Because you need to protect your computers!!! By: Ashley Hubbard.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Installation & User Guide
Setting Up Dropbox PCNA: HOW TO SETUP & SYNC FILES WITH DROPBOX.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
LittleOrange Internet Security an Endpoint Security Appliance.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Eric Claus Assistant Network Administrator Network+ Ernest Staats Master Science Information Assurance, (CISSP)®, CEH, MCSE, CNA, CWNA,
How It Applies In A Virtual World
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Security for Seniors SeniorNet Help Desk
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
TalkTalk network security overview 14 th April 2011.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Uploading Your Page to the Internet Configuring FTP on Dreamweaver.
You Have A Website?!? How to create a class website that is useful and user-friendly for you, students, parents, and other educators Presented by Sarah.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
What is Spam? d min.
 An online community for finding ideas and accessing resources related to Kidspiration, Inspiration and other Inspiration Software products.  You can.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
 There are three things to get Trend Micro software for your PC. They are Download, Installation and Activation of the software license. Trend Micro.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Three steps to prevent Malware infection
Unit 4 IT Security.
Office 365/OneDrive Installation Guide.
Technical Steps to Install Norton Mobile Security on Android Phone.
WELCOME TO.
Ti ps to Disable Firewall with Norton 360. Norton 360 comes with a lot of beneficial features in which one of the best features is Smart Firewall feature,
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Call AVG Antivirus Support | Fix Your PC
HOW TO INSTALL DRIVERS ON WINDOWS 10. Select the Start button and Go to the device manager.
HOW TO INSTALL DRIVERS ON WINDOWS 10. Select the Start button and Go to the device manager.
Click Here. Webroot Antivirus Technical Support UK Fix and support for all technical problems related computer security. Remove all online harmful threats.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Norton is a standout amongst the most well known world class antiviruses which is generally known for offering high class security administrations to their.
Welcome and thank you for choosing SharkGate
So you were told to make a website
Unit 4 IT Security Kerris Davies.

Presentation transcript:

Because you need to protect your computers!!! By: Ashley Hubbard

K9 is a free web protecting software that will allow you to set limits and boundaries on your internet. You can create settings that allow you to visit websites based on types or you can set up specific web addresses to allow or forbid. It is used in addition to the school established firewalls that the students are able to bypass. I have not had any students who have been able to get around the K9 settings. It also helps to protect your computer from malware and phishing. It filters out spyware and malware and prevents it from coming in and disrupting your computer.

In order to use K9 you must 1 st go to the website: Then click on “Get it Now” Fill out the information, including a secure address A license number will be sent to your which will allow you to download it to your computers

Once you get your license number, you can download the software onto the computer. Go to the website, click “Download Software” on the sidebar. Choose your operating system (Windows or Mac) Install software

Once it is installed, you must customize it to your liking. Click on your start menu and go to the “Bluecoat K9 Web Protection Administration “ tab Clock on setup and type in your password that you chose You can now customize your security settings! You merely click on the setting you want. If you choose to customize your settings, click custom and then choose the websites categories that you want to block or allow. In this category, you can also type in specific websites you want to permit.

High – Protects against all default level categories plus social interaction and unrated sites Default – Protects against all adult content, security threats, and sexually suggestive sites Moderate – Protects against adult content, security threats, and illegal activity Minimal – Protects against pornography and security threats Monitor – Allows all categories – only logs traffic Custom – Allows you to select your own categories to block; also allows you to specify certain websites to block or allow

You can make changes to your K9 settings at any time including your address and passwords by simply clicking on the sidebar. It is essential that your address and password are kept private to ensure that your students are not able to make changes to the computers without your knowing Make sure you always click save after making changes to ensure that the computer stores them.

At this time you are going to have the opportunity to go on the K9 website, look around, ask questions, and even get started. If you need any help, I would be happy to aid you in any way I can! Thanks for your attention, and I hope you can utilize this amazing new tool in your classroom!