KEEPING YOUR BALANCE Walking Uprightly. KEEPING YOUR BALANCE.
Keeping Your Children, your information and your equiptment safe
-
Upload
computer-explorers -
Category
Education
-
view
2.381 -
download
0
description
Transcript of Keeping Your Children, your information and your equiptment safe
![Page 1: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/1.jpg)
Internet Safety and You
How to keep you, your children, your information, and your
equipment safe.
http://www.computerexplorers.com
![Page 2: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/2.jpg)
Protecting Your Computer
Viruses Trojan Horses Worms Spyware Adware Malware
What are they?
http://www.computerexplorers.com
![Page 3: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/3.jpg)
Viruses
Virus – a computer program that can copy itself and infect a computer without permission or knowledge of the user
How do viruses spread? makes copies of itself in a
computer’s memory, storage or over a network
transferred on a floppy disk, CD/DVD, or USB storage device to another computer
sent via an e-mail message over the Internet
http://www.computerexplorers.com
![Page 4: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/4.jpg)
Trojan Horses
Trojan Horse - a program that installs malicious software while under the guise of doing something else.
How do Trojan Horses spread?
Does not spread by inserting its code into computer files
The malicious program has to be run by the recipient in order to install
http://www.computerexplorers.com
What do Trojan Horses look like?
•An image
•A game
•Weather alerting software
![Page 5: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/5.jpg)
Worms
Worm - a self-replicating
computer program.
How does a worm work? Uses a network to send copies of itself
to other computers on the network May copy itself without a person
executing the program
http://www.computerexplorers.com
How is a worm different from a virus?
Does not need to attach itself to an existing program
Harms the network; viruses infect files on a computer
![Page 6: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/6.jpg)
Protect Your ComputerInstall complete Anti-virus protection
What should my Anti-virus software do: recognize current viruses, as well as older ones effectively reverse the damage update automatically run smart or partial scans
http://www.computerexplorers.com
![Page 7: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/7.jpg)
Available Anti-virus SoftwareCOMPUTER EXPLORERS® in no way endorses or warrants the purchase, download, or use of the listed software.
Software for purchase:
Norton AntiVirus®
http://www.symantec.com
McAfee®
http://www.mcafee.com
ZoneAlarm®
http://www.zonealarm.com
CA® Anti-virushttp://www.ca.com
Free downloads:
AVG Anti-virushttp://www.avg.com
avast! 4 Home Editionhttp://www.avast.com
Avira AntiVir Personal Editionhttp://www.free-av.com
http://www.computerexplorers.com
![Page 8: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/8.jpg)
Spyware
Spyware - programming that is put in someone's computer, without his/her knowledge, to gather information about the user and relay it to advertisers or other interested parties
How does Spyware work? Gathers information about the
user for marketing purposes Delivers unwanted pop-up ads Steals personal information Can interfere with user control
of the computer by: Installing additional software Redirecting web browser pages Diverting advertising revenue to
a third party
http://www.computerexplorers.com
![Page 9: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/9.jpg)
Adware
Adware - any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used
Adware Prevention Tips: Avoid installing adware Keep up-to-date with security
patches and operating system updates from Windows Update
If using a version of Internet Explorer earlier than version 7, set the browser to prompt the user for ActiveX installation
Use an alternative Web browser (e.g. Opera, Mozilla Firefox, Safari, etc.)
Install ad-blocking software
http://www.computerexplorers.com
![Page 10: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/10.jpg)
Malware
Malware (Malicious Software)
– any program or file that is harmful to a computer user
Malware includes: Viruses Trojan horses worms spyware
Symptoms of Malware:
Sluggish or choppy computer performance
An onslaught of unwanted pop-up ads
New and unfamiliar toolbars or toolbar icons
Repeated or sudden changes in your Web browser home page
http://www.computerexplorers.com
![Page 11: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/11.jpg)
Infested
Computers
http://www.computerexplorers.com
Severe Case
Mild Case
![Page 12: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/12.jpg)
Prevention Tips The best defense against spyware and other unwanted software is not to
download it in the first place.
Use alternative Web browsers other than Internet Explorer. Other browsers include Netscape, Mozilla Firefox, Opera, and Safari (for Mac users).
Only download programs from Web sites you trust.
Read all security warnings, license agreements, and privacy statements associated with any downloads.
Close unwanted pop-up windows by clicking the X in the right corner of the window. Never click “agree” or “OK” to close an unwanted window.
Be cautious about using "free" music and movie file-sharing programs, and be sure you clearly understand all of the software packaged with those programs.
Use spyware and adware removal software.
http://www.computerexplorers.com
![Page 13: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/13.jpg)
Available Spyware and Adware Products COMPUTER EXPLORERS® in no way endorses or warrants the purchase, download, or use of the listed software.
Ad-Aware (http://www.lavasoft.com)
Windows Defender (http://www.microsoft.com/downloads)
Spybot Search & Destroy (http://www.safer-networking.org)
Spyware Blaster (http://www.javacoolsoftware.com)
Spyware Doctor (http://www.pctools.com)
Many anti-virus companies are now creating security suites that include spyware and adware prevention. Those companies include: Norton (Symantec) McAfee AVG
Important Note: Adware and spyware removers only detect and remove adware and spyware. These programs are not a replacement for anti-virus software.
http://www.computerexplorers.com
![Page 14: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/14.jpg)
Pop-up Blockers
Within Web browsers:
Windows Browsers Internet Explorer: Tools Pop-up blocker
Pop-up Blocker settings Mozilla Firefox: Tools Options
Content Tab Opera: Tools
**Note** Most browsers block pop-up windows or ads by default.
Within free toolbars
Yahoo! Toolbar (http://toolbar.yahoo.com)
Google Toolbar (http://toolbar.google.com)
http://www.computerexplorers.com
![Page 15: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/15.jpg)
Firewalls
Available Personal Firewalls:
Windows firewall (free) ZoneAlarm firewall (free or
pay) LavaSoft firewall (pay) Look ‘n’ Stop firewall (free for
30 days then pay)
http://www.computerexplorers.com
What’s a Firewall?
A firewall is a hardware or software device configured to allow or deny data through a computer network with different trust levels.
How does a Firewall work?
•Prevents network intrusions
•Prevents hackers from accessing personal information stored on your computer
![Page 16: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/16.jpg)
Protecting Your Information
Identity Theft
Fraudulent e-mail Spoofing or Phishing Intercepted e-mails or instant messages Lurkers on discussion boards and chat
rooms
http://www.computerexplorers.com
![Page 17: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/17.jpg)
Spam Mail
Tips for Preventing Spam
• Opt-out of e-mail marketing messages when registering with a Website.
• Use an alternative e-mail address when registering for services on various Websites. Free e-mail providers include Hotmail, Yahoo, GMail, and others.
• Read the fine print. Be sure you know how your e-mail will be used when registering with a site.
Daily Spam Mail Statistics*
•June 2005 – 30 billion
•June 2006 – 55 billion
•December 2006 – 85 billion
•June 2007 – 90 billion
•April 2008 – over 100 billion
*Source: IronPoint Systems, Inc. and www.spamunit.com
http://www.computerexplorers.com
Spam – any message, regardless of its content, that is sent to multiple mailing lists, individuals or newsgroups. Also called bulk e-mail or junk e-mail.
![Page 18: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/18.jpg)
Fraudulent E-Mail
Be suspicious of any e-mail that requests: Credit card information Complete home
address Banking information Username or
passwords Social security number
http://www.computerexplorers.com
Fraudulent e-mails are “spoofing” or “phishing” messages. Scammers use these methods to “fish” for consumer’s financial or other identifying information. These messages will create the impression the user has an urgent need to update his/her personal information.
![Page 19: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/19.jpg)
Tips to Protect Against “Phishing”
Remember that e-mail headers can be forged Avoid providing info or filling out forms via e-mail
because the data is not secure Avoid clicking links within an unsolicited e-mail
message Ensure a website is secure before providing any
personal information. Check for an address that begins with https or the browser has a lock icon in the address bar or bottom of the screen.
http://www.computerexplorers.com
![Page 20: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/20.jpg)
The Look of Fraudulent E-Mails
http://www.computerexplorers.com
Hovering over a link with the mouse cursor will reveal the real address the
link will take you to.
Don’t be fooled by the official looking header in
this fraudulent e-mail.
![Page 21: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/21.jpg)
General Safety Tips Use spam filters. Be suspicious of unsolicited e-mail. Treat e-mail attachments with caution. Don’t click links in e-mail messages. Create strong passwords. Use a combination of letters, numbers
and symbols. Change passwords frequently. Use a pseudonym when participating in public online forums, chat
rooms, discussion boards, etc. Don’t reveal username, passwords, or personal information to
anyone other than a trusted party. Install anti-virus software and keep it up to date. Install a personal firewall and keep it up to date. Install spyware/adware software and keep it up to date.
http://www.computerexplorers.com
![Page 22: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/22.jpg)
Protecting You or Your Children Filtering and Site blocking
http://www.computerexplorers.com
PC Based Software
•Cyber Patrol
•Net Nanny
•Cyber Sitter
Web Based Filters •Earthlink
•Comcast
•AOL
•Qwest
Search Engine controls•Google
•Yahoo!
•Windows Live Search (formerly MSN)
•Ask.com
What can you filter?
•Pornography
•Sexually explicit content
•Violence, including gaming sites and bomb making
![Page 23: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/23.jpg)
Online Social Situations
Chat rooms: a multi-user, simultaneous, real-time chat environment
MySpace: a social networking website that offers an interactive network of friends. The site includes personal profiles, blogs, groups, photos, videos and music. Other social networking sites include FaceBook, Friendster, Meetup.com, Nexopia, Orkut, hi5, and Xanga
Instant Messaging (IM): a form of real-time, text-typed communication between two computers or devices connected via a network. Yahoo! Messenger, Google Talk, Skype Messenger, AOL Instant Messenger (AIM), MSN, and ICQ are just a few of the messaging clients.
http://www.computerexplorers.com
![Page 24: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/24.jpg)
Blogs: or Web logs, are entries written in chronological order. Entries can be online diaries or commentaries on a specific topic. Blogs generally include text, hyperlinks, pictures, and now videos
Forums: a web application for holding discussions posted by users. Discussions generally pertain to a common topic. Forums are often referred to as discussion boards, message boards or web forums
Online games: video games played over a computer network. Online games can range from simple text-based games to games incorporating complex graphics and virtual worlds allowing for multiple players to play simultaneously.
Online Social Situations, cont.
http://www.computerexplorers.com
![Page 25: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/25.jpg)
Popular Social Sites for Teens and Pre-teens
Pre-teens (6-12) Club Penguin WebKinz Whyville.net Nicktropolis Disney Xtreme Digital
Teens (13+) MySpace MyYearbook Habbo Hotel FaceBook Live Journal
http://www.computerexplorers.com
Please note, your children are fickle. What may be popular today may not be popular tomorrow. Keep an eye on their surfing and investigate any unknown sites.
![Page 26: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/26.jpg)
Can you decipher these?FWIW, I thnk U R gr8t!
Btw, ur BFF is a PITA
OMG!
LOL!
Cul8r, H&K, ttyl
http://www.computerexplorers.com
![Page 27: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/27.jpg)
Internet Safety Study Teens have an established presence on social networking sites:
61% of 13-17 year-olds have a profile on sites such as MySpace, Friendster, or Xanga
50% of those have posted pictures of themselves online Older teens (16-17s) and girls especially use the Internet for social
interaction, meeting friends, and networking 71% reported receiving messages online from someone they don’t know 45% have been asked for personal information by someone they don’t
know 30% have considered meeting someone that they’ve only talk to online 14% have actually met a person face-to-face that they’ve only spoken to
over the Internet 9% were 13-15 year-olds 22% were 16-17 year-olds
Of those receiving messages from someone they don’t know, 40% report they’ll usually reply and chat with that person
Only 18% said they’ll tell an adultData from the National Center for Missing & Exploited Children
http://www.computerexplorers.com
![Page 28: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/28.jpg)
Internet Safety StudyPerceptions of Safety: 20% of teens report that it is somewhat or very safe to share personal
information on a public blog or networking site 37% of 13-17 year-olds said they are either “not very concerned” or “not at
all concerned” about someone using information they’ve posted online in ways they don’t want
Do you know what your child is doing?: 33% of 13-17 year-olds report their parents or guardians know “very little” or
“nothing” about what they do on the Internet 48% of 16-17 year-olds report their parents or guardians know “very little” or
“nothing” 22% of teens surveyed report their parents of guardians have never
discussed Internet safety with them 36% of teens, mostly girls and younger teens, have said their parents of
guardians have talked to them “a lot” about online safety 70% have said their parents or guardians have discussed the subject with
them during the past year Data from the National Center for Missing
& Exploited Children
http://www.computerexplorers.com
![Page 29: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/29.jpg)
Safety Tips for Parents or Guardians
Put the computer in a public area Use tools available to make your job
easier Know where the children surf Talk about Internet risks Emphasize the Internet is a public place Establish family rules for Internet use
http://www.computerexplorers.com
![Page 30: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/30.jpg)
Remember Three Tips Keep Current
Try to keep up with the latest technologies or sites.
Keep CommunicatingBe sure to communicate with your children and
keep up with their online activities. Keep Checking
Use the History feature on your Web browser to see where your children have been.
http://www.computerexplorers.com
![Page 31: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/31.jpg)
Safety Tips for Your Kids Use a nickname that does not closely resemble your
real name or reveal personal information. Never reveal your real name, address, phone
number, e-mail address, school, sports team, or favorite hang outs.
Refuse to meet someone you only know from online activities without a parent’s consent.
Always remember people online may not be who they say they are.
Tell a trusted adult if someone online threatens or does anything to make you feel uncomfortable.
http://www.computerexplorers.com
![Page 32: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/32.jpg)
Don’t Be Afraid of the Internet
Use the Internet to your advantage. Don’t know what that Website is your child visits
daily? Don’t know that acronym or short hand in your
child’s chat history? Got an attachment you’re not sure about?
Use a Search Engine.
Look it up!
http://www.computerexplorers.com
![Page 33: Keeping Your Children, your information and your equiptment safe](https://reader035.fdocuments.in/reader035/viewer/2022070303/54b3bc884a795991608b45d0/html5/thumbnails/33.jpg)
Contact Information
Name:
Phone:
E-mail:
www.computerexplorers.com
www.computerexplorers.com/yourCEsite
YOUR
PHOTO
HERE