Web Stalkers: Protect Yourself from Internet Criminals & PsychopathsRampant TechPress, 2005 - Broj stranica: 339 The methods used by web stalkers to invade a person's privacy, steal their identity, and threaten their safety and well-being are detailed in this guide to avoiding identity theft on the Internet. With advice from practicing psychologists and more than a decade of research and observations, this reference provides the tools for protecting one's anonymity, financial information, and reputation. The actual techniques used by web stalkers and the prevention and intervention secrets used to bring them to justice are discussed. |
Sadržaj
Acknowledgements | 1 |
Finding Criminal | 12 |
Sources of Personal Information | 18 |
Corporate AntiPrivacy Tools | 24 |
Analyze Passwords Forget Logins Safely Purchasing Online | 35 |
Understanding Web Personalities | 42 |
Conclusion | 62 |
3 | 63 |
Detecting Plagiarism | 179 |
Conclusion | 185 |
7 | 186 |
All about | 191 |
21 | 197 |
Web Charity | 204 |
27 | 213 |
Phishing | 215 |
Weirdos | 69 |
4 | 73 |
Web Addicts Web Gambling Addicts Web Pornography Addicts Looking for Love on the web | 78 |
Vengeance and Terrorism Stalking | 96 |
The Web Stalking Progression | 103 |
Conclusion | 111 |
6 | 132 |
Invasion of Privacy | 147 |
Illegal Websites and Cybercrime | 154 |
Cyber Attacks and Terrorism | 160 |
Penalties for Cyber Criminals | 166 |
Conclusion | 227 |
Self Protection on the Web | 247 |
Protecting Children on the Web | 259 |
Internet Spies | 275 |
Removing Spyware | 282 |
Virus Attacks | 291 |
Spam Spam Spam Spam | 309 |
Book Conclusion | 331 |
333 | |
Uobičajeni izrazi i fraze
action activity addition advertising Adware anonymity antivirus antivirus software become browser chapter chat room clicking communication consumer copies court credit card criminal cyber crime Cybercrime cybersquatting damage dangerous database defamation deviants e-mail message eBay eCommerce encryption example fake Federal firewall fraud hacker harassment identify identity theft illegal ILOVEYOU individual individual’s installed Internet users investigate IP address jurisdiction law enforcement legitimate libel license Linux monitor netizens Nigerian Oracle Oracle Database password PASV PayPal personal information phishing phone number plagiarism police pornography problem protect provides risk scam scammers server someone spam filter Spyware stalker stalking steal target threat updates Usenet user’s victim violate virus attack viruses Wayback Machine web stalker wireless network