1 / 29

WHAT YOU NEED FOR A SAFE COMPUTER

WHAT YOU NEED FOR A SAFE COMPUTER. A Safe Computer has…. Up-to-date Virus checker Up-to-date Anti spy-ware software Firewall Up-to-date OS and application software Passwords Security settings Safe, tested software installed. I don’t Need a Firewall because. I have dial-up.

daktari
Download Presentation

WHAT YOU NEED FOR A SAFE COMPUTER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WHAT YOU NEEDFOR ASAFE COMPUTER

  2. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed

  3. I don’t Need a Firewall because... • I have dial-up. • Windows has a Firewall. • I don’t leave my computer on all the time. • I never surf anywhere dangerous. • Firewalls are complicated. • I go to church on Sundays.

  4. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed

  5. Virus Prevention • Do not to open attachments unless you are expecting them. • Do not execute software that is downloaded from the Internet unless it has been scanned for viruses. • Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.

  6. Email attachments • Many emails have an attachment which is a good use of Email. • Look at attachment name. Ensure you can see extension. Go to “Control Panel”, “Folder Options”, “View” and “Hide extensions for known file types” must be unchecked.

  7. Email attachments • If it ends with .vbs, .bat, .exe, .pif and .scr, be aware that it could be trouble. • Examples: spywarefile.exe, format.bat • Do not open unless you are sure they are safe. Store them first and run your Anti Virus checker by right clicking on file, and click on “Scan with AVG Free”.

  8. AVG - Run Complete Virus Scan Click on “Icon” near clock, then “Test Center”

  9. AVG Complete Virus Scan Click on “Tests”

  10. AVG Complete Virus Scan Click on “Scan all files”, then “OK”

  11. Many virus checkers • AVG Free Edition • AVAST - Free • Norton - $50 • McAfee - $50 Which One do I chose? AVG is a very good choice.

  12. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed

  13. Previous Presentations • Frank gave an excellent presentation on why you need Anti Spyware and Adware programs and Charlie showed which ones worked best. • So we will not speak anymore for now on this but instead have a good look at a…

  14. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed

  15. Firewall Protection • Keeps hackers from coming in system’s ports the same way your ISP does. Also stops unwanted programs sending information out. • MS Firewall better than nothing, but it protects in-coming only. Sygate or ZoneAlarm are good. Use one only. Not AVG Beta Firewall. • Computer running 7/24 increases the risk. • High-speed increases the risk. • Firewalls identify who wants in and out. If previously approved by you, it passes. If not, you are advised and a decision is needed.

  16. How to Handle Firewall Decisions A Firewall encounters a new request - a program wants to enter or leave computer • You are asked to “Allow” or “Block” an application and if you want to “Remember the Decision”. • For Internet Explorer – Answer “Allow” and “Remember” – because you want it. • For Adobe – I answer “Block” – because they don’t need to know what I am doing and “Remember” because I am sure.

  17. Zone Alarm

  18. How to Handle Firewall DecisionsWhat do I do when I am not sure? • Firewall asks to “Allow” or “Block”, a program called “Whatsrunning”. • You want to see if you can “Block” it and still operate normally. • Answer “Block” but don’t ask to “Remember” yet. • See if you operate the same. • If you operate the same, the next rime answer “Block” and “Remember.”

  19. Zone Alarm

  20. Reset your Firewall You may have made a wrong decision Remove all “Allow” and “Block” decisions that you have in your firewall. • Then every time you encounter an application you will be asked to “Allow” or “Block” and to “Remember”. NOTE: Firewalls can block programs and services that you need. When system is running OK, note which programs are allowed and blocked.

  21. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed

  22. MS Windows up-to-date • XP – SP2 installed and all critical updates. • Check all application programs for latest up-dates and versions. Save old version. • If some programs do not work with SP2 installed, go to MS and get info. Go to application program websites and get latest drivers and updated programs.

  23. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed

  24. Hackers can break your code • Complex passwords make it difficult to crack password files on compromised computers. • Use, upper & lower case alphabetic, numbers and special characters. • No: Dictionary words, names, personal names, license plates, sequences, slang or repeats. • Change password regularly.

  25. Use Eight or more Characters in your Password With today’s computer speeds with 68 characters per letter they can have your 5 letter password in 3 minutes. 8 letter password in 1.8 years. 9 letter password in 123 years. So…“Fb8cxM4*” is difficult to remember. 1st letter of words in a sentence “TiKwIaD4y” (Think I Know what I am Doing 4 you)

  26. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed

  27. Security Settings • For Internet Explorer click on – “Tools”, “Internet Options”, “ Security” • Safe way is leaving them on “Default”. • You may not be able to open all your joke attachments but do you care? • Think Safety. • If you have Security settings set to “Low”, IE will let you know.

  28. A Safe Computer has… • Up-to-date Virus checker • Up-to-date Anti spy-ware software • Firewall • Up-to-date OS and application software • Passwords • Security settings • Safe, tested software installed.

  29. Safe Tested Software • Well known software: Microsoft, Corel, Nero, Symantec and many others. • Free software is tempting but be careful. Some are loaded with adware, spyware and could give trouble. Where do I get safe, tested, free software? From our website of course… brightoncomputerclub.org Safe Computer = Happy User

More Related