SlideShare uma empresa Scribd logo
1 de 33
Internet Safety and   You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.com
Protecting Your Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com
Trojan Horses ,[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com ,[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com ,[object Object],[object Object],[object Object]
Protect Your Computer Install complete Anti-virus protection ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Available Anti-virus Software COMPUTER EXPLORERS ®  in no way endorses or warrants the purchase, download, or use of the listed software. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Adware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Infested Computers http://www.computerexplorers.com Severe Case  Mild Case
Prevention Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Available Spyware and Adware Products   COMPUTER EXPLORERS ®  in no way endorses or warrants the purchase, download, or use of the listed software. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Pop-up Blockers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com What’s a Firewall? A firewall is a hardware or software device  configured to allow or deny data through a computer network with different trust levels. ,[object Object],[object Object],[object Object]
Protecting Your Information ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Spam Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Spam  – any message, regardless of its content, that is sent to multiple mailing lists, individuals or newsgroups. Also called bulk e-mail or junk e-mail.
Fraudulent E-Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Fraudulent e-mails are “spoofing” or “phishing” messages. Scammers use these methods to “fish” for consumer’s financial or other identifying information. These messages will create the impression the user has an urgent need to update his/her personal information.
Tips to Protect Against “Phishing” ,[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
The Look of Fraudulent E-Mails http://www.computerexplorers.com Hovering over a link with the mouse cursor will reveal the real address the link will take you to. Don’t be fooled by the official looking header in this fraudulent e-mail.
General Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com
Protecting You or Your Children   Filtering and Site blocking http://www.computerexplorers.com ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Social Situations ,[object Object],[object Object],[object Object],http://www.computerexplorers.com
[object Object],[object Object],[object Object],Online Social Situations, cont. http://www.computerexplorers.com
Popular Social Sites for Teens and Pre-teens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Please note, your children are fickle. What may be popular today may not be popular tomorrow. Keep an eye on their surfing and investigate any unknown sites.
Can you decipher these? FWIW, I thnk U R gr8t! Btw, ur BFF is a PITA OMG!  LOL!  Cul8r, H&K, ttyl http://www.computerexplorers.com
Internet Safety Study   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Internet Safety Study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Safety Tips for Parents or Guardians ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Remember Three Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Safety Tips for Your Kids ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Don’t Be Afraid of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Contact Information Name: Phone: E-mail: www.computerexplorers.com   www.computerexplorers.com/yourCEsite YOUR PHOTO HERE

Mais conteúdo relacionado

Mais procurados

Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
nicamos
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 

Mais procurados (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Ppt123
Ppt123Ppt123
Ppt123
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
 
C 7
C 7C 7
C 7
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Instructions to remove ads by lolliscan
Instructions to remove ads by lolliscanInstructions to remove ads by lolliscan
Instructions to remove ads by lolliscan
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
M
MM
M
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 

Destaque

Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
Joe Drumgoole
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Employee safety and health
Employee safety and healthEmployee safety and health
Employee safety and health
rumel009
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Destaque (15)

Emergency planning for school safety
Emergency planning for school safetyEmergency planning for school safety
Emergency planning for school safety
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
CHILD SAFETY AT HOME
CHILD SAFETY AT HOMECHILD SAFETY AT HOME
CHILD SAFETY AT HOME
 
Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Employee safety and health
Employee safety and healthEmployee safety and health
Employee safety and health
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Semelhante a Keeping Your Children, your information and your equiptment safe

Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 

Semelhante a Keeping Your Children, your information and your equiptment safe (20)

Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Spyware
SpywareSpyware
Spyware
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Keeping Your Children, your information and your equiptment safe

  • 1. Internet Safety and You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. The Look of Fraudulent E-Mails http://www.computerexplorers.com Hovering over a link with the mouse cursor will reveal the real address the link will take you to. Don’t be fooled by the official looking header in this fraudulent e-mail.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Can you decipher these? FWIW, I thnk U R gr8t! Btw, ur BFF is a PITA OMG! LOL! Cul8r, H&K, ttyl http://www.computerexplorers.com
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Contact Information Name: Phone: E-mail: www.computerexplorers.com www.computerexplorers.com/yourCEsite YOUR PHOTO HERE

Notas do Editor

  1. Welcome to “Internet Safety and You”! I am ( your name ), ( owner, director, etc) of COMPUTER EXPLORERS. The presentation today is designed to help you arm yourself with facts and tips to keep you safe while using the Internet.