Danger on Your Desktop
-
Upload
andy-smith -
Category
Technology
-
view
8.098 -
download
0
description
Transcript of Danger on Your Desktop
Danger on Your Desktop Educating and EmpoweringParents Towards Internet Safety
Please grab a Quiz on your way in!
YOUR MOM
BLOW THINGSOUT OF
PROPORTION
CONFINE
WORK TOGETHER
http://www.vimeo.com/2030361
Generation Gap?
What is your Generation?
Generation Gap?
You… were born between 1960 and 1981 have few relationships but they are
deep are interested in technology saw an explosion of technology
in your lifetime use the Internet more for work
than play Are part of GenerationX
Generation Gap?
Your Kids… were born between 1982 and 2001 have many relationships that are
technology based can not live without technology live in a world dominated
by technology use the Internet more for play
than work are part of The Millennial
Generation
Generation Gap?
Your Kids… were born between 1982
and 2001 have many relationships
that are technology based can not live without
technology live in a world dominated
by technology use the Internet more for
play than work are part of The
Millennial Generation
You… were born between 1960
and 1981 have few relationships but
they are deep are interested in
technology saw an explosion of
technology in your lifetime use the Internet more for
work than play Are part of GenerationX
Internet 101
…is the publicly accessible worldwide system of interconnected computer networks.
What do we do on the Internet?
Web sites deliver information
Web applications allow you to perform functions or tasks
Web Sites and Applications
Web 2.0 & UGC
What is Web 2.0 & UGC?
User Generated Content
Web 2.0 & UGC
Examples of Web 2.0 & UGC Web Sites
http://web2logo.com/
Content Licensing
ONLINE VIDEO
Email & Spam
Spamming is commonly defined as the sending of unsolicited bulk e-mail - that is, email that was not asked for (unsolicited) and received by multiple recipients (in bulk)
gone phishing
Malware/Spyware/Virus
Malware is software designed to infiltrate or damage a computer system, without the owner's consent.
Malware is commonly taken to include computer viruses, worms, Trojan horses, spyware and adware.
Some malware is used to “hijack” computers to send spam, store illegal data like child pornography, create denial of service (DOS) attacks…
RSS (Really Simple Syndication)
RSS is used by (among other things) news websites, weblogs and podcasting.
Web feeds provide web content or summaries of web content together with links to the full versions of the content, and other metadata.
RSS feeds allow a website's frequent readers to track updates on the site using an RSS Feed Reader.
Podcasting
Podcasting is the method of distributing multimedia files, such as audio programs or music videos, over the Internet for playback on mobile devices and personal computers.
Usually the podcast features one type of "show", with new episodes either sporadically or at planned intervals, such as daily or weekly.
Peer-to-Peer File Sharing
P2P Networks are typically used to share files from one computer on the Internet to another without the use of a web server.
Used primarily for MP3s, movies, pictures Common programs: Bit-Torrent LimeWire,
Ares, Morpheus, Grouper, Kazaa, BearShare, eDonkey2000, Shareaza, iMesh, Napster
Instant Messenger & Chat
Popular Chat Clients MSN Messenger Yahoo! Messenger Google Talk AOL Messenger Jabber Meebo Skype
Blogs
Weblogging - “Blogs” Blogger Wordpress.com Xanga Live Journal Within Social Networks Twitter
Internet Pornography
Tips For Parents
Monitor Filter Have “the talk” Get practical Monitor Social Interaction on
Internet Monitor peer-to-peer file sharing
http://triplexchurch.com/_pdf/_GetHelpPDFs/get_help_parents.pdf
Tips For Kids
Never give out personal information on-line. This can include such things as your address, telephone number, and location of your school or parent's name or their place of employment.
Never respond to obnoxious, sexual or menacing E-mails.
Never send anyone your picture and don't accept anyone else's picture either.
Never agree to get together with someone you "meet" online with out first checking with your parents.
Instead of using your real name online think of a code name that you can use.
Always use your common sense while online. Remember that you never really know with whom you are talking online.
Technology SolutionsBetter Web Browser Firefox [FREE]
(www.mozilla.com/firefox)
Why Switch: – 10 reasons (www.switch2firefox.com/whyswitch)
#2 – Popup blocking #4 – Simple Privacy/Annoyance
Eliminator #5 – Better Bookmarks and
History #7 – Customizable and
Extendable
Technology Solutions
Parental Control SoftwareK9 Web Protection [FREE]
Content Control (filtering) Usage Logging Limited Time Control
Technology Solutions
Parental Control SoftwareSafeEyes [$49.95US/yr] Web Blocking Usage Logging Time Limits Usage Alerts Program Control Free 15 Day Trial Easy to configure with multiple accounts
Instant Messaging Email Blocking Social Networking
Technology Solutions
Accountability Software X3Watch [FREE] (www.x3watch.com) X3PRO [$19.95US] (www.x3watch.com)
QUIZ
Danger on Your Desktop
Questions & Answers
Technology Help
Toby Goodman
$50 to install either application Can also help with other computer issues
(at additional cost) [email protected] (905) 935-0429
Danger on Your Desktop Educating and EmpoweringParents Towards Internet Safety
BREAK