Internet basics 2.3 Protecting your computer
|
|
|
- Gladys Nelson
- 9 years ago
- Views:
Transcription
1 Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from malicious software and how to stay ahead of people who might want your private data. What will I learn? What the risks are to your computer How to block viruses and spyware How to keep your computer up to date
2 How do I do it? Be safe! If you re using this hand-out on a shared or public computer, remember to: Log on using a strong password : one that includes upper and lower case letters, numbers, and isn t something that someone else could guess. Never share or write down your password. Log out when you re finished. Go to the Get Safe Online web link in Useful Links. Scroll down and click on the link for advice videos and then click to watch Protect your PC. You may have to press escape after you have watched the video. Scroll to the top of the page and hover your mouse over Protecting Your Computer and Protecting Yourself. Various options will appear explore these to find out more about the myths about protecting your computer, the threats you face, and how people become victims. The web links referred to throughout this document can be found in the Useful Links section at the end. What are the risks to my computer? 1. When you re using the Internet, your computer downloads data. Normally this is safe, but some sites can trick you into downloading programs that can capture your personal information and send this to criminals. Names for these include viruses, trojans, malware and spyware. They work in different ways, but they all put you at risk: Get Safe Online website Example of Malware 2 Internet basics: Protecting your computer Basics
3 How do I block viruses, spyware and other threats? 2. You can protect your computer by using the right software and the right behaviour. One of the best ways to be safe is to think before you click. Visit the Get Safe Online site. Scroll down and click on Videos and watch the Protect your PC video. Protect your PC video 3. Anti-virus software constantly scans your computer for problem software that might put you at risk of identity theft or fraud. There are many types available, some of which are paid for, and some of which are free. Visit the Microsoft Security Essentials web page in Useful links. The support link will show the types of actions that can be taken in the event of a problem. This page will identify which version of Microsoft Windows you have and show you the appropriate information. For Windows 8, Security Essentials is called Windows Defender. More information can be found in the Product Info section. 4. The latest versions of web browsers come with built-in security filters that can detect many fake websites. But don t just rely on your software. Think before you click: Avoid dodgy websites that offer a deal that s too good to be true. Don t click on links in a website or that you re not completely sure about. Don t give out personal information unless you re sure that the site is genuine and safe. 5. There s lots more you can learn about protecting your PC and yourself when online. The Get Safe Online site you mentioned earlier has a lot of useful information. Go back to this site and hover the mouse over Protecting Your Computer again. Read the information in the web links on: - Firewalls - Viruses and Spyware - Windows updates Think about what you need to do to make your PC safe at home. How can I keep up to date? 6. Your computer s software needs to be up to date in order to keep you safe. Regular updates fix any known security problems and update the anti-virus software s database of known threats. You need to keep your operating system (eg Windows), anti-virus software and web browser software all up to date: Remember that to update, the computer s security software needs to download new data from the Internet. This won t 3 Internet basics: Protecting your computer Basics
4 be possible if you just use the web for a few minutes a day and then turn off your computer. At least once a week, leave it on for a couple of hours so automatic updates can complete. once a week. It s important that you then remember to do this every week. This also makes sure that Microsoft Security Essentials or Windows Defender is kept up to date. Another way is to visit the Windows Update website and follow the instructions. 7. Most computers are set so that they update Windows automatically: Click the Start button to open the Windows Start Menu (bottom left of the screen) or to access the search tool (magnifying glass). In the search box at the bottom, enter windows update into your search box and click on Windows Update in the search results. If automatic updates are not on, click the button to turn on automatic updates. The computer will immediately start checking for updates. You can set how often your computer checks for updates. Click on Change settings in the left-hand menu of the Windows Updates panel. There is a drop-down menu for each option. It s best to leave these as they are, and to leave your computer turned on. But if you don t leave your computer on all the time, change these settings to when you will, for example by leaving it on overnight Example of Windows Update 8. Internet Explorer is updated as part of Windows Update and other browsers should also update automatically. 4 Internet basics: Protecting your computer Basics
5 Quiz yourself Why can some websites put your privacy or computer at risk? What information can criminals find by installing software on your computer? What software can help protect your safety? What might tell you that a web link or site is not safe to use? Try your new skills Practice what you have just learnt: Check your firewall is on: you can check in the same way that you checked Windows Update. Check that you have anti-virus software installed and that it is up to date. Use a search engine to find out more about anti-virus software that you can buy. Write down any notes that will help you: 5 Internet basics: Protecting your computer Basics
6 My learning checklist o I can explain to someone why going online can put my personal information and my computer at risk. o I can browse the Internet safely and avoid dodgy websites. o I know what software I need for my web browsing to be safe. o I know how to install and update this software so I stay safe. Top tips Your computer s security settings (accessed using the Control Panel) are pre-set to keep you safe. It s not a good idea to change any security settings. Beware of s that are forwarded by friends or family. You might trust them, but you don t know who sent the link to them. Don t download software unless it s from a site that you trust. This applies to free and paid-for programs. Where next? Protect yourself from phishing: Phishing is the name for using fake websites to capture personal data. Usually, an will try to lure you to the site, which is commonly for a bank or other financial provider. Get Safe Online has a video about phishing and more information in its Knowledgebase. Remember that a reputable site will never send an asking you to provide your username, password or other personal information. Check the spam filtering in your programme: Spam is unwanted that can also expose you to fraud or infect your computer. Up-todate programs, either on your computer or web-based, all include filters to block spam. Complete hand-out 4.1 Understanding if you re not sure about . Don t ignore spam in your inbox. Mark it as spam or junk to remove it, and don t open it. If spam is getting through, use your program s help facility to increase the filtering. If you do this, you may need to check your spam folder from time to time in case s that you want to receive are getting blocked. You can unmark these so the program won t filter them in future. Write down any notes that will help you: 6 Internet basics: Protecting your computer Basics
7 Useful Links You may want to use these links in your session: Get Safe Online: Microsoft Security Essentials: Windows Update: Internet Matters (for additional useful information on keeping you and your computer safe) 7 Internet basics: Protecting your computer Basics
Internet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests
Wider interests Use this document with the glossary Beginner s guide to Money and shopping 8.1 Online banking This activity will help you register to bank online and get you started with your online banking
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
Internet basics 2.1 Getting online. Beginner s guide to. www.bt.com/getittogetherresources. Basics. Get IT Together
Beginner s guide to Internet basics 2.1 Getting online Use this document with the glossary A helper should take you through this guide This activity will help you get online for the first time. What will
Everyday help 3.3 Searching for jobs. Beginner s guide to. www.bt.com/getittogetherresources. Basics. Get IT Together
Beginner s guide to Everyday help 3.3 Searching for jobs Use this document with the glossary A helper should take you through this guide This activity will help you search for, find and apply for the right
Frequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
How can I use the internet to make free calls?
Keeping in touch 4.3 Making calls on Skype How can I use the internet to make free calls? Skype is a free service that enables anyone to make free voice or video calls between computers regardless of location.
Internet basics 2.1 Getting online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.1 Getting online Use this document with the glossary A helper should take you through this guide This activity will help you get online for the first time.
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
GUIDEWIRE. Introduction to Using WebMail. macrobatix. Learn how to: august 2008
macrobatix GUIDEWIRE august 2008 Introduction to Using WebMail Learn how to: Manage Your Inbox Compose a Message Activate Spam Filter Modify Spam Settings Check Held Messages *To download the complete
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Online Security Information. Tips for staying safe online
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
NEVER guess an e-mail address. Your mail will nearly always go to the wrong person.
16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Understand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Using the City of Stamford / Stamford Public Schools. Web Email System
Using the City of Stamford / Stamford Public Schools Web Email System Open the Login Screen: Go to the following site: www.stamfordct.gov/mail and choose the login link. The login screen will look like
What's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
Saheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
About junk e-mail protection
About junk e-mail protection Entourage 2008 Junk E-Mail Protection Entourage has a built-in junk mail filter that helps separate junk e-mail also called spam from legitimate messages. By default, the level
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
Basics. How can I use the Internet to make free calls?
Basics Use this document with the glossary A helper should take you through this guide Keeping in touch 4.3 Making calls on Skype How can I use the Internet to make free calls? Skype is a free service
OUTLOOK WEB ACCESS. User Guide
OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.
HITC elearning Modules Quickstart Guide
HITC elearning Modules Quickstart Guide This Quickstart Guide has been designed to help you access the Hamad International Training Center (HITC) elearning platform and course content. The Online Learning
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
Welcome to Cox Business Security Suite:
Welcome to Cox Business Security Suite: Thank you for choosing Cox Business Security Suite Powered by McAfee. Cox Business Security Suite is a simple, efficient and reliable way to protect your business
Barracuda SPAM Firewall
Barracuda SPAM Firewall SPAM and other types of unwanted email is a steadily growing problem for all businesses and schools. Because of the growing nature of the problem, we have a SPAM filter and Quarantine
How To Protect Yourself Online
NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online
Secure Email FAQs for External Stakeholders
Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What
Network Security. Demo: Web browser
Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Deter, Detect, Defend
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Amy wants to use her email to view some photos her friend Sandy sent, from her vacation to Washington DC.
E-mail Attachments Hi, I m Sarah. I m going to show you how to download files people send to you in emails, and how to send your own files to other people using your email. We ll follow along with Amy,
Exchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
2. _General Help and Technical Support
1. _Welcome Welcome to Business Internet Banking. Our online service is available 06:00 AM ET 12:00 AM (Midnight) ET, seven days a week, so you and your employees can manage your business banking accounts
Information Security. Louis Morgan, CISSP Information Security Officer
Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long
Basic Computer Maintenance
Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Antivirus. Quick Start Guide. Antivirus
Antivirus 2007 Antivirus plus I Firewall Quick Start Guide Helpful Information on Installation and Set-Up STOPS and Removes Viruses DELIVERS Proactive Firewall Protection EASY to Set Up and Use FREE Upgrades
How To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
How to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1
Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Corporate Account Takeover & Information Security Awareness. Customer Training
Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN
Frequently Asked Questions for logging in to Online Banking
Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the
PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone
Best Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Why you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
https://mail.wheelock.edu
The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document
More Details About Your Spam Digest & Dashboard
TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
AVG AntiVirus Free Edition
AVG AntiVirus Free Edition User Manual Document revision AVG.06 (16.10.2015 ) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.
Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs
Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.
Welcome to Log on to Learn
Welcome to Log on to Learn You ve just begun membership of the premier web based software training service. You will now enjoy access to everything that Log on to Learn has to offer. This short guide will
Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1
P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
2009 Antispyware Coalition Public Workshop
2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and
Paramount Unified School District Technology and Ed Services Departments Computer In-service
4 Paramount Unified School District Technology and Ed Services Departments Computer In-service Distribute notebooks / Test logins Login information Login contexts (see Page 2) Logging in at other sites
How to Attach the Syllabus and Course Schedule to a Content Item
How to Attach the Syllabus and Course Schedule to a Content Item Getting Started Part of preparing your course for delivery to students includes uploading your syllabus and course schedule to your online
Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
Safety precautions for Internet banking or shopping How to avoid identity theft online
Winter 2016 A Customer s Guide to Cybersecurity To Help Prevent Online Fraud and Theft Safety precautions for Internet banking or shopping How to avoid identity theft online Protect Your Cyber Home With
How to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
Cybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
Using the University s Spam and Virus E-mail Filtering Service
Using the University s Spam and Virus E-mail Filtering Service Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Overview The University of Pittsburgh s spam and virus e-mail filtering
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
