Keeping Your Computer Safe and Running Efficiently.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Primary Threats to Computer Security
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
How to Keep Your PC Running Like New Bryan Nowak.
SECURE YOUR COMPUTER or Lose It 1. Activate Anti-virus Software. 2. Firewall it. 3. Windows Service Pack 2 4. Fight Spyware 5. Update it, automate updates.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
1 Computer Security: Protect your PC and Protect Yourself.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Physical Cleaning Disconnect Power Open the Case.
Lesson 10 Operating System Customization
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Chapter 5: System Software: Operating Systems and Utility Programs.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Learning In A Techno World How Safe is Your Cyberspace?
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Basic Computer Cleanup Larry James ResNet Manager.
Staying Safe Online Keep your Information Secure.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
Why do you need to think about security?  Data loss  System loss  Identity theft.
PC Maintenance How to keep your computer healthy.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Chapter X When can I consider my personal data secure?
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Course ILT Printer and virus management Unit objectives Perform various printing tasks, including installing printer drivers, printing documents, monitoring.
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Chapter 3: Where are programs and data Stored?. How important is this chapter to understanding how a computer works? 7 (on a scale of 1-10 with 10 being.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
NetTech Solutions Protecting the Computer Lesson 10.
Computer Essentials by Mark White. Computer Essentials Firewalls Anti-Virus Software Spyware Adware.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
IT-IDT-5 Understand, communicate, and adapt to a digital world. File Management.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Recommended Computing Practices Dean Steichen SIR Branch 8 February 16, 2006.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture-16(B) Taking Protective Measures
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Presentation transcript:

Keeping Your Computer Safe and Running Efficiently

Backup Your System It’s possible that your hard disk will crash and everything on your computer will be lost. IT HAPPENS EVERY DAY. Make (at least) one duplicate of all files that are critical to you. Make this duplicate on external media.

Backups (continued) Backup Media Floppy disk External Hard disk Tape Drive Burn to CD/DVD

What to backup Full backup Duplicates everything on your disk Incremental backup Duplicates everything since the last full backup Differential backup Duplicates everything since the last differential backup (or full backup)

Backups – What I Do I use an external hard disk and on occasion (say every month) make a full backup of my system. I do not save old full backups I also make full backups of “important” data. These backups are made to External hard disk (monthly) Burned to CD (as needed usually monthly) USB Flash memory sticks (very frequently)

Backups –What I Do (continued) Registry backup Restore point backups

Spyware Spyware is software that is put on your system possibly without you being aware of it. It is often installed during the process of installing other software. (Read your license agreement for details)

Spyware (cont) Its purpose is to detect how you use your computer and send that information to others. It may also create pop-up ads on your computer.

How to Remove Spyware Use a spyware detection program and run it periodically. I use Spybot S&D (search and destroy) Others use AdAware. I also use Microsoft AntiSpyware (beta). ml reviews various products. ml Note that I haven not checked this site out thoroughly

Anti-Virus Software A virus is an unwanted or unexpected program usually designed to damage a computer, degrade its performance, or cause the computer to perform unwanted tasks (such as sending information to other computers)

How Does Your Computer Get a Virus? From Downloaded Files From attachments to messages From macro files located in data files such as Word documents or Excel worksheets.

How does Anti-virus software work? It checks files to see if they contain virii.

How does it recognize a virus? Virii have characteristic patterns in them called “signatures”. Anti-Virus software checks files to see if they contain these signatures.

What if a file has a virus? The virus is removed from the file if possible If it is not possible, then the file is “quarantined” in a special folder so that it will not be used. The quarantined files can then be replaced by proper files.

Updating Anti-Virus Software AV software consists of two parts: The program that checks for virii The data that contains the signatures of various virii. The program also has built in schemes for testing for unknown virii. Both the program and data should be kept up-to-date

How Do I update? Download new data files (I do it weekly). I recommend that you do it about that often. You can set your program to automatically download updates. Download updates to the program. I do that monthly. I recommend that you do that about as often.

A Problem Do NOT use two anti-virus programs simultaneously. They will probably cause the computer to hang. At least that’s the case with Norton Anti- virus and McAfee Anti-Virus.

Subscriptions Typically your anti-virus program has a one year license. You are free to use the program past the end of the license BUT… Most publishers of anti-virus programs will not allow you to download program updates once your license has expired.

When your subscription has run out… You can replace your program with one that has no expiration date or one that is free. AVG is one such example Antivir is another one Others can be found online.

Firewalls A firewall is a program that controls access to your computer from the Internet and controls access from your computer to the Internet.

Windows Firewall Windows XP with service pack 2 has a free firewall program built in to it. Unfortunately this firewall only controls what comes in to your computer.

Other Free Firewalls firewall.htm is a link to a Web site that tests firewall software. firewall.htm NOTE that I haven’t examined their tests so I can’t vouch for the quality of the tests. I use Zone Alarm Pro, which is not free. (Regular) Zone Alarm is free and I’ve tested it and been satisfied. But it does take some configuration.

How Does a Firewall Work? When “stuff” moves from one place to another it is broken down into packets, each packet is sent, and the packets are reassembled at the destination site. Each packet has a header which gives information about what the packet contains. The firewall can then allow packets to pass if their headers contain the “right” information.

Firewall Rules Firewalls contain rules that determine whether packets are allowed to pass or are not allowed to pass. Rules can be stated in two ways Allow everything to pass except … Allow Nothing to pass except…

What kind of Rules can Firewalls Have? Rules about ports. A port is a number that represents a logical connection to a program. For example port 80 is for http connections and ports 20 and 21 are for ftp connections If a firewall were set up to deny port 80 then your computer would not be able to read Web pages.

What kind of Rules can Firewalls Have? (cont) Rules about locations. A location is either a domain or an IP address. A firewall could have a rule that says accept from This rule would mean that anything that is on the literacy Web server ( or will be accepted.

What kind of Rules can Firewalls Have? Application rules. A firewall could have a rule that says deny any program the use of port 20 except ftp.exe, iexplore.exe, coreftp.exe, or nvu.exe. This would keep your computer from being able to ftp files unless they were being ftp’ed by one of those programs.ftp.exe