Windows Tutorial 5 Protecting Your Computer

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

1 After completing this lesson, you will be able to: Specify options. Customize the appearance of messages. Add a signature to an .
Microsoft Office 2007 Excel Web Feature Creating Web Pages Using Excel.
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
Microsoft Windows Vista Chapter 5 Personalize Your Work Environment.
COMPREHENSIVE Windows Tutorial 3 Personalizing Your Windows Environment.
Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Microsoft Office 2007 PowerPoint Web Feature Creating Web Pages Using PowerPoint.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Microsoft Windows Vista Chapter 6 Customizing Your Computer Using the Control Panel.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
®® Microsoft Windows 7 Windows Tutorial 10 Improving Your Computer’s Performance.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
Windows Tutorial 9 Maintaining Hardware and Software
®® Microsoft Windows 7 Windows Tutorial 1 Exploring the Basics of Microsoft Windows 7.
Tutorial 8 Managing and Securing a Database. Objectives Filter data in a table and a form Save a filter as a query and apply the saved query as a filter.
®® Microsoft Windows 7 Windows Tutorial 6 Searching for Information and Collaborating with Others.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Security for Seniors SeniorNet Help Desk
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Using Windows Firewall and Windows Defender
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
Windows Tutorial 4 Working with the Internet and
Microsoft Windows Vista Chapter 1 Fundamentals of Using Microsoft Windows Vista.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Microsoft Access 2010 Chapter 10 Administering a Database System.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 7 – Creating and Using Templates in a Web.
COMPREHENSIVE Windows Tutorial 1 Exploring the Basics of Microsoft Windows Vista.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Internet safety By Suman Nazir
AL A. LAURIO Teacher Microsoft Windows Vista. DESKTOP is the main screen area that you see after you turn on your computer and log on to Windows. it serves.
XP New Perspectives on Microsoft Office Access 2003, Second Edition- Tutorial 8 1 Microsoft Office Access 2003 Tutorial 8 – Integrating Access with the.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
COMPREHENSIVE Windows Tutorial 6 Searching for Information and Collaborating with Others.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
FIRST COURSE Exploring the Basics of Microsoft Windows Vista.
Windows Tutorial 3 Personalizing Your Windows Environment
Excel Tutorial 8 Developing an Excel Application
Tutorial 1 Creating a Database
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Computer Literacy BASICS
Access Tutorial 1 Creating a Database
Tutorial 8 Managing and Securing a Database
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Access Tutorial 1 Creating a Database
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
Microsoft Office Access 2003
Microsoft Office Access 2003
Windows Tutorial 9 Maintaining Hardware and Software
Access Tutorial 1 Creating a Database
Access Tutorial 1 Creating a Database
Windows Vista Inside Out
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Windows Tutorial 5 Protecting Your Computer

Objectives Set up Windows Firewall and Windows Update Protect your computer from viruses and other malicious software Use Windows Defender to protect against spyware Manage Windows Mail security New Perspectives on Microsoft Windows Vista

Objectives Manage Microsoft Internet Explorer security Set up user accounts Control access to your computer Secure and share folders New Perspectives on Microsoft Windows Vista

Using the Windows Vista Security Center Improved features in Windows Vista keep your computer safe from threats such as viruses, worms, hackers, crackers, and spyware Security Center Windows Defender User Account Control Back Up and Restore New Perspectives on Microsoft Windows Vista

Using the Windows Vista Security Center New Perspectives on Microsoft Windows Vista

Adding a Program to the Windows Firewall Exception List Click the Start button, click Control Panel, click Security, and then click Windows Firewall In the left pane, click Allow a program through Windows Firewall, then click the Continue button, if necessary In the Program or port list, click to select a program check box. If a program does not appear in this list, click the Add program button, click a program in the Add a Program dialog box, or click the Browse button to locate and select a program Click the OK button New Perspectives on Microsoft Windows Vista

Setting Up Windows Update An update is a change to software that can prevent or repair problems, enhance the security of the computer, or improve the computer’s performance In the left pane of the Windows Security Center window, click Windows Update New Perspectives on Microsoft Windows Vista

Setting Up Windows Update New Perspectives on Microsoft Windows Vista

Protecting Your Computer from Malware In the Windows Security Center window, examine the settings in the Malware protection section New Perspectives on Microsoft Windows Vista

Defending Against Spyware Spyware is software that can install itself or run on your computer without your consent or control Adware Pop-up ads To perform a scan with Windows Defender: Click the Start button, click Control Panel, click Security, and then click Windows Defender Click the Scan button arrow on the toolbar, and then click Quick Scan New Perspectives on Microsoft Windows Vista

Defending Against Spyware New Perspectives on Microsoft Windows Vista

Scheduling a Spyware Scan In the Windows Defender window, click the Tools button on the toolbar to open the Tools and Settings page, and then click Options New Perspectives on Microsoft Windows Vista

Defending Against E-mail Viruses with Windows Mail An annoying and potentially dangerous type of privacy invasion is spam, or junk e-mail Start Windows Mail Click Tools on the menu bar, and then click Options Click the Security tab New Perspectives on Microsoft Windows Vista

Defending Against E-mail Viruses with Windows Mail New Perspectives on Microsoft Windows Vista

Adding a Sender to the Blocked Senders or Safe Senders List To block a sender in Windows Mail, right-click a message whose sender you want to add to the Blocked Senders list, point to Junk E-mail, and then click Add Sender to Blocked Senders List on the shortcut menu To always allow a sender, right-click a message whose sender you want to add to the Safe Senders list, point to Junk E-mail, and then click Add Sender to Safe Senders List on the shortcut menu Click the OK button New Perspectives on Microsoft Windows Vista

Managing Microsoft Internet Explorer Security Internet Explorer offers the following security and privacy features: Phishing filter Protected mode Digital signatures Pop-up Blocker Add-on Manager Privacy settings and alerts Secure connections New Perspectives on Microsoft Windows Vista

Managing Microsoft Internet Explorer Security Click the Tools button on the toolbar, point to Phishing Filter, and then click Check This Website New Perspectives on Microsoft Windows Vista

Blocking Pop-up Ads Click Tools on the Internet Explorer toolbar, point to Pop-up Blocker, and then click Pop-up Blocker Settings Click the current Filter level setting, and then click a setting ranging from High to Low Click the Close button New Perspectives on Microsoft Windows Vista

Managing Add-on Programs A browser add-on is a program offered by any software vendor that provides enhancements such as a toolbar or improved search feature New Perspectives on Microsoft Windows Vista

Selecting Privacy Settings Click Tools on the Internet Explorer toolbar, and then click Internet Options Click the Privacy tab in the Internet Options dialog box Drag the slider to select a privacy setting ranging from Block All Cookies to Accept All Cookies Click the OK button New Perspectives on Microsoft Windows Vista

Selecting Privacy Settings New Perspectives on Microsoft Windows Vista

Internet Explorer Advanced Settings You can manage advanced Internet Explorer settings to enhance the security of your computer Enable third-party browser extensions Do not save encrypted pages to disk Empty Temporary Internet Files folder when browser is closed Warn if changing between secure and not secure mode New Perspectives on Microsoft Windows Vista

Setting Up User Accounts Open the Control Panel in Category view, click User Accounts and Family Safety, and then click User Accounts Click Manage another account Click Create a new account Type the new account name, click the Standard user option button or the Administrator option button, and then click the Create Account button New Perspectives on Microsoft Windows Vista

Setting Up User Accounts Click Create a Password Click in the New password text box, and then type your password Click in the Confirm new password text box, and then type your password again Click in the Type a password hint text box, and then type a hint to help you remember your password Click the Create password button New Perspectives on Microsoft Windows Vista

Setting Up User Accounts New Perspectives on Microsoft Windows Vista

Controlling Access to Your Computer One way to manage access to your computer is to take advantage of User Account Control (UAC) The UAC feature is turned on by default, and should not be turned off Another way to protect your privacy and reduce power consumption is to let your computer go to sleep after a specified amount of idle time New Perspectives on Microsoft Windows Vista

Securing and Sharing Folders If more than one person uses your computer, you can share files and folders with them in two ways: Explicitly allowing another user to share a folder Storing files in the Public folder When you explicitly share files, you set sharing permissions that determine who can change your files and what kinds of changes they can make New Perspectives on Microsoft Windows Vista

Assigning Permissions to Folders To specify which users can access a folder you want to share, click the folder in a folder window, click Share on the toolbar, and then enter the account name of another user on the computer New Perspectives on Microsoft Windows Vista

Assigning Permissions to Folders New Perspectives on Microsoft Windows Vista