SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Michael Wells, President
Gurus NOT Geeks LLC
 Viruses
 Viruses replicate, spread, damage
 Spyware
 Toolbars
 Popups
 Ads
 Potentially Unwanted Programs (pups)
 Scams
 Boot Sector Viruses
 Code executes before computer boots
 Program Viruses
 A program that runs in the background
 Root Kits
tries to hide and use methods to avoid detection
 Trojans
 Steals info or allows remote access to your
computer
 Ransomware
 Encrypts important files asks for payment
“A rootkit is a stealthy type of
software, typically malicious,
designed to hide the existence of
certain processes or programs from
normal methods of detection and
enable continued privileged
access to a computer” – Wikipedia
 “Manual removal of a rootkit is often too
difficult for a typical computer user” –
Wikipedia
 “Hello I am from Microsoft, and we have
detected that your PC is causing errors on
our network. Can we call in remotely to your
computer and show you what is wrong?”
Avoid scams that use the Microsoft name fraudulently
Cybercriminals often use the names of well-known companies, like ours, in
their scams. They think it will convince you to give them money or your
personal information. While they usually use email to trick you, they
sometimes use the telephone, instead.
Common scams that use the Microsoft name
•Someone from "Microsoft Tech Support" calls to fix your computer
•"You have won the Microsoft Lottery"
•Microsoft "requires credit card information to validate your copy of Windows"
•"Microsoft" sends unsolicited email messages with attached security updates
Avoid these dangerous hoaxes
We do not send unsolicited email messages or make unsolicited phone calls to
request personal or financial information or fix your computer.
If you receive an unsolicited email message or phone call that purports to be
from Microsoft and requests that you send personal information or click
links, delete the message or hang up the phone.
Microsoft does not make unsolicited phone calls
to help you fix your computer!
You have not won the "Microsoft Lottery"
 Microsoft customers are often targets of a scam that uses email messages to falsely promise money.
Victims receive messages claiming "You have won the Microsoft Lottery!" There is no Microsoft Lottery.
Delete the message.
 If you have lost money to this scam, report it. You can also send the police report to Microsoft and we
will use it to help law enforcement catch the criminals who send out these e-mail messages.
 To help protect yourself from these e-mail hoaxes, you can use the same general guidance that you use
to protect yourself from phishing scams.
Microsoft does not request credit card information to validate
your copy of Windows
 We require that your copy of Windows is legitimate before you can obtain programs from the Microsoft
Download Center or receive software updates from Microsoft Update. Our online process that performs
this validation is called the Genuine Advantage Program. At no time during the validation process do
we request your credit card information.
 In fact, we do not collect information that can be used to identify you such as your name, email
address, or other personal details.
 To learn more, read the Genuine Microsoft software program privacy statement.
 To learn more about the program in general, see Genuine Windows: frequently asked questions.
Microsoft does not send unsolicited communication about
security updates
 When we release information about a security software update or a security incident, we send email
messages only to subscribers of our security communications program.
 Unfortunately, cybercriminals have exploited this program by sending fake security communications that
appear to be from Microsoft. Some messages lure recipients to websites to download spyware or other
malicious software. Others include a file attachment that contains a virus. Delete the message. Do not
open the attachment.
Do NOT open any email you are not
expecting !
 Forwarded jokes, pictures, videos
 May contain viruses and spyware
 Links to viruses
 Do not follow any links from emails from people
you know unless they explain exactly what it is.
 Attachments with Viruses
 Do not open any unknown attachment
 “Phishing” emails
 Fake emails from Banks, UPS, FedEx
Toolbars
Popups
Ads
Browser Hijackers
Search Engines
 Know your home page.
 Google
 MSN
 Yahoo
 Aol
 Learn how to check for add-ons and plug-ins
 Know your browser
 Know your search engine
 Scan often with UPDATED antispyware
 Internet Explorer
 Google Chrome
 Mozilla Firefox
Set or Check Home Page
Set or Check Search Engines
Set or Check Extensions
ADD-ONS and Search Providers
Click on gear
in upper right
of browser,
then choose
“Internet
Options”
Also, press ALT key to display menu
Make menu visible by pressing ALT
Google? Yahoo? Bing? Aol? Ask?
 Google
 Bing
 Yahoo
 Aol
UNSAFE
 Ask
 Search conduit
 Anything else
 I call it the “did I ask?” toolbar
 Adds nothing to the search experience
 Does not provide the “engine”
 May allow adware in.
 Comes bundled with Java update (uncheck!)
 Uses many of the same sneaky techniques to
get installed.
 REMEMBER: GOOGLE BING YAHOO AOL are the
only search engines that should be listed.
 Uninstall from programs and features if listed
 Free downloads contain harmful bundled
software
 Ads are made to confuse you
 You first need to make sure you are on the right
download link.
 If you just check yes on every checkbox, you
can destroy your computer.
?
?
?
?
?
The word “download” appears 13 times on
this page with ads made to look like the real
link
?
?
?
 Advanced System
Protector
 Babylon Toolbar
 delta toolbar
 funmoods toolbar
 ILIVID
 Imminent
 Inbox
 Inbox Ace –
Mindspark
 MixiDJ
 MoboGenie
 My PC Backup
 Optimize your PC
 Optimizer Pro
 PC Utilties Pro
 Quiklinx
 RegClean Pro
 search protect *
 Severe Weather Alerts
 Speedy PC
 Sweetpacks
 Tidynetwork
 Viewpassword
 Wajam
 1.1 Astromenda Search
 1.2 Onewebsearch
 1.3 TV Wizard
 1.4 Conduit Search
 1.5 CoolWebSearch
 1.6 Coupon Server
 1.7 Delta Search and Claro
Search
 1.8 Search-daily.com
 1.9 MyStartSearch
 1.10 MyStart.IncrediBar Search
 1.11 Nation Zoom
 1.12 Babylon Toolbar
1.13 Qone8.com
1.14 qvo6.com
1.15 istartsurf.com
1.16 Mixi.DJ
1.17 Snap.do
1.18 RocketTab
1.19 Searchnu.com
1.20 Searchgol.com
1.21 Tuvaro
1.22 Trovi
1.23 Vosteran
1.24 Groovorio
1.25 GoSave
 Install 2 antispyware programs
 Superantispyware
 Malwarebytes Antimalware
 Run each one on alternating weeks
 Always update first
 SuperAntispyware
 Download from Superantispyware.com
 Decline the free trial
 Malwarebytes
 Download from download.com
 Uncheck free trial
 Know your home page.
 Google
 MSN
 Yahoo
 Aol
 Learn how to check for add-ons and plug-ins
 Know your browser
 Know your search engine
 Scan often with UPDATED antispyware
 “Mountain View, California: The majority of
Android smartphone and tablet users do not
need to install anti-virus and other security
apps to protect them, despite dire warnings
from security companies selling such
products, Google’s head of Android security
says.” - Google 2015
 Yes, but not as many
 “Malware has grown to be such a tremendous
problem that over 32 percent of the world’s
computers are infected with some type of
malware. With East Asian countries like China,
South Korea, and Taiwan having the most
infected computers.
 Northwestern European countries such as
Norway, Switzerland, and Sweden all have the
lowest amount of computers infected with
malware.
 The United States has the eleventh highest rate
of infection with just over 30 percent of
households being infected with malware.
On site visits and repairs. New
computers ordered and installed.
Remote computer help.

Weitere ähnliche Inhalte

Was ist angesagt?

Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Remove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXYRemove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXYjennyaniston
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect viruscoseanonans
 
Instructions to remove ads by lolliscan
Instructions to remove ads by lolliscanInstructions to remove ads by lolliscan
Instructions to remove ads by lolliscanMU
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
Guide to remove search.searchgeniusinfo.com
Guide to remove search.searchgeniusinfo.comGuide to remove search.searchgeniusinfo.com
Guide to remove search.searchgeniusinfo.comficilitynorwy
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Cyber Security Guide
Cyber Security GuideCyber Security Guide
Cyber Security GuideChris Roche
 
Remove 1 startpage.com pop up
Remove 1 startpage.com pop upRemove 1 startpage.com pop up
Remove 1 startpage.com pop upcoseanonans
 
How can we remove window fix?
How can we remove window fix?How can we remove window fix?
How can we remove window fix?charliedavibrown
 
Remove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyRemove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyharoNaroum
 
Steps to remove include maker
Steps to remove include makerSteps to remove include maker
Steps to remove include makerhuasom
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.commariagoel7
 
Remove bilisearch.com redirect virus
Remove bilisearch.com redirect virusRemove bilisearch.com redirect virus
Remove bilisearch.com redirect viruscoseanonans
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infectionscottgelbard123
 
Tips to uninstall Unisales
Tips to uninstall Unisales Tips to uninstall Unisales
Tips to uninstall Unisales Adoniscooper
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskarnullowaspmumbai
 

Was ist angesagt? (20)

Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Remove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXYRemove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXY
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virus
 
Instructions to remove ads by lolliscan
Instructions to remove ads by lolliscanInstructions to remove ads by lolliscan
Instructions to remove ads by lolliscan
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Guide to remove search.searchgeniusinfo.com
Guide to remove search.searchgeniusinfo.comGuide to remove search.searchgeniusinfo.com
Guide to remove search.searchgeniusinfo.com
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Cyber Security Guide
Cyber Security GuideCyber Security Guide
Cyber Security Guide
 
Remove 1 startpage.com pop up
Remove 1 startpage.com pop upRemove 1 startpage.com pop up
Remove 1 startpage.com pop up
 
How can we remove window fix?
How can we remove window fix?How can we remove window fix?
How can we remove window fix?
 
Remove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyRemove search shield.com pop-ups manually
Remove search shield.com pop-ups manually
 
Steps to remove include maker
Steps to remove include makerSteps to remove include maker
Steps to remove include maker
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Remove bilisearch.com redirect virus
Remove bilisearch.com redirect virusRemove bilisearch.com redirect virus
Remove bilisearch.com redirect virus
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
 
Tips to uninstall Unisales
Tips to uninstall Unisales Tips to uninstall Unisales
Tips to uninstall Unisales
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskar
 

Andere mochten auch

Slot Drain Systems Submittal
Slot Drain Systems SubmittalSlot Drain Systems Submittal
Slot Drain Systems SubmittalDevan Cronshaw
 
Swimming through the digital flood hsdam chicago_2015
Swimming through the digital flood hsdam chicago_2015Swimming through the digital flood hsdam chicago_2015
Swimming through the digital flood hsdam chicago_2015fLLOYDb
 
Selenized Milk Protein, Warrington et al.
Selenized Milk Protein, Warrington et al.Selenized Milk Protein, Warrington et al.
Selenized Milk Protein, Warrington et al.Jenny Warrington
 
Plenoxia presentazione italia
Plenoxia presentazione italiaPlenoxia presentazione italia
Plenoxia presentazione italiaPlenoxiaItalia
 
Fiji Time Dec Jan FINAL Kay-2
Fiji Time Dec Jan FINAL Kay-2Fiji Time Dec Jan FINAL Kay-2
Fiji Time Dec Jan FINAL Kay-2Kay Dougherty
 
презентация цб глонасс 2013 новая
презентация цб глонасс 2013 новаяпрезентация цб глонасс 2013 новая
презентация цб глонасс 2013 новаяDsKazan
 
Tachograf
TachografTachograf
TachografDsKazan
 
Git lev 3 -おひとりさまでブランチを-
Git lev 3 -おひとりさまでブランチを-Git lev 3 -おひとりさまでブランチを-
Git lev 3 -おひとりさまでブランチを-Kentarou Kurashige
 
Git lev 1-おひとりさま用-
Git lev 1-おひとりさま用-Git lev 1-おひとりさま用-
Git lev 1-おひとりさま用-Kentarou Kurashige
 
PER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZ
PER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZPER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZ
PER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZMaestraCibernella
 

Andere mochten auch (20)

New york
New yorkNew york
New york
 
basquet
basquetbasquet
basquet
 
Slot Drain Systems Submittal
Slot Drain Systems SubmittalSlot Drain Systems Submittal
Slot Drain Systems Submittal
 
BSc Tourism Awards
BSc Tourism AwardsBSc Tourism Awards
BSc Tourism Awards
 
Swimming through the digital flood hsdam chicago_2015
Swimming through the digital flood hsdam chicago_2015Swimming through the digital flood hsdam chicago_2015
Swimming through the digital flood hsdam chicago_2015
 
2015_DeltaModel_SMEs
2015_DeltaModel_SMEs2015_DeltaModel_SMEs
2015_DeltaModel_SMEs
 
MA SIF and Statewide SIS Program Presentation
MA SIF and Statewide SIS Program PresentationMA SIF and Statewide SIS Program Presentation
MA SIF and Statewide SIS Program Presentation
 
Selenized Milk Protein, Warrington et al.
Selenized Milk Protein, Warrington et al.Selenized Milk Protein, Warrington et al.
Selenized Milk Protein, Warrington et al.
 
Flex3 brochure
Flex3 brochureFlex3 brochure
Flex3 brochure
 
Plenoxia presentazione italia
Plenoxia presentazione italiaPlenoxia presentazione italia
Plenoxia presentazione italia
 
Fiji Time Dec Jan FINAL Kay-2
Fiji Time Dec Jan FINAL Kay-2Fiji Time Dec Jan FINAL Kay-2
Fiji Time Dec Jan FINAL Kay-2
 
Assure plan2
Assure plan2Assure plan2
Assure plan2
 
презентация цб глонасс 2013 новая
презентация цб глонасс 2013 новаяпрезентация цб глонасс 2013 новая
презентация цб глонасс 2013 новая
 
Tachograf
TachografTachograf
Tachograf
 
Plenoxia commercianti
Plenoxia commerciantiPlenoxia commercianti
Plenoxia commercianti
 
Git lev 3 -おひとりさまでブランチを-
Git lev 3 -おひとりさまでブランチを-Git lev 3 -おひとりさまでブランチを-
Git lev 3 -おひとりさまでブランチを-
 
Git lev 1-おひとりさま用-
Git lev 1-おひとりさま用-Git lev 1-おひとりさま用-
Git lev 1-おひとりさま用-
 
Git lev 4 -みんなでGit-
Git lev 4 -みんなでGit-Git lev 4 -みんなでGit-
Git lev 4 -みんなでGit-
 
Gitの勉強 紹介編-
Gitの勉強 紹介編-Gitの勉強 紹介編-
Gitの勉強 紹介編-
 
PER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZ
PER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZPER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZ
PER NON DIMENTICARE...70° ANNIVERSARIO DELLA LIBERAZIONE DI AUSCHWITZ
 

Ähnlich wie Protecting your pc in the new year

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Computer based crime
Computer based crimeComputer based crime
Computer based crimeTaylor_Marie
 
Computer based crime
Computer based crimeComputer based crime
Computer based crimeTaylor_Marie
 
Computer Based Crime
Computer Based CrimeComputer Based Crime
Computer Based CrimeTaylor_Marie
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 

Ähnlich wie Protecting your pc in the new year (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer Based Crime
Computer Based CrimeComputer Based Crime
Computer Based Crime
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Mischievous Malware
Mischievous MalwareMischievous Malware
Mischievous Malware
 
Spyware
SpywareSpyware
Spyware
 
How to-remove- virus
How to-remove- virusHow to-remove- virus
How to-remove- virus
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Internet security
Internet securityInternet security
Internet security
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 

Kürzlich hochgeladen

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Protecting your pc in the new year

  • 2.  Viruses  Viruses replicate, spread, damage  Spyware  Toolbars  Popups  Ads  Potentially Unwanted Programs (pups)  Scams
  • 3.  Boot Sector Viruses  Code executes before computer boots  Program Viruses  A program that runs in the background  Root Kits tries to hide and use methods to avoid detection  Trojans  Steals info or allows remote access to your computer
  • 4.  Ransomware  Encrypts important files asks for payment
  • 5. “A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer” – Wikipedia  “Manual removal of a rootkit is often too difficult for a typical computer user” – Wikipedia
  • 6.
  • 7.  “Hello I am from Microsoft, and we have detected that your PC is causing errors on our network. Can we call in remotely to your computer and show you what is wrong?”
  • 8. Avoid scams that use the Microsoft name fraudulently Cybercriminals often use the names of well-known companies, like ours, in their scams. They think it will convince you to give them money or your personal information. While they usually use email to trick you, they sometimes use the telephone, instead. Common scams that use the Microsoft name •Someone from "Microsoft Tech Support" calls to fix your computer •"You have won the Microsoft Lottery" •Microsoft "requires credit card information to validate your copy of Windows" •"Microsoft" sends unsolicited email messages with attached security updates Avoid these dangerous hoaxes We do not send unsolicited email messages or make unsolicited phone calls to request personal or financial information or fix your computer. If you receive an unsolicited email message or phone call that purports to be from Microsoft and requests that you send personal information or click links, delete the message or hang up the phone. Microsoft does not make unsolicited phone calls to help you fix your computer!
  • 9. You have not won the "Microsoft Lottery"  Microsoft customers are often targets of a scam that uses email messages to falsely promise money. Victims receive messages claiming "You have won the Microsoft Lottery!" There is no Microsoft Lottery. Delete the message.  If you have lost money to this scam, report it. You can also send the police report to Microsoft and we will use it to help law enforcement catch the criminals who send out these e-mail messages.  To help protect yourself from these e-mail hoaxes, you can use the same general guidance that you use to protect yourself from phishing scams. Microsoft does not request credit card information to validate your copy of Windows  We require that your copy of Windows is legitimate before you can obtain programs from the Microsoft Download Center or receive software updates from Microsoft Update. Our online process that performs this validation is called the Genuine Advantage Program. At no time during the validation process do we request your credit card information.  In fact, we do not collect information that can be used to identify you such as your name, email address, or other personal details.  To learn more, read the Genuine Microsoft software program privacy statement.  To learn more about the program in general, see Genuine Windows: frequently asked questions. Microsoft does not send unsolicited communication about security updates  When we release information about a security software update or a security incident, we send email messages only to subscribers of our security communications program.  Unfortunately, cybercriminals have exploited this program by sending fake security communications that appear to be from Microsoft. Some messages lure recipients to websites to download spyware or other malicious software. Others include a file attachment that contains a virus. Delete the message. Do not open the attachment.
  • 10. Do NOT open any email you are not expecting !
  • 11.  Forwarded jokes, pictures, videos  May contain viruses and spyware  Links to viruses  Do not follow any links from emails from people you know unless they explain exactly what it is.  Attachments with Viruses  Do not open any unknown attachment  “Phishing” emails  Fake emails from Banks, UPS, FedEx
  • 12.
  • 14.  Know your home page.  Google  MSN  Yahoo  Aol  Learn how to check for add-ons and plug-ins  Know your browser  Know your search engine  Scan often with UPDATED antispyware
  • 15.  Internet Explorer  Google Chrome  Mozilla Firefox
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Set or Check Home Page Set or Check Search Engines Set or Check Extensions
  • 22.
  • 23.
  • 24. ADD-ONS and Search Providers
  • 25. Click on gear in upper right of browser, then choose “Internet Options”
  • 26. Also, press ALT key to display menu
  • 27.
  • 28. Make menu visible by pressing ALT
  • 29. Google? Yahoo? Bing? Aol? Ask?
  • 30.  Google  Bing  Yahoo  Aol UNSAFE  Ask  Search conduit  Anything else
  • 31.  I call it the “did I ask?” toolbar  Adds nothing to the search experience  Does not provide the “engine”  May allow adware in.  Comes bundled with Java update (uncheck!)  Uses many of the same sneaky techniques to get installed.  REMEMBER: GOOGLE BING YAHOO AOL are the only search engines that should be listed.  Uninstall from programs and features if listed
  • 32.  Free downloads contain harmful bundled software  Ads are made to confuse you  You first need to make sure you are on the right download link.  If you just check yes on every checkbox, you can destroy your computer.
  • 33. ? ? ? ? ? The word “download” appears 13 times on this page with ads made to look like the real link ? ? ?
  • 34.
  • 35.
  • 36.  Advanced System Protector  Babylon Toolbar  delta toolbar  funmoods toolbar  ILIVID  Imminent  Inbox  Inbox Ace – Mindspark  MixiDJ  MoboGenie  My PC Backup  Optimize your PC  Optimizer Pro  PC Utilties Pro  Quiklinx  RegClean Pro  search protect *  Severe Weather Alerts  Speedy PC  Sweetpacks  Tidynetwork  Viewpassword  Wajam
  • 37.  1.1 Astromenda Search  1.2 Onewebsearch  1.3 TV Wizard  1.4 Conduit Search  1.5 CoolWebSearch  1.6 Coupon Server  1.7 Delta Search and Claro Search  1.8 Search-daily.com  1.9 MyStartSearch  1.10 MyStart.IncrediBar Search  1.11 Nation Zoom  1.12 Babylon Toolbar 1.13 Qone8.com 1.14 qvo6.com 1.15 istartsurf.com 1.16 Mixi.DJ 1.17 Snap.do 1.18 RocketTab 1.19 Searchnu.com 1.20 Searchgol.com 1.21 Tuvaro 1.22 Trovi 1.23 Vosteran 1.24 Groovorio 1.25 GoSave
  • 38.
  • 39.  Install 2 antispyware programs  Superantispyware  Malwarebytes Antimalware  Run each one on alternating weeks  Always update first  SuperAntispyware  Download from Superantispyware.com  Decline the free trial  Malwarebytes  Download from download.com  Uncheck free trial
  • 40.  Know your home page.  Google  MSN  Yahoo  Aol  Learn how to check for add-ons and plug-ins  Know your browser  Know your search engine  Scan often with UPDATED antispyware
  • 41.  “Mountain View, California: The majority of Android smartphone and tablet users do not need to install anti-virus and other security apps to protect them, despite dire warnings from security companies selling such products, Google’s head of Android security says.” - Google 2015
  • 42.  Yes, but not as many
  • 43.  “Malware has grown to be such a tremendous problem that over 32 percent of the world’s computers are infected with some type of malware. With East Asian countries like China, South Korea, and Taiwan having the most infected computers.  Northwestern European countries such as Norway, Switzerland, and Sweden all have the lowest amount of computers infected with malware.  The United States has the eleventh highest rate of infection with just over 30 percent of households being infected with malware.
  • 44. On site visits and repairs. New computers ordered and installed. Remote computer help.

Hinweis der Redaktion

  1. The best kind of protection is knowledge. As a Computer store owner for 20 years, I heard so many times, “but I have Norton!”. I will start by describing the many types of computer threats, and then I will show you how to “know” certain things like answers to these questions: What browser do you use? What is your home page? What search engines do you use?
  2. This is why you should always have important files in 2 places. In many cases, you have no choice but to pay if your files are really important to you.
  3.  Microsoft Support does not cold-call people and tell them their computer has been hacked and give them instructions on how to fix it. If you require support, you have to call Microsoft support directly. They won’t call you unless you first call them with a problem.
  4. This page from http://www.microsoft.com/security/online-privacy/msname.aspx
  5. http://www.microsoft.com/security/online-privacy/msname.aspx
  6. Which browser is better? I personally think that there is no “best” browser to use all the time. Some pages will simply not work in a certain browser. Updates are made that cause pages and websites to stop working. One thing you can do in that case is copy the link and try it in another browser. Match the Logo to the Browser.
  7. Here it shows how to open multiple tabs as a home page
  8. Press alt to show the menu in firefox
  9. Add-ons and options
  10. REPEAT AFTER ME! GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL GOOGLE BING YAHOO AOL
  11. Free software? Yes, the internet today is an amazing place, and you can get workable versions of any type of software for free if you know what you are looking for. You can get an entire office suite compatible with Microsoft office files for free. You can get video editors, photoshop type programs, dvd players, and games for free. But that does not mean that it is easy.
  12. Even on the most reputable free download site, advertisements are made to mimic the real download link. There are many times I was fooled by this. You really have to study the page and know where to click. They are out to get you even before you get to the program you are trying to download!
  13. 24x7 help? That nice friendly looking guy on the upper right of EVERY window? Well I would venture to say it is a scam. If you do call them, they are likely to find things that are not really wrong with your computer and charge you for it. Junkware is a group of programs that did not succeed in the marketplace, and so they went to the “dark side” . Many of them did not set out to be malicious and some of them like “My PC Backup”, actually work. But the actual crime is that companies like Conduit LTD, use trickery and deceit, and yes, illegal hacking to install way way too many of these at once!
  14. Bleeping Computer: “The SweetPacks Toolbar and SweetIM Toolbar are adware programs that are commonly bundled with and installed by other free programs that you find on the Internet. Once installed, SweetPacks will install the SweetPacks or SweetIM Toolbar in your browser and change your home page and search defaults to use sweetim.com. Though SweetPacks is not a computer infection, a common complaint is that it is difficult to remove SweetPacks from your computer. Using this guide you will be able to easily and quickly remove all traces of the SweetPacks and SweetIM Toolbar from your computer and browser.”
  15. One installation of sweetpacks can install ALL of these unwanted, un-asked for, unnecessary, bloatware products! I disagree with those who say that all of these programs come as a result of not opting out of bundled software. I am sure that sweetpacks and similar programs use illegal means to get onto your pc. From Wikipedia: “Conduit Search[edit] Conduit toolbars have been identified as Potentially Unwanted Programs by Malwarebytes[4] and are typically bundled with other free downloads.[5][6] These toolbars modify the browser's default search engine, homepage, new tab page, and several other browser settings.[7] A program called "Conduit Search Protect", better known as "Search Protect by conduit", can cause severe system errors upon uninstallation. It claims to protect browser settings but actually blocks all attempts to manipulate a browser through the settings page; in other words, it makes sure the malicious settings remain unchanged. The uninstall program for Search Protect can cause Windows to be unbootable because the uninstall file not only removes its own files, but also all the boot files in the root of the C: drive.[citation needed] Conduit is associated with malware,spyware, and adware, as victims of this hijacker have reported unwanted pop-up and in-text advertisements.[8] Victims of unwanted redirections to conduit.com have also reported that they have been attacked by phishing attempts and have received unwanted email spam, junk mail, other messages, and telephone calls from telemarketers. Some victims claim that the people claimed to be Apple, Microsoft, or their ISP, that personal information was used in some phone calls, and that some of the calls concerned their browsing habits and recent browsing history. Personal information used in phishing attempts may be associated with spyware. This hijacker virus is currently added to the official PowerISO download, and the Vuze version 5.4.0.0 update, for example.[9] “
  16. With the knowledge given in this presentation, and the two antispyware programs on this page, it is all you need to keep your computer protected. Of course, there are new viruses everyday.
  17. The most common types of malware are viruses, Trojan Horses, and unwanted software. The most common computer virus of all time is the Conficker worm. This worm targets Windows operating system flaws and spreads across networks forming a botnet of auto-acting malware. Conficker, also known as “Downup”, was first detected in late 2008 and spread to over 200 different countries making it the biggest, most widespread computer worm ever.