Free Willie Freeware Software Project Tulsa Computer Society www.tcs.org.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
Online PC Safety and Security Workshop LBCC Library Gabriel Beeler, LBCC Librarian.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Computer Troubleshooting (and other interesting facts) Presented by: Kristi Manuel and Derwin Woodard.
Chapter Nine Maintaining a Computer Part III: Malware.
Virtualization and Open source Software Mr. Lau Ka Lun – Lai King Catholic Secondary School Date: 9 th, 21 st, 22 nd March, 2011.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
What’s New and Hot In Free Software. Kingsoft Office Suite Does not use Java Free version has Microsoft 2003 interface – Paid versions can switch between.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Protecting Your Computer & Your Information
Keeping your computer current and trouble free Aaron Robertson.
Tutorial 11 Installing, Updating, and Configuring Software
B.A. (Mahayana Studies) Introduction to Computer Science November March Software What is software? What are the main types of software?
March 2014 LCCU Meeting How to use Windows XP safely after end of support. We’ll answers members’ questions: –How to restore Win XP backups to Win XP,
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Introduction to Computing Chapter 2 – Part 2 Industry of Computing William Johnson Julia Benson-Slaughter
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
James Falkofske Director of Online Learning - St. Cloud Technical College TechnologyBites.blogspot.comTechnologyBites.blogspot.com.
Computer Update March Just a Bit of an Update Equipment Security.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
March 2013 LCCU Meeting Judy Grindle will discuss and demonstrate: –How can you securely clean off files and programs from a PC before donating it, or.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Unit 5- Computer Software.  Identify how hardware & software interact  Explain how a software program works  Describe the difference between application.
Eric Moore Computer Users Group of Greeley. What Is It? Additional software that may be installed when you install other software May be made by the same.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Online Virus Scanning The easy way, using Knoppix live CD By Carl Weisheit.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Software Categories Figure 3-1.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Software : Applications Software
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Introduction to Windows 10 Windsor Senior Computer Users Group October 12, 2015.
Linux Mint 1 Introduction Linux Mint is a computer operating system based on the Linux distribution Ubuntu. Linux Mint is intended to be a modern, elegant.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Google Apps and Education Jack Nieporte St James of the Valley
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
System Software Chapter 5 The Director Computer Components & Networks, 2002.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Windows 10 Utilities  Windows Utilities:  Anti-Malware/Anti-Virus  Windows Update  Disk Cleanup  Defrag  Task Manager  Backup.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Setting up a new PC Setting up a new PC or updating an older one Technology SIG FPCUG – August 1, 2006.
GNU and Linux.
Managing Windows Security
Three steps to prevent Malware infection
Chapter 3 Installing and Learning Software
What is Microsoft Internet Explorer?
Computing Fundamentals
How to Fix Trojan.Poweliks Using Norton Antivirus?
Software basics on the Internet
Chapter 3 Installing and Using Software
Computer Concepts Module 3
Presentation transcript:

Free Willie Freeware Software Project Tulsa Computer Society

2 Project Objectives Assemble a computer (Luggue3) with vintage components and use Windows XP as an operating system Install only freeware on the computer The Freeware programs will be demoed by the member that recommended it The project will continue until all of the software had been demoed or until the members get bored with the project At the end of the project, a CD or DVD list containing links to the freeware will be distributed to the members who may download what they want Highlighted programs are installed on the Free Willie disk (or should be) Software will be 32-bit

3 Free Willie Criteria Software must be free as in free speech AND free beer No spyware / adware / spybots / rootkits / trojans / worms / viruses or other malicious add-ons No demo software No nagware, if possible, but requests for donations are allowed Not programs with crippled in features, if possible Not trial or timed software, if possible No file sharing software such as BitTorrent, eDonkey, LimeWire, etc No raunchy, pornographic, gambling, violent game software No commercial “borrowed-from-friend” software Preferably, the software should be Open Source, including that ported from Linux

4 Warnings and disclaimers The TCS does not produce a CD or DVD or Freeware any longer because the software changed too often. Some of these programs perform better than others and all software listed is subject to change. This list is not an endorsement of any software by the TCS. Some links may be broken. Use an anti-malware program to scan all downloaded software for viruses, spyware and malware, no matter the source. Download freeware only from reputable web pages, FTP sites or sources.

5 Types of Free Willie Freeware Communication Office Graphics Sound Video Players Security Utilities Mapping Linux Freeware Sites Freeware Articles Portable Apps (for installation on thumb drives)

6 Communication Firefox Thunderbird

7 Office IBM Lotus Symphony TrueCrypt MWSnap PDF-XChange Viewer Primo PDF with OpenCandy

8 Video Players and Graphics Editor Graphics Editor Paint.net Video Player VLC Video Player

9 Security Darik’s Boot and Nuke (DBAN) boot CD Secunia Malware Bytes Microsoft Malicious Software Removal Tool Microsoft Security Essentials us

10 Utilities Belarc Advisor Macrium Reflect Smart Defrag CCleaner Easeus Partition Manager

11 Mapping Google Earth Geographic Information Systems

12 Linux on Luggie 3 Ubuntu Mint Linux v Fedora v. 15 (Redhat) Open Suse v (Novell)

13 Freeware Sites PCWorld Download.com Kim Komando SourceForge File Hippo

14 Freeware Articles PC Magazine C00.asp cNet Windows Starter Kit cNet Windows Security Kit 1.html?tag=contentBody;photoPromoMain Computer Shopper software

15 Portable Apps (for installation on thumb drives) List of programs All apps, with user comments All apps Suites

16 Freeware Down Side Some programs will try to add toolbars, browsers Note the install windows Read the license agreement Download from established web sites Update like any other program Many programs managed by volunteers You may be asked to Help!

17 Primo PDF and Open Candy The software installer you are about to initiate utilizes the OpenCandy, Inc. recommendation network in order to provide you offers that may be of interest. By proceeding with the installation process, you agree that OpenCandy may collect and use certain information obtained in connection with this software installation in accordance with the policies and practices set forth in OpenCandy's Privacy Policy, which can be read at...

18 The Free Willie Freeware Software Project Tulsa Computer Society