Presentation is loading. Please wait.

Presentation is loading. Please wait.

U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 2:30 to 4:30pm 10/11/14.

Similar presentations


Presentation on theme: "U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 2:30 to 4:30pm 10/11/14."— Presentation transcript:

1 U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 2:30 to 4:30pm 10/11/14

2 New Members Social Event The committee would like to invite all new members, who have joined Crewe and Nantwich U3A since October 2013, to join us for our annual ‘Coffee and Cake’ event on Wednesday November19 th at 2.30pm at Wistaston Memorial Hall.

3 Windows 8 Demo Windows 8 starts in a completely different view called Metro which is intended to allow use on Tablets. Icons have been replaced by chunky rectangular “Tiles” and NO Start menu. These “Apps” are different from normal programs. They are minimalistic and run full screen only. W8 uses mouse movements to the edge of the screen and the Windows button for control. These actions have to be remembered. There is still a simplified Desktop for programs. I have a program to give me back the Start Menu.

4 Control of Windows 8 Use of corner positions. After switch on get a picture with date/time defined by the last user logged in. Top LHS & click gives a login list. Try U3A / u3a. At Metro screen try Photos App, Top LHS RH click gives Close & Snap- makes it like a Window. But next time shows a command bar at the bottom. The normal way to close an App is to drag from the top all the way down. RH click on a App gives commands, Unpin removes from Metro, use All apps to get back.

5 Top RHS or Windows & C. Brings up the Charms bar, a list Search, Share, Start, Devices, and Settings- includes shut down. Many standard Apps use the internet, slowing it down for your own use of the Internet Explorer App. Because IE layout is so minimal, its hard to see why its frozen. IE is available as a normal Program. New App’s can only be installed from Apps Store. Bottom LH & click brings up a reduced desktop and taskbar which shows all Programs and no App’s but no Startup. So Internet Explorer is the full version with all controls.

6 Web sites on Windows 8 http://www.bleepingcomputer.com/tutorials/how- to-use-windows-8-start-screen/ http://www.bleepingcomputer.com/tutorials/how- to-use-windows-8-start-screen/ http://en.wikipedia.org/wiki/Windows_8

7 Email Safety If you have used Email for a while you will no doubt encounter malicious emails in your inbox. It is important to be able to recognise them. They are steadily getting more and more convincing all the time. The main problems are Links to dubious web sites and dubious Attachments. Banks keep reminding users that they will never send an Email asking for personal details or to log on to verify something.

8 An Example of a Malicious Email.

9 How to check a dubious email First, if it’s like the previous slides, delete it. If you are not sure, I often Google a part of it which is unlikely to be customised for you. Be sure to put “ “ around the phrase so Google searches for the exact whole phrase. EG= “Please submit the tax refund request and allow us 5-7 days in order to process it” If it’s malicious, somebody else in the world will have seen it and will warn about it. Try it. Look at the results. Only open the first one from http://www.justchat.co.uk.

10 Malicious Email exploiting interest in Ebola. The attachment contains the DarkKomet virus

11 Other Malicious Emails Some of the newest printers have scan-to-email ability. Symantec has identified what looks like a printer generated email which tempts you to open what looks like a.doc file but in fact contains a virus. http://mpa.com/blog/identify-malicious-email/ &http://mpa.com/blog/identify-malicious-email/ http://www.makeuseof.com/tag/spot-dangerous- email-attachment/ Contains helpful tips on identifying a Malicious Email.

12 Web sites can spread Viruses Web sites can be taken over by Malware hackers so that if you enter them your computer will be infected, unless- All Anti Virus programs now check for this. AVG has link scanner and for Google searches will show a green tick if OK. Even so they may be behind in finding a problem site so it’s best to avoid obvious dubious sites e.g. sites offering free music/software etc.

13 Internet Safety. E-mail Tips MalwareBytes is a good program to remove Malware. Run it in addition to a antivirus program. Download for free from http://www.majorgeeks.com/mg/getmirror/malwar ebytes_anti_malware,1.html Then Save As mbam-setup-majorgeeks-2.0.3.1025.exe on your desktop then run it to install. http://www.majorgeeks.com/mg/getmirror/malwar ebytes_anti_malware,1.html http://www.emailsafety.net/tips.php A bit old. http://www.emailsafety.net/tips.php I have made a Glossary of computer terms. It is available for download on the CMP, Course material page of http://www.creweandnantwich-u3a.org.uk/http://www.creweandnantwich-u3a.org.uk/

14 Practical on Hotmail Browse to www.hotmail.com It will redirect to Login.Live.com Outlook sign in screen. Login to mondayu3a@hotmail.co.uk with password= u3a1234. Go to OneDrive (was SkyDrive), Documents. You should have the safe version of the malicious email mentioned earlier in your inbox. Double click on it will open a on line version of word. Its OK to click on “Proceed to refund” Then Sign Out.www.hotmail.com mondayu3a@hotmail.co.uk Note the large amount of space 15Gb that is available for on line storage.

15 Facebook Worlds No 1 social web site. Browse to https://www.facebook.com/https://www.facebook.com/ Log in with your own account or email= mondayu3a@hotmail.co.uk password= u3a.Monday. Settings of Facebook. Think about who you want to communicate with, called Friends. Their friends can ask if you want to be friends of theirs. This can get tiresome. Even worse is requests from Everyone.

16 Facebook settings Two good sites on Facebook settings= http://www.welivesecurity.com/2014/07/08/facebo ok-account-settings/ http://www.welivesecurity.com/2014/07/08/facebo ok-account-settings/ & http://thecybersafetylady.com.au/2014/06/4- important-security-settings-protect-facebook- profile/http://thecybersafetylady.com.au/2014/06/4- important-security-settings-protect-facebook- profile/ They are also on the Crewe & Nantwich web site, CMP, Course Material, Week 7 as Best Facebook Settings as a word document.

17 Twitter For quick comments – called Tweets. Browse to http://twitter.com/http://twitter.com/ Log in with your own account or email= mondayu3a@hotmail.co.uk password= u3a.Monday. Settings of Twitter see http://www.fightcyberstalking.org/privacy-settings- twitter/ http://www.fightcyberstalking.org/privacy-settings- twitter/ This is also on the Crewe & Nantwich web site, CMP, Course Material, Week 7 as Best Twitter Settings as a word document.


Download ppt "U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 2:30 to 4:30pm 10/11/14."

Similar presentations


Ads by Google