Christopher W Schneider Portfolio Nov2015

7
Christopher W. Schneider - Portfolio

Transcript of Christopher W Schneider Portfolio Nov2015

Page 1: Christopher W Schneider Portfolio Nov2015

Christopher W. Schneider - Portfolio

Page 2: Christopher W Schneider Portfolio Nov2015

Christopher W. Schneider - Portfolio

Page 3: Christopher W Schneider Portfolio Nov2015

Christopher W. Schneider - Portfolio

Page 4: Christopher W Schneider Portfolio Nov2015

Christopher W. Schneider - Portfolio

Already have an Apple ID/iTunes Account? Terrific! Go ahead and use it with these precautions: Do NOT plug your Ecolab devices into your PC or 1) Set up as new or 2) Restore an iTunes back-up. If you do, you will lose all Ecolab configurations on your iPhone or iPad. Sign in at Step 2, choose to allow your Ecolab devices to merge information, and allow iCloud to Use the Location of Your iPhone. You will need to open and confirm the verification email that will be sent to the email you used.

What’s an Apple ID and why do I need one?

The Apple ID is an account that you can use to access all of Apple's services. You can use it to buy music and apps from the iTunes Store. For work, you'll need it to download helpful or required apps found in the Pest App Store. You’ll also need an Apple ID in order to use iCloud which can help you find a lost device. To create a brand new Apple ID from your Ecolab iPhone, follow the steps below.

Method 2 instructions:

1. From the Home screen, tap

on the Settings icon.

3. Enter your Birthday.

2. Scroll to and tap iCloud

and Get a free Apple ID.

4. Enter your First Name and

Last Name.

5. Select Get a free iCloud

email address.

6. Create the Apple ID.

Page 5: Christopher W Schneider Portfolio Nov2015

Christopher W. Schneider - Portfolio

1.

8. Enter a rescue email and

(optional) allow email updates.

7. Select 3 security questions

and provide answers.

9. Agree to terms and conditions.

11. Return to Home Screen

and tap on Pest App Store.

10. Allow iCloud to Use

Location finder for iPhone.

12. Scroll to the ADP app and tap install.

13. Tap Install to confirm.

14. Sign in with Apple ID.

15. Tap Install to finish.

Page 6: Christopher W Schneider Portfolio Nov2015

Christopher W. Schneider - Portfolio

16. Return to Home Screen

and tap on the ADP app.

17. Allow ADP Mobile to Use

Current Location.

18. Sign in with User ID you

received from Ecolab HR.

Page 7: Christopher W Schneider Portfolio Nov2015

Christopher W. Schneider - Portfolio

This is a sample of instructions I was asked to submit to a private business client to help his employees

understand that they have to own why their computers are having problems.

How Does My Windows Operating System Get Infected?

Your internet surfing behavior needs improvement Websites are becoming annoying mazes of ads and popups; it is best to exercise caution when going to any new site. Both the pop-culture internet sites and the social network sites are super-saturated with paths that can easily lead to infection and popup headaches. The people most commonly targeted are those who play the games offered on Facebook--especially the games that cost money. Avoid gaming on all these sites. When in doubt, don’t click it. You use the same password for everything This is a bad idea, but if you insist on doing so, a good password has to be at least 8 alphanumeric (letters and numbers) characters and contain at least one capital letter and one punctuation mark. Even if you follow these guidelines, it’s still a temptation to take the easy way out. For example, if your password was “fryingpan” and you change it to “Frying5pan!”, while it is an improvement, it still might not be secure. It is too common to capitalize the first letter and put a special character at the end. A number could be a substitute for a letter and should not always be in an obvious breaking point. Consider a phrase instead: “veryrus7yfryingP@n”. And finally, change all your passwords annually. You try to get something for nothing (which is called theft) via file sharing sites For example: 4shared, Megaupload, Mediafire, Filestube, Rapidshare, The Pirate Bay, Fileserve, Hotfile, Torrentz.eu, Depositfile, MiniNova, WhereToWatch.com, Bittorent.AM, etc. If you try to download movies, music, television shows, software, or pornography from a site that offers them to you free of charge, you are putting yourself in harm’s way. Avoid trying to get something for nothing; it is always best to purchase items from a reputable source. Ask yourself if your integrity and security worth is it. You often ignore Microsoft Updates On the second Tuesday of every month, Microsoft makes updates available that are designed to plug holes that develop in the Windows operating system. If you ignore these updates, you are in effect saying, “Thanks, Mr. Gates, for the amazing and comparatively inexpensive operating system that dominates the entire world computer market, but I can take it from here.” This is wrong. Do not do this. These updates are important and they are free. Install these updates when you are notified, then restart your computer once they’ve been installed. Don’t starve your operating system. You open infected links in emails or email attachments Opening any spam email or suspected spam email is high risk behavior, even if it comes from a close

friend or family member. Spam email typically has no text in the Subject field, and the only text in the

body of the email is the offending link. Don’t click on the link and don’t reply to the sender from this

email. Call or text the sender, and ask, "Did you mean to send this to me?" Odds are you’ll be doing

them a favor as well--they’re probably unaware that this is happening. Lastly, open the trash bin in your

email and delete it there as well.