The internet for beginners section four of four
This presentation is the property of its rightful owner.
Sponsored Links
1 / 31

The Internet for Beginners Section Four of Four PowerPoint PPT Presentation


  • 59 Views
  • Uploaded on
  • Presentation posted in: General

The Internet for Beginners Section Four of Four. From the Richard Sugden Library Spencer, MA Jillian M. Parsons. Being Careful when Using the Net Summary. Section Four: Today’s Presentation. Being Careful When Using the Net. Who has seen that AOL commercial?.

Download Presentation

The Internet for Beginners Section Four of Four

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


The internet for beginners section four of four

The Internet for BeginnersSection Four of Four

From the

Richard Sugden Library

Spencer, MA

Jillian M. Parsons


Section four today s presentation

Being Careful when

Using the Net

Summary

Section Four: Today’s Presentation


Being careful when using the net

Being Careful When Using the Net


Who has seen that aol commercial

Who has seen that AOL commercial?


What aol doesn t tell you

What AOL doesn’t tell you

Definitions

  • Advertising Gimmicks

  • Pop Ups

  • Pop Up Solutions

  • Spyware

  • Spyware Solutions


What aol doesn t tell you1

What AOL doesn’t tell you

  • Spam

  • Spam Solutions

  • Viruses

  • Virus Solutions


What aol doesn t tell you2

What AOL doesn’t tell you

  • Identity Theft

  • Identity Theft Solutions

  • The Internet and your Privacy


Advertising gimmicks

Advertising Gimmicks

  • Almost every site has at least one or two advertisements. They may flash, they may move around, or they may move only when your mouse is over the ad.

  • If you are confronted with content that seems unrelated, or is not what you are looking for, feel free to ignore it, or if you can, “x out of it”


Pop ups

Pop Ups

  • Pop-up ads are a form of online advertising on the Internet intended to increase the amount of visitors to that site, or to capture email addresses.

  • They get their name because they pop-up uninvited while you may be doing other things on the Internet.

  • Some web browsers claim to block pop-up ads, but I would recommend toolbars that offer several useful services in one package.


Pop ups toolbar solutions

Pop ups Toolbar Solutions

  • Yahoo! Toolbar

  • MSN Toolbar

  • Google Toolbar


Examples of internet toolbars

Examples of Internet Toolbars

  • Yahoo!

  • Google


Spyware

Spyware

  • Spyware covers a broad category of software, created with mean-spirited intent, that takes partial control of a computer's operation without the informed consent of the machine's user.

  • Spyware sometimes manifests itself as an advertisement or includes itself in a download.


Anti spyware programs

Anti-Spyware Programs

  • Spyware infestations can be prevented or disabled before they infect your computer.

    Examples of Anti-Spyware software:

    www.lavasoftusa.com/software/adaware/

  • Lavasoft's Ad-Aware SE

    www.download.com/ Spybot-Search-Destroy/3000-8022-10289035.html

  • Patrick Kolla's Spybot - Search & Destroy


The internet for beginners section four of four

Spam

  • Spam, in this sense, involves sending nearly identical messages to thousands (or millions) of recipients by email.

  • By definition, spam occurs without the permission of the recipients.

  • Following links in email spam, or opening attachments to these email could result in a computer virus or the introduction of Spyware.


Avoiding spam

Avoiding Spam

Computer users can avoid e-mail spam.

  • End-users can use automated e-mail filtering on their own computers.

  • Most email programs allow users to identify junk mail. This block prohibits the identified Spam from that specific sender from getting into your mailbox.


Viruses

Viruses

  • Regarding computer security, a virus is a self-replicating program that spreads by inserting copies of itself into other code or other documents

  • The insertion of a virus into the program is termed as an infection, and the infected file (or executable code that is not part of a file) is called a host.


Anti virus software

Anti-Virus Software

Available through:

www.mcafee.com/us/

  • McAfee Antivirus Software and Intrusion Prevention Solutions

    Or,

    www.symantec.com/

  • Norton Antivirus and computer protection products


Identity theft

Identity Theft

  • Identity theft is usually the result of serious breaches of privacy.


Identity theft1

Identity Theft

  • Except for the simplest credit-related cases, it is usually not possible without breakdowns in:

    • customer privacy,

    • consumer privacy, or

    • client confidentiality


Customer privacy

Customer Privacy

  • In which case the consequences may be limited to one company; typically the one that leaked the data in the first place, e.g. account numbers.


Consumer privacy

Consumer Privacy

  • Is more serious, where credit card numbers or other generally-useful identity data are stolen and used much more widely.


Client confidentiality

Client Confidentiality

  • Such breeches make it easy to effectively impersonate someone, by using confidential information that an ordinary impersonator would not have access to.


The internet and your privacy

The Internet and Your Privacy

The ability to control what information one reveals about oneself over the Internet, and to control who can access that information


Let s talk about ducks

“Let’s talk about ducks.”

Is AOL really evil?


Workshop task

WORKSHOP TASK

Risk analysis: Pros and Cons


Conclusion

Conclusion


Review

Review

  • Using the Internet Explorer

    Web Browser

  • Establishing Home

  • Websites / Web Pages

  • The Web Address (URL)


Review1

Review

  • Searching

  • Everyday Uses for the Internet

  • Saving and Printing

  • Being Careful when Using the Net


Summary

Summary

  • We’ve covered a lot of information here. You will want to keep these handouts and refer to them as needed.

  • Please leave a message for me at the Circulation Desk with any questions you might have.


Summary1

Summary

  • Leave your name, phone number or email, name of workshop at

    508-885-7513or my email,[email protected]


What do i do now

What do I do now?

  • Make a plan

  • Write down goals

  • Brainstorm on how to achieve goals

  • Practice!


  • Login