home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page46.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  119KB  |  817x1045  |  8-bit (256 colors)
Labels: cell phone | hakham | laptop | monitor | person | poster | sky
OCR: 0-22 SECTION Security and Privacy AS WITH MOST OTHER facets of modern life computing has its share of troublemakers scam artists, and identity thieves. Section offers some tips on navigating through the sometimes rough neighborhoods of cyberspace while keeping your data Safe and your identity private SECURING YOUR COMPUTER AND DATA What's at risk if my computer is stolen? The value of a stolen com- puter not so much in the hardware as in the data contains. With stolen data such as your bank account numbers and PINs, thief can wipe out your checking and savings accounts. With your credit card numbers thief can go on spending spree. Even worse criminal can use stolen data to assume your identity, run up debts, get into legal difficulties, ruin your credit rating, pue cause you no end of trou ...