Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Size: px
Start display at page:

Download "Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?"

Transcription

1 Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1

2 2

3 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review the ways in which adware and spyware get installed Provide some methods and best practices in order to prevent this software from being installed on your computer And finally, we will provide you with a list of resources should you wish to pursue this topic further 3

4 As discussed in Part One of this presentation, spyware and adware is a big business. The creators profit enormously by selling information on your surfing habits, redirecting you to sites you didn t intend to visit, and bombarding you with pop-up ads. To add to this problem, it is almost impossible to find and stop the makers of spyware. 4

5 We have already discussed some of the methods spyware and adware find their way onto your computer. We will summarize many of the common methods of installation so we have a clear understanding of how this occurs. The most direct method is via user installation. Spyware and adware companies pay software publishers to include their spyware or adware in their products. They will try to trick the user into installing the software without realizing it. It is contained in free toolbars, games, free subscriptions, screen savers, and other free software that is downloaded from the Internet. As we discussed earlier, this free software is bundled with spyware and adware. Another frequent method of installation is the sharing and swapping of music files or photos. This is most commonly achieved through peer-to-peer networking applications such as Kazaa, imesh, limewire, etc. Be sure to watch Part One of this presentation for an explanation of file-sharing and the dangers associated with this application. Allowing others to use your computer creates a vulnerable situation as they visit web sites and may unknowingly install adware and spyware. Keep in mind that those using your computer may not be educated on spyware and adware risks and may install free downloads and click on pop-up ads being oblivious to any security threat they may pose. 5

6 Opening spam messages is another method of installation. In addition, opening attachments from someone you don t know or that you are not expecting is another method of installation. Remember, just because you know the sender of the attachment doesn t make it safe to open if you are not expecting the attachment always check with the sender first. Sometimes security flaws are also exploited in order to install spyware and adware. 6

7 The dilemma is that there are no clear spyware standards established. The software vendors who create the applications to find and remove spyware and adware don t share information with one another. This makes it difficult for any one anti-spyware or anti-adware product to find every possible piece of spyware and adware on your computer. For that reason, you may need to have more than one product to fight spyware and adware. 7

8 The University of Akron already has a response in place to deal with adware and spyware. To begin with, McAfee anti-virus is installed as a proactive tool. McAfee runs in the background and checks files as they are accessed. McAfee is configured to look for spyware and adware, in addition to viruses. If it finds any malicious software it will stop and remove the threat. The McAfee anti-virus software is installed on all University-owned computers on the UAnet domain. For those university-owned computers that are NOT on the UAnet Domain, contact the Support Desk at and request the software. It is free of charge for university-owned computers. 8

9 It is important to understand how McAfee works so let s spend a few minutes discussing this. There is one important concept to keep in mind when we discuss virus protection and that is that new viruses are constantly popping up this means your virus definitions must be updated in order to find these new strains of viruses. If McAfee is setup on a university-owned computer via epo it will be controlled and updated by the server. (epo is the University s security management solution that provides the University with a coordinated defense against malicious threats and attacks. It enables computers to automatically get the virus updates with no action required on the part of the user). The server knows if your computer is not updating correctly. Now, if you have a laptop p that is off-campus you will still get the updates if you connect to the Internet. In this case, the software will go directly to McAfee s web site and get the updates, rather than getting them from the University s server. 9

10 If you want to verify that your computer is getting the latest virus definitions, you can check this very easily by right-clicking on the McAfee virus shield. This will be located in the task tray of your computer desktop in the lower right corner. Next, click on the option labeled About VirusScan Enterprise and check the date in the Created On field. The updates are scheduled by default for 5:00 PM so the date should never be more than a day or two old. If the date is older than that contact the Support Desk and open a ticket to have this situation investigated! 10

11 Here is a screen shot from the McAfee Virus Scan which points out the location of the Created On date. 11

12 As for personal computers belonging to faculty, staff, and students The University of Akron has free software available for home use. Each student, faculty, or staff member can download the software by logging in to ZipLine and accessing the Home Use Software Downloads link. The download is for a home version of McAfee Anti-Virus. However, unlike the version used for campus-owned computers, the personal version of McAfee does NOT include the anti-spyware and anti-adware components. Therefore, you will need to install additional software to help detect spyware and adware on your personal computer. Once installed on your personal computer, the McAfee settings should be configured to allow for automatic updates. Remember, we discussed the importance of keeping your virus definitions up to date, therefore, it is critical that you setup McAfee for auto updates in order to protect yourself. We have provided the web address for documentation on how to configure these settings in McAfee. 12

13 We have also provided some links to other popular anti-spyware and anti-adware software that you may wish to download. It is a good idea to run more than one anti-spyware or anti-adware program due to the fact that the software vendors cannot agree on what is spyware and what is not. Therefore, the more spyware programs you run each may identify something the others do not. Some of the popular programs are Counter Spy, Spybot Search and Destroy, Microsoft Windows Defender, and LavaSoft s Ad-Aware SE Personal. Counter Spy is one of the better programs and is available for approximately $20 a year. All of the other programs are available as a download from the Internet free of charge. 13

14 Let s review the complete list of how you can protect yourself from spyware and adware: First, install and run spyware and adware-detection software. We already discussed the software available from the University for this purpose. We also mentioned other anti-spyware and anti-adware programs that you may wish to install. You should also install anti-virus software to keep your computer virus-free. Once again, we already discussed the McAfee anti-virus software. Remember, you should configure your virus protection program to automatically update so you have the latest updates. 14

15 You must also keep your operating system up to date. Remember how we said that the creators of adware and spyware will try to exploit system vulnerabilities? Well, by keeping your operating system up to date you remove that opportunity. For personal users, you can go to Microsoft s web site or select Start All Programs - Windows Update. You can setup your computer to automatically receive updates. For those faculty and staff using a university-owned computer on the UAnet domain, your computer automatically receives Windows and Office updates. For laptop users, the updates will work through VPN, however, if the PC is NOT brought to campus or connected through VPN, it will not get the automatic update. Therefore, for those clients it is critical that you download and install these updates yourself. 15

16 Some other prevention techniques include NOT using peer-to-peer networking this just puts you at greater risk for adware and spyware infection not to mention a host of other problems. You should also not install or run any software unless you know and trust the source. We have provided you with links to free anti-virus and anti-spyware software so you can be assured that these programs are safe and reliable. However, after completing this presentation you should be aware that you need to be suspicious of free software. Also, if you don t understand the license agreement or privacy statements DO Not install the software. If you are not sure about the trustworthiness of the software you should perform a Google search. Search for the name of the software plus the word adware or spyware. Do this BEFORE installing the software and the search results should provide you with a good indication as to the safety of the software. 16

17 You also learned not to click anything on a pop-up window except for the standard X in the upper right corner to close the window. Remember, do not click on any of the buttons in the pop-up regardless of what they may say! Also, maintain at least a medium security level on your browser. In Internet Explorer, click on Tools in the menu bar and select Internet Options and then select the Security Tab. 17

18 This is a screenshot of the Security Setting from Internet Explorer. Notice the Medium setting towards the bottom of the dialog box. 18

19 Some types of sites are very popular with spyware publishers and highly likely to try to install spyware or adware on your computer. In general, you should always be suspicious of sites offering anything for free but you should be especially suspicious of sites offering the following types of content: Pornography, warez which is illegally cracked or pirated software, free games, graphics, smileys or screen savers Free music or lyrics or sheet music Free Online diaries Peer-to-peer file sharing programs. 19

20 You should also enable pop-up blockers on your browser. This will prevent those pop-ups from ever appearing. This feature is available in Internet Explorer Service 6.0 and later. Select Tools from the menu and then select Pop-Up Blocker Turn on Pop-up blocker. Keep in mind that there may be certain, valid sites that will need to have pop-up blockers enabled. You can allow pop-ups from a trusted site. For example, in order to use PeopleSoft Financials clients must allow pop-ups from uakron.edu You will find instructions on how to allow pop-ups from uakron.edu by navigating to the web address listed on this page. We also have included these instructions as a document within the WebCT course. In Mozilla Firefox the pop-up blocker is automatically turned on by default. However, should you need to access the option, select Tools Options Web Features. In Netscape, the pop-up blocker is also turned on by default and may be accessed by selecting Tools PopUp manager. 20

21 You might be watching this presentation and recognize one of the spyware or adware programs as one you have installed on your computer. If that is the case, make sure you remove this program. You can remove a program by selecting Start- Control Panel Add or Remove Programs and then selecting the software you wish to remove. Now, unfortunately, uninstalling a piece of adware or spyware may not be that easy sometimes the creators make it impossible to cleanly remove their adware and spyware by just uninstalling the program. You may want to do some research first to see how well the software will uninstall. To accomplish this, perform an Internet search using the name of the software plus uninstall. That should provide you with some good information. 21

22 For assistance with removing spyware or adware, campus desktop clients may call the Support Desk at and open a ticket. Campus-owned laptops may be brought to either Bierce Library lower level or the Computer Center. Personal machines may be brought to Bierce Library or the Computer Center. 22

23 The following list of resources has been created to assist you with finding more information on anti-spyware and anti-adware software. You will want to make sure you print out a copy of the handout so you have a hard-copy of these web addresses. It is also worth mentioning that firewalls are another useful tool against unwanted programs if you want to learn more about firewalls and how to set them up, visit the Microsoft Security web site which is the first link on this page. 23

24 We have also provided some links to additional information on spyware and adware, should you wish to pursue further research on this topic. 24

25 Finally, some additional links to information related to spyware and adware. 25

26 26

27 Thanks for your time! We hope you enjoyed this web-based course on spyware and adware. More importantly, we hope this course provided you with a set of valuable tools to help battle adware and spyware. They are thriving on the Internet and you need to guard against them to protect yourself! Should you have any questions or comments, please feel free to contact Pstrain@uakron.edu 27

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Preparing Your Personal Computer to Connect to the VPN

Preparing Your Personal Computer to Connect to the VPN Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer

More information

www.notapennydown.com

www.notapennydown.com All You Need to Know About Spyware What is spyware? Recent studies from a joint project between Dell Computer and the Internet Education Foundation have found that an estimated 90% or more home computers

More information

Outlook Safe Sender s Filtering

Outlook Safe Sender s Filtering Outlook Safe Sender s Filtering User s Guide Also Guide to Making Internet Explorer More Secure By: Gregg Sterner Trellix Engineering Corp. Table of Contents Introduction... 1 This Manual... 3 Junk E-mail

More information

Recommended Settings for PACS HRS-d/eJacket via Remote Access

Recommended Settings for PACS HRS-d/eJacket via Remote Access The Main Line Health (MLH) system can be accessed through the Internet using the MLH Extranet Portal. The Extranet Portal gives users access to the MLH Intranet, PACS Horizon RadStation Distributed (HRS-d),

More information

Internet Security for Windows XP and Vista

Internet Security for Windows XP and Vista Welcome Windows XP and Vista Users Welcome to Alliance Internet. You have joined one of the fastest growing Internet providers in the area. This information will help you understand how your Internet works.

More information

STEP 1: INSTALLING WINDOWS DEFENDER

STEP 1: INSTALLING WINDOWS DEFENDER Office of Information Technology Secure your Windows XP Computer for Use on AU s Network Every member of the AU community has a shared responsibility for the safekeeping of our computer network. Since

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Spyware and Adware What s in Your Computer?

Spyware and Adware What s in Your Computer? Spyware and Adware What s in Your Computer? Part 1 Welcome to Part 1 of the online course, Spyware and Adware What s in your computer? Are you being bombarded by advertisements on your computer, has your

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

Computer Security. Table of Contents

Computer Security. Table of Contents Computer Security This document was prepared by Barry The Computer Guy and is the sole property of My Computer Professional. Copyright 2004-2005 My Computer Professional British Columbia, Canada. Please

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

How to Disable Common Pop-Up Blockers

How to Disable Common Pop-Up Blockers How to Disable Common Pop-Up Blockers Listed below are some of the more popular Pop-up Blocking software packages and the workarounds that should be followed in order to disable the Pop-Up blocking feature

More information

Spyware. How to avoid hidden software on your computer

Spyware. How to avoid hidden software on your computer Spyware How to avoid hidden software on your computer Has your computer been functioning abnormally? Do you have random internet pages or pop-ups appear out of nowhere? Has your computer dramatically slowed

More information

How can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware?

How can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware? C&C s effectiveness when responding to virus activity can only be improved with the continued cooperation of our clients. Clients are therefore strongly cautioned against opening email attachments from

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

Bookmarks for Desktop Self-Defense

Bookmarks for Desktop Self-Defense Basic Security Tips Bookmarks for Desktop Self-Defense Get Safe Online http://www.getsafeonline.org/ Get Safe Online will help you protect yourself against Internet threats. The site is sponsored by government

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Follow the instructions below for first-time users only

Follow the instructions below for first-time users only Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Clean Machine with No Anti-Virus Installed) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Select

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

More Computer Hints and Tips

More Computer Hints and Tips Introduction More Computer Hints and Tips This document covers in a little more detail the topics introduced at the Carefree Computer Club meeting held on 15 Dec 2008. The principal subjects included:

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

This document provides instructions for updating and running the free versions of Ad- Aware, Spybot Search & Destroy, and Spyware Blaster.

This document provides instructions for updating and running the free versions of Ad- Aware, Spybot Search & Destroy, and Spyware Blaster. How to Use Anti-Spyware Tools Spyware are programs that get installed on your computer without your permission. Some spyware is relatively harmless, and some spyware can destroy your computer. Most anti-virus

More information

How To Use Moodle Online Class On A Pc Or Mac Or Ipad (For Acedo) On A Computer Or Mac) On Your Computer Or Ipod Or Ipo (For An Ipo) For Acedor Or Mac (

How To Use Moodle Online Class On A Pc Or Mac Or Ipad (For Acedo) On A Computer Or Mac) On Your Computer Or Ipod Or Ipo (For An Ipo) For Acedor Or Mac ( Welcome to Stanly Online, This document has been sent to you to supply the information you need to: access our online learning system AND find help, should the need arise Accessing : Your online class

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Free and Legal Software You Can Download By Tom Krauser

Free and Legal Software You Can Download By Tom Krauser Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions

More information

IRM NEWS CYBER SECURITY AWARENESS FIREWALLS THE GUARDIAN AT THE GATE FLORIDA ATLANTIC UNIVERSITY

IRM NEWS CYBER SECURITY AWARENESS FIREWALLS THE GUARDIAN AT THE GATE FLORIDA ATLANTIC UNIVERSITY FLORIDA ATLANTIC UNIVERSITY IRM NEWS JANUARY 2006 IRM NEWS INSIDE THIS ISSUE: CYBER SECURITY AWARENESS FIREWALLS 1 COMPUTER VIRUSES 2 POP-UPS AND POP- UP BLOCKER ALL ABOUT SPAM 3 YOUR AOL ACCOUNT AND FAU

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

FAQ. Safe Anywhere PC. Disclaimer:

FAQ. Safe Anywhere PC. Disclaimer: FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers.

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Disable Pop-Up Blockers for MyCPD This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Popup blockers interfere with proper functioning of the

More information

Welcome back everyone from the Monmouth University Student Help Desk!

Welcome back everyone from the Monmouth University Student Help Desk! Welcome back everyone from the Monmouth University Student Help Desk! From past experience, we realized that many students do not take the time to keep their computers updated. New viruses and spyware

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

User Guide for the Identity Shield

User Guide for the Identity Shield User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and

More information

Remote Access to Niagara Wheatfield s Computer Network

Remote Access to Niagara Wheatfield s Computer Network Remote Access to Niagara Wheatfield s Computer Network Niagara Wheatfield Central School District Office of Instructional Technology Revised: June 24, 2010 Page 1 of 15 To gain access to Niagara Wheatfield

More information

The Care and Feeding of Your Computer Troubleshooting and Maintenance

The Care and Feeding of Your Computer Troubleshooting and Maintenance Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use

More information

How to Configure Sophos Anti-Virus for Home Systems

How to Configure Sophos Anti-Virus for Home Systems How to Configure Sophos Anti-Virus for Home Systems When you download and install Sophos on your home computer, on-access scanning is enabled. However, the settings for scheduled scans and scanning for

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Welcome to the UVU IT Help Desk

Welcome to the UVU IT Help Desk Welcome to the UVU IT Help Desk Agenda 1. Getting Procedures Help 2. Network & EMail 3. UVLink Portal 4. Professional Web Pages 5. Security 6. Outages & Emergencies 7. Software Getting Help Phone 863-8888

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription

More information

Sophos Anti-virus Basic Level Handout

Sophos Anti-virus Basic Level Handout Sophos Anti-virus Basic Level Handout Sophos Anti-Virus provides cross-platform protection against: Computer viruses Potentially Unwanted Applications (PUA s) such as spyware and adware Host intrusions

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

How to Deal with Spyware A CyberAngels Quick Tutorial

How to Deal with Spyware A CyberAngels Quick Tutorial How to Deal with Spyware A CyberAngels Quick Tutorial Adapted from the US Computer Emergency Readiness Team Spyware and Adware After completing this tutorial, you will be able to: Identify the main risks

More information

Securing small business. Firewalls Anti-virus Anti-spyware

Securing small business. Firewalls Anti-virus Anti-spyware Securing small business Firewalls Anti-virus Anti-spyware Introduction Due to the phenomenal growth of the Internet in the last decade companies and individuals find it hard to operate without a presence

More information

Disabling Common Pop-up Blockers (or, when I click on a link nothing happens )

Disabling Common Pop-up Blockers (or, when I click on a link nothing happens ) Disabling Common Pop-up Blockers (or, when I click on a link nothing happens ) Some UWS online systems such as MySR, MyUWS and WebCT may be configured to open a new browser window. Internet security software

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

UMMS SSL VPN Instructions

UMMS SSL VPN Instructions UMMS SSL VPN Instructions The document contains the following sections: 1. Introduction 2. Prerequisites 3. Supported software platforms 4. Browser configuration 5. Logon to the UMMS SSL VPN 6. Launching

More information

Welcome to Cox Business Security Suite:

Welcome to Cox Business Security Suite: Welcome to Cox Business Security Suite: Thank you for choosing Cox Business Security Suite Powered by McAfee. Cox Business Security Suite is a simple, efficient and reliable way to protect your business

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

Spyware and Viruses. There is a distinct difference between spyware and viruses.

Spyware and Viruses. There is a distinct difference between spyware and viruses. Spyware and Viruses Spyware and viruses are getting to be the largest problem in the battle of keeping your computer running smoothly and being able to use your computer with any kind of efficiency. There

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Instructions for Disabling Common Pop-up Blockers

Instructions for Disabling Common Pop-up Blockers Instructions for Disabling Common Pop-up Blockers Reliance Standard maintains a series of web-based applications that require you to allow pop-up windows. Listed below are some of the more popular pop-up

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

How to Temporarily Allow Popups for the Current Session

How to Temporarily Allow Popups for the Current Session How to Temporarily Allow Popups for the Current Session NOTE: The following procedure works on most browsers, but there may be some that don t. Try it anyway. Press the ctrl key while clicking on the Go

More information

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015) AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec: Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

avast! Small Office Administration Console Small Office Administration Console User Guide

avast! Small Office Administration Console Small Office Administration Console User Guide Small Office Administration Console User Guide 1 2 Introduction to the Small Off ice Administrat ion Console The Small Office Administration Console provides central management capability for your installation

More information

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy A Crawler-based Study of Spyware in the Web Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy What is spyware? Broad class of malicious and unwanted software Steal control of a PC for the benefit of

More information

The answers vary widely, but there are five components to every spyware definition:

The answers vary widely, but there are five components to every spyware definition: What's spyware? The answers vary widely, but there are five components to every spyware definition: Users don't knowingly request spyware. Spyware applications operate on the user's computer and have not

More information

How to Disable Common Pop-Up Blockers

How to Disable Common Pop-Up Blockers How to Disable Common Pop-Up Blockers Listed below are some of the more popular Pop-up Blocking software packages and the workarounds that should be followed in order to disable the Pop-Up blocking feature

More information

How to Disable Common Pop-Up Blockers

How to Disable Common Pop-Up Blockers How to Disable Common Pop-Up Blockers Listed below are some of the most popular pop-up blocking software packages, and instructions to enable pop-up windows with them. Pop-up windows must be enabled to

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

7 Steps to Safer Computing

7 Steps to Safer Computing 7 Steps to Safer Computing These are the seven essentials: - Use a firewall. - Keep your software up to date. - Use an up to date antivirus program. - Use an up to date anti-spyware program. - Only download

More information

Mortgage Quest WebDesk Setup and Login Instructions

Mortgage Quest WebDesk Setup and Login Instructions Initial WebDesk Setup Mortgage Quest WebDesk Setup and Login Instructions 1. The following steps need to be performed one time only. 2. Start Microsoft Internet Explorer. 3. Enter the address: http://webdesk.emarketfocus.com/

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

1. What are popups? 1. 2. What if I have a problem with viewing popups? 1

1. What are popups? 1. 2. What if I have a problem with viewing popups? 1 1. What are popups? 1 2. What if I have a problem with viewing popups? 1 3. Steps to take if your web browser is blocking popups 2 3.1. Internet Explorer 6, 7 & 8 2 3.2. Internet Explorer 9 4 3.3. Mozilla

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Microsoft Internet explorer 7.0 or higher (Except 10), Mozilla Firefox.

Microsoft Internet explorer 7.0 or higher (Except 10), Mozilla Firefox. Dear Client, Welcome to www.canmoney.in, our portal for online trading. We thank you for choosing us as your trading partner. Our website provides host of services and we have taken adequate care to make

More information

AVG AntiVirus Free Edition

AVG AntiVirus Free Edition AVG AntiVirus Free Edition User Manual Document revision AVG.06 (16.10.2015 ) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.

More information

Help System. Table of Contents

Help System. Table of Contents Help System Table of Contents 1 INTRODUCTION 1.1 Features 2 GETTING STARTED! 2.1 Installation 2.2 Registration 2.3 Updates 3 VIEWING RECORDED DATA 3.1 Snapshots 3.2 Programs 3.3 Websites 3.4 Keystrokes

More information

ODOT UAG Tips/Troubleshooting Guide

ODOT UAG Tips/Troubleshooting Guide ODOT UAG Tips/Troubleshooting Guide These helpful tips are provided by ODOT Computer Support to help those using a non-odot PC and running into issues with connecting the UAG/VPN. This is a best-effort

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Welcome. Thank you for choosing Cogeco High Speed Internet.

Welcome. Thank you for choosing Cogeco High Speed Internet. Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

RISKS OF SPYWARE. Lesson Procedures

RISKS OF SPYWARE. Lesson Procedures i-safe Lesson Plan Suggested Grade Levels Middle Grades RISKS OF SPYWARE Learning Objectives Students will: understand the term spyware and the types of programs it applies to understand the security risks

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Customers with Existing Security Software)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Customers with Existing Security Software) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Customers with Existing Security Software) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Remove Incompatible

More information

How to Disable Common Pop-Up Blockers

How to Disable Common Pop-Up Blockers How to Disable Common Pop-Up Blockers Listed below are some of the most popular pop-up blocking software packages, and instructions to enable pop-up windows with them. Pop-up windows must be enabled to

More information

2. PMP New Computer Installation. & Networking Instructions

2. PMP New Computer Installation. & Networking Instructions ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for

More information