Docstoc

WORD PROCESSING 101 Part 4

Document Sample
WORD PROCESSING 101 Part 4 Powered By Docstoc
					KEEPING SAFE
LET’S TALK ABOUT SECURITY!

   YOU ARE UNDER
    ATTACK!
    –   People who want your
        money
    –   People who want your
        information
    –   People who want to use
        your computer
    –   People who want to
        mess up your computer
        just for fun
SHALL WE PANIC NOW OR LATER?

   We are NOT going to panic at all
   We are going to understand what can
    happen
   We are going to learn how easy it is to
    defend ourselves and how little extra it need
    cost
   TOTAL SECURITY IS IMPOSSIBLE BUT
    WE CAN GET VERY CLOSE
THE AREAS WE HAVE TO LOOK AT

   Passwords and ID‟s
   Information Back-Up [Safety Copy]
   Firewalls
   Anti-Virus
   Anti-Malware [MALicious softWARE]
   Scareware & false Pop-Ups
   False Web Sites
   Wireless connections
PASSWORDS AND I.D.’S

   As you use the computer for different things
    you may need to have several passwords
    and I.D‟s [I.D. may be called different things
    like LogIn Name, Account Name but will
    almost always be used with a password]
   They prevent other people from using your
    computer or pretending they are you –
    probably not for your good
PASSWORDS AND I.D.’S

   Your first protection – when your computer is
    starting up - prevents people from physically
    using your computer unless you want them
    to – this is password only
   Can stop others using anything on your
    computer or stop them from using critical
    parts
   BUT THEY ARE ONLY GOOD IF YOU DO
    IT RIGHT
A GOOD PASSWORD

   Should not be obvious – spouses name,
    birthday etc.
   Mixed letters and numbers – harder to break
   Longer is better than shorter
   Easy to remember
PASSWORDS AND I.D.’S

   Never tell anyone else your password & I.D.
   Best to never write down your passwords and I.D.‟s
    – just remember them
   If you have a lot [I have 14] remembering them all
    can be hard. It‟s not good to have them all the same
    – if someone gets one somehow - then you are in
    trouble for everything
   If you do write them down you MUST keep them
    hidden – NOT near the computer
PASSWORDS AND I.D.’S

   Many places you visit on the web [Banks, E-
    mail] will need both I.D. and password and
    some will ask if you would like them to
    remember these for next time
   NEVER do this if using someone else‟s
    computer – the next person can become you
   On your own computer it may be OK to have
    the I.D. remembered but NEVER passwords
AN EXCEPTION

   For most e-mail systems, your I.D. is the
    same as your e-mail address. To use e-mail,
    other people have to know your address – so
    in this case you have to give it to people.
WRITTEN DOWN?

   Why not use a password protected file?
   Double layer of security
   Keep it in two places
HOW TO DO IT

   Open a WORD document
   List your passwords – and log-ins. Could
    keep your Product Key Codes here too
   Create a password – use something you will
    remember BUT not something obvious like
    your birthday
PASSWORDS & I.D.’S

   Click Tools - Options
PASSWORDS & I.D.’S

   On the Security Tab
    type “password to
    open” and click OK
PASSWORDS & I.D.’S

   You will be asked to
    enter it again – click OK
    when you have done it
   Then „save as” in the
    normal way
PASSWORDS & I.D.’S

   Suggest to save in “My Documents”
   Then save it on a spare flash drive also –
    you keep this safe as we shall see later when
    talking about physical security
INFORMATION BACK-UP

   You can lose all the information in your
    computer due to:
    –   Fire
    –   Theft
    –   Damage to the storage – could be a faulty hard
        drive, a lost or damaged flash drive or it could be
        due to a serious Virus infection
INFORMATION BACK-UP

   Much of what is stored on your computer –
    Operating System & Programs can be
    recovered – although it may take time and
    need expert help
   Things you created yourself can NOT be
    recovered if the worst happens UNLESS you
    have a copy – this is called BACK-UP
LET’S KEEP IT SIMPLE

   There are ways to back up everything
   Programs like Macrium Reflect [free] can create a
    complete “mirror image” of your hard drive [s] – see
    www.macrium.com
   You will need a back-up drive at least as large as the
    one in your computer – an extra cost
   What this does do is to save time and money if you
    have a disaster. This may not be a big deal for
    people who do not depend on their computer
BASIC BACK UP

   You can keep things simple be storing all
    your work in the special place set up by
    Windows called “My Documents”
   You can then back up this place to a Flash
    Drive
BASIC BACK UP

   If you do this, you will need a flash drive that
    has enough storage. An 4Gb drive will be
    enough for most people – $10 - $12.
   For most people, making a back up once a
    week is enough although people who use a
    computer a lot may do it each day
HOW IS IT DONE?

   Back up is done by making a copy of what is
    stored in the computer on a separate device
    that can be kept away from the computer
   This device should be hidden
   The best thing is to keep it in a fire-proof box
    – these can be bought for as little as $25
HOW IS IT DONE?

   The easiest way is to use a program which
    comes with all versions of Windows called
    “Windows Explorer”
   Be sure your Flash Drive is plugged in
   Good idea to name it
STARTING WINDOWS EXPLORER

   All these illustrations
    are from Windows 7
    [Windows Vista will look
    the same]
   Remember that if you
    are using XP, it will look
    a little different
STARTING WINDOWS EXPLORER
   Make sure you can see
    both the “from”
    [Documents/My
    Documents] and the
    “to” – the flash drive
LET’S DO IT!

   We use “Drag and Drop
   ONE BIG DIFFERENCE – WE USE THE
    RIGHT BUTTON
   REMEMBER – USE
    THE RIGHT BUTTON
WHAT NEXT

   When you release the
    Right button you will
    see this
   If you click “Move here”
    you will still only have
    your work in one place
   Use “Copy here”
FIREWALL

   This is a program inside your computer that acts like
    a wall round a castle – it tries to keep unwanted
    strangers out. You don‟t need to understand it.
   All modern Windows Operating Systems have a
    good Firewall built in. So no problem except:-
   When installing, some anti-virus and anti-malware
    programs will ask if you want to install their Firewall.
    Say NO – if you have two, they fight each other and
    ignore real problems
ANTI-VIRUS & ANTI-MALWARE
Viruses, Trojans & Worms

   Don‟t worry about the meanings of these
    names – they are all bad things that try to
    invade your computer from outside
   They can arrive hidden in an e-mail or be
    waiting on a web site you visit
   The most dangerous web sites are social
    networking sites [Facebook, YouTube,
    Twitter] & Celebrity Sites
ANTI-VIRUS & ANTI-MALWARE
Viruses, Trojans & Worms

   THE DANGER EVERYONE FORGETS
    ABOUT
    –   The friend who has no protection on his/her
        computer but brings stuff to your computer on a
        flash drive or CD/DVD for you to use
BASIC FACTS

   Many people will say that a good anti-virus
    software [program] is all you need
   Experience shows that both anti-virus and
    anti-malware are needed – as they look after
    different things
   Many computers have anti-virus installed
    when they are bought
MORE BASIC FACTS

   This anti-virus software is usually only a “trial”
    version – after a few months you will have to pay to
    keep it up to date – usually every year
   You must never have more than one anti-virus
    program running – if you do, they fight and let the
    bad things in
   Some free software only runs in a way that helps
    AFTER the bad thing arrives. Sometimes this is
    enough BUT often not!
WHAT SHOULD I GET?

   For anti-virus, Microsoft Security Essentials
    is suggested. THIS IS FREE
   For anti-malware MalwareBytes is
    suggested. This costs about $40. There is a
    free version but, as mentioned, it only works
    AFTER the problem arrives
IMPORTANT

   Neither of these programs can be bought at
    a store – they have to be downloaded from
    the Internet.
   If you are not sure, get experienced help:
    –   To download
    –   To install properly
IMPORTANT

   If you are downloading a replacement ant-
    virus you need to follow these steps:
    –   Go on-line and download the new software BUT
        choose the “save” option – not “run”
    –   You need to un-install the old anti-virus. Go to the
        manufacturer‟s web site and check for an un-
        install utility – add/remove software may not do it.
        Again – “save” not “run”
IMPORTANT

   DISCONNECT FROM THE INTERNET –
    YOU ARE VUNERABLE DURING THE
    NEXT STEP.
   Un-install the old a/v
   Install the new a/v and set it up
   Re-connect to the Internet
FRIEND OR ENEMY?

   A friend wants to load something on your
    computer from a flash drive or other media –
    but you‟re not sure that they know the
    dangers – it may be compromised
   There is an easy way to check before you
    load
STEPS

   Start Windows Explorer
   Insert the “visiting”
    media
   Locate the device
    concerned
   Then right click on it
   This will give you the
    chance to scan the item
    with any or all of the
    “protection” software
    you have installed
SCAREWARE & FALSE POP-UPS

   These are messages that “pop-up” on your
    screen
   They usually are about one of two things:
    –   Telling you that your computer has a problem –
        usually that it has viruses - and to “click here” to
        fix it
    –   Telling you there is an update available for you
        computer and to “click here” to download it
HOW DO I KNOW IT’S NOT GENUINE?

   The most common way used to get your attention is to make it
    look like it‟s a Windows message – Windows DOESN‟T do this!
   If it seems to come from a program you didn‟t know you had
WHAT DOES SCAREWARE LOOK
LIKE?

   Look like genuine
    messages
   Made to “scare” you
    into doing something
   Doing anything with
    these will probably
    make things worse
   Often ask you to pay as
    well – you get
    NOTHING!
WHAT DO I DO?

   Click the red X at the top right
   NEVER click anything else – sometimes you
    are offered YES or NO choices [or ACCEPT
    & CANCEL] – both are really YES!
   If there is no red X or it doesn‟t close the
    message – SHUT OFF THE COMPUTER
    AND GET HELP
   If it keeps coming back – GET HELP
FALSE POP-UPS

   Usually tell you that an update is available
   Often use the name of a program [Adobe is
    an example] that is found on most computers
   May be genuine – a number of real programs
    use this way of telling you that updates are
    available
WHAT DO I DO?

   Close with the X – if it won‟t close, again
    switch off and get help
   If it comes from a program you don‟t have –
    ignore it
   If you think it might be real – close the pop-
    up and go to the web site for that program.
    You can get the update from there – get help
    if you are not sure how
FALSE WEB SITES

   When you use a search engine you get many
    choices of where to go – in the example below
    where we are looking to find a download for the new
    Microsoft Internet Explorer 9
LET’S LOOK A LITTLE CLOSER
BUT ARE THEY?
WHAT ARE WE SEEING

   Everything in each choice is written by the
    person who created the web site – if they are
    “BAD” – so is what they wrote
   BUT they can not change the green printing
   In the top choice, we see “Microsoft” – in the
    second one we see something else
   This does not mean the second one has to
    be bad but the first choice would be safer
WIRELESS CONNECTIONS

   Need to be clear what
    we are talking about
   This does NOT mean
    “Mobile Internet” using
    the cell phone network
    which uses a separate
    wireless device and can
    be used almost
    anywhere
WIRELESS CONNECTIONS

   It means the method where
    the computer does not have
    a wire connecting it to the
    Internet – it uses a device
    called a “Wireless Router”
   Which means the computer
    can be moved around in the
    general area – in a house for
    example
WIRELESS CONNECTIONS

   Because the signal is quite strong, it can
    often be read outside the home. Any stranger
    could park outside with a laptop and try to
    access your computer
WHAT TO DO?

   All wireless routers have “Encryption”
   This means the signal is coded so that only
    your computer can use it
   INSTALLING A WIRELESS ROUTER IS
    SOMETHING FOR WHICH YOU MAY NEED
    HELP. ENCRYPTION IS NOT SET UP
    AUTOMATICALLY – MAKE SURE IT IS
    DONE!
BETTER SAFE THAN SORRY!



             Take a little time to take
              the basic precautions

				
DOCUMENT INFO
Shared By:
Categories:
Stats:
views:4
posted:6/29/2011
language:English
pages:56