SlideShare uma empresa Scribd logo
1 de 19
Internet Safety Tips to Keep Students safe while  Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot;  width=&quot;470&quot;  height=&quot;275&quot;  bgcolor=&quot;undefined&quot;  allowscriptaccess=&quot;always&quot;  allowfullscreen=&quot;true&quot;  flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
With Social Networking, Your Safety’s at Sake… ,[object Object],[object Object],Image source morguefile:http://mrg.bz/oBLbEM
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile:   http://mrg.bz/0F6fg8
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/byySzY
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/qjMfce
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/GJc118
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/zfSgLy
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/xxyNdo
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/0B6o9J
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/dJwALA
Safety Concerns in General… ,[object Object],Image source: screenshot: rnappi
Safety Concerns in General… ,[object Object],Image source:screenshot, rnappi
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/nIkQsz
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/miTt5T
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/w2JBND
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/Xateje
The Case of the Cyber Criminal  ,[object Object],[object Object]
Where Do I Find More Information? ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spywarediwakar sharma
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Practica 3 manejo de repertorio
Practica 3 manejo de repertorioPractica 3 manejo de repertorio
Practica 3 manejo de repertorioPaoCarrasco-s
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation Bee255
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 PhpstudyYusuke Ando
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentationguest16e403
 

Mais procurados (11)

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Usable security
Usable securityUsable security
Usable security
 
Ideology
IdeologyIdeology
Ideology
 
King louis xvi
King louis xviKing louis xvi
King louis xvi
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Χρήσιμα URLs
Χρήσιμα URLsΧρήσιμα URLs
Χρήσιμα URLs
 
Practica 3 manejo de repertorio
Practica 3 manejo de repertorioPractica 3 manejo de repertorio
Practica 3 manejo de repertorio
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation
 
Blogs trucos
Blogs trucosBlogs trucos
Blogs trucos
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 Phpstudy
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentation
 

Destaque (6)

Licitação
LicitaçãoLicitação
Licitação
 
Anorexia
AnorexiaAnorexia
Anorexia
 
56365695 programacao-semic
56365695 programacao-semic56365695 programacao-semic
56365695 programacao-semic
 
Tendencia ambientales
Tendencia ambientalesTendencia ambientales
Tendencia ambientales
 
La responsabilidad
La responsabilidadLa responsabilidad
La responsabilidad
 
Calendario Layout 1
Calendario Layout 1Calendario Layout 1
Calendario Layout 1
 

Semelhante a Internet safety

Community presentation
Community presentation Community presentation
Community presentation ozesteph1992
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsPrajwal Panchmahalkar
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepapern|u - The Open Security Community
 
Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Shamal Aryan
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepatNie Andini
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017Codemotion
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Pixlr and small apps in the classroom
Pixlr and small apps in the classroomPixlr and small apps in the classroom
Pixlr and small apps in the classroomArtfulArtsyAmy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetystrifman
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityChristian Heilmann
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1BaileyFurman
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1BaileyFurman
 

Semelhante a Internet safety (20)

Community presentation
Community presentation Community presentation
Community presentation
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
 
Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Pixlr and small apps in the classroom
Pixlr and small apps in the classroomPixlr and small apps in the classroom
Pixlr and small apps in the classroom
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking Accessibility
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 

Último (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 

Internet safety

  • 1. Internet Safety Tips to Keep Students safe while Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
  • 2. Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot; width=&quot;470&quot; height=&quot;275&quot; bgcolor=&quot;undefined&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Notas do Editor

  1. Think about how different sites work before deciding to join a site. Some sites will allow only a defined community of users to access posted content; others allow anyone and everyone to view postings.
  2. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people, for example, your friends from school, your club, your team, your community groups, or your family.
  3. Keep your information to yourself. Don’t post your full name, Social Security number, address, phone number, or bank and credit card account numbers — and don’t post other people’s information, either. Be cautious about posting information that could be used to identify you or locate you offline. This could include the name of your school, sports team, clubs, and where you work or hang out.
  4. Make sure your screen name doesn’t say too much about you. Don’t use your name, your age, or your hometown. Even if you think your screen name makes you anonymous, it doesn’t take a genius to combine clues to figure out who you are and where you can be found.
  5. Post only information that you are comfortable with others seeing — and knowing — about you. Many people can see your page, including your parents, your teachers, the police, the college you might want to apply to next year, or the job you might want to apply for in five years.
  6. Remember that once you post information online, you can’t take it back. Even if you delete the information from a site, older versions exist on other people’s computers.
  7. Flirting with strangers online could have serious consequences. Because some people lie about who they really are, you never really know who you’re dealing with
  8. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust and report it to the police and the social networking site. You could end up preventing someone else from becoming a victim.
  9. Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers. A good virus protection software program can protect you, but you must keep it up to date.
  10. The terms &amp;quot;spyware&amp;quot; and &amp;quot;adware&amp;quot; apply to several different technologies. The two important things to know about them is that 1) they can download themselves onto your computer without your permission (typically when you visit an unsafe Web site or via an attachment) and 2) they can make your computer do things you don&apos;t want it to do. That might be as simple as opening an advertisement you didn&apos;t want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.
  11. Although they sound like something out of a bad science fiction movie, botnets have become a very real danger on the Internet. Botnets are made up of large numbers of computers that have been infected by criminals (using some of the tools mentioned before). Often, the people whose computers are controlled by a botnet don&apos;t even know that they&apos;ve been infected. Criminals use these armies of infected computers to attack Web sites by flooding them with massive amounts of traffic or as engines for sending spam. These attacks can devastate companies, and even entire countries in some cases. Victims caught in botnets can also be subject to identity theft as their personal information is compromised.
  12. Three protections that every computer connected to the Internet should have installed are:Anti-Virus Software, a Firewall, and Anti-Spyware Software. This software suite, which sometimes can be purchased as a package, is your frontline defense against cyber criminals and intrusions. Installing these software packages is the first step. Equally important is keeping them up to date.
  13. Anti-virus software protects your computer from viruses by scanning your computer and your incoming email and deleting anything that is infected. Viruses can destroy your data, slow your computer&apos;s performance, cause a crash, or allow spammers to send email through your account.
  14. Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don&apos;t permit. Some operating systems come with a built-in firewall that may be set on the &amp;quot;off&amp;quot; mode. Make sure you turn it on and keep it updated. Check your online &amp;quot;Help&amp;quot; feature for specific instructions.
  15. Spyware is a form of malicious software that monitors your online activities and can potentially collect your personal information. Anti-spyware software helps protect your computer from spyware. It periodically scans your computer for spyware programs, and then gives you the opportunity to remove any harmful surveillance software found. Some anti-virus software also contains anti-spyware capability. Given the increasing sophistication of spyware programs, consider using two different anti-spyware programs. Each one looks for slightly different sets of threats, and together they may offer increased protection.