Presentation on theme: "Safe Computing. Computer Maintenance Back up, Back up, Back up External Hard Drive CDs or DVDs Disk Defragmenter Reallocates files so they use."— Presentation transcript:
Computer Maintenance Back up, Back up, Back up External Hard Drive CDs or DVDs Disk Defragmenter Reallocates files so they use available hard drive space more efficiently Restore Utility Periodically creates a restore point Manually create a restore point before making any major changes to your system
Viruses Computer viruses are malicious codes or programs that are usually installed on your computer without your knowledge and against your wishes. Virus severity varies Just a nuisance Corrupt or erase files Shut down the computer Erase the entire hard drive
How does your computer get a virus? Through an e-mail attachment Don’t open attachments without scanning with anti-virus software Don’t open attachments unless you know the sender and why they are sending the attachment Through files you download
Worms Worms are malicious programs that spread from computer to computer without human interaction. Burrow into your e-mail address book and then send themselves out to your contacts Open a “back door” to your system, which enables hackers access to it and the ability to control it with remote access Replicate themselves and eventually fill up your hard drive or network drive
Trojan Horses Not truly viruses because they do not duplicate themselves or infect other files. Appear as legitimate programs (free screensaver, animated cursors)
Spyware and Adware Spyware is software designed to capture personal and confidential information that resides on your system and send it elsewhere. Primary threat to your privacy and confidentiality – passwords, IP Address Doesn’t usually harm your system Adware is spyware that tracks your Internet browsing and can install malicious cookies on your computer. Cookies are small text files that contain information that can identify you to a Web site. Cause an increase in the number of pop-up ads sometimes even when you’re not online. Hijack your browser and direct you to undesirable Web pages.
Key loggers Key loggers record every keystroke made on the computer. Capture passwords, credit card numbers, bank account numbers, etc. Hardware key loggers attached between keyboard and computer Trojan horses can be used to distribute key loggers.
Avoiding Spyware Don’t use free file-sharing services – Kazaa, Morpheus, Share Bear Don’t click on buttons on pop-up ads – use the close X in the right corner of the window Use pop-up blocking software – already enabled in IE and Firefox
Protecting Your Computer Update your Operating System and Web browser Install and update Antivirus software AVG Free – www.download.com, type AVG free in Search boxwww.download.com Personal firewalls – prevent unauthorized access to your computer, prevent it from becoming a zombie Hardware - router Software – Windows XP and Vista have software firewall included
Protecting Yourself Avoid phishing attempts by never giving out personal information unless it is for legitimate purposes. Legitimate organizations will never ask for passwords, bank account numbers or credit card details through e-mail. Be aware of pharming. Pharming is the practice where fraudulent Web sites are created to look like an official Web site, so that unknowing clients and customers conduct business and reveal personal information. Create strong passwords that include combo of numbers and letters Never give out your passwords
Secure Web sites When using a web site for shopping or banking transactions, you want the Web site to be secure. In the address bar the URL should have the protocol HTTPS:// rather than just HTTP://