Moving On...

Moving On

In the previous two chapters, I showed you all the ways in which you could share files with others and access shares on other computers. In this chapter I also showed you how others can access your printers and printing queues. One of the consequences of having so many ways to communicate with other computers is that there are many ways for malevolent hackers to get into your computer—many more so than with the classic Mac OS. In the next chapter, I'll talk about how to keep your data and personal information private from other users of your computer, other users on your local network, and from nasty people "out there" on the Internet.



 
ASPTreeView.com
 
Evaluation has АёЖ»ЪёґАexpired.
Info...