SlideShare uma empresa Scribd logo
1 de 8
How Can You Protect Your Computer? 
How to Protect Your Computer From Viruses/Spyware/Hackers 
Since the Internet is a popular means of communication it is important 
to protect your computer from viruses, hackers and spyware. Viruses 
can delete files, hackers can retrieve personal information you have on 
your computer, advertisers can load programs that read and send them 
your passwords without your knowledge, and in some cases someone 
can actually access your computer and delete files that could render 
your computer unusable. 
While most of the "behind the scenes" stuff that takes place as you surf 
the Internet are only targeted advertising, demographic data collection, 
or pranks, you should be aware of the potential problems and protect 
your computer. You can do this by making sure that you avoid 
programs that can install spyware without your knowledge, keep 
antivirus software installed and updated and keep security and critical 
patches updated by automating Windows Updates. 
Spyware 
What is Spyware?
Spyware (aka adware) refers to a category of software that, when 
installed on your computer, may send you pop-up ads, redirect your 
browser to certain websites, or monitor the websites that you visit. 
Some extreme, invasive versions of spyware may track exactly what 
keys you type (http://gopcpro.com/download.html). 
How Do You Know if There is Spyware on Your Computer? 
The following symptoms may indicate that spyware is installed on your 
computer: 
Your computer suddenly seems very slow when opening programs 
or processing tasks (saving files, etc.). 
You are subject to endless pop-up windows. 
You are redirected to web sites other than the one you typed into 
your browser. 
New, unexpected toolbars appear in your web browser. 
New, unexpected icons appear in the task tray at the bottom of 
your screen. 
Your browser's home page suddenly changed. 
The search engine your browser opens when you click "search" has 
been changed.
Certain keys fail to work in your browser (e.g., the tab key doesn't 
work when you are moving to the next field within a form). 
Random Windows error messages begin to appear. 
How Can You Prevent Spyware from Installing on Your Computer? 
To avoid unintentionally installing it yourself, follow these good security 
practices: 
Don't click on links within pop-up windows. Because pop-up windows 
are often a product of spyware, clicking on the window may install 
spyware software on your computer. To close the pop-up window, click 
on the "X" icon in the title bar instead of a "close" link within the 
window. 
Choose "no" when asked unexpected questions - Be wary of 
unexpected dialog boxes asking whether you want to run a particular 
program or perform another type of task. Always select "no" or 
"cancel," or close the dialog box by clicking the "X" icon in the title bar. 
Be wary of free downloadable software - There are many sites that 
offer customized toolbars or other features that appeal to users. 
Don't download programs from sites you don't trust, and realize that 
you may be exposing your computer to spyware by downloading some 
of these programs.
Don't follow email links claiming to offer anti-spyware software like 
email viruses, the links may serve the opposite purpose and actually 
install the spyware it claims to be eliminating. 
How Do You Remove Spyware? 
Run a full scan on your computer with your anti-virus software - 
Some anti-virus software will find and remove spyware, but it may not 
find the spyware when it is monitoring your computer in real time. Set 
your anti-virus software to prompt you to run a full scan periodically. 
Run a legitimate product specifically designed to remove spyware - 
Many vendors offer products that will scan your computer for spyware 
and remove any spyware software. Information Technology 
recommends using Spybot Search and Destroy. This software can be 
downloaded for free at this website: 
http://gopcpro.com/download.html 
Virus 
What is a Virus? 
A piece of programming code inserted into other programming to cause 
some unexpected and usually undesirable event, such as lost or 
damaged files. Viruses can be transmitted by downloading programs
from other sites or be present on a diskette. You may be unaware that 
you have received a virus and may be spreading it as a virus can be 
dormant until something causes its code to be executed by the 
computer. Many Internet users have had their computers crash from 
viruses that attached to e-mails 
How Do You Know if There is a Virus on Your Computer? 
The following symptoms may indicate that a virus is installed on your 
computer: 
Your computer seems sluggish or slow. 
You can’t open specific programs on your computer. 
Your Internet browser begins acting weird (ie, unexpectedly closes, 
won’t open at all, unable to go to any websites, etc). 
Your computer reboots on its own. 
Receive constant system error messages that an important file is 
missing or corrupt. 
How Can You Prevent a Virus from Installing on Your Computer?
To avoid unintentionally installing it yourself, follow these good security 
practices: 
Make sure that you have antivirus software installed on your 
computer. 
Schedule weekly virus definition updates so that your software is able 
to catch the latest viruses. 
Schedule weekly scans of your hard disks so that the software can 
find viruses before it infects your system. 
Make sure that automatic protection is enabled so that the program 
is constantly looking for viruses as soon as you turn on your computer. 
Make sure that the program is compatible with your email program 
so that it can immediately detect and block viruses in email 
attachments. 
How Do You Remove Viruses? 
Run a full scan on your computer with your antivirus software. If a 
virus is detected your antivirus software will either clean, delete or 
quarantine the file.
If the virus can’t be removed by your antivirus software you can find 
removal tools specific to the type of virus by going to the software 
manufacturer website (Gopcpro.com Most use full) 
Windows Update 
What is Windows Update? 
A Microsoft website that provides updates for Windows operating 
system software and Windows-based hardware. Updates address 
known issues and help protect against known security threats. 
How Does it Work? 
When you visit the website, Windows Update scans your computer and 
tells you which updates apply to your software and hardware. You 
choose the updates that you want to install and how to install them. 
How Can You Update Your Computer? 
If you turn on Automatic Updates, Windows Update can deliver high 
priority updates to your computer as they become available. You can
decide when and how updates are installed. To turn on Automatic 
Updates follow these instructions: 
Right click on My Computer and then click on Properties. 
Click on the Automatic Updates tab. 
Then choose the recommended option for installing the updates. 
Gopcpro.com, Gopcpro Registry Cleaner, Increase Your PC's Performance

Mais conteúdo relacionado

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Destaque

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 

Destaque (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Gopcpro.com

  • 1. How Can You Protect Your Computer? How to Protect Your Computer From Viruses/Spyware/Hackers Since the Internet is a popular means of communication it is important to protect your computer from viruses, hackers and spyware. Viruses can delete files, hackers can retrieve personal information you have on your computer, advertisers can load programs that read and send them your passwords without your knowledge, and in some cases someone can actually access your computer and delete files that could render your computer unusable. While most of the "behind the scenes" stuff that takes place as you surf the Internet are only targeted advertising, demographic data collection, or pranks, you should be aware of the potential problems and protect your computer. You can do this by making sure that you avoid programs that can install spyware without your knowledge, keep antivirus software installed and updated and keep security and critical patches updated by automating Windows Updates. Spyware What is Spyware?
  • 2. Spyware (aka adware) refers to a category of software that, when installed on your computer, may send you pop-up ads, redirect your browser to certain websites, or monitor the websites that you visit. Some extreme, invasive versions of spyware may track exactly what keys you type (http://gopcpro.com/download.html). How Do You Know if There is Spyware on Your Computer? The following symptoms may indicate that spyware is installed on your computer: Your computer suddenly seems very slow when opening programs or processing tasks (saving files, etc.). You are subject to endless pop-up windows. You are redirected to web sites other than the one you typed into your browser. New, unexpected toolbars appear in your web browser. New, unexpected icons appear in the task tray at the bottom of your screen. Your browser's home page suddenly changed. The search engine your browser opens when you click "search" has been changed.
  • 3. Certain keys fail to work in your browser (e.g., the tab key doesn't work when you are moving to the next field within a form). Random Windows error messages begin to appear. How Can You Prevent Spyware from Installing on Your Computer? To avoid unintentionally installing it yourself, follow these good security practices: Don't click on links within pop-up windows. Because pop-up windows are often a product of spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the "X" icon in the title bar instead of a "close" link within the window. Choose "no" when asked unexpected questions - Be wary of unexpected dialog boxes asking whether you want to run a particular program or perform another type of task. Always select "no" or "cancel," or close the dialog box by clicking the "X" icon in the title bar. Be wary of free downloadable software - There are many sites that offer customized toolbars or other features that appeal to users. Don't download programs from sites you don't trust, and realize that you may be exposing your computer to spyware by downloading some of these programs.
  • 4. Don't follow email links claiming to offer anti-spyware software like email viruses, the links may serve the opposite purpose and actually install the spyware it claims to be eliminating. How Do You Remove Spyware? Run a full scan on your computer with your anti-virus software - Some anti-virus software will find and remove spyware, but it may not find the spyware when it is monitoring your computer in real time. Set your anti-virus software to prompt you to run a full scan periodically. Run a legitimate product specifically designed to remove spyware - Many vendors offer products that will scan your computer for spyware and remove any spyware software. Information Technology recommends using Spybot Search and Destroy. This software can be downloaded for free at this website: http://gopcpro.com/download.html Virus What is a Virus? A piece of programming code inserted into other programming to cause some unexpected and usually undesirable event, such as lost or damaged files. Viruses can be transmitted by downloading programs
  • 5. from other sites or be present on a diskette. You may be unaware that you have received a virus and may be spreading it as a virus can be dormant until something causes its code to be executed by the computer. Many Internet users have had their computers crash from viruses that attached to e-mails How Do You Know if There is a Virus on Your Computer? The following symptoms may indicate that a virus is installed on your computer: Your computer seems sluggish or slow. You can’t open specific programs on your computer. Your Internet browser begins acting weird (ie, unexpectedly closes, won’t open at all, unable to go to any websites, etc). Your computer reboots on its own. Receive constant system error messages that an important file is missing or corrupt. How Can You Prevent a Virus from Installing on Your Computer?
  • 6. To avoid unintentionally installing it yourself, follow these good security practices: Make sure that you have antivirus software installed on your computer. Schedule weekly virus definition updates so that your software is able to catch the latest viruses. Schedule weekly scans of your hard disks so that the software can find viruses before it infects your system. Make sure that automatic protection is enabled so that the program is constantly looking for viruses as soon as you turn on your computer. Make sure that the program is compatible with your email program so that it can immediately detect and block viruses in email attachments. How Do You Remove Viruses? Run a full scan on your computer with your antivirus software. If a virus is detected your antivirus software will either clean, delete or quarantine the file.
  • 7. If the virus can’t be removed by your antivirus software you can find removal tools specific to the type of virus by going to the software manufacturer website (Gopcpro.com Most use full) Windows Update What is Windows Update? A Microsoft website that provides updates for Windows operating system software and Windows-based hardware. Updates address known issues and help protect against known security threats. How Does it Work? When you visit the website, Windows Update scans your computer and tells you which updates apply to your software and hardware. You choose the updates that you want to install and how to install them. How Can You Update Your Computer? If you turn on Automatic Updates, Windows Update can deliver high priority updates to your computer as they become available. You can
  • 8. decide when and how updates are installed. To turn on Automatic Updates follow these instructions: Right click on My Computer and then click on Properties. Click on the Automatic Updates tab. Then choose the recommended option for installing the updates. Gopcpro.com, Gopcpro Registry Cleaner, Increase Your PC's Performance