1 / 50

Welcome!!

Welcome!!. Computer / Internet Security Class / Seminar / Workshop. My Name is: Larry Miller I have worked with computers since 1982, my first computer was an Apple IIc. My Second was an IBM PC (model 5150). SOME FACTS: I am not all knowing

lucita
Download Presentation

Welcome!!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome!! Computer / Internet Security Class / Seminar / Workshop

  2. My Name is: Larry Miller • I have worked with computers since 1982, my first computer was an Apple IIc

  3. My Second was an IBM PC (model 5150)

  4. SOME FACTS: • I am not all knowing • I am hoping you will learn something new here today

  5. SOME FACTS: • The Slammer worm was relentless. In the first minute of existence, it doubled the number of machines that it infected every 8.5 seconds. In just three minutes it was scanning 55 million targets per second! Within 10-minutes, 90 percent of all unprotected computers in the world were infected. Luckily that is all that it did was spread. What a nightmare it would have been if it carried a payload that actually damaged computers.

  6. SOME FACTS: • No two computers are the same (even if you image it) • I tend to ramble, so please stop me if I do  • I do not plan on reading every word that you see on this wall • NO QUESTION IS A DUMB QUESTION

  7. With the usage of these products our lives become more “social” (i.e. Facebook and Twitter) and more vulnerable • Today I will help you understand how to keep yourself safe on your computer • Also, we will talk about the best way to navigate the Internet without getting a virus’, malware, adware, etc.

  8. TOPICS WE WILL DISCUSSING TODAY • Securing Your Operating System • Take steps to ensure your system is secure! • Passwords • AntiVirus, Adware, Malware, etc ------------------------------------------------------ • Keeping your system up to date • Windows Updates • MAC OS Software Updates • AntiVirus, Adware, Malware, etc Updates • De-fragmentation • Installing Applications and what the ramifications are...

  9. Connecting to the Internet • Wired vs. Wireless • Why and what is the difference • What is the best browser to us (i.e. Internet Explorer, Chrome, Firefox) • Safe Surfing • Making sure you keep your information safe on the Internet • EMAIL • SPAM • Phishing • Attachments • Virus', Malware, Adware, etc

  10. Maintaining your computer • Backups • How to keep you computer from getting "SLOW“ ------------------------------------------------------ • Questions and Answers (talk and hands on)

  11. Do you feel this way about your computer most days?

  12. Securing Your Operating System • First thing to protecting yourself is to become familiar with what types of attacks there are on the Internet. • Always Think First, and Ask QuestionsWhen in doubt, DELETE or CLOSE the screen (right click on the bottom of the screen and choose close)! • Be careful who you trust and what information you • provide online. • Know what data you have, where it is and that it’s • secured. • Don’t let your private life become part of the Internet. Take steps to ensure yoursystem is secure!

  13. Securing Your Operating System Good Passwords: • At Least 8 Characters Long • No Dictionary Words - (Forwards OR Backwards) • May Contain Special Characters (&%_#) • Should Have UPPER and lower Case Letters and/or Words.

  14. Securing Your Operating System Good Passwords: • Never Be Written Down or Shared • Should Be Changed Regularly • Do Not Tell ANYONE! Not Me, Not Anyone! • If it is absolutely necessary for maintenance and/or a trusted repair person you can give them a temporary password. After they are done, change it immediately.

  15. Securing Your Operating System Good Passwords: • Your Password should be a unique combination of letters, numbers and a special character (i.e. Y@nkeyD00dle )

  16. Securing Your Operating System Good Passwords: • Example of BAD passwords:

  17. Securing Your Operating System • It is very important to assign passwords to your user accounts on your computer – this will keep your DATA safe and secure • Setting The Windows Administrator’s Password: • Start -> Run -> control userpasswords2

  18. Securing Your Operating System Highlight “Administrator” Choose “Reset Password” Clear the User Name field and Rename it

  19. Securing Your Operating System Setting The Mac OS X Root Password: Root Account DISABLED by Default •Net Info Manager •Authenticate •Enable Root User •Create Root Password

  20. What Is A Virus? • "A parasitic program written intentionally to enter a computer without the user's permission or knowledge. The word parasitic is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some viruses do little but replicate, others can cause serious damage or affect program and system performance. A virus should never be assumed harmless and left on a system." -- Symantec Securing Your Operating System

  21. Types of Computer Viruses • Basic Virus - a piece of software code that is developed to attack computers and network entities via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive. • Trojan Horse - This is a type of benign program, a malicious code that doesn't replicate when entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to assume control over a particular system or to steal vital data. As an example, QAZ helped hackers view the secret source code at Microsoft-owned network. •  Worm - this type of virus has the capability to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc. As an example, in the early August of 2003, a worm by the name of Blaster infected more than 1 million computers worldwide. In similar case, Welchia, an antidote to Blaster, clogged huge amounts of network computers and caused computers crashes. •  Blended or a Combination Attack - covers innovative strategies to infect and spread various viruses within computer networks. It involves basic virus, worm, and Trojan Horse techniques where attackers can use peer-to-peer networks and instant messaging systems to channel such viruses. In the mid-August of 2003, SoBig, a virus, infected nearly every other email traveling on the Internet at its peak. Securing Your Operating System

  22. How They Infect • Open Ports (Worms, Trojans) • A port is a method on how your computer connects to the Internet (it is like a room full of doors and you choose which one to go through) • Removable Media (Floppy Disk, Memory Card) • Downloads (WWW, FTP, P2P) • Email (Attachments, Scripts) Securing Your Operating System

  23. Securing Your Operating System

  24. Free AntiVirus, Anti-Malware and Anti-Spyware • AVG • Avast • Spybot Search and Destory • AntiVir • Ad-Aware Securing Your Operating System

  25. Let’s hope your computer does not do this…

  26. QUESTIONS

  27. Computer Maintenance Checklist • At system setup • Install a surge suppressor/emergency shutdown power strip • Register your software products • Schedule automated updates • Read the maintenance section of your manual • Set up your email to auto-archive older messages (if you are using that type of email program (i.e. Microsoft Outlook) • Install anti virus software • Install anti-advertising/malware software • Put your software drivers(does anyone know what a software driver is??) in a pocket sleeve 3 ring binder Keeping your system up to date

  28. Weekly • Run a disk scan to check for hard drive issues (demo) • Run a defragmentation program – in Windows Vista and 7 this is done automatically) • Run a clean up to delete unneeded files (demo) • Back up your files to a remote location (I suggest Mozy Pro) • Empty your recycle bin • Delete your Internet files (demo) • Clear your browsing history (demo) • Delete your cookies (demo) • Update your virus definitions • Run a full virus scan Keeping your system up to date

  29. Monthly • Check for updates • Delete/uninstall unneeded or unused programs • Quarterly • Clean your keyboard and mouse (alcohol pads and canned air) ***** I have a story about canned air • Clean your monitor • Clean your peripherals • Rebuild your desktop (this is not an easy task, please make sure you get a professional to do this or ask a friend to help or myself) -- MOST IMPORTANT, BACK UP YOUR DATA • Change all your passwords Keeping your system up to date

  30. Yearly • Renew your software update and anti virus subscriptions Keeping your system up to date

  31. Installing Applications • Only install applications that you need • If you install to many applications, your hard drive will slowly fill up with files and will cause it to be slow over time (also, even if you think that uninstalling an application will speed up your computer, that is not always a truth… some applications leave behind files and could cause issues later on) Keeping your system up to date

  32. Which Operating System is best for me?? • It is all about preference (what works best for me?) • Windows XP? • Windows Vista • Windows 7 • MAC OS X • Linux (Ubuntu, Fedora, Red Hat) • No matter which Operating System you choose, always remember, it can get a virus, you need to keep it up to date and you need to back up your data Keeping your system up to date

  33. QUESTIONS

  34. NEED A BREAK???

  35. Wired vs. Wireless • Some Pros and Cons • Wired can be more fast (some wired connections have faster speeds than wireless) • Wireless allows you to be anywhere in your home and still connected to the Internet • Wired connections can be more secure (in some cases than wireless) • Wireless connections can be less secure if you don’t have the proper encryption enabled on your wireless access point Connecting to the Internet

  36. Which Internet Browser is best for me • It is all about preference (what works best for me?) • Window’s Internet Explorer • Integrates really well with Windows OS • Probably the most targeted (hacked, virus) browser in the world • Mozilla’s Firefox • It is very extendable (customizable) • Apple’s Safari • Apple’s answer to browsing • Not very customizable • Google’s Chrome • Google’s answer to browsing • Not very customizable • Opera • Opera’s answer to browsing • Not very customizable Connecting to the Internet

  37. Connecting to the Internet

  38. Safe/Smart Surfing • First rule of smart surfing? Remain as anonymous as possible. That means keeping all private information private. Here are some examples of private information that you should never give out on the Internet: • full name • home address • phone number • Social Security number • passwords • names of family members • credit card numbers Connecting to the Internet

  39. Keeping your information safe on the Internet • The best way is not to put anything out there • No personal information should be shared with anyone you don’t know • If you use Facebook, MySpace, Linkedin, etc… understand that everything you say, express and post (i.e. photos) are available for the world to see… Also, remember that once something is “posted” on the Internet it could potentially be there forever. The all mighty Google may have already cataloged it. Connecting to the Internet

  40. If you have children, it might be a good idea to use some sort of preventative measures to keep them safe • First thing is talk to them about Internet and let me know the about the dangers keeping their personal information safe • If you are worried that they might go to unsafe places on the Internet you can install programs on to your computer to help them stay safe (i.e. McGruff SafeGuard, CYBERSitter and NetNanny). Windows Vista and Windows 7 have a similar programs built-in Connecting to the Internet

  41. Downloading Files, Music and Applications from the Internet • My best advise to you about any of this is… don’t do any of it • If you have to download something, I suggest you have updated AntiVirus software and Anti-Malware software • For Music, I suggest using iTunes or another reputable company to download your music. Stay away from companies like LimeWire and other “free” music download sites. They typically have a lot of virus’ associated with them Connecting to the Internet

  42. Email • The best way to keep from getting these, is to only open emails from people you trust • SPAM (video) • Phishing • These people are trying to get you to give them information about personal online accounts (i.e. ebay, paypal, etc) • Attachments • Only time you should open email from anyone is if you trust the person and you are expecting something from them (next to Phishing, this is the #1 way people get virus) Connecting to the Internet

  43. Email • Don’t get fooled by the emails with attachments… like, “If you forward this email you will receive $100 in 100 days” • Remember if you are going to forward an email to friends and family, it is important to not include the previous email addresses from the attached email. • Also, if you have a group of emails that you plan to send to, it is best to blind carbon copy (BCC) them Connecting to the Internet

  44. Connecting to the Internet

  45. Malware • Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. - wikipedia • Intrusive-ware (not an official term, that is what I call it) • It is almost the same as Malware; however, it has all of the characteristics of a legitimate piece of software. Example, a program that looks and feels like your AntiVirus program; however, it keeps telling you that you have virus and the only way to make these pop-ups go away, is to buy their software. Now they may have your money, your computer and possibly your identity. Connecting to the Internet

  46. Misconceptions about your computer • Upgrading (to the next version of Windows, Linux or MAC OS X) will not always fix the issue • Running a virus scan and/or a anti-malware will not always fix your issue

  47. Keeping yourself from having to call a technician or repair person • Follow these 4 simple rules • Be mindful of where you go on to the Internet (if you think it is doesn’t look or feel right, then it isn’t… close your browser and/or just turn off your computer) • Update your computer with your AntiVirus definitions and Window Updates • Back up your data to an external hard or an external company (i.e. Mozy Pro) • Follow the Weekly, Monthly, Quarterly, Yearly plan (as mentioned above)

  48. QUESTIONS

  49. Cool Websites: • http://www.komando.com/ • http://twit.tv/ • http://www.cnet.com/buzz-out-loud-podcast/ • http://www.crossloop.com/ • http://www.mahalo.com/ • http://www.petri.co.il/ • http://www.connectedgeek.net • Survey: • http://shortlinks.connectedgeek.net/2010-04-Survey

  50. THANK YOU FOR COMING TODAY! • Please fill out the survey form • If you have any questions or need help, please contact me at: http://www.connectedgeek.net LARRY@CONNECTEDGEEK.NET or 248-648-1717

More Related