Web Stalkers: Protect Yourself from Internet Criminals & Psychopaths
The methods used by web stalkers to invade a person’s privacy, steal their identity, and threaten their safety and well-being are detailed in this guide to avoiding identity theft on the Internet. With advice from practicing psychologists and more than a decade of research and observations, this reference provides the tools for protecting one’s anonymity, financial information, and reputation. The actual techniques used by web stalkers and the prevention and intervention secrets used to bring them to justice are discussed.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Understanding Web Personalities
All About Cybercrime
action activity addition advertising Adware anonymity antivirus antivirus software become browser chapter chat room communication consumer cookies copies court credit card criminal cyber crime Cybercrime cybersquatting damage dangerous database domain e-mail message eBay eCommerce encryption example fake firewall fraud Google hacker harassment identify identity theft illegal ILOVEYOU individual individual’s installed Internet users investigation IP address jurisdiction law enforcement legitimate libel license Linux Luddite machine monitor netizens one’s Oracle Oracle Database password PASV LIST personal information phishing phone number plagiarism police pornography problem protect provides real-world record risk Rottweiler scam scammers server social security number someone spam filter Spyware stalker stalking target threat updates Usenet user’s victim virus attack viruses Wayback Machine web stalker wireless network