Protection of Personal Computer Best Practices for General User

Size: px
Start display at page:

Download "Protection of Personal Computer Best Practices for General User"

Transcription

1 Protection of Personal Computer Best Practices for General User ccording to the Government survey conducted in , over 80% of Hong Kong households own a computer. Thanks to the extensive broadband network of the city, Internet connection has never been this accessible, whether at work or at home. With just a few clicks, we can make the most out of the multimedia device for business, education or entertainment purposes. In recent years, it has become a common practice for computer vendors to offer university students and staff special discounts for purchasing personal computer. The computers sold usually contain the most updated operating system and software, including antivirus, while some of them use cloud platform such as Office 365 and Adobe Cloud. With connections to both the Internet and school Intranet, students and staff are well equipped to complete the tasks at hand with abundant resources. While computers continue to occupy a central role in daily assignment and work, users must be aware of the potential IT security threats posed to their personal computers. The following paragraphs will introduce eight essential protection areas for users to secure usage of their personal computers. 1 Cookies and Plug in Software vulnerability is not limited to software installed on top of the operating system, Internet browser is another security concern that user should be aware of. Cookies 2 It is a small piece of data that helps browser to track user behaviour and the websites that user visited. Even though cookies itself does not contain malware or carry any virus, it still raises concern about user privacy. Authentication cookies issued by websites may subject user to potential Man in the middle attack. Hackers can easily access the website using the victim s personal information with the help of cookies and fish for financial gain. Unlike their counterparts in commercial sector, users personal computers are generally not wellmanaged as most of them lack centralized services, such as Active Directory from Microsoft, to monitor and maintain their well beings. For example, without regular system health check, personal computers may be exposed to the latest vulnerabilities if the patch level is not up to date. Therefore, the protection of personal computers, though neglected at times, should be made the top priority for any computer users. Figure 1 The statistics of browser plug in vulnerabilities 3 Page 1

2 Cookies Removal 4 : Although cookies may not pose any threat to our software, it could expose user privacy, such as user login ID, password and other Internet surfing hobbies. Users may find the following instructions useful if they wish to remove cookies. For Mozilla FireFox version or above: 1. Select Tools, Options of FireFox pull down menu. 2. In the page of Options, click Privacy tab. 3. At Privacy section, click Show Cookies button, click Remove All. Plug in 5 It is a software component that adds a specific feature to an existing software application. The most common plug in is web browser plug in such as Adobe Flash player, Apple QuickTime player and Oracle Java. The most crucial browser plug ins are Microsoft Active X, Adobe Flash and Oracle Java, users should update the plugin in from Microsoft, Adobe and Oracle when prompted. Do not accept any update request of Active X, Flash and Java from untrustworthy websites. User should be careful when opening unsolicited attachments from message, the usage of anti spyware software is also appropriated for the protection and scanning of incoming documents, not just only from the web site. ATTENTION: As user may be using browser of different versions, the steps explained below may be slightly different: Figure 3 Mozilla FireFox cookies setting For Apple Safari version 5 or above: 1. Select Gears menu in the upper right corner of the Safari window. 2. Click Reset Safari. 3. Check the last item, Remove all website data and uncheck the remaining items if you would like to remove cookies only. For Google Chrome version 14 or above: 1. Select Options from the wrench button in the upper right corner of the Chrome window. 2. In the page of Options, click Under the Hood. 3. At Privacy section, click Content Settings. 4. At Cookies section, click All Cookies and Site Data. 5. Click Remove All button to delete all cookies. Figure 4 Safari cookies setting For Microsoft Internet Explorer, the latest version is highly recommended: Figure 2 Google Chrome setting about Cookies 1. Select the menu from top right corner of the browser window, choose Internet Option (This is also available from Control Panel). 2. Select the General tab from the Option window Page 2

3 3. Click Delete under Browsing History 4. Select Cookies and Website Data, click Delete For Mozilla FireFox, choose Tools, Add ons to select which Add on (plug in) would like to disable (deactivate): Figure 7 Mozilla FireFox Add on setting Figure 5 Internet Explorer browsing history setting Browser Plug in Management 6 : Different from cookies, plug in works as part of the browser application. Plug in sometimes not only slows down the Internet browsing speed but also introduces security holes, especially to Java. User can disable any plug in which is no longer used or one that poses security concern. For Google Chrome, click the top right corner option, and choose Extensions, a list of extensions (plug in) can be disabled by unchecking the boxes or even removing the extensions: For Apple Safari, the setting page can be found in Preferences page. Safari does not install any Extensions (plug in) by default. To disable all extensions, simply check the OFF button as shown below: Figure 8 Safari extension switch For Internet Explorer, select Programs tab from Internet Option window, choose Manage add ons. A list of installed plug in is shown in Manage addons window, user can right click specific plug in to choose either Enable or Disable: Figure 6 Google Chrome extensions setting Figure 9 Internet Explorer add on setting Page 3

4 2 Software Patching Patch is a small program that not only fixes security vulnerability but also improves software usability and performance. Patch update is a MUST for keeping operating system and software at an up todate security level, regardless of the operating system and software employed. Office 2007 or above, signature based antivirus software such as McAfee, Norton 360, all need to be updated regularly. For Windows, users can check the default settings of Windows Update and make sure it will download the latest patch from official Microsoft and install them automatically. How does patch secure our computer? 7 Figure 10 Patch Cycle New patch is available for handling new threat throughout regular audit process. After comprehensive testing, deployment and review, operating system and application are deemed to be secure against malware attack. This audit cycle will then come to a halt when a new version of operating system or application is released. The update behaviour for both operating system and applications should be configured automatically. Users should neither ignore the update notification messages from software vendor nor disable the update function. During the patch update process, for example like Windows Update, users can still use the computer as usual, but reboot is required for the changes to take place. Users should make sure that current files are saved before clicking the reboot button. What kind of operating system and application needs patching? Windows from Microsoft, Mac OSX from Apple, UNIX, and Linux, including CentOS or RedHat, all require regular patching. Applications such as Adobe Reader, Flash, Shockwave, Microsoft Figure 11 The default settings of Windows Update is Install updates automatically (recommended) 3 Computer Update While hardware update such as BIOS update rarely happen, the release aims at fixing certain critical vulnerability or hardware fault. Users need to ensure that all data has been backed up and AC power connected before performing update of this kind. Now most of the computers will only allow user to update the BIOS when it is AC plugged in, other hardware updates are mainly driver driven, that means new driver for specific hardware is released for hardware vulnerability fix. Users should pay attention to the source of driver update it should be downloaded only from the official website from the hardware vendor, such as Lenovo. Page 4

5 4 Antivirus Signature Update Antivirus update is essential because it enables the system to block any known attack. Therefore, users should follow the update instruction when it is prompted. Most of the well known antivirus programs are now bundled with firewall, which is another defensive setting that prevents remote attack, users MUST NOT DISABLE it. User can check and update the antivirus manually but the software will perform the update automatically. Figure 12 is an example of Norton Security setting for user reference. 5 Password Management Password functions as the key to open the door. A good password practice can help prevent unauthorized accesses of the computer system. Below are best practices for users to strengthen password protection: 1) create a strong password, 2) do not share the password, 3) change the password regularly, 4) do not configure accounts without password protection. Users may also consider using a password manager software to store their passwords securely and retrieve them when necessary. Users can refer to a previous JUCC newsletter for more details about best practices of password management. 8 Signature is out dated. Click Live Update for signature update. 6 Spyware or Malware Awareness Whenever connected to the Internet, a computer can become the target of all forms of remote attacks. Users should be wary of the suspicious website links (URLs) received via system and instant messaging applications such as Skype, and never set the browser to accept cookies automatically. Most of the antivirus programs should be able to detect if a website link is safe to browse or if it contains malicious code. 7 Regular System Backup Updating is in progress. Update is completed. Figure 12 Norton Security update process The main objective for system backup is to resume the operating system functions when it accidentally crashes, or when it does not boot normally after certain patches are applied. System backup is different from backing up files and folders in the way that system backup crones an image of the entire operating system and application environment for recovery purpose. This task may take longer time to complete, depending on the number of applications installed Page 5

6 and the operating system patching level. Users are highly recommended to perform system backup when the computer is idle with minimum activities to speed up the process. Under Windows operating system, users can choose to create a system image under the backup and restore control panel item. 8 Software Download and Installation There are all kinds of software and freeware available on the Internet. However, users must be cautious and select carefully before installing them. Users should always verify the source of the downloaded files only downloads from official website is highly recommended. Also, users should make sure the operating system is compatible with the programs. Essential Security Checklist For the daily usage of personal computer, users should perform essential security checking to ensure that the computer system is secure. The checklist focuses not only on system setting but also computing habits among users. Healthy computing habits include turning off Bluetooth and WiFi when unnecessary, enabling Pop blocker in browser and disabling of widgets. Users should always make sure that the firewall and antivirus software are both up to date. One crucial habit always ignored by users is the regular cleaning of touch screen and keyboard, this can reduce the risk of password guessing by fingerprint trace. Users should also bear in mind the reliability of website: never download and install any fonts or freeware from untrusted site as mentioned earlier in this article. Also, when a computer is left idle, it is better to lock the screen with password. In addition, the free space in the computer system is important not only from the functional point of view, but it is also a security concern as malicious software can take up a lot of available space in the system. There is no standard answer for the recommended percentage of free space storage, as different operating systems have different disk space requirement. Another important checkpoint is the DNS server setting of the personal computer. DNS server information is provided by an Internet Service Provider (ISP) when the Internet connection is made. The illustrations below show the steps to check DNS server setting on Windows platform: Type Command at Windows Start Menu: Figure 13 Windows command prompt starting Then key the following command at Command Prompt: IPCONFIG /ALL It shows the existing IP address and DNS servers setting which may change when another network is connected: Figure 14 DNS setting The abnormal changing of DNS server setting can imply several security risks 9, like users being diverted from the real banking site to the fake one (Refer to Figure 15). Users should check and make sure the DNS server settings are correct when using different networks (school, home and café free WiFi). Page 6

7 When DNS functions normally Internet When DNS hijacking happen... Internet bank.com Figure 15 Illustration of DNS Hijacking To sum up, users should always be aware of insecure practices and software which can cause harm to the system via the Internet connection. The table shown below is the essential security checklist for personal computer users. Item To do List Checklist 1 Disable widgets when not in use 2 Keep certain amount of disk space free 3 Check DNS server settings 4 Turn off Bluetooth or WiFi when not in use 5 Turn on Pop blocker from Internet browser 6 Do not install software or fonts from insecure web site 7 Enable built in Firewall 8 Use reliable anti virus software and update it when prompted 9 Lock the computer with password protected when it is left idle 10 Clean keyboard and touch screen regularly BEST PRACTICE The computer protection methodologies mentioned here are required by the usage of privilege account Administrators group account from Windows. If the daily usage of computer system does not require any software installation and update, users are highly recommended to set up and use a non privilege account ( Power User in Windows) instead. Security Incidents Affecting Personal Computers How system vulnerability can affects our lives? Users can draw a lesson from the examples below: Cybertheft Incident 10 Former Secretary for Security Regina Ip Lau Suk yee became one of the victims of Internet scam earlier this year, as her account was hacked and about HK$500,000 was transferred from her Swiss bank account. Although the bank stopped such transfer, Ip s story reiterates the importance of constant vigilance against cyber security threat. Unsecured devices open to attack! 11 In March 2015, a group of self described security amateur discovered hundreds of devices connected to the Internet without any password protection. These devices, ranging from cameras to industrial control systems, are easy targets for exploitation as they can be easily turned on and off by a single click of mouse. Patch Adobe Flash now! 12 Also at the same month, Adobe released a critical security patch for Flash Player browser plug in for users of Windows, Mac OSX and Linux system. Although there has been no reports of the flaws fixed being targeted, it is believed that hackers are prone attacking users who do not perform a timely update. Page 7

8 References 1. HKSAR Thematic Household Survey Report No. 50 January PDF. 20 April Wikpedia HTTP cookie Web. 20 April Symantec Vulnerability Trends Web. 20 April PCWorld How to Delete Cookies 2 November 2011 Web. 20 April Wikpedia Plug in (computing) Web. 20 April How To Geek How to View and Disable Installed Plug ins in Any Browser Web. 20 April Wikpedia PatchMgmt Web. 20 April Password Management Best Practice for General User Web. 6 May Wikipedia DNS spoofing, Wikipedia DNS hijacking Web. 6 May News100 Hong Kong lawmaker Regina Ip falls victim to HK$500,000 cybertheft 5 May Web. 20 April ComputerWorld IoT s dark side: Hundreds of unsecured devices open to attack 6 June Web. 20 April Patch Flash now: Google Project Zero, Intel and pals school Adobe on security Mar Web. 20 April 2015 Copyright Statement All material in this document is, unless otherwise stated, the property of the Joint Universities Computer Centre ( JUCC ). Copyright and other intellectual property laws protect these materials. Reproduction or retransmission of the materials, in whole or in part, in any manner, without the prior written consent of the copyright holder, is a violation of copyright law. A single copy of the materials available through this document may be made, solely for personal, non commercial use. Individuals must preserve any copyright or other notices contained in or associated with them. Users may not distribute such copies to others, whether or not in electronic form, whether or not for a charge or other consideration, without prior written consent of the copyright holder of the materials. Contact information for requests for permission to reproduce or distribute materials available through this document are listed below: copyright@jucc.edu.hk Joint Universities Computer Centre Limited (JUCC) c/o Information Technology Services The University of Hong Kong Pokfulam Road, Hong Kong Page 8

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

Complete Patch Management

Complete Patch Management Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

Blackboard: Help & Guidance

Blackboard: Help & Guidance Blackboard: Help & Guidance Solving problems experienced when using Blackboard 9.1 STUDENT GUIDE 1 Introduction This document covers Internet Explorer 7 (or later. We do not currently support Internet

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

ADOBE FLASH PLAYER Local Settings Manager

ADOBE FLASH PLAYER Local Settings Manager ADOBE FLASH PLAYER Local Settings Manager Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Storage...............................................................................................................

More information

Wireless Network Best Practices for General User

Wireless Network Best Practices for General User Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

In order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements.

In order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements. System Requirements In order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements. Please select your preferred or current

More information

1. TURN OFF UAC SETTINGS

1. TURN OFF UAC SETTINGS AKOYA INSTALLATION TECHNICAL REQUIREMENTS INTERNET EXPLORER CONFIGURATION FOR AKOYA.NET 1. TURN OFF UAC SETTINGS Before making the following changes in Internet Explorer, you must be a local administrator

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Dartmouth College Technical Support Document for Kronos PC version

Dartmouth College Technical Support Document for Kronos PC version Dartmouth College Technical Support Document for Kronos PC version Contents How to Save the Kronos URL as a Favorite or Bookmark... 2 Internet Explorer... 2 Firefox... 4 Possible Problems When Logging

More information

I N R O A D S, I N C. T R A I N I N G A N D D E V E L O P M E N T

I N R O A D S, I N C. T R A I N I N G A N D D E V E L O P M E N T I N R O A D S, I N C. T R A I N I N G A N D D E V E L O P M E N T Intern E- Learning Guide 2015 1 Introduction Welcome to another valuable piece of your INROADS development experience, e-learning! If you

More information

MyReports Recommended Browser Settings MYR-200a

MyReports Recommended Browser Settings MYR-200a MyReports Recommended Browser Settings MYR-200a Note: If you have installed an additional Tool Bar on your browser, such as Yahoo Tool Bar or Google Tool Bar, be sure that it is also configured to allow

More information

Information Security

Information Security Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View: Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical

More information

Section 1.0 Getting Started with the Vālant EMR. Contents

Section 1.0 Getting Started with the Vālant EMR. Contents Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...

More information

How To Use Moodle Online Class On A Pc Or Mac Or Ipad (For Acedo) On A Computer Or Mac) On Your Computer Or Ipod Or Ipo (For An Ipo) For Acedor Or Mac (

How To Use Moodle Online Class On A Pc Or Mac Or Ipad (For Acedo) On A Computer Or Mac) On Your Computer Or Ipod Or Ipo (For An Ipo) For Acedor Or Mac ( Welcome to Stanly Online, This document has been sent to you to supply the information you need to: access our online learning system AND find help, should the need arise Accessing : Your online class

More information

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

Schools of Distance Education. Computer check-up for students using Mac OS X 10.10 (Yosemite) devices

Schools of Distance Education. Computer check-up for students using Mac OS X 10.10 (Yosemite) devices Schools of Distance Education Computer check-up for students using Mac OS X 10.10 (Yosemite) devices The check-up summary Start of each term 1. Check your internet connection 2. Clean your computer 3.

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Remote Access Services Apple Macintosh - Installation Guide

Remote Access Services Apple Macintosh - Installation Guide Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java

More information

Frequently Asked Questions Ag Banking Online

Frequently Asked Questions Ag Banking Online Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it

More information

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are

More information

The Importance of Patching Non-Microsoft Applications

The Importance of Patching Non-Microsoft Applications The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

QuickStart Guide for Client Management. Version 8.7

QuickStart Guide for Client Management. Version 8.7 QuickStart Guide for Client Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software

More information

New Online Banking Guide for FIRST time Login

New Online Banking Guide for FIRST time Login New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS e-filing Guide 2012-2014 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Cloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers

Cloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers Cloud Computing Security Practices for General User T he cloud is composed of an extensive bulk of computers owned by a third-party in remote location(s). The Internet provides a bridge between personal

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

Installing Citrix for Mac

Installing Citrix for Mac Installing Citrix for Mac 1) Go to: http://receiver.citrix.com. 2) Click on Download Receiver. 3) On the bottom left hand corner of your computer screen, the Citrix Download should appear. Click on that

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

RemoteTM Web Server User Guide. Copyright 2008-2014 Maxprograms

RemoteTM Web Server User Guide. Copyright 2008-2014 Maxprograms RemoteTM Web Server User Guide Copyright 2008-2014 Maxprograms Contents 3 Contents Introduction...5 Requirements...5 Installation...7 Email Server Configuration...7 Users Management...8 Create User...8

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Housekeeping Your PC

Housekeeping Your PC for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services

More information

The Importance of Patching Non-Microsoft Applications

The Importance of Patching Non-Microsoft Applications The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

INROADS, INC. TRAINING AND DEVELOPMENT. Intern E- Learning Guide 2012 (rev. 4.2012)

INROADS, INC. TRAINING AND DEVELOPMENT. Intern E- Learning Guide 2012 (rev. 4.2012) INROADS, INC. TRAINING AND DEVELOPMENT Intern E- Learning Guide 2012 (rev. 4.2012) 1 Introduction Welcome to another valuable piece of your INROADS development experience, e learning! If you are unfamiliar

More information

http://vpn.madeleyacademy.com

http://vpn.madeleyacademy.com Madeley Academy Remote Access http://vpn.madeleyacademy.com Members of Staff and Sixth form students are able to log into the shared and their user areas from home. System requirements Antivirus Trusted

More information

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008 PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Technical Guide for Remote access

Technical Guide for Remote access Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS

STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS Table of Contents How to check the browser version... 3 PC - Internet Explorer... 8 Internet Explorer V9 Compatibility

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

VMware vcenter Support Assistant 5.1.1

VMware vcenter Support Assistant 5.1.1 VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following

More information

Intelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3

Intelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3 Intelligent Office: Web Optimisation Guide Published Date: 06/11/2015 Version: 3.3 Table of Contents System Requirements:... 3 Introduction... 3 Difficulties Logging on to Intelligent Office (io)... 3

More information

Email Getting Started Guide Unix Platform

Email Getting Started Guide Unix Platform Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information

SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE

SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions

More information

Chapter 15: Computer and Network Security

Chapter 15: Computer and Network Security Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How

More information

Security Awareness. ITS Security Training. Fall 2015

Security Awareness. ITS Security Training. Fall 2015 Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data

More information

The UC Learning Center: Disabling Pop-Up Blockers

The UC Learning Center: Disabling Pop-Up Blockers The UC Learning Center: Disabling Pop-Up Blockers In order to launch online courses within the UC Learning Center all pop-up blockers must be turned off. This guide will walk you through disabling pop-up

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

Initial Access and Basic IPv4 Internet Configuration

Initial Access and Basic IPv4 Internet Configuration Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N

More information

Computer Security Literacy

Computer Security Literacy Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis

More information

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows Optimal Browser Settings for Internet Explorer Running on Microsoft Windows If you have Internet Explorer 7 or 8: Each time you log in to our web site, it evaluates whether you are using the same computer

More information

Intel Unite Solution. Standalone User Guide

Intel Unite Solution. Standalone User Guide Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel

More information

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Sophistication of attacks will keep improving, especially APT and zero-day exploits FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Five Tips to Reduce Risk From Modern Web Threats

Five Tips to Reduce Risk From Modern Web Threats Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Instructions for Department of Public Health (DPH) WebConnect (Mac)

Instructions for Department of Public Health (DPH) WebConnect (Mac) Instructions for Department of Public Health (DPH) WebConnect (Mac) UCSF at SFGH Computing and Network Services Hours of Operation: Monday Friday 8 AM to 5PM Pacific Time Website: http://tiny.ucsf.edu/sfghcns

More information