What is it? Why do I keep getting email from Barracuda? SPAM.

Slides:



Advertisements
Similar presentations
How to Use Stowe School District
Advertisements

How to protect yourself, your computer, and others on the internet
Computer Technology Timpview High School. is inexpensive and easy to use and track Spam – s sent in bulk to many peoples accounts;
Parents Guide to Online Admissions We suggest you read this guide before you apply for your child’s school place or have it open in a separate window to.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
( ) Basics Apr 2011 Public Computer Center Moore Memorial Library | Greene, NY.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Follow these instructions to pay your dues. Get into your web browser Like Internet Explorer Now you need type in this address in the Address bar. Example.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This is the first page of the log in, this is were you enter your unique details.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
The Shastalink Barracuda Spam Filter How to properly use the Barracuda Spam Filter to control your Inbox.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
How to Read Outlook . Make sure the computer is on.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Setting up Suitable for: Beginner.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
BARDEN JUNIOR SCHOOL How to Use School . By C Carey.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Network System Security - Task 2. Russell Johnston.
Windows Tutorial 5 Protecting Your Computer
Done by… Hanoof Al-Khaldi Information Assurance
Misuses of ICT Malpractice and crime © Folens 2008.
An authorized user can make payments on your account by logging on with their own username and password. Click on the Authorized Users tab to add an authorized.
Unit 4 IT Security.
A Parent Guide to creating a student (under 13) Apple ID
Unit 4 IT Security.
Yahoo Support Ireland Toll-Free Number:
Protect Your Computer Against Harmful Attacks!
Business mail account in yahoo
Barbara Palmer APD Director
What devices use the internet?
UCFB Online Store User Guide.
Presentation transcript:

What is it? Why do I keep getting email from Barracuda? SPAM

Barracuda is our filtering system. It is designed to filter out unwanted email. SPAM

What does the Spam Filter, Filter??? The Barracuda Spam Firewall is an integrated hardware and software solution for complete protection of your email server. It provides a powerful, easy to use solution to eliminating spam and virus from your organization by providing protection from: spam - sending massive amounts of e-mail promotions or advertisements (and scams) to people that have not asked for it. virus - a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance" spoofing - impersonating a server or person without permission. Pretending to be someone else. The deliberate inducement of a user or a resource to take an incorrect action. Attempt to gain access to a system by pretending to be an authorized user. phishing - is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords. spyware - gathers information about Internet users without their knowledge or consent and delivers that information to advertisers or others who have access to the information. Users can get spyware in their systems by downloading certain programs or in the form of a virus.

There are four types of emails you should receive from Barracuda. Use Quarantine Account information – This is your login information to manage your account. You only receive this once when the account was set up. Spam Quarantine Summary – This is a list of blocked emails Returned mail: User Unknown – This is a message you sent and the email address was not active or corect. Message you sent blocked by or bulk email filter – This is a message that you sent that was classified as bulk or spam.

Classify as Spam Go down through the Current Message Log click the box to checkmark it (check the emails that you don’t want delivered then click Classify as Spam. The mail will be deleted from this box, and classified as SPAM

Classify as not Spam Go down through the Current Message Log click the box to checkmark it (check the emails that you do want delivered then click Classify as Not Spam. The mail will be delivered to your inbox, and classified as not SPAM.

Quarantine Summary The Barracuda filtering System is blocking some of those unwanted emails so they don’t get delivered to your inbox but also notifying you that an email has been stopped. This is what your Quarantine Summary email looks like. Click on the Deliver link to have a message delivered to your mailbox. Click on the Whitelist link to have a message delivered to your mailbox and whitelist the sender so that his/her messages will no longer be quarantined. Click the Delete link to have the message deleted from your quarantine inbox. You will have better options to manage your inbox and can also change the preferences by clicking here.

Quarantine Inbox You also have two folder tabs here: Quarantine Inbox and Preferences. By clicking on the checkbox inside the gray bar you can select all emails on that page then click the action that you would like to take Deliver, Whitelist, or Delete.

Whitelist/Blacklist Under Preferences and Whitelist/Blacklist you have the option to enter addresses that you want Barracuda to block (Whitelist) and addresses that you no longer wish Barracuda to block (Blacklist). You will see the first section is for e-mail addresses that you want to get (allowed). You can add email addresses here by simply typing the address, and then click add. The next section of email addresses are blocked. (Blacklist) You can also add or remove email addresses from this section.

Quarantine Settings In Preferences and Quarantine Settings, you have the option to tell Barracuda how often to send notifications and choose a language setting.

Under Preferences and password you have an option to change your password. Type in your old password and then your new one and your new password again to confirm.

Do Not log off When you finish there is no need to log off, just click “X” to close the program and you will not have to log in the next time.

If you do log off you will get this login screen the next time you go to Barracuda Spam.

If Barracuda never blocks an email that you want, you can go to your GroupWise mailbox and right click on a Barracuda email click Junk Mail and Block sender. This will keep you from getting email from Barracuda.

I hope this was helpful to you and answered your questions about Barracuda! SPAM