Microsoft Office Tutorials and References
In Depth Information
Summary
Summary
This chapter has shown you how you can protect your computer from attacks that
arrive via the Internet by using exploits and open ports on your computer and
through your web browser. I showed you how you can use Windows Firewall
to protect your computer and also defend against attacks and increase the
security of Internet Explorer. Then I wrapped up the chapter by showing you
how to protect your computer from malicious software such as viruses. The
next chapter is all about protecting your privacy in Windows. Windows 8 tracks
more information about what you do than any other version of Windows. Sure,
that information can be useful, but it also can be embarrassing. Find out how
to clean it up in the next chapter.
 
Search JabSto ::




Custom Search