Research Corporation | |
| |
| |
Secure Design | |
| |
| |
Sygate Online Services | |
| |
| |
Symantec | |
| |
| |
McAfee | |
| |
| |
HackYourself.com | |