246 95 7MB
English Pages 179 Year 2001
4
THE
" LI
COMPLETE
oe -
+“. ‘=.
GUIDE
a
TO
a a
cca
4
gg
nn
+ @6O44R4
a
5582"
ae
oe
MICHAEL
CHESBRO
AINA YI |Ih CLUES
pri
ite
VeVi Le Be GUIDE TO
ESecurity
For Joni. Timeless beauty that nothing could improve.
Pee
THE
COMPLETE GUIDE
TO
E-Security PRIVACY ON THE — ee
INTERNET
MICHAEL
_
CHESBRO
Also by Michael E. Chesbro: Privacy for Sale: How Big Brother and Others Are Selling Your Private Secrets for Profit
CITADEL PRESS books are published by Kensington Publishing Corp. 850 Third Avenue New York, NY 10022 Copyright © 2000 Michael E. Chesbro
All rights reserved. No part of this book may be reproduced in any form or by any means without the prior written consent of the publisher, excepting brief quotes used in reviews. All Kensington titles, imprints, and distributed lines are available at special quantity discounts for bulk purchases for sales promotions, premiums, fund-raising, educational, or institutional use. Special book excerpts or customized printings can also be created to fit specific needs. For details, write or phone the office of the Kensington special sales manager: Kensington Publishing Corp., 850 Third Avenue, New York, NY 10022. attn: Special Sales Department, phone 1-800-221-2647.
Citadel Press and the Citadel logo are trademarks of Kensington Publishing Corp. First Citadel printing: October 2001
IK
Soe 7h
0)
Ma ie
8h
al
Printed in the United States of America Cataloging data for this title may be obtained from the Library of Congress. ISBN 0-8065-2279-8
Table of Contents
Chapter |: The Need for Private Communication Chapter 2: Understanding E-Mail and the Internet Internet Protocol E-Mail Traps Trace Route Effective Use of Passwords Junk E-Mail, Pornography, and Spam Anonymous Web-Browsing Online People Finders Chapter 3: Free E-Mail Services HushMail SAFe-mail ZipLip Unencrypted Web-Based E-Mail Juno Chapter 4: Remailers Chapter 5: Understanding Encryption Chapter 6: PGP and Digital Certificates Chapter 7: One-Time Pads Chapter 8: Encryption Programs Norton Secret Stuff Security Box Two Fish Lite—with Key Generator Passwords and Encryption Built into Other Software Steganography Chapter 9: Securely Deleting or Hiding Files Chapter 10: Communications Planning ........ Vv
The Complete
Guide to E-Security
Chapter 11: Online Communications and the Law Privacy in the E-World and the Physical World . .115 GRapter LA ringl Word ©
ef?
IF
YOU
THINK
YOU’RE
ONLINE...THINK
ALONE
AGAIN
- sc
As cutting-edge advances in technology increase at a breathtaking rate, personal privacy is becoming harder to maintain. The fact is, your communica-
— _
tion through e-mail and Web sites can be seen by dozens of unauthorized _ readers—from marketers to nosy coworkers to criminal hackers who can steal your credit card numbers, social security number—and your identity itself. Even the Federal government can secretly monitor you via the Internet.
— "
:
—_
Now, with this eye-opening book, you'll learn how to protect yourself from BP
these unwanted intrusions. Written by a former intelligence agent with the U. S. x Department of Defense, THE COMPLETE GUIDE TO E-SECURITY gives — you the most up-to- date information on:
AF
e Avoiding ennai traps and faked Web sites ¢ Creating an effective, uncrackable password — ¢ Surfing the Net anonymously ¢ Protecting your children from pornographic Web sites
¢ Using encryption (disguising text through use of a code) ° pesegegrame your pee records from seizure
Writtenin diane ienepe free afargued jargon, thisinvaluable resource isa
oa must for anyone who wants to ensure safe, ananymntly use of thInthe ee *
@&@e
penal
“Contains simple techniques and practices| thatwilliincrease4) personal security and safety in the Information. Age.Peeos
“
—
“
—Agent Myah Strong, i. ease Senior Intelligence Officer, U.S. Department of‘Defense ;;; ‘
"
ISBN
ut
ei
‘
e
“2
2
é.2-¢
0-8065-2279 512
a: Zpl-d |
CITADEL PRESS
©|
|UO VALSQ AQT VMUUSY UY
EAN
KENSINGTON U.S. $12.00
CAN $18.00 PRINTED
IN U.S.A.
806"522 on
|