Download presentation
Presentation is loading. Please wait.
1
Use computer and internet safely Dave Dai 2008
2
Computer security Malware Virus: a program that copies itself and infect a computer without permission or knowledge of the user. Worm: a self-replicating computer program. It uses a network to send copies of itself to other computers on the network. Unlike a virus, it does not need to attach itself to an existing program. Trojan: a program appears to perform a desirable function. Rootkit: a computer virus which consists of a program to take fundamental control (in Unix terms "root" access, in Windows "Administrator" access) of a computer system. Spyware: intercept or take partial control over the user's interaction with the computer; can collect various types of personal information, such as Internet surfing habit, sites that have been visited. Adware: automatically plays, displays, or downloads advertisements. Crimeware: a class of malware designed specifically to automate financial crime
3
Internet research and security Browse Internet safely –Set your browser security to medium/medium-high –Add safe sites to trusted sites –Read e-mail messages in plain text –Block pop-up windows in your browser Secure sites; Secure Data; online transaction; Instant messenger, chatting
4
Email –Phishing (example)Phishing example –SpamSpam –MSU mail Spam Filter ProcessMSU mail Spam Filter Process –Outlook spam filter setting –VirusVirus Free Anti virus software: AVGAVG
5
Phishing examples How can we tell they are fake? Appear to come from your bank, or company your know (such as Microsoft, or MSU mail team) Spelling Mistakes Incorrect Graphics Ask for personal Information The URL
6
Identity theft / Identity fraud someone wrongfully obtains and uses another person's personal data shoulder surfing dumpster diving (preapproved" credit cards ) Phishing emails Internet traffic / network breach Watch out when use/provide – be stingy (need to know): SSN, birth date, address, credit card number..
7
IE 7 popup blocker IE 7 phishing filter
8
Basic PC protection –Strong password –Virus Scanning program features (Norton or NOD32); AVG for home use NOD32AVG –Firewalls (turn on Windows built-in firewall)turn on Windows built-in firewall –Spyware & Adware removal (download and install “Windows Defender”)Windows Defender –Set the Internet browser security medium-high
9
Basic maintenance –“My computer does not work” (Be specific when report error; copy the error message). –Hard disk de-fragmentationHard disk de-fragmentation –PC Restore and Recover –Restore PC performanceRestore PC performance –***Useful free tools from Microsoft: Windows SysinternalsSysinternals –***Start application list; RUN MSCONFIGlist –Use AutoRun to see what will start automaticallyAutoRun
10
Things to consider when you purchase a computer CPU speed Hard Drive size Memory/RAMMemoryRAM DVD Drive Video Card / web cam External Connectors (USB 2.0, SATA) College recommended vendor: Dell, IBM/Lenovo
11
Things to consider when you purchase a computer Who is going to use it? What is the priority? »Weight »Screen size »CPU power »Pricing »Timeline
12
Resources College computer support websitewebsite MSU Help desk – Computer center RM120Help desk MSU computer storestore
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.