Введение
  • Introduction.
  • Threat classification and reasons.
  • Rump’s Paradox and history...
  • Computer virus classification.
  • How does the virus work?
  • Anti-virus program classification. Hackers and Anti-hacker programs.
  • Rating of anti-virus programs.
  • Rating of anti-hacker programs.
  • Protection against spam.
  • Examples of practical protection against intruders on the Internet.
  • Final Practice on Internet Data Protection.
  • Conclusions on protection in the Internet.