Mailing lists "Listservs" people must subscribe messages sent by email sent only to people who subscribe, not general public do NOT use the "Reply All" option unless you mean to!
E-commerce buying, selling, advertising, banking look for secure "signed" sites https:// versus http:// check with Better Business before buying use credit card for purchase
Online Dangers Spam – electronic junk mail Pop-ups – intrusive advertising Cookies – tracking user’s browsing habits Malware - software that has a malicious intent - spyware, viruses, Trojans, worms, etc. Phishing and Hoaxes – Ruses to fool and maybe steal from users
Spam Junk e-Mail May soon comprise 90% of email volume Named after a Monty Python sketch LinkLink Antispam practices Don’t reply to it, even to “unsubscribe”! Use “dummy” addresses – can get free ones Read privacy statement on a site before you give them your address Spam filters
Pop-ups Usually advertising Pop-up automatically Can also contain spyware Most browsers can prevent them Pop-up blockers
Cookies Text files stored on client computers when visiting Web sites Used on return visits to Web sites Unique ID number Personal information remembered Privacy risk Selling information
Spyware Added as a program piggybacked with a requested program Secretly gathers information, usually about surfing habits Spyware removal programs are required – Ad-aware or Malwarebytes are good
Spyware Very often comes in from file-sharing, P2P sites Ties up system resources, can modify browser settings, can spawn popups and other ads Read the EULA (end user license agreement) for any software you install before you install!
Phishing and Hoaxes Phishing is a phony communication from a trusted source Phishing attempts to scam someone into sending vital information Hoaxes are attempts to scam people into sending money, or join a chain letter (see snopes.com)
Malware Software that has a malicious intent Spyware is a form of malware Other forms are viruses, worms, and Trojan horses Designed to render a computer useless or control it completely
Internet Access Security A connection that is "always on" is a security risk - turn the computer off when you’re not using it! Keep OS and anti-virus software up to date USE firewall software browser security settings for LAN, use NAT - router Network Address Translation For more privacy on the Net, virtual private network (VPN)
Issue: Free Wi-Fi access Some people offer wireless access for free to the community A good point - people who can't afford to pay for it can use it Broadband providers don't like people giving it away for free A bad point - can be used for illegal activities