Threats to computer security, how hackers work, and how we unintentionally make it
easy for them. Passwords, "social engineering," case studies, using the Internet
securely, e-mail, viruses, security of hard drives, theft of laptop computers.
Intercepting Your Communications
Telephones, fax machines, cell phones, cordless phones, answering
machines, voice mail, intercoms and baby monitors, countermeasures.
and Other Eavesdropping Devices
Eavesdropping threat. Methods of eavesdropping. Detecting and Preventing