Safe Computing and Internet Browsing with Free Software Aosheng Wang ( 王敖生 ) 2014-07-19.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Steve Garner Ag Communications Services IT Manager.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Chapter 5 System Software.
The Ultimate Backup Solution.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Cap 333 Network Administration. Grades  20 marks distributed on  Assignments / Project Activities Individual Pairs  1 or 2 tutorial quizzes.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
To run the program: To run the program: You need the OS: You need the OS:
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Chapter 5: System Software: Operating Systems and Utility Programs.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Passwords, Encryption Forensic Tools
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
Easy Encryption: OS X and Windows 2K/Xp Shawn Sines OARTech August 8, 2007.
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
Security for Seniors SeniorNet Help Desk
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Cap 333 Network Administration. Solution Rules  Your solution must be typed by computer. Otherwise, it will not be accepted.  If the question is a project.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
SIG Leader: Mike Smith Host of the Mike Tech Show podcast
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
George Skarbek May What drives? There are three types of virtual drives that can help. They are: A mapped network drive Virtual CD/DVD drive RAM.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Cap 333 Network Administration. Grades  20 marks distributed on  Assignments / Project Activities Individual Pairs  1 or 2 tutorial quizzes.
System Software Chapter Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Panda Anti-Rootkit & password storage tools
By Liam Wright Manga comic group Japan SAFETY on your computer.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
I NFORMATION S UPPORT AND S ERVICES 2.02 U NDERSTAND BASIC TROUBLESHOOTING OF HARDWARE AND SOFTWARE.
BMTS 242: Computer and Systems Lecture 5: Yousef Alharbi Website
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Windows 10 Utilities  Windows Utilities:  Anti-Malware/Anti-Virus  Windows Update  Disk Cleanup  Defrag  Task Manager  Backup.
Running Windows Securely and Efficiently By Gary Esworthy.
The Future With Windows XP Microsoft announced that after April 16, 2014 it will not longer support Windows XP. No statement on continued inclusion of.
There are many leading online sources that are providing reliable encryption solution for your online as well as offline file security through smart software.
GNU and Linux.
Using Virtualization in the Classroom
Virtual Machine and VirtualBox
Joseph J. Malone Security for Seniors Joseph J. Malone
Chapter 6 Application Hardening
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Virtual Operating Systems
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

Safe Computing and Internet Browsing with Free Software Aosheng Wang ( 王敖生 )

Summary Password Encryption Backup Antivirus Safe Internet Browsing Virtual Machine

Password Please enter your new password: "cabbage" Sorry, the password must be more than 8 characters. "boiled cabbage" Sorry, the password must contain 1 numerical character. "1 boiled cabbage" Sorry, the password cannot have blank spaces. "50bloodyboiledcabbages" Sorry, the password must contain at least one upper case character. "50BLOODYboiledcabbages" Sorry, the password cannot use more than one upper case character consecutively. "50BloodyBoiledCabbagesShovedUpYourYouKnowWhat,IfYouDon'tGiveMeAccessnow” Sorry, the password cannot contain punctuation. “ReallyPissedOff50BloodyBoiledCabbagesShovedUpYourYouKnowWhatIfYouDontGiveMeAccessnow” Sorry, that password is already in use.

KeePass Password management – Usernames and passwords – Custom fields and free-form notes – File attachment – Encrypted database – Single master password and/or key file – Small and simple to use Free, open source, and cross-platform

Encryption NSA: If Your Data Is Encrypted, You Might Be Evil.

TrueCrypt On-the-fly encryption of a container file – Mounted as a virtual encrypted disk Free, open source, and cross-platform Publicly audited – No backdoor found for decryption Widely used – Private companies – Public institutions – Governments? Commercial encryption software in US – Decryption backdoor may be required by NSA Recommended by Snowden Sudden shut-down of TrueCrypt development in May 2014 – A new Internet home in Switzerland – Safe to use the latest version (7.1a) released before the shut-down

Backup Two types of people – those who have lost data, and – those who are going to lose data. Other two kinds of people – those who backup their data, and – those who have never had a hard drive crash. Two types of backup – File backup – System backup

FreeFileSync for File Backup Folder comparison and synchronization Free, open source, and cross-platform Easy to use

Antivirus, Antimalware, and Safe Internet Browsing Virus and antivirus Malware and antimalware Identity theft Hacking, Hijacking, Spamming Microsoft Security Essentials (WinXP, Win7) Windows Defender (Win8) Virtual machine

Virtual Machine Software-based emulation of a computer – Guest OS Running in a host OS – Independent of software running in the host Preventive health care for home computers – Running legacy or risky software in virtual machine – Safe Internet browsing in virtual machine

VirtualBox Virtual machine software from Oracle Free, open source, and cross-platform License key of guest OS – Do not throw away the key from your old PCs – Microsoft provides 90-day VirtualBox-ready OS Virtually no limit to use forever – Free open source OS Linux Android – Mac in Windows and Windows in Mac

Links KeePass – TrueCrypt – FreeFileSync – Security Essentials – essentials-download essentials-download VirtualBox –

Demo