O'Reilly logo

Is It Safe? Protecting Your Computer, Your Business, and Yourself Online by Michael Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 23. Defending Your Home Network from Attack

As you learned in the previous chapter, a single home computer is an unlikely target for computer attack; what reason would a big-time cracker have to take down your PC? What attackers are interested in, however, are computers they can use to conduct other, more significant activities—such as attacking large networks and websites, or sending out tons of spam email messages. In this regard, your computer is a valued recruit in an army of zombie computers—just one of many, but an important part of the whole.

Of course, it’s also possible that an individual with a specific goal in mind might like to infiltrate your personal computer or home network, malicious intent beforehand. Perhaps this individual ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required