SlideShare ist ein Scribd-Unternehmen logo
1 von 53
A Guide for Teens & ParentsA Guide for Teens & Parents
 DO have your security settings set toDO have your security settings set to
“Friends Only” or “Friends of Friends”. You“Friends Only” or “Friends of Friends”. You
don’t want all of your personal informationdon’t want all of your personal information
out for the entire world to see. Change yourout for the entire world to see. Change your
“Instant Personalization Pilot Program”“Instant Personalization Pilot Program”
setting to be unchecked and the “What yoursetting to be unchecked and the “What your
friends can share about you” setting to be allfriends can share about you” setting to be all
unchecked. Change your “Facebook Places”unchecked. Change your “Facebook Places”
settings to be private.settings to be private.
 DO NOT post your address or phoneDO NOT post your address or phone
number on your Profile. If someonenumber on your Profile. If someone
doesn’t have your info, there’s probablydoesn’t have your info, there’s probably
a reason for it.a reason for it.
 DO NOT post personal information onDO NOT post personal information on
someone’s Wall. If you have somethingsomeone’s Wall. If you have something
important to tell them, do it viaimportant to tell them, do it via
Message or tell them in person.Message or tell them in person.
 DO validate friend requests.DO validate friend requests.
Make sure it’s from someoneMake sure it’s from someone
you actually know in person.you actually know in person.
Just because someone’s profileJust because someone’s profile
says they live in your town andsays they live in your town and
go to your school doesn’t meango to your school doesn’t mean
that they actually do.that they actually do.
 DO be careful when installingDO be careful when installing
Applications. If an App asks you toApplications. If an App asks you to
input your email & password, it’sinput your email & password, it’s
an attempt to steal your login info,an attempt to steal your login info,
also known as phishing. If it wantsalso known as phishing. If it wants
you to complete a survey or offer inyou to complete a survey or offer in
order to access the App, the creatorsorder to access the App, the creators
of the App are trying to spam you.of the App are trying to spam you.
 Also, if you click on a link, and aAlso, if you click on a link, and a
page comes up that looks just likepage comes up that looks just like
the Facebook login page, check thethe Facebook login page, check the
address bar. If it’s notaddress bar. If it’s not
http://www.facebook.com/http://www.facebook.com/ oror
http://www.facebook.com/login.phphttp://www.facebook.com/login.php
then it is NOT a legit login page!then it is NOT a legit login page!
 DO NOT have your full name listed on yourDO NOT have your full name listed on your
profile.profile.
 DO have your profile set to ‘Viewable by MyDO have your profile set to ‘Viewable by My
Friends Only’. Also DO edit your settings toFriends Only’. Also DO edit your settings to
have people have to input your last name orhave people have to input your last name or
email address to send you a friend request toemail address to send you a friend request to
prevent unwanted solicitation.prevent unwanted solicitation.
 DO have the “Block all apps and third-partyDO have the “Block all apps and third-party
services I haven’t connected to from accessingservices I haven’t connected to from accessing
my profile information through the MySpacemy profile information through the MySpace
Developer Platform” and “Block all apps andDeveloper Platform” and “Block all apps and
third-party services I haven’t connected to fromthird-party services I haven’t connected to from
communicating with me through the MySpacecommunicating with me through the MySpace
Developer Platform” boxes checked underDeveloper Platform” boxes checked under
‘Application Settings’.‘Application Settings’.
 DO NOT use custom profilesDO NOT use custom profiles
randomly found on the Internetrandomly found on the Internet
unless you or someone you knowunless you or someone you know
are able to go through the HTMLare able to go through the HTML
script bit by bit to verify that it’sscript bit by bit to verify that it’s
clean.clean.
 DO validate friend requests. Make sureDO validate friend requests. Make sure
the request is from someone you know.the request is from someone you know.
 DO NOT click on links in messages orDO NOT click on links in messages or
comments that say that someone has yourcomments that say that someone has your
information or there is a video of you, eveninformation or there is a video of you, even
from someone you know. It is very possiblefrom someone you know. It is very possible
that their login info has been stolen and thatthat their login info has been stolen and that
someone is trying to steal yours as well.someone is trying to steal yours as well.
 DO be careful when installingDO be careful when installing
applications. If you click on a link or toapplications. If you click on a link or to
install an App and a page pops up thatinstall an App and a page pops up that
looks JUST like the MySpace homepage,looks JUST like the MySpace homepage,
check the address bar. If it’s notcheck the address bar. If it’s not
http://www.myspace.com/http://www.myspace.com/ oror
http://login.myspace.comhttp://login.myspace.com, then it’s an, then it’s an
attempt to steal your login information.attempt to steal your login information.
 DO NOT give out your emailDO NOT give out your email
or Facebook/Myspace/Twitteror Facebook/Myspace/Twitter
password to ANYONE, not yourpassword to ANYONE, not your
significant other, not your bestsignificant other, not your best
friend, NO ONE except yourfriend, NO ONE except your
parents.parents.
 Beware of shortened links, especially onesBeware of shortened links, especially ones
posted on Facebook, MySpace, and Twitter.posted on Facebook, MySpace, and Twitter.
There are malicious websites out there whoseThere are malicious websites out there whose
web addresses are disguised with shortenedweb addresses are disguised with shortened
urls that will try to give you a virus as soon asurls that will try to give you a virus as soon as
you visit the website. Links such asyou visit the website. Links such as
http://tinyurl.com/24a3ku3http://tinyurl.com/24a3ku3 oror
http://bit.ly/c5Ao7ohttp://bit.ly/c5Ao7o could go to an infectedcould go to an infected
site.site.
 DO make sure you haveDO make sure you have
anti-virus software installedanti-virus software installed
and that it is up-to-date.and that it is up-to-date.
 If you’re surfing the Internet and get aIf you’re surfing the Internet and get a
popup that says that your computer ispopup that says that your computer is
infected with X number of viruses andinfected with X number of viruses and
that you need to download a certainthat you need to download a certain
program to get rid of them, DO NOTprogram to get rid of them, DO NOT
click OK. It is a fake anti-virus programclick OK. It is a fake anti-virus program
that will give you a very nasty virus thatthat will give you a very nasty virus that
is extremely difficult and expensive tois extremely difficult and expensive to
get rid of.get rid of.
DO NOTDO NOT
CLICK OK!CLICK OK!
 If you receive an email fromIf you receive an email from
someone, even someone yousomeone, even someone you
know and trust, but there isknow and trust, but there is
nothing but a link in the bodynothing but a link in the body
of the e-mail, DO NOT click onof the e-mail, DO NOT click on
it unless you are expectingit unless you are expecting
something from them, in whichsomething from them, in which
case verify that it was sent .case verify that it was sent .
 DO be wary of e-mailDO be wary of e-mail
attachments. Download and scanattachments. Download and scan
all attachments before opening.all attachments before opening.
Most email clients come with aMost email clients come with a
built-in e-mail scanner, but nonebuilt-in e-mail scanner, but none
are perfect. New viruses pop upare perfect. New viruses pop up
every single day.every single day.
 DO be wary of emails that claim toDO be wary of emails that claim to
be from Facebook, MySpace, or anybe from Facebook, MySpace, or any
“official”-looking source such as the“official”-looking source such as the
FBI, UPS, Fed-Ex, etc. Hackers andFBI, UPS, Fed-Ex, etc. Hackers and
spammers try to lure unsuspectingspammers try to lure unsuspecting
victims into giving out theirvictims into giving out their
information by duplicating the lookinformation by duplicating the look
of legitimate messaging systems.of legitimate messaging systems.
 When downloading anything from theWhen downloading anything from the
internet, DO scan any executable files orinternet, DO scan any executable files or
archives before opening. There are manyarchives before opening. There are many
free multi-software antivirus scanningfree multi-software antivirus scanning
sites you can use to scan files. If the filesites you can use to scan files. If the file
or archive in question is too large to beor archive in question is too large to be
scanned from the sites, use your installedscanned from the sites, use your installed
anti-virus software(s) to scan the file.anti-virus software(s) to scan the file.
 When on ANY MMORPG orWhen on ANY MMORPG or
online game, DO NOT give outonline game, DO NOT give out
any personal information. Youany personal information. You
don’t know who you are reallydon’t know who you are really
talking to. You may thinktalking to. You may think
you’re talking to 16-year-oldyou’re talking to 16-year-old
‘Sienna du Larc’ but you’re‘Sienna du Larc’ but you’re
really talking to some 40-year-really talking to some 40-year-
old guy named Fred.old guy named Fred.
 DO remember that everythingDO remember that everything
you post on the Internet isyou post on the Internet is
there FOREVER. Unlessthere FOREVER. Unless
you're prepared to attachyou're prepared to attach
something in your Facebooksomething in your Facebook
or MySpace profile to aor MySpace profile to a
resume or scholarshipresume or scholarship
application, DO NOT post it.application, DO NOT post it.
 Run C-Cleaner or Disk Cleanup.Run C-Cleaner or Disk Cleanup.
 Run Disk Defragmenter.Run Disk Defragmenter.
 ***MAY require a restart after completing******MAY require a restart after completing***
 Run Checkdisk. (This will check yourRun Checkdisk. (This will check your
harddrive for errors and repair any itharddrive for errors and repair any it
finds.)finds.)
 ***WILL REQUIRE A RESTART TO RUN******WILL REQUIRE A RESTART TO RUN***
 Runs extremelyRuns extremely
slowly, but doing aslowly, but doing a
basic cleanup doesn’tbasic cleanup doesn’t
help.help.
 Multiple Pop-ups,Multiple Pop-ups,
even when not in aneven when not in an
Internet browser.Internet browser.
 Your computer restartsYour computer restarts
on its own and thenon its own and then
fails to run normally.fails to run normally.
 Programs on yourPrograms on your
computer don't workcomputer don't work
correctly.correctly.
 Your Web browser'sYour Web browser's
home pagehome page
unexpectedly changes.unexpectedly changes.
 Web pages areWeb pages are
unexpectedly added tounexpectedly added to
your Favorites folder.your Favorites folder.
 New toolbars areNew toolbars are
unexpectedly added tounexpectedly added to
your Web browser.your Web browser.
 Strange music or soundsStrange music or sounds
unexpectedly play fromunexpectedly play from
your computer’s speakers.your computer’s speakers.
 Disks or disk drives areDisks or disk drives are
inaccessible.inaccessible.
 You can't print correctly.You can't print correctly.
 You see unusual errorYou see unusual error
messages.messages.
 You see distorted menusYou see distorted menus
and dialog boxes.and dialog boxes.
 Anti-virus softwareAnti-virus software
has been disabled.has been disabled.
 Antivirus softwareAntivirus software
that you did notthat you did not
install needs you toinstall needs you to
pay for “full access”.pay for “full access”.
 Your computerYour computer
stops responding orstops responding or
freezes often.freezes often.
 Your computerYour computer
crashes and restartscrashes and restarts
every few minutes.every few minutes.
 Restart yourRestart your
computer incomputer in SafeSafe
ModeMode. (This can be. (This can be
done by restartingdone by restarting
and pressing F8and pressing F8
BEFORE theBEFORE the
Windows Load screenWindows Load screen
comes up.)comes up.)
 Run your anti-virus software.Run your anti-virus software.
Do a full scan. If infected filesDo a full scan. If infected files
have been found once it’shave been found once it’s
finished, follow the instructionsfinished, follow the instructions
to get rid of the infected files,to get rid of the infected files,
and then run your anti-virusand then run your anti-virus
software again. If it doesn’t findsoftware again. If it doesn’t find
any infected files or you haveany infected files or you have
completed the second scan, trycompleted the second scan, try
running a backup anti-malwarerunning a backup anti-malware
program (such as Malwarebytes).program (such as Malwarebytes).
Staying safe on_the_internet_presentation (2)

Weitere ähnliche Inhalte

Was ist angesagt?

Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Facts about Facebook
Facts about FacebookFacts about Facebook
Facts about Facebooksportela1
 
Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)Michael Johansen
 
Tannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossTannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossmarketingsocialmedia09
 
Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebDonald McArthur
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
GenericVirusTraining
GenericVirusTrainingGenericVirusTraining
GenericVirusTrainingsbsadminklb
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Modified presentation
Modified presentationModified presentation
Modified presentationani5212
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Tweet Your Way To A New Job
Tweet Your Way To A New JobTweet Your Way To A New Job
Tweet Your Way To A New JobJacob Alonzo
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet SafetyBobbi Newman
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 

Was ist angesagt? (18)

Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Facts about Facebook
Facts about FacebookFacts about Facebook
Facts about Facebook
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)
 
Tannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossTannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home loss
 
Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The Web
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
GenericVirusTraining
GenericVirusTrainingGenericVirusTraining
GenericVirusTraining
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Modified presentation
Modified presentationModified presentation
Modified presentation
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Tweet Your Way To A New Job
Tweet Your Way To A New JobTweet Your Way To A New Job
Tweet Your Way To A New Job
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet Safety
 
101 Facebook Tips Poster
101 Facebook Tips Poster101 Facebook Tips Poster
101 Facebook Tips Poster
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 

Andere mochten auch

Andere mochten auch (7)

Linkedin
LinkedinLinkedin
Linkedin
 
Tax district flyer
Tax district flyerTax district flyer
Tax district flyer
 
Introduction to searching online
Introduction to searching onlineIntroduction to searching online
Introduction to searching online
 
Mm managedigphotos
Mm managedigphotosMm managedigphotos
Mm managedigphotos
 
Basics of photography (2)
Basics of photography (2)Basics of photography (2)
Basics of photography (2)
 
Aroanokepubliclibraryboothattheroan
AroanokepubliclibraryboothattheroanAroanokepubliclibraryboothattheroan
Aroanokepubliclibraryboothattheroan
 
Basics of Photography
Basics of PhotographyBasics of Photography
Basics of Photography
 

Ähnlich wie Staying safe on_the_internet_presentation (2)

10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerJillian Stone
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerJillian Stone
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook unsightlyoaf4043
 
Intro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started SafelyIntro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started Safelyhewie
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new yearMichael Wells
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security snobbishmishap958
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? The TNS Group
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyTsenn13
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websitesmaha5960
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 

Ähnlich wie Staying safe on_the_internet_presentation (2) (20)

Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your Computer
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your Computer
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Intro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started SafelyIntro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started Safely
 
security procedures
security procedures
security procedures
security procedures
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
Online Safety
Online Safety Online Safety
Online Safety
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Test
TestTest
Test
 

Mehr von Celia Bandelier (18)

Microsoft word
Microsoft wordMicrosoft word
Microsoft word
 
Pinterest
PinterestPinterest
Pinterest
 
Itunes
ItunesItunes
Itunes
 
Using publisher to design and print business cards
Using publisher to design and print business cardsUsing publisher to design and print business cards
Using publisher to design and print business cards
 
Jobsearch
JobsearchJobsearch
Jobsearch
 
Estate planning
Estate planningEstate planning
Estate planning
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Introduction to internet with windows 7 changes
Introduction to internet with windows 7 changesIntroduction to internet with windows 7 changes
Introduction to internet with windows 7 changes
 
Introduction microsoft excel 2007
Introduction microsoft excel 2007Introduction microsoft excel 2007
Introduction microsoft excel 2007
 
Facebook
FacebookFacebook
Facebook
 
Google
GoogleGoogle
Google
 
Computer basics02
Computer basics02Computer basics02
Computer basics02
 
E mail basics (bob's)
E mail basics (bob's)E mail basics (bob's)
E mail basics (bob's)
 
Digital photography
Digital photographyDigital photography
Digital photography
 
Craigslist
CraigslistCraigslist
Craigslist
 
Blogging1
Blogging1Blogging1
Blogging1
 
Basics of photography
Basics of photographyBasics of photography
Basics of photography
 
Ebay
EbayEbay
Ebay
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Staying safe on_the_internet_presentation (2)

  • 1. A Guide for Teens & ParentsA Guide for Teens & Parents
  • 2.
  • 3.  DO have your security settings set toDO have your security settings set to “Friends Only” or “Friends of Friends”. You“Friends Only” or “Friends of Friends”. You don’t want all of your personal informationdon’t want all of your personal information out for the entire world to see. Change yourout for the entire world to see. Change your “Instant Personalization Pilot Program”“Instant Personalization Pilot Program” setting to be unchecked and the “What yoursetting to be unchecked and the “What your friends can share about you” setting to be allfriends can share about you” setting to be all unchecked. Change your “Facebook Places”unchecked. Change your “Facebook Places” settings to be private.settings to be private.
  • 4.  DO NOT post your address or phoneDO NOT post your address or phone number on your Profile. If someonenumber on your Profile. If someone doesn’t have your info, there’s probablydoesn’t have your info, there’s probably a reason for it.a reason for it.  DO NOT post personal information onDO NOT post personal information on someone’s Wall. If you have somethingsomeone’s Wall. If you have something important to tell them, do it viaimportant to tell them, do it via Message or tell them in person.Message or tell them in person.
  • 5.  DO validate friend requests.DO validate friend requests. Make sure it’s from someoneMake sure it’s from someone you actually know in person.you actually know in person. Just because someone’s profileJust because someone’s profile says they live in your town andsays they live in your town and go to your school doesn’t meango to your school doesn’t mean that they actually do.that they actually do.
  • 6.  DO be careful when installingDO be careful when installing Applications. If an App asks you toApplications. If an App asks you to input your email & password, it’sinput your email & password, it’s an attempt to steal your login info,an attempt to steal your login info, also known as phishing. If it wantsalso known as phishing. If it wants you to complete a survey or offer inyou to complete a survey or offer in order to access the App, the creatorsorder to access the App, the creators of the App are trying to spam you.of the App are trying to spam you.
  • 7.
  • 8.  Also, if you click on a link, and aAlso, if you click on a link, and a page comes up that looks just likepage comes up that looks just like the Facebook login page, check thethe Facebook login page, check the address bar. If it’s notaddress bar. If it’s not http://www.facebook.com/http://www.facebook.com/ oror http://www.facebook.com/login.phphttp://www.facebook.com/login.php then it is NOT a legit login page!then it is NOT a legit login page!
  • 9.
  • 10.
  • 11.
  • 12.  DO NOT have your full name listed on yourDO NOT have your full name listed on your profile.profile.  DO have your profile set to ‘Viewable by MyDO have your profile set to ‘Viewable by My Friends Only’. Also DO edit your settings toFriends Only’. Also DO edit your settings to have people have to input your last name orhave people have to input your last name or email address to send you a friend request toemail address to send you a friend request to prevent unwanted solicitation.prevent unwanted solicitation.
  • 13.  DO have the “Block all apps and third-partyDO have the “Block all apps and third-party services I haven’t connected to from accessingservices I haven’t connected to from accessing my profile information through the MySpacemy profile information through the MySpace Developer Platform” and “Block all apps andDeveloper Platform” and “Block all apps and third-party services I haven’t connected to fromthird-party services I haven’t connected to from communicating with me through the MySpacecommunicating with me through the MySpace Developer Platform” boxes checked underDeveloper Platform” boxes checked under ‘Application Settings’.‘Application Settings’.
  • 14.  DO NOT use custom profilesDO NOT use custom profiles randomly found on the Internetrandomly found on the Internet unless you or someone you knowunless you or someone you know are able to go through the HTMLare able to go through the HTML script bit by bit to verify that it’sscript bit by bit to verify that it’s clean.clean.
  • 15.  DO validate friend requests. Make sureDO validate friend requests. Make sure the request is from someone you know.the request is from someone you know.  DO NOT click on links in messages orDO NOT click on links in messages or comments that say that someone has yourcomments that say that someone has your information or there is a video of you, eveninformation or there is a video of you, even from someone you know. It is very possiblefrom someone you know. It is very possible that their login info has been stolen and thatthat their login info has been stolen and that someone is trying to steal yours as well.someone is trying to steal yours as well.
  • 16.
  • 17.  DO be careful when installingDO be careful when installing applications. If you click on a link or toapplications. If you click on a link or to install an App and a page pops up thatinstall an App and a page pops up that looks JUST like the MySpace homepage,looks JUST like the MySpace homepage, check the address bar. If it’s notcheck the address bar. If it’s not http://www.myspace.com/http://www.myspace.com/ oror http://login.myspace.comhttp://login.myspace.com, then it’s an, then it’s an attempt to steal your login information.attempt to steal your login information.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.  DO NOT give out your emailDO NOT give out your email or Facebook/Myspace/Twitteror Facebook/Myspace/Twitter password to ANYONE, not yourpassword to ANYONE, not your significant other, not your bestsignificant other, not your best friend, NO ONE except yourfriend, NO ONE except your parents.parents.
  • 25.  Beware of shortened links, especially onesBeware of shortened links, especially ones posted on Facebook, MySpace, and Twitter.posted on Facebook, MySpace, and Twitter. There are malicious websites out there whoseThere are malicious websites out there whose web addresses are disguised with shortenedweb addresses are disguised with shortened urls that will try to give you a virus as soon asurls that will try to give you a virus as soon as you visit the website. Links such asyou visit the website. Links such as http://tinyurl.com/24a3ku3http://tinyurl.com/24a3ku3 oror http://bit.ly/c5Ao7ohttp://bit.ly/c5Ao7o could go to an infectedcould go to an infected site.site.
  • 26.  DO make sure you haveDO make sure you have anti-virus software installedanti-virus software installed and that it is up-to-date.and that it is up-to-date.
  • 27.  If you’re surfing the Internet and get aIf you’re surfing the Internet and get a popup that says that your computer ispopup that says that your computer is infected with X number of viruses andinfected with X number of viruses and that you need to download a certainthat you need to download a certain program to get rid of them, DO NOTprogram to get rid of them, DO NOT click OK. It is a fake anti-virus programclick OK. It is a fake anti-virus program that will give you a very nasty virus thatthat will give you a very nasty virus that is extremely difficult and expensive tois extremely difficult and expensive to get rid of.get rid of.
  • 28.
  • 29.
  • 30. DO NOTDO NOT CLICK OK!CLICK OK!
  • 31.
  • 32.  If you receive an email fromIf you receive an email from someone, even someone yousomeone, even someone you know and trust, but there isknow and trust, but there is nothing but a link in the bodynothing but a link in the body of the e-mail, DO NOT click onof the e-mail, DO NOT click on it unless you are expectingit unless you are expecting something from them, in whichsomething from them, in which case verify that it was sent .case verify that it was sent .
  • 33.
  • 34.  DO be wary of e-mailDO be wary of e-mail attachments. Download and scanattachments. Download and scan all attachments before opening.all attachments before opening. Most email clients come with aMost email clients come with a built-in e-mail scanner, but nonebuilt-in e-mail scanner, but none are perfect. New viruses pop upare perfect. New viruses pop up every single day.every single day.
  • 35.  DO be wary of emails that claim toDO be wary of emails that claim to be from Facebook, MySpace, or anybe from Facebook, MySpace, or any “official”-looking source such as the“official”-looking source such as the FBI, UPS, Fed-Ex, etc. Hackers andFBI, UPS, Fed-Ex, etc. Hackers and spammers try to lure unsuspectingspammers try to lure unsuspecting victims into giving out theirvictims into giving out their information by duplicating the lookinformation by duplicating the look of legitimate messaging systems.of legitimate messaging systems.
  • 36.
  • 37.
  • 38.  When downloading anything from theWhen downloading anything from the internet, DO scan any executable files orinternet, DO scan any executable files or archives before opening. There are manyarchives before opening. There are many free multi-software antivirus scanningfree multi-software antivirus scanning sites you can use to scan files. If the filesites you can use to scan files. If the file or archive in question is too large to beor archive in question is too large to be scanned from the sites, use your installedscanned from the sites, use your installed anti-virus software(s) to scan the file.anti-virus software(s) to scan the file.
  • 39.  When on ANY MMORPG orWhen on ANY MMORPG or online game, DO NOT give outonline game, DO NOT give out any personal information. Youany personal information. You don’t know who you are reallydon’t know who you are really talking to. You may thinktalking to. You may think you’re talking to 16-year-oldyou’re talking to 16-year-old ‘Sienna du Larc’ but you’re‘Sienna du Larc’ but you’re really talking to some 40-year-really talking to some 40-year- old guy named Fred.old guy named Fred.
  • 40.  DO remember that everythingDO remember that everything you post on the Internet isyou post on the Internet is there FOREVER. Unlessthere FOREVER. Unless you're prepared to attachyou're prepared to attach something in your Facebooksomething in your Facebook or MySpace profile to aor MySpace profile to a resume or scholarshipresume or scholarship application, DO NOT post it.application, DO NOT post it.
  • 41.  Run C-Cleaner or Disk Cleanup.Run C-Cleaner or Disk Cleanup.  Run Disk Defragmenter.Run Disk Defragmenter.  ***MAY require a restart after completing******MAY require a restart after completing***  Run Checkdisk. (This will check yourRun Checkdisk. (This will check your harddrive for errors and repair any itharddrive for errors and repair any it finds.)finds.)  ***WILL REQUIRE A RESTART TO RUN******WILL REQUIRE A RESTART TO RUN***
  • 42.  Runs extremelyRuns extremely slowly, but doing aslowly, but doing a basic cleanup doesn’tbasic cleanup doesn’t help.help.  Multiple Pop-ups,Multiple Pop-ups, even when not in aneven when not in an Internet browser.Internet browser.
  • 43.  Your computer restartsYour computer restarts on its own and thenon its own and then fails to run normally.fails to run normally.  Programs on yourPrograms on your computer don't workcomputer don't work correctly.correctly.
  • 44.  Your Web browser'sYour Web browser's home pagehome page unexpectedly changes.unexpectedly changes.  Web pages areWeb pages are unexpectedly added tounexpectedly added to your Favorites folder.your Favorites folder.
  • 45.  New toolbars areNew toolbars are unexpectedly added tounexpectedly added to your Web browser.your Web browser.  Strange music or soundsStrange music or sounds unexpectedly play fromunexpectedly play from your computer’s speakers.your computer’s speakers.
  • 46.  Disks or disk drives areDisks or disk drives are inaccessible.inaccessible.  You can't print correctly.You can't print correctly.  You see unusual errorYou see unusual error messages.messages.  You see distorted menusYou see distorted menus and dialog boxes.and dialog boxes.
  • 47.  Anti-virus softwareAnti-virus software has been disabled.has been disabled.  Antivirus softwareAntivirus software that you did notthat you did not install needs you toinstall needs you to pay for “full access”.pay for “full access”.
  • 48.  Your computerYour computer stops responding orstops responding or freezes often.freezes often.  Your computerYour computer crashes and restartscrashes and restarts every few minutes.every few minutes.
  • 49.
  • 50.
  • 51.  Restart yourRestart your computer incomputer in SafeSafe ModeMode. (This can be. (This can be done by restartingdone by restarting and pressing F8and pressing F8 BEFORE theBEFORE the Windows Load screenWindows Load screen comes up.)comes up.)
  • 52.  Run your anti-virus software.Run your anti-virus software. Do a full scan. If infected filesDo a full scan. If infected files have been found once it’shave been found once it’s finished, follow the instructionsfinished, follow the instructions to get rid of the infected files,to get rid of the infected files, and then run your anti-virusand then run your anti-virus software again. If it doesn’t findsoftware again. If it doesn’t find any infected files or you haveany infected files or you have completed the second scan, trycompleted the second scan, try running a backup anti-malwarerunning a backup anti-malware program (such as Malwarebytes).program (such as Malwarebytes).

Hinweis der Redaktion

  1. Will be up at start of program when people come in.
  2. Welcome A little about me Have worked for the library about 5 years, have been interested in computers for a long time, was taught everything I know by my husband.
  3. This can be done by going to Account -> Privacy Settings -> Applications and Websites and clicking “Edit Settings” next to both “Instant Personalization” and “Info accessible through your friends”. ***SHOW THEM HOW TO DO IT USING EXAMPLE FB ACCT.***
  4. For gaming Apps, if it’s not an official app from the game developer, do not install it.
  5. This can be done by going to Profile->My Privacy. Also DO edit your settings to have people have to input your last name or email address to send you a friend request to prevent unwanted solicitation. This can be done by going to Profile -> My Privacy, and checking the box.
  6. This can be done by going to Profile->My Privacy or My Account->Privacy and clicking “Go to Application Settings to Change Settings for Apps and Third-Parties.” Make sure both boxes are checked.
  7. Myspace now has a custom profile editor built into the site that you can use to spruce up your profile.
  8. This includes messages such as “OMG this person has your information!” Or “Is that YOU in this video!?”
  9. This includes messages such as “OMG this person has your information!” Or “Is that YOU in this video!?”
  10. The only security setting Twitter has is to make your Tweets protected, but ANYONE ‘following’ you can see your Tweets, so be careful who you allow to follow you. DO NOT click on links in Tweets that say that someone has your information, even if the comment or message is from someone you know. If you do click on the link and a page comes up that looks just like the Twitter login page, check the address bar. If it is not http://twitter.com/login, then DO NOT put your login information in.
  11. There is a list of sites that check shortened urls in handout.
  12. I recommend both MS Security Essentials & Malwarebytes. MS Security Essentials is free as long as you have a valid copy of Windows, and Malwarebytes is a good backup to have.
  13. OR says that your registry has errors, speed up your computer, etc.
  14. Example of software that pops up on computers running Windows XP.
  15. Rogue Anti-virus programs will try to trick you by copying the look of legitimate software and using “scare tactics” to get you to download the software. May also try to copy the look of the Windows Security Center.
  16. This one has tried to copy the look of the “My Computer” window in Windows 7.
  17. Just because it’s from a trusted source, doesn’t mean that a file couldn’t have gotten infected while flying around in cyberspace.
  18. If you use a multi-scanner site, if you don’t feel comfortable with the results of the scan, don’t open the file.
  19. When you’re going for a job or college interview in the future, do you really want your potential boss or college scholarship committee to be able to see something you’re about to post? If the answer is NO, then DO NOT post it!
  20. Can also use Defraggler or JKDefrag to defragment.
  21. I.E. MS Office is disabled, Internet Explorer or Firefox doesn’t work, etc.
  22. Big clue that comp is infected is that the Anti-Virus software is disabled.
  23. Crash usually followed by the BLUE SCREEN OF DEATH.
  24. Example of the Blue Screen of Death. Will have an error code, known as a STOP ERROR.
  25. Not as funny when it happens to you though. 
  26. Depending on your computer’s speed, you can run both Malwarebytes and MS Security Essentials at the same time.