June 2008 Surf Safely with a Clean Computer Roger Thornburn.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
What is Spyware? Where did it come from?.
Ways to keep your PC running smoothly  Reboot at least once a week  Make sure fan is free of dust and debris  Defragment your PC once a month  Run.
Computer Information Technology – Section 2-4. Objectives The Student will Understand the basic system tools and how to use them Understand virus and.
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Explanations Of Software Utilities By Tim Wong.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
Patricia O’Brien30 June 2015 Housekeeping your PC Training Session for XP and VISTA.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Computer Troubleshooting (and other interesting facts) Presented by: Kristi Manuel and Derwin Woodard.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
SIR Area 2 Computers & Technology Dean Steichen.  “A well maintained PC will run at peak performance for years” (IOLO Technologies).  You can easily.
Windows Tutorial 9 Maintaining Hardware and Software
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Internet safety By Lydia Snowden.
eScan Total Security Suite with Cloud Security
Security for Seniors SeniorNet Help Desk
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Keeping your computer current and trouble free Aaron Robertson.
Get the best performance out of your PC By Matthew Pinch.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Computer Maintenance. Clean up tools How I Defragmented the Hard Drive.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
June 2013 LCCU Meeting Organize links, images, and files for your projects, trips, hobbies, etc. using Evernote notebooks. We’ll use a multiple laptop.
(and other interesting facts). My Computer is Slow Internet Active Directory Video Issues.
Internet safety By Suman Nazir
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Palm Creek RV and Golf Resort December 07, 2011 Garth Vanstone.
PREVENTION Cleaning/Housekeeping BASIC MONTHLY CHECK OFF LIST (Minimum requirement): –Cleaning »Physical Cleaning »Clean internal dust bunnies with canned.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
For more information on Rouge, visit:
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Keeping your System/Computer healthy and Operating
Windows Tutorial 5 Protecting Your Computer
Three steps to prevent Malware infection
Malware aka- malicious software By: Ken Fogel
How to Fix Trojan.Poweliks Using Norton Antivirus?
Keeping your System/Computer healthy and Operating
Connecting Remotely Winter 2014.
Windows Vista Inside Out
Presentation transcript:

June 2008 Surf Safely with a Clean Computer Roger Thornburn

Surf Safely with a Clean Computer Roger Thornburn June Seminar Goals Internet Security Background on internet security threats How to protect your computer Using a Sandbox A Clean Computer Using CCleaner To clean out temporary files To clean the registry Disk defrag Scheduling these tasks

Surf Safely with a Clean Computer Roger Thornburn June Unwanted Visitors! The Four Main Threats to Your Computer Hackers Viruses, worms & trojans Spyware and hijacks Operating System/Apps security holes Annoyances Spam Adware Pop-up Ads See Wikipedia ( or handouthttp://en.wikipedia.org/wiki/Malware

Surf Safely with a Clean Computer Roger Thornburn June Dealing With the Threats Hackers Use a Firewall. Windows XP and Vista both have a good built-in software firewall If on broadband, then use a router with a h/w firewall Viruses Use ONE Anti-Virus tool Spyware Use ONE real time Anti-Spyware tool Can use more than one anti-spyware scanner

Surf Safely with a Clean Computer Roger Thornburn June So, Are You Safe Now? Better – but not completely Security holes not yet patched. Not yet acknowledged by software suplier No fix yet available Havent updated all your programs Pop up windows requiring user action Standard Window with a question or offer, with Yes/No buttons So, still at risk from: Drive-by that exploits a software security hole Malicious java script, Flash animations, etc. Both exploit weaknesses in poorly written software that enable Spyware, Hijacks, Worms, Bots, etc. to be put on your computer, directly from a Webpage

Surf Safely with a Clean Computer Roger Thornburn June The Answer Is …. A sandbox is a special software program that isolates any application running inside it, from the rest of your computer. After running your application, delete the sandbox and all traces of the application are also deleted. So, if we open our Internet Browser inside a sandbox, then any malware that tries to enter our computer, either by accidentally clicking the wrong thing, or by a drive-by, will be trapped inside. The sandbox I will show you today, is a freeware program called Sandboxie Can be downloaded from Sandbox!

Surf Safely with a Clean Computer Roger Thornburn June How Sandboxie works Hard Drive Without Sandboxie Using Sandboxie Reads Writes Sandboxie temporary storage Reads Writes For a complete explanation, see

Surf Safely with a Clean Computer Roger Thornburn June Sandboxie Basics All programs can be opened sandboxed Main use is for your Internet Browser and client Can also be used to run downloaded or other programs to test without leaving any traces on your computer attachments opened inside the sandbox Files you want to keep can be copied from the sandbox Do I still need A-V and A-S? Yes. Sandboxie will stop any program or software being written to your hard drive. It does not do any virus or Spyware checking

Surf Safely with a Clean Computer Roger Thornburn June Using Sandboxie Good tutorial. Open Sandboxie, click Help>Getting Started Tutorial Sandboxie automatically creates a desktop icon that opens your default browser in a sandbox (e.g. Internet Explorer) Just double click this icon Use Right Click and select Open Sandboxed to open any other program in a sandbox Use for – Outlook Express, Windows Mail, etc. Also for testing new programs. When using a sandboxed browser or client, nothing is saved: Cookies, temporary internet files, favorites New add-ons (e.g. Flash plug-in) Downloaded files or programs Saved attachments

Surf Safely with a Clean Computer Roger Thornburn June Using Sandboxie Saving files from the sandbox Download to My Documents or Desktop Sandboxie will allow you to recover these files Other folders can be added to be recovered Online banking, credit card, brokerage or other trusted website. As cookies will not be saved, these hi-security sites may require you to answer a security question Go to these sites once, outside the sandbox, login and the cookie will be saved Other By default, favorites will not be saved Can make a change in the Sandbox Settings

Surf Safely with a Clean Computer Roger Thornburn June Sandboxie Settings Open Sandboxie Default Settings Open Sandboxie Control click Sandbox>DefaultBox>Sandbox Settings Recovery folders click Recovery>Quick Recovery. Add folders if necessary Automatically delete sandbox when no longer active click Delete. Check Automatically delete….. Enable web browser favorites: click Applications>Web Browser. Check Allow Direct Access to ….. And/or for Firefox Also check Allow Full Access to Protected…. If you use saved password. Enable client: click Applications> Reader. Check the appropriate check box for you client.

Surf Safely with a Clean Computer Roger Thornburn June Summary for Safe Surfing Use a Firewall – Windows XP/Vista is fine Keep your Windows and internet enabled apps patched/updated Use ONE Anti-Virus program Use a ONE real time Anti-Spyware program Consider using a combined A-V & A-S, e.g. AVG 8, Norton AV, Kapersky AV, Webroot, Avast, etc. A total internet suite is not a necessity. Use an /ISP service that scans ALL your Yahoo, Excite, Google, Dell, etc. Only download programs from known sites Dont accept programs on CD from unknown people Use Sandboxie for surfing the web and

Surf Safely with a Clean Computer Roger Thornburn June Lets do some more demos

Surf Safely with a Clean Computer Roger Thornburn June Cleaning Up Your Computer Use CCleaner Removes all temporary files Internet Logs Windows Removes cookies Select those to keep Registry cleanup Defragment your Hard Drive Combines fragmented files Speeds up disk operations Slightly different interface XP to Vista

Surf Safely with a Clean Computer Roger Thornburn June Suggested Sequence Download and install Sandboxie & CCleaner In CCleaner, select items to clean, include all cookies Run CCleaner including the Registry cleaner Open non-sandoxed browser, and login to all your hi- security sites (bank, credit card, etc.) and any customized page (e.g. Yahoo) Reopen CCleaner, in Options>Cookies, move all cookies to Cookies To Keep Change settings to default Sandbox Applications>Web Browser Check to Allow Direct Access to Internet Explorer Favorites Check to Allow Access to Protected Storage Applications> Reader Delete>Invocation and check Automatically delete contents Now can run browser in sandbox and run CCleaner

Surf Safely with a Clean Computer Roger Thornburn June Scheduling the Cleanup Vista Defragmenter includes a scheduler Select daily/weekly and time (computer needs to be on) Use Task Scheduler for CCleaner Control Panel>Administrative Tools>Task Scheduler Action>Basic task – set day and time (computer needs to be on) Select CCleaner and type /auto for the argument Windows XP Create a batch file (c:\cleanup.bat) c:\program files\ccleaner\ccleaner.exe /auto c:\windows\system32\defrag.exe c: Use Scheduled Tasks to run this batch file Control Panel>Scheduled Tasks>Add scheduled task Select c:\cleanup.bat – set day and time Check Open advanced… and check Run only..

June 2008 Enjoy Your Surfing Experience