Go Home / Ir a la página inicial
Sojourner Books
Windows and Computer Security Books

Computation Windows 10 Internet
security privacy anonymity encryption virtual machines social media
seguridad privacía anonimidad encriptación máquinas virtuales redes sociales

Computer Security and Privacy for Windows 10

Computer Security and Privacy for Windows 10

Dan Bern

260 páginas / 6 x 9 inches

Security has always been a pressing concern for computer users, especially those using Windows. Not that Windows is insecure by itself, but because Windows is the most widely used computer operating system, all hackers see it as their primary target. Also, unfortunately, many Windows users are not adequately educated in good security practices, and that makes them easy targets.
The other valid concern, that is specifically related to Windows 10, is user's privacy. By default Windows 10 collects data from your direct use of Windows and all your Microsoft accounts.
Also, securing Internet browsers, messaging and email apps is vital to keep your system free of spyware and private.
This book teaches you, in easy terms, how to protect the security and privacy of Windows 10 and its apps. Also shows how to protect your anonymity and privacy on the web.
Some of the topics covered in this book are:

  • Basic Security Measures. The ABC of computer security.
  • Windows 10 Privacy Guide. Learn to configure Windows 10 to reduce Microsoft data slurp to the minimum.
  • Computer Access Control. This explains how to secure your computer physically against hackers, how to encrypt it and how to secure computers used by several users.
  • Secure your Web Browser: Learn how to choose a web browser, how to configure it correctly and which extensions and add-ons are useful to protect better your security and privacy.
  • Tracking Techniques. By learning how you are tracked in the Internet, you can defend better against tracking.
  • Privacy and Anonymity. Learn how to use VPNs, the Tor browser and other techniques, to improve your privacy and surf the Internet anonymously.
  • Security by compartmentalization. This is an advanced topic, but if you take the time to master it you will learn how to compartmentalize your computer using Virtual Machines, and in that way, make it impervious to ransomware and other common threats.
  • Securing IOT devices. As cool as they look, IoT devices are a security nightmare. Learn how to secure them.

Plenty of other topics are covered in this book, look at its Table of Contents to see them all.

Buy or look inside the Kindle version at Amazon.com

Buy or look inside the paper version at Amazon.com

Computer Security and Privacy for Windows 10

Seguridad Informática y Privacidad para Windows 10

Dan Bern

278 páginas / 6 x 9 pulgadas

La seguridad siempre ha sido una preocupación apremiante para los usuarios de computadoras, especialmente los que usan Windows. No porque Windows sea inseguro por sí mismo, sino que debido a que Windows es el sistema operativo informático más utilizado, todos los hackers lo ven como su objetivo principal. Además, desafortunadamente, muchos usuarios de Windows no están adecuadamente educados en las buenas prácticas de seguridad, y eso los convierte en objetivos fáciles.

La otra preocupación válida, que está específicamente relacionada con Windows 10, es la privacidad del usuario. De forma predeterminada, Windows 10 recopila datos de su uso directo de Windows y de todas sus cuentas de Microsoft.

Un tema más general es la protección de los navegadores de Internet, la mensajería y las aplicaciones de correo electrónico, lo que es vital para mantener su sistema libre de virus y privado.
Este libro le enseña, en términos sencillos, cómo proteger la seguridad y la privacidad de Windows 10 y sus aplicaciones. También muestra cómo proteger su anonimato y privacidad en la web.
Algunos de los temas tratados en este libro son:

  • Medidas básicas de seguridad. El ABC de la seguridad informática.
  • Guía de privacidad de Windows 10. Aprenda a configurar Windows 10 para proteger al máximo su privacidad.
  • Controle el acceso a su ordenador. Cómo proteger su ordenador físicamente contra los hackers, cómo encriptarlo y cómo proteger los ordenadores utilizados por varios usuarios.
  • Asegure su navegador web. Aprenda cómo elegir el navegador web más confiable, cómo configurarlo correctamente y qué extensiones y complementos son útiles para proteger mejor su seguridad y privacidad.
  • Técnicas de rastreo. Al aprender cómo los usuarios son espiados y rastreados cuando navegan por Internet, podrá defenderse mejor contra el rastreo.
  • Privacidad y Anonimato. Aprenda a usar VPN, el navegador Tor y otras técnicas para mejorar su privacidad y navegar por Internet de forma anónima.
  • Seguridad por compartimentación. Este es un tema avanzado, pero si se tomas el tiempo para dominarlo aprenderá a compartimentar tu computadora usando Máquinas Virtuales, y de esa manera, hacerla impermeable al ransomware y otras amenazas comunes.
  • Protección de dispositivos IoT. Por muy guays que parezcan, los dispositivos del Internet de las Cosas (Internet of Things) son una pesadilla de seguridad. Aprenda a protegerlos adecuadamente.

Compre u hojee la versión impresa de este libro en Amazon.com(Estados Unidos)

Compre u hojee la versión impresa de este libro en Amazon.es(España)

Internet Anonymity and Alter Egos

Internet Anonymity and Alter Egos

Safeguard your privacy and security

Dan Bern

Anonymity in cyberspace is easy to achieve but difficult to maintain. Identities can be easily hidden, anybody can send messages, impersonating other people or using false identities. This freedom of expression, without accountability, provides an easy way to perpetrate criminal activity. Also it allows political activists and oppressed people to research and express themselves freely, without fear of reprisal.

But we're not as anonymous as it seems at first glance. Wherever we go in cyberspace, we leave a trail, and if we use a smartphone, the situation is even worse. Some years ago, people could open a Facebook, Google, or whatever other free online account, without providing a cellphone number. Todays, many sites ask to prove where you are located, via cellphone number, before opening a new account.

Keeping your Internet doings private and/or anonymous requires commitment. There is no application or operating system that will keep you anonymous by itself. It is a matter, not only of using the right application and OS, but mainly, of following some precautionary rules, if you skip taking precautions one single time, you may blow up your cover and your digital alter-ego will be linked to your true self, in the real world.

You can have different levels of anonymity, depending on how much protection against tracking you want to achieve:

  • Hide your location. Prevent the websites you visit from knowing where you are located.
  • Prevent fingerprinting. Each computer/browser has unique characteristics, avoid the government and the Data Brokers from fingerprinting your browser effectively.
  • Create different alter egos to protect your privacy and avoid trouble.
  • Tracking and fingerprinting cannot be stopped completely, compartmentalize your digital life to keep your anonymity protected.

Learn the techniques, from basic to advanced, to be safe and truly anonymous in cyberspace.

Buy or look inside this ebook at Amazon.com