April 2006 Mike Farquhar Thornbury U3A Computer Group “Microsoft Shortcuts”…

Slides:



Advertisements
Similar presentations
Wireless Networking Thornbury U3A Computer Club Mike Farquhar 2010.
Advertisements

PC Security 101 Keeping your data and your computer safe.
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
Unit 8- Windows Customization.  Backup & restore, update, power.
What’s the computer?? computer is an electronic device that stores, processes, inputs, and outputs data to produce a result.
Notes on Installation of version 8.5 Notes on Configuration Mike Farquhar April 2009 Thornbury U3A Computer Club.
A Quick Review of Unit 2 – Using Windows 7 Computing Fundamentals © CCI Learning Solutions.
Thornbury U3A Computer Group Wireless Networking (Part 2) September 2006 Mike Farquhar.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Computer Viruses.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Patricia O’Brien30 June 2015 Housekeeping your PC Training Session for XP and VISTA.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs Using the Taskbar, opening & switching.
Mike Farquhar January 2009 MSN and Skype-like programs MSN and Skype-like programs Computer Group Computer Group.
Windows Tutorial 9 Maintaining Hardware and Software
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Chapter 7 Installing and Using Windows XP Professional.
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Security for Seniors SeniorNet Help Desk
Gorman, Stubbs, & CEP Inc. Introduction to Operating Systems Lesson 5 Windows 2000 Professional.
Windows Basics: Desktop, Taskbar and Window
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.
. CEO & Engineering of W: T: / / MCSA. MCSE. CCNA Heng Nida.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
INTRODUCTION TO OPERATING SYSTEMS. An operating system is a program that controls the overall activity of a computer. Like an orchestra conductor an operating.
Windows Basics: Desktop, Taskbar and Window
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Computer Update March Just a Bit of an Update Equipment Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Thornbury U3A Computer Group November 2007 Mike Farquhar.
IT security By Tilly Gerlack.
Multimedia Review Presented by Amie Ware. Software Terms Word Processor ◦An application designed for letter writing, reports, or charts and tables. (Microsoft.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Working with Windows 2000 What it is: The system inside your computer that enables it to run software Uses icons (pictures) to access and work within programs.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Module 2.4 Computer management 1. Contents Initial maintenance Setting up accounts Configuring the desktop Security settings Ongoing maintenance Adding.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Small Business Security Keith Slagle April 24, 2007.
CMPF124: Basics Skills for Knowledge Workers Manipulating Windows GUI.
Macros Lesson 7. Objectives 1. Create a macro. 2. Run a macro. 3. Edit a macro. 4. Copy, rename, and delete macros. 5. Customize menus and toolbars. After.
and MS Word document enhancement and MS Word document enhancement (inserting pictures and scanned images) Thornbury U3A Computer Group September.
Computer Skills and Applications Computer Security.
NetTech Solutions Troubleshooting Office Applications Lesson Seven.
Internet safety By Suman Nazir
Basics of Windows 95/98/NT. Versions of Windows Windows 95 and 98 used mainly on standalone computers Windows NT used on networked computers (as in our.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Recommended Computing Practices Dean Steichen SIR Branch 8 February 16, 2006.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Ms Burnham Wild Card Ms Access General Knowledge.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Excel 2002 Using Macros Lesson.
Joseph J. Malone Security for Seniors Joseph J. Malone
Computing Fundamentals
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Advanced Technology Skills
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

April 2006 Mike Farquhar Thornbury U3A Computer Group “Microsoft Shortcuts”…

..but what am I really going to talk about? Security Update Broadband Speed Microsoft Shortcuts

Security Update Keep on using the products  Anti-Virus (FreeGrisoft AVG)  Anti-Spyware (Ad-Aware, Spybot)  Firewall (Windows Firewall, ZoneAlarm) Keep doing backups (USB memory devices are cheap and easy for ad-hoc backups and CD or DVD for more permanent backups) Secure your Wireless Network Spam/Phishing/malware news New security products

Australia introduces the first anti-spam code Australia has become the first country to lay down a code of practice to deal with spam. ISPs and other service providers are now required to give adequate spam filters to their customers. Failure to provide them incurs fines of up to A$10 million.

Microsoft targets the phishers Microsoft says it plans a legal onslaught on phishing. There are 7.9 million phishing attempts per day That’s an increase of 39% over the same time last year The Global Phishing Enforcement Initiative (GPEI) has been set up to track down and prosecute the people behind this type of online fraud. Across the world Microsoft has led to the closure of 4,744 phishing sites, and in the US alone it filed 117 phishing lawsuits last spring.

Beware the 3 rd February… A nasty piece of mal-ware threatens the files on an infected PC Variously called… MyWife, Blackmal, Nyxem and the Karma Sutra worm On the 3 rd day of every month it deletes files with the extensions such as.doc,.ppt,.xls and.pdf How does it work, and how do you prevent it?

Passwords… How about blank passwords - are they OK or not? Passwords for user passwords are OK blank Passwords for accounts with administrator privileges should be secured with a strong password

Windows Shortcuts Highlighting, Dragging and Dropping Context menus Cut and paste Move or Copy? When does “Delete” move to the Recycle Bin, and when does it actually delete?

Microsoft Word Shortcuts Where to find them?  Start Word  From the menus choose: Tools | Macro | Macros… This brings up the Macros dialog box  From “Macros in:” choose “Word Commands  From “Macro Name:” choose “ListCommands”  Choose “Run”  From the “List Commands” dialog box, choose “Current Menu and Keyboard Settings” and “OK”

Microsoft Excel Shortcuts

Mike’s Downloads Computer Club 2006 program Windows Glossary Windows Shortcuts Understanding Screen and Printer Resolution This Microsoft Shortcuts PowerPoint presentation