INTERNET AND EMAIL Information Technology College of Public and Community Service University of Massachusetts at Boston ©2011 William Holmes 1.

Slides:



Advertisements
Similar presentations
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Advertisements

Using Different Forms of Basic Knowledge of the 3 Different Platform: Outlook, AOL and HTML Prepared by Mitch.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
INTERNET, , AND SOCIAL MEDIA Information Technology College of Public and Community Service University of Massachusetts at Boston ©2014 William Holmes.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
August 15 click! 1 Basics Kitsap Regional Library.
By Laura Trawin.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Information about the computer By Sophia and Christina C.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This is the first page of the log in, this is were you enter your unique details.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
ICT Essential Skills. (electronic mail) Snail Mail.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
How to use safely and efficiently
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Unit 19 INTERNET SECURITY
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Computer stuff LIBS100.
evidence By Sam Phillips. evidence Sending and replying.
Santa’s s By Chloe Warman.
Santa’s s By Brandon. Sending an attachment to Santa I attached the by pressing the attachment button above the recipient box I used.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Evidence Including tools and etiquette.
Using Wikis in Education Caroline County Educational Technology Workshop August 1, kispaces.com/
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
1 ADVANCED MICROSOFT POWERPOINT Lesson 9 – Importing and Exporting Information Microsoft Office 2003: Advanced.
Adagio4 Web Content Management Mailing. Create a "GROUP" containing receivers' s. You may create different groups according to the language, target.
Internet Security and Your Computer Welcome to Boot Camp.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Objective 4.01: Compose effective correspondence.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Windows Vista Configuration MCTS : Productivity Applications.
3.2 Introduction to .
is short for electronic mail!
Huntington Beach Public Library
Technology ICT Option: .
3.2 Introduction to .
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Objective 4.01: Compose effective correspondence
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Technology ICT Option: .
Objective: Compose effective e- mail correspondence
Electronic Communication and the Internet
Technology Mrs. Huddleston
What devices use the internet?
Presentation transcript:

INTERNET AND Information Technology College of Public and Community Service University of Massachusetts at Boston ©2011 William Holmes 1

INTERNET ISSUES Type of Connection Virus Protection Spyware Protection Firewall Backing up Privacy and Monitoring 2

INTERNET TIPS I Internet Use Cleanup Beware “Phishing” Don’t save passwords Tradeoff : Dialup, DSL, Cable, T1 3

INTERNET TIPS II Protect Content Have adequate memory Don’t leave on Beware “wakeups” 4

ISSUES Differences Among Programs Filters—spam and risky files Viruses Embedded links Deleting and purging Saving 5

FILE ATTACHMENTS File naming Attachment filters File size Multiple files Downloading files Lost Attachments 6

FILE COMPRESSION 1.Zipping and Unzipping 2.Proprietary compression 3.Automatic decompression 4.Can usually be decompressed without keys 5.File vary in decompressability 7

FILE ENCRYPTION Converts characters, spaces, and colors to random digits Uses password key Has Public Keys and private keys Can’t be decrypted without keys (usually) 8

LISTS Group member lists Userlists from repeat mailings Reply to sender versus all Blind cc allows hidden recipients

TIPS Insert icons for interest Use small pictures Use saving for retrieval Have multiple accounts Use Unique Passwords 10

SPECIAL ISSUES Openness of Wireless Text messaging Encrypting Away bouncing Compressing 11