COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

1 After completing this lesson, you will be able to: Specify options. Customize the appearance of messages. Add a signature to an .
Browser Comparisons Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Security, Privacy, Add-ons & Convenience.
®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
XP Tutorial 9 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Exploring Your Network Tutorial 9.
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
Microsoft Windows Vista Chapter 5 Personalize Your Work Environment.
COMPREHENSIVE Windows Tutorial 3 Personalizing Your Windows Environment.
Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Microsoft Office 2007 PowerPoint Web Feature Creating Web Pages Using PowerPoint.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Microsoft Windows Vista Chapter 6 Customizing Your Computer Using the Control Panel.
COMPREHENSIVE Windows Tutorial 10 Improving Your Computer’s Performance.
COMPREHENSIVE Windows Tutorial 2 Organizing Your Files.
®® Microsoft Windows 7 Windows Tutorial 10 Improving Your Computer’s Performance.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
Windows Tutorial 9 Maintaining Hardware and Software
Access Tutorial 10 Automating Tasks with Macros
®® Microsoft Windows 7 Windows Tutorial 1 Exploring the Basics of Microsoft Windows 7.
Tutorial 8 Managing and Securing a Database. Objectives Filter data in a table and a form Save a filter as a query and apply the saved query as a filter.
®® Microsoft Windows 7 Windows Tutorial 6 Searching for Information and Collaborating with Others.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Security for Seniors SeniorNet Help Desk
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Using Windows Firewall and Windows Defender
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
Windows Tutorial 4 Working with the Internet and
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 7 – Creating and Using Templates in a Web.
COMPREHENSIVE Windows Tutorial 1 Exploring the Basics of Microsoft Windows Vista.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Internet safety By Suman Nazir
XP New Perspectives on Microsoft Office Access 2003, Second Edition- Tutorial 8 1 Microsoft Office Access 2003 Tutorial 8 – Integrating Access with the.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Productivity Applications.
COMPREHENSIVE Windows Tutorial 6 Searching for Information and Collaborating with Others.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
FIRST COURSE Exploring the Basics of Microsoft Windows Vista.
Windows Tutorial 5 Protecting Your Computer
Windows Tutorial 3 Personalizing Your Windows Environment
Excel Tutorial 8 Developing an Excel Application
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Tutorial 8 Managing and Securing a Database
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Microsoft Office Access 2003
Microsoft Office Access 2003
Windows Tutorial 9 Maintaining Hardware and Software
Windows Vista Inside Out
Chapter 9: Configuring Internet Explorer
Presentation transcript:

COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer

XP Objectives Set up Windows Firewall and Windows Update Protect your computer from viruses and other malicious software Use Windows Defender to protect against spyware Manage Windows Mail security New Perspectives on Microsoft Windows Vista2

XP Objectives Manage Microsoft Internet Explorer security Set up user accounts Control access to your computer Secure and share folders New Perspectives on Microsoft Windows Vista3

XP Using the Windows Vista Security Center Improved features in Windows Vista keep your computer safe from threats such as viruses, worms, hackers, crackers, and spyware – Security Center – Windows Defender – User Account Control – Back Up and Restore New Perspectives on Microsoft Windows Vista4

XP Using the Windows Vista Security Center New Perspectives on Microsoft Windows Vista5

XP Adding a Program to the Windows Firewall Exception List Click the Start button, click Control Panel, click Security, and then click Windows Firewall In the left pane, click Allow a program through Windows Firewall, then click the Continue button, if necessary In the Program or port list, click to select a program check box. If a program does not appear in this list, click the Add program button, click a program in the Add a Program dialog box, or click the Browse button to locate and select a program Click the OK button New Perspectives on Microsoft Windows Vista6

XP Setting Up Windows Update An update is a change to software that can prevent or repair problems, enhance the security of the computer, or improve the computer’s performance In the left pane of the Windows Security Center window, click Windows Update New Perspectives on Microsoft Windows Vista7

XP Setting Up Windows Update New Perspectives on Microsoft Windows Vista8

XP Protecting Your Computer from Malware In the Windows Security Center window, examine the settings in the Malware protection section New Perspectives on Microsoft Windows Vista9

XP Defending Against Spyware Spyware is software that can install itself or run on your computer without your consent or control – Adware – Pop-up ads To perform a scan with Windows Defender: – Click the Start button, click Control Panel, click Security, and then click Windows Defender – Click the Scan button arrow on the toolbar, and then click Quick Scan New Perspectives on Microsoft Windows Vista10

XP Defending Against Spyware New Perspectives on Microsoft Windows Vista11

XP Scheduling a Spyware Scan In the Windows Defender window, click the Tools button on the toolbar to open the Tools and Settings page, and then click Options New Perspectives on Microsoft Windows Vista12

XP Defending Against Viruses with Windows Mail An annoying and potentially dangerous type of privacy invasion is spam, or junk Start Windows Mail Click Tools on the menu bar, and then click Options Click the Security tab New Perspectives on Microsoft Windows Vista13

XP Defending Against Viruses with Windows Mail New Perspectives on Microsoft Windows Vista14

XP Adding a Sender to the Blocked Senders or Safe Senders List To block a sender in Windows Mail, right-click a message whose sender you want to add to the Blocked Senders list, point to Junk , and then click Add Sender to Blocked Senders List on the shortcut menu To always allow a sender, right-click a message whose sender you want to add to the Safe Senders list, point to Junk , and then click Add Sender to Safe Senders List on the shortcut menu Click the OK button New Perspectives on Microsoft Windows Vista15

XP Managing Microsoft Internet Explorer Security Internet Explorer offers the following security and privacy features: – Phishing filter – Protected mode – Digital signatures – Pop-up Blocker – Add-on Manager – Privacy settings and alerts – Secure connections New Perspectives on Microsoft Windows Vista16

XP Managing Microsoft Internet Explorer Security Click the Tools button on the toolbar, point to Phishing Filter, and then click Check This Website New Perspectives on Microsoft Windows Vista17

XP Blocking Pop-up Ads Click Tools on the Internet Explorer toolbar, point to Pop-up Blocker, and then click Pop-up Blocker Settings Click the current Filter level setting, and then click a setting ranging from High to Low Click the Close button New Perspectives on Microsoft Windows Vista18

XP Managing Add-on Programs A browser add-on is a program offered by any software vendor that provides enhancements such as a toolbar or improved search feature New Perspectives on Microsoft Windows Vista19

XP Selecting Privacy Settings Click Tools on the Internet Explorer toolbar, and then click Internet Options Click the Privacy tab in the Internet Options dialog box Drag the slider to select a privacy setting ranging from Block All Cookies to Accept All Cookies Click the OK button New Perspectives on Microsoft Windows Vista20

XP Selecting Privacy Settings New Perspectives on Microsoft Windows Vista21

XP Internet Explorer Advanced Settings You can manage advanced Internet Explorer settings to enhance the security of your computer – Enable third-party browser extensions – Do not save encrypted pages to disk – Empty Temporary Internet Files folder when browser is closed – Warn if changing between secure and not secure mode New Perspectives on Microsoft Windows Vista22

XP Setting Up User Accounts Open the Control Panel in Category view, click User Accounts and Family Safety, and then click User Accounts Click Manage another account Click Create a new account Type the new account name, click the Standard user option button or the Administrator option button, and then click the Create Account button New Perspectives on Microsoft Windows Vista23

XP Setting Up User Accounts Click Create a Password Click in the New password text box, and then type your password Click in the Confirm new password text box, and then type your password again Click in the Type a password hint text box, and then type a hint to help you remember your password Click the Create password button New Perspectives on Microsoft Windows Vista24

XP Setting Up User Accounts New Perspectives on Microsoft Windows Vista25

XP Controlling Access to Your Computer One way to manage access to your computer is to take advantage of User Account Control (UAC) – The UAC feature is turned on by default, and should not be turned off Another way to protect your privacy and reduce power consumption is to let your computer go to sleep after a specified amount of idle time New Perspectives on Microsoft Windows Vista26

XP Securing and Sharing Folders If more than one person uses your computer, you can share files and folders with them in two ways: – Explicitly allowing another user to share a folder – Storing files in the Public folder When you explicitly share files, you set sharing permissions that determine who can change your files and what kinds of changes they can make New Perspectives on Microsoft Windows Vista27

XP Assigning Permissions to Folders To specify which users can access a folder you want to share, click the folder in a folder window, click Share on the toolbar, and then enter the account name of another user on the computer New Perspectives on Microsoft Windows Vista28

XP Assigning Permissions to Folders New Perspectives on Microsoft Windows Vista29