1 / 23

Leyton Sixth Form College

Leyton Sixth Form College. London. Desktop Computer Security. We will be looking at three types of software: Personal Firewall Spyware/Adware removal Popup killer. A firewall blocks unwanted packets from entering or leaving the computer. Sygate personal firewall.

Download Presentation

Leyton Sixth Form College

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Leyton Sixth Form College London

  2. Desktop Computer Security • We will be looking at three types of software: • Personal Firewall • Spyware/Adware removal • Popup killer

  3. A firewall blocks unwanted packets from entering or leaving the computer

  4. Sygate personal firewall A message is shown when packets are blocked. Example1.

  5. Example 2

  6. Example 3

  7. The firewall also informs you if an application has changed since you last used it. This may be because it has been infected by a virus or worm

  8. The firewall also stops Port scan attacks

  9. Windows XP with service pack 2 also a built-in firewall

  10. You can choose which applications are blocked

  11. Killad.exe is an example of a popup killer

  12. You can choose whick popups to kill by editing the list

  13. These popups are not allowed

  14. Adware & Spyware Removal

  15. TZ Spyware-Adware Remover

  16. You can now select what drives you wish to scan, once you have done this click ‘Scan’ and the scan of the chosen drives will begin.You will be kept updated with the progress of the scan in the main window.

  17. Once the scan is completed you will have all of the scan results displayed on the main window. You then have the option to view the log of the scan or continue to the next page.

  18. When you click on ‘next’, the following screen will be displayed.It shows all of the found spyware and adware from the scan.You can now select which items you wish and choose whether to Ignore, Backup or Delete the items

  19. You can also view the registry settings.This is where you can view all of the setup files for all of the programs installed on your machine.WARNING: Messing about with these settings can result in programs no longer working

  20. Once you have finished with all of the searching and removing you will be displayed with a final rundown of the scan and anything you did with the files found

More Related