Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013
BACKUP SECURITY AND THE CLOUD
BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF YOU BACK UP TO YOUR COMPUTER AND YOU HAVE A HARD DRIVE FAILURE YOU WILL LOSE YOUR BOTH YOUR DATA AND YOUR BACKUP!! THE MAJORITY OF EXTERNAL HARD DRIVES COME WITH THEIR OWN BACKUP SOFTWARE
WINDOWS BACK UP
DRAG & DROP
Click Start Point to All Programs Point to Accessories Point to System Tools And then click Backup. Click Advanced Mode. BACK UP IN XP http://www.ntbackup.us/articles/installntbackup-xp-home.htm
FREE BACKUP SOFTWARE FREE FILE SYNC. http://freefilesync.sourceforge.net/ TOP 10 BACKUP SOFTWARE http://www.thetop10bestonlinebackup.com/
SECURITY ANTIVIRUS, ANTISPYWARE & FIREWALL
VIRUS Transmitted Via Websites, E-Mail Attachments, From The Internet Or On Removable Media Trojans Hidden In Files Or Pictures Or Programs Worms These Viruses Can Get In Via Open Internet Connections SPYWARE Spyware Is Software That Can Gather Information About A Person Or Organization Without Their Knowledge MALWARE Short for malicious software, Malware is software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse RANSOMWARE 'Ransomware' is a type of malware that attempts to extort money from a computer user by infecting and taking control of the victim's machine ROOTKITS Rootkit is an application (or set of applications), that hides its presence or presence of another application (virus, spyware, etc.) on the computer, using some of the lower layers of the operating system
Keystroke Logging Often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
5 RULES FOR SAFETY
1. KEEP YOUR SOFTWARE UP TO DATE Even if your computer comes off the shelf with a level of protection, threats change daily. So it's imperative you keep it up-to-date or else it's useless. For Windows 7, just click on "Start", go to Control Panel, select ALL PROGRAMS and click the "Windows Update" icon, where it will show you if there are any updates for your PC. The same goes for users with Windows 8 or XP. The same goes for dedicated antivirus software Keep it up-to-date, and do a full system scan once a week even if your software regularly scans your system
2. PROTECT YOUR ONLINE IDENTITY With more and more of us using the web to bank online and do other sensitive tasks, coming up with solid passwords is more vital than ever. It may seem obvious, but don't use the same login for lots of sites. If one falls into the wrong hands, your whole online life is up for grabs. Remembering lots of different ones is tricky, so try picking one and just add a few letters to it related specifically to each site you're logging into. Ensure you change your passwords frequently. BUT DO REMEMBER THEM!!!
3. NEVER OPEN UNKNOWN E-MAIL ATTACHMENTS Most web crime still happens via email, so be on guard when checking yours. Don't open any attachments you're not expecting, or click any random links you find in the text If you're unsure if a site's legitimate, put the name into Google and see what comes up. It may be listed as a scam.
POLICE SCAM
CryptoLocker CryptoLocker is Trojan horse malware which surfaced in late 2013. A form of ransomware targeting computers running Windows, a CryptoLocker attack may come from various sources; one such is disguised as a legitimate email attachment. When activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment is made by a stated deadline, and says that the private key will be deleted and unavailable for recovery if the deadline passes. PAYMENTS NORMALLY $300-185 If the deadline is not met, the malware offers to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin. http://www.afterdawn.com/software/security/antivirus/cryptoprevent.cfm
BEWARE OF PAYPAL E-MAIL SCAMS Dear PayPal Customer, You have an incoming payment from a member of Craiglist slated for your account regarding your item. This transaction cannot be completed due to errors present in your account information. You are required to download the form attached to this email to fix this problem immediately. Please do not reply to this message. For questions, please call Customer Service. We are available 24 hours a day, 7 days a week.
4. ONLY DOWNLOAD SOFTWARE FROM TRUSTED SITES Looking for a piece of software? Find out which company makes it first and then go to its site to get it, rather than a third party site found via Google. For smaller free or shareware programs, try using big sites such as Download.com, rather than just getting them from anywhere that shows up. When using torrents, avoid.exe files wherever possible. If you must tempt fate, make sure they're thoroughly scanned first.
BE CAREFUL EVEN FROM OFFICIAL SITES LOOK FOR THE TICKS!!
WIRELESS ROUTER SECURITY MAKE SURE YOUR ROUTER CAN ONLY BE ACCESSED WITH THE PROVISION OF A WIRELESS SECURITY KEY IF YOU ARE NOT SURE GET SOME ADVICE!!
5. SWITCH IT OFF!! Switching your computer off when you aren't using it doesn't just save energy, it stops others accessing it while you're away. At the very least, disconnect your broadband when you don't need the web. While your PC's on, and after you've been browsing, is a prime time for malware (malicious software) attacks. So switching it off is a good preventative measure.
COMMERCIAL SOFTWARE NORTON 360 INTERNET SECURITY MCAFEE INTERNET SECURITY BITDEFENDER KASPERSKY BULLGUARD F-SECURE AVG ANTIVIRUS OR INTERNET SECURITY RAPPORT - SUPPLIED BY BANKS OR BUILDING SOCIETIES SOPHOS
FREE SECURITY SOFTWARE FREE AVG ANTIVIRUS 2014 SUPERANTISPYWARE AVAST 2014 AVIRA BITDEFENDER FREE PANDA Download Links On LRFHS Computer Group Page www.lrfhs.org.uk/compgroup.html
3 KEY ELEMENTS FOR TOTAL COVER ANTIVIRUS ANTISPYWARE FIREWALL
STAND ALONE ANTIVIRUS SOFTWARE DOES NOT INCLUDE A FIREWALL INTERNET SECURITY PACKAGES NORMALLY DO INCLUDE A FIREWALL CHECK YOUR FIREWALL IS ON
MORE THAN ONE SECURITY PROGRAM ON YOUR COMPUTER? Most commercial software will not like other free software on at the same time. NORTON & AVG Bad Combination Most Seem To Accept Super Anti SPyware
USING IN-THE-CLOUD SCANNING, BITDEFENDER SAFEGO PROTECTS YOUR SOCIAL NETWORK ACCOUNT FROM ALL SORTS OF E-TROUBLE: SCAMS, SPAM, MALWARE AND PRIVATE DATA EXPOSURE. BUT, MOST IMPORTANTLY, SAFEGO KEEPS YOUR ONLINE FRIENDS SAFE
DO YOU TRAVEL ABROAD? EVER CHARGED YOUR IPHONE OR TABLET PUBLICLY - E.G. IN AN AIRPORT?
The USB Condom protects personal and private data stored on your mobile device by blocking data connections in the USB cable, only allowing power to your device. USB CONDOMS!!
INTERNET BROWSER SECURITY
KEEP YOUR BROWSER UP TO DATE Each new version is more secure than the previous one Internet Explorer 11 XP Internet Explorer 8 Firefox 26 Google Chrome
INTERNET BROWSER SECURITY
SPAM E-MAILS MOST INTERNET/EMAIL PROVIDES WILL HAVE SOME SPAM PROTECTION BUILT-IN Virus scanned by DO NOT ASSUME THEY ARE SAFE MOST SPAM NOW COMES FROM WEB HOSTING COMPANIES WHO HAVE BEEN COMPROMISED BY SPAMMERS
SCAM PHONE CALLS
THE CLOUD Cloud computing is an expression used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet
Amazon Cloud Storage 5 gb Amazon Cloud Player Apple icloud 5gb SkyDrive Microsoft 7gb Free With Office 365 DropBox 2GB 200 Million Users
http://www.which.co.uk/technology/software/guides/how-to-choose-the-best-cloud-storageservice/the-best-free-cloud-storage-services/ http://www.which.co.uk/technology/software/guide s/how-to-choose-the-best-cloud-storage-service/thebest-free-cloud-storage-services/
KEEP UP TO DATE AND BE CAREFUL