SlideShare a Scribd company logo
1 of 16
Safe Computing
Tips
&
Tricks
6 Steps for Safe Computing
Required
1. Keep Your Operating System Up To Date
2. Install and Update Anti-Virus Software
3. Use Strong Passwords
Strongly Recommended
1. Enable Firewall Protection
2. Install and Use Spyware Removal Tools
3. Back Up Important Files
Update your Operating System
• Recent versions of Windows and
Macintosh computers have automatic
software updates.
• Configure your computer to
automatically download the latest
patches and updates.
Most security issues are related to vulnerabilities in the
Operating System. As these flaws are discovered,
software companies release patches and updates to
protect you from security holes.
Install and Update Anti-virus Software
How to Get Anti-virus software
• Purchase commercial anti-virus software.
• Free Windows version for home use by
Avast, AVG, MSE etc.
Keep the virus definitions up to date.
If your computer is connected to the Internet or you
share files with anyone, you need anti-virus
software !
Set Strong Passwords
• Set Your Computer Password - Do not leave it blank
• Password Tips
– Never share your password.
– Never write your password down.
– Change your password periodically.
• Creating a Strong Password
– Passwords should be 7 characters or longer. The longer the better.
– Passwords should contain at least one alpha character (a-z).
– Passwords should contain at least one non-alpha character.
– Do not choose passwords that contain personal information, like pet’s or
children’s names.
– Try using a pass phrase.
For example, Hpatp0a = “Harry Potter and the Prisoner of Azkaban”.
The easiest way to break into your computer is a weak or blank
password. If your computer is compromised it can be used to attack
other computers on campus or around the world.
Personal Firewall Protection
• Enable Your Firewall Protection
– Windows, Macintosh OS X (v. 10.2 and later), and Linux
have built in firewall software.
• Commercial Firewall Software
– If you have an older Operating System or want a more
robust firewall, consider purchasing a commercial version.
• Free Firewall Software for Windows
– ZoneAlarm Firewall for Windows is available for free for
individual home use on your personal computer.
A firewall can protect your computer against hackers and other
security attacks. The latest versions of Windows, Linux and the
Macintosh operating systems have basic built in firewalls.
Spyware and How to Avoid It?
• Spyware is often installed by you without your
knowledge by piggybacking on other software or
by tricking you into installing it.
• Some anti-virus software also has anti-spyware
capability.
• Anti-spyware Recommendations for Windows
– Adaware
(http://www.lavasoftusa.com/default.shtml.en)
– Spybot Search and Destroy
(http://www.safer-networking.org/en/home/index.html)
Spyware is software that is downloaded and installed onto
your computer, often without your knowledge. Spyware
monitors and shares your information while you browse the
Internet.
Back Up Important Files !
• How Should I Back Up My Files?
– Backup Software: Can be installed easily & regular
backup can be taken.
– Back up to Web Files: SkyDrive has 25GB of space on
Cloud. Powered by Microsoft
– Back up to CD or DVD Writers: All computers have a
built in CD or DVD writer. Burning discs is easy and
inexpensive.
Since no system is completely secure, you should regularly
back up important files. This is also your best defense
against losing files to viruses, software or hardware failure,
or the loss or theft of your computer.
Email Safety Tips
1. Do not open unexpected attachments.
2. Use Spam Filters
3. Beware of Spoof Emails or Phishing.
4. Don’t send sensitive data in email.
5. Avoid clicking on links in the body of an email
message.
While these links may not be a phishing attempt, they may not go to the site you
intend. Unless you are completely comfortable that the email is legitimate, it is
best to copy and paste the link or type it in directly in your browser.
Spoof Email (Phishing)
Phishing emails are an attempt by thieves to lure you into
divulging personal and financial information, for their profit.
Spoof Email (Phishing)
6 Ways to Recognize Phishing
1. Generic Greeting
For example, “Dear Customer”.
2. Sense of urgency.
May include an urgent warning requiring immediate action.
3. Account status threat.
May include a warning that your account will be terminated unless
you reply.
4. Forged email address.
The sender’s email address may be forged, even if it looks
legitimate.
5. Forged links to Web sites.
There is often a link to a Website to “fix” the problem. These are
usually forged.
6. Requests for personal information.
Asking for login and password info, either in email or via the link.
Expert comments !
Source
1. www.safecomputing.co.uk
2. www.safecomputingtips.com
3. www.india-infotech.com/Articles/safe_computing.html
4. www.ictknowledgebase.org.uk
5. www-comp.arch.cam.ac.uk/h-and-s.html
6. www.direct.gov.uk/en/.../HealthAndSafetyAtWork/DG_10026668
7. www.bbc.co.uk › Home › ICT › Risks and implications of ICT
8. www.computerfreetips.com
9. www.pctipstricks.com
10. www.computeronlinetips.com
11. computershopper.com/feature/the-best-computer-tips-and-tricks
Satyendra Arora

More Related Content

What's hot

Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallBev Robb
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.MarianaGilMartnez1
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malwarejackadision
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 

What's hot (20)

10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Network security
Network securityNetwork security
Network security
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town Hall
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
RANSOMWARE
RANSOMWARERANSOMWARE
RANSOMWARE
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Jeopardy
JeopardyJeopardy
Jeopardy
 

Viewers also liked

Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012Mike Linksvayer
 
SEO & Analytics - 2012 Symposium for the Marketing of Higher Education
SEO & Analytics - 2012 Symposium for the Marketing of Higher EducationSEO & Analytics - 2012 Symposium for the Marketing of Higher Education
SEO & Analytics - 2012 Symposium for the Marketing of Higher EducationMarcel Media
 
Setting Up Internal Tech Support for your Nonprofit Organization
Setting Up Internal Tech Support for your Nonprofit OrganizationSetting Up Internal Tech Support for your Nonprofit Organization
Setting Up Internal Tech Support for your Nonprofit OrganizationExponent Partners
 
Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...
Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...
Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...Infusionsoft
 
Marketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsMarketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsB2BPlanner Ltd.
 
Basic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsBasic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsB2BPlanner Ltd.
 
Selling Good Works -- Fundamentals of Marketing a Non-Profit Organization
Selling Good Works -- Fundamentals of Marketing a Non-Profit OrganizationSelling Good Works -- Fundamentals of Marketing a Non-Profit Organization
Selling Good Works -- Fundamentals of Marketing a Non-Profit OrganizationChris Houchens
 
Multichannel Lifecycle Marketing
Multichannel Lifecycle MarketingMultichannel Lifecycle Marketing
Multichannel Lifecycle MarketingSpider Trainers
 
Mario Guerrero - Automating the Sales Cycle
Mario Guerrero - Automating the Sales CycleMario Guerrero - Automating the Sales Cycle
Mario Guerrero - Automating the Sales CycleInfusionsoft
 
Building Effective Skills Strategies to Foster Quality Job Creation and Growt...
Building Effective Skills Strategies to Foster Quality Job Creation and Growt...Building Effective Skills Strategies to Foster Quality Job Creation and Growt...
Building Effective Skills Strategies to Foster Quality Job Creation and Growt...OECD CFE
 
John Swords, Head of Procurement, HSE
John Swords, Head of Procurement, HSEJohn Swords, Head of Procurement, HSE
John Swords, Head of Procurement, HSEInvestnet
 
Structure For Non Profit Org
Structure For Non Profit OrgStructure For Non Profit Org
Structure For Non Profit Orgdkmarshall
 
50 Must-Have Email Campaigns
50 Must-Have Email Campaigns50 Must-Have Email Campaigns
50 Must-Have Email CampaignsWhatConts
 
Marketplace Overview (Infusionsoft Mastermind Webinar)
Marketplace Overview (Infusionsoft Mastermind Webinar)Marketplace Overview (Infusionsoft Mastermind Webinar)
Marketplace Overview (Infusionsoft Mastermind Webinar)Infusionsoft
 
The state of lifecycle marketing and automation 2016
The state of lifecycle marketing and automation 2016The state of lifecycle marketing and automation 2016
The state of lifecycle marketing and automation 2016Smart Insights
 

Viewers also liked (19)

Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012
 
SEO & Analytics - 2012 Symposium for the Marketing of Higher Education
SEO & Analytics - 2012 Symposium for the Marketing of Higher EducationSEO & Analytics - 2012 Symposium for the Marketing of Higher Education
SEO & Analytics - 2012 Symposium for the Marketing of Higher Education
 
EBD Course: Lecture 4 Secondary Sources
EBD Course: Lecture 4 Secondary SourcesEBD Course: Lecture 4 Secondary Sources
EBD Course: Lecture 4 Secondary Sources
 
Setting Up Internal Tech Support for your Nonprofit Organization
Setting Up Internal Tech Support for your Nonprofit OrganizationSetting Up Internal Tech Support for your Nonprofit Organization
Setting Up Internal Tech Support for your Nonprofit Organization
 
Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...
Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...
Lifecycle Marketing for Nonprofit organizations to drive donations and volunt...
 
Marketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsMarketing For Nonprofit Organizations
Marketing For Nonprofit Organizations
 
Basic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsBasic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit Organizations
 
Selling Good Works -- Fundamentals of Marketing a Non-Profit Organization
Selling Good Works -- Fundamentals of Marketing a Non-Profit OrganizationSelling Good Works -- Fundamentals of Marketing a Non-Profit Organization
Selling Good Works -- Fundamentals of Marketing a Non-Profit Organization
 
Introduction to Research Methodology
Introduction to Research MethodologyIntroduction to Research Methodology
Introduction to Research Methodology
 
Multichannel Lifecycle Marketing
Multichannel Lifecycle MarketingMultichannel Lifecycle Marketing
Multichannel Lifecycle Marketing
 
Mario Guerrero - Automating the Sales Cycle
Mario Guerrero - Automating the Sales CycleMario Guerrero - Automating the Sales Cycle
Mario Guerrero - Automating the Sales Cycle
 
Serving seniors in the library
Serving seniors in the libraryServing seniors in the library
Serving seniors in the library
 
Building Effective Skills Strategies to Foster Quality Job Creation and Growt...
Building Effective Skills Strategies to Foster Quality Job Creation and Growt...Building Effective Skills Strategies to Foster Quality Job Creation and Growt...
Building Effective Skills Strategies to Foster Quality Job Creation and Growt...
 
John Swords, Head of Procurement, HSE
John Swords, Head of Procurement, HSEJohn Swords, Head of Procurement, HSE
John Swords, Head of Procurement, HSE
 
Structure For Non Profit Org
Structure For Non Profit OrgStructure For Non Profit Org
Structure For Non Profit Org
 
50 Must-Have Email Campaigns
50 Must-Have Email Campaigns50 Must-Have Email Campaigns
50 Must-Have Email Campaigns
 
Marketplace Overview (Infusionsoft Mastermind Webinar)
Marketplace Overview (Infusionsoft Mastermind Webinar)Marketplace Overview (Infusionsoft Mastermind Webinar)
Marketplace Overview (Infusionsoft Mastermind Webinar)
 
A Simple Nonprofit Organizational Chart
A Simple Nonprofit Organizational ChartA Simple Nonprofit Organizational Chart
A Simple Nonprofit Organizational Chart
 
The state of lifecycle marketing and automation 2016
The state of lifecycle marketing and automation 2016The state of lifecycle marketing and automation 2016
The state of lifecycle marketing and automation 2016
 

Similar to Safe computing (Tips & Tricks)

Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
computerviruses-171008143158.ppt
computerviruses-171008143158.pptcomputerviruses-171008143158.ppt
computerviruses-171008143158.pptssuser342286
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 

Similar to Safe computing (Tips & Tricks) (20)

Internet security
Internet securityInternet security
Internet security
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Internet
InternetInternet
Internet
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Ransomware
RansomwareRansomware
Ransomware
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
computerviruses-171008143158.ppt
computerviruses-171008143158.pptcomputerviruses-171008143158.ppt
computerviruses-171008143158.ppt
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 

More from Satyendra Arora

More from Satyendra Arora (11)

2 minutes Demo Slams: PrintFriendly
2 minutes Demo Slams: PrintFriendly2 minutes Demo Slams: PrintFriendly
2 minutes Demo Slams: PrintFriendly
 
Splashtop & Doceri in classrooms
Splashtop & Doceri in classroomsSplashtop & Doceri in classrooms
Splashtop & Doceri in classrooms
 
How to use google efficiently !
How to use google efficiently !How to use google efficiently !
How to use google efficiently !
 
The Evolution of Information Technology
The Evolution of Information TechnologyThe Evolution of Information Technology
The Evolution of Information Technology
 
Power failure presentation
Power failure presentationPower failure presentation
Power failure presentation
 
Innovative teaching
Innovative teachingInnovative teaching
Innovative teaching
 
LED bulbs
LED bulbsLED bulbs
LED bulbs
 
Web2.0 Tools
Web2.0 ToolsWeb2.0 Tools
Web2.0 Tools
 
6 Thinking Hats
6 Thinking Hats6 Thinking Hats
6 Thinking Hats
 
Tech Videos
Tech VideosTech Videos
Tech Videos
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 

Recently uploaded

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 

Recently uploaded (20)

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 

Safe computing (Tips & Tricks)

  • 2. 6 Steps for Safe Computing Required 1. Keep Your Operating System Up To Date 2. Install and Update Anti-Virus Software 3. Use Strong Passwords Strongly Recommended 1. Enable Firewall Protection 2. Install and Use Spyware Removal Tools 3. Back Up Important Files
  • 3. Update your Operating System • Recent versions of Windows and Macintosh computers have automatic software updates. • Configure your computer to automatically download the latest patches and updates. Most security issues are related to vulnerabilities in the Operating System. As these flaws are discovered, software companies release patches and updates to protect you from security holes.
  • 4. Install and Update Anti-virus Software How to Get Anti-virus software • Purchase commercial anti-virus software. • Free Windows version for home use by Avast, AVG, MSE etc. Keep the virus definitions up to date. If your computer is connected to the Internet or you share files with anyone, you need anti-virus software !
  • 5. Set Strong Passwords • Set Your Computer Password - Do not leave it blank • Password Tips – Never share your password. – Never write your password down. – Change your password periodically. • Creating a Strong Password – Passwords should be 7 characters or longer. The longer the better. – Passwords should contain at least one alpha character (a-z). – Passwords should contain at least one non-alpha character. – Do not choose passwords that contain personal information, like pet’s or children’s names. – Try using a pass phrase. For example, Hpatp0a = “Harry Potter and the Prisoner of Azkaban”. The easiest way to break into your computer is a weak or blank password. If your computer is compromised it can be used to attack other computers on campus or around the world.
  • 6. Personal Firewall Protection • Enable Your Firewall Protection – Windows, Macintosh OS X (v. 10.2 and later), and Linux have built in firewall software. • Commercial Firewall Software – If you have an older Operating System or want a more robust firewall, consider purchasing a commercial version. • Free Firewall Software for Windows – ZoneAlarm Firewall for Windows is available for free for individual home use on your personal computer. A firewall can protect your computer against hackers and other security attacks. The latest versions of Windows, Linux and the Macintosh operating systems have basic built in firewalls.
  • 7. Spyware and How to Avoid It? • Spyware is often installed by you without your knowledge by piggybacking on other software or by tricking you into installing it. • Some anti-virus software also has anti-spyware capability. • Anti-spyware Recommendations for Windows – Adaware (http://www.lavasoftusa.com/default.shtml.en) – Spybot Search and Destroy (http://www.safer-networking.org/en/home/index.html) Spyware is software that is downloaded and installed onto your computer, often without your knowledge. Spyware monitors and shares your information while you browse the Internet.
  • 8. Back Up Important Files ! • How Should I Back Up My Files? – Backup Software: Can be installed easily & regular backup can be taken. – Back up to Web Files: SkyDrive has 25GB of space on Cloud. Powered by Microsoft – Back up to CD or DVD Writers: All computers have a built in CD or DVD writer. Burning discs is easy and inexpensive. Since no system is completely secure, you should regularly back up important files. This is also your best defense against losing files to viruses, software or hardware failure, or the loss or theft of your computer.
  • 9. Email Safety Tips 1. Do not open unexpected attachments. 2. Use Spam Filters 3. Beware of Spoof Emails or Phishing. 4. Don’t send sensitive data in email. 5. Avoid clicking on links in the body of an email message. While these links may not be a phishing attempt, they may not go to the site you intend. Unless you are completely comfortable that the email is legitimate, it is best to copy and paste the link or type it in directly in your browser.
  • 10. Spoof Email (Phishing) Phishing emails are an attempt by thieves to lure you into divulging personal and financial information, for their profit.
  • 11. Spoof Email (Phishing) 6 Ways to Recognize Phishing 1. Generic Greeting For example, “Dear Customer”. 2. Sense of urgency. May include an urgent warning requiring immediate action. 3. Account status threat. May include a warning that your account will be terminated unless you reply. 4. Forged email address. The sender’s email address may be forged, even if it looks legitimate. 5. Forged links to Web sites. There is often a link to a Website to “fix” the problem. These are usually forged. 6. Requests for personal information. Asking for login and password info, either in email or via the link.
  • 13. Source 1. www.safecomputing.co.uk 2. www.safecomputingtips.com 3. www.india-infotech.com/Articles/safe_computing.html 4. www.ictknowledgebase.org.uk 5. www-comp.arch.cam.ac.uk/h-and-s.html 6. www.direct.gov.uk/en/.../HealthAndSafetyAtWork/DG_10026668 7. www.bbc.co.uk › Home › ICT › Risks and implications of ICT 8. www.computerfreetips.com 9. www.pctipstricks.com 10. www.computeronlinetips.com 11. computershopper.com/feature/the-best-computer-tips-and-tricks
  • 14.
  • 15.