1 / 29

Windows Tutorial 5 Protecting Your Computer

Windows Tutorial 5 Protecting Your Computer Objectives Set up Windows Firewall and Windows Update Protect your computer from viruses and other malicious software Use Windows Defender to protect against spyware Manage Windows Mail security Objectives

paul2
Télécharger la présentation

Windows Tutorial 5 Protecting Your Computer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Windows Tutorial 5Protecting Your Computer

  2. Objectives • Set up Windows Firewall and Windows Update • Protect your computer from viruses and other malicious software • Use Windows Defender to protect against spyware • Manage Windows Mail security New Perspectives on Microsoft Windows Vista

  3. Objectives • Manage Microsoft Internet Explorer security • Set up user accounts • Control access to your computer • Secure and share folders New Perspectives on Microsoft Windows Vista

  4. Using the Windows Vista Security Center • Improved features in Windows Vista keep your computer safe from threats such as viruses, worms, hackers, crackers, and spyware • Security Center • Windows Defender • User Account Control • Back Up and Restore New Perspectives on Microsoft Windows Vista

  5. Using the Windows Vista Security Center New Perspectives on Microsoft Windows Vista

  6. Adding a Program to the Windows Firewall Exception List • Click the Start button, click Control Panel, click Security, and then click Windows Firewall • In the left pane, click Allow a program through Windows Firewall, then click the Continue button, if necessary • In the Program or port list, click to select a program check box. If a program does not appear in this list, click the Add program button, click a program in the Add a Program dialog box, or click the Browse button to locate and select a program • Click the OK button New Perspectives on Microsoft Windows Vista

  7. Setting Up Windows Update • An update is a change to software that can prevent or repair problems, enhance the security of the computer, or improve the computer’s performance • In the left pane of the Windows Security Center window, click Windows Update New Perspectives on Microsoft Windows Vista

  8. Setting Up Windows Update New Perspectives on Microsoft Windows Vista

  9. Protecting Your Computer from Malware • In the Windows Security Center window, examine the settings in the Malware protection section New Perspectives on Microsoft Windows Vista

  10. Defending Against Spyware • Spyware is software that can install itself or run on your computer without your consent or control • Adware • Pop-up ads • To perform a scan with Windows Defender: • Click the Start button, click Control Panel, click Security, and then click Windows Defender • Click the Scan button arrow on the toolbar, and then click Quick Scan New Perspectives on Microsoft Windows Vista

  11. Defending Against Spyware New Perspectives on Microsoft Windows Vista

  12. Scheduling a Spyware Scan • In the Windows Defender window, click the Tools button on the toolbar to open the Tools and Settings page, and then click Options New Perspectives on Microsoft Windows Vista

  13. Defending Against E-mail Viruses with Windows Mail • An annoying and potentially dangerous type of privacy invasion is spam, or junk e-mail • Start Windows Mail • Click Tools on the menu bar, and then click Options • Click the Security tab New Perspectives on Microsoft Windows Vista

  14. Defending Against E-mail Viruses with Windows Mail New Perspectives on Microsoft Windows Vista

  15. Adding a Sender to the Blocked Senders or Safe Senders List • To block a sender in Windows Mail, right-click a message whose sender you want to add to the Blocked Senders list, point to Junk E-mail, and then click Add Sender to Blocked Senders List on the shortcut menu • To always allow a sender, right-click a message whose sender you want to add to the Safe Senders list, point to Junk E-mail, and then click Add Sender to Safe Senders List on the shortcut menu • Click the OK button New Perspectives on Microsoft Windows Vista

  16. Managing Microsoft Internet Explorer Security • Internet Explorer offers the following security and privacy features: • Phishing filter • Protected mode • Digital signatures • Pop-up Blocker • Add-on Manager • Privacy settings and alerts • Secure connections New Perspectives on Microsoft Windows Vista

  17. Managing Microsoft Internet Explorer Security • Click the Tools button on the toolbar, point to Phishing Filter, and then click Check This Website New Perspectives on Microsoft Windows Vista

  18. Blocking Pop-up Ads • Click Tools on the Internet Explorer toolbar, point to Pop-up Blocker, and then click Pop-up Blocker Settings • Click the current Filter level setting, and then click a setting ranging from High to Low • Click the Close button New Perspectives on Microsoft Windows Vista

  19. Managing Add-on Programs • A browser add-on is a program offered by any software vendor that provides enhancementssuch as a toolbar or improved search feature New Perspectives on Microsoft Windows Vista

  20. Selecting Privacy Settings • Click Tools on the Internet Explorer toolbar, and then click Internet Options • Click the Privacy tab in the Internet Options dialog box • Drag the slider to select a privacy setting ranging from Block All Cookies to Accept All Cookies • Click the OK button New Perspectives on Microsoft Windows Vista

  21. Selecting Privacy Settings New Perspectives on Microsoft Windows Vista

  22. Internet Explorer Advanced Settings • You can manage advanced Internet Explorer settings to enhance the security of your computer • Enable third-party browser extensions • Do not save encrypted pages to disk • Empty Temporary Internet Files folder when browser is closed • Warn if changing between secure and not secure mode New Perspectives on Microsoft Windows Vista

  23. Setting Up User Accounts • Open the Control Panel in Category view, click User Accounts and Family Safety, and then click User Accounts • Click Manage another account • Click Create a new account • Type the new account name, click the Standard user option button or the Administrator option button, and then click the Create Account button New Perspectives on Microsoft Windows Vista

  24. Setting Up User Accounts • Click Create a Password • Click in the New password text box, and then type your password • Click in the Confirm new password text box, and then type your password again • Click in the Type a password hint text box, and then type a hint to help you remember your password • Click the Create password button New Perspectives on Microsoft Windows Vista

  25. Setting Up User Accounts New Perspectives on Microsoft Windows Vista

  26. Controlling Access to Your Computer • One way to manage access to your computer is to take advantage of User Account Control (UAC) • The UAC feature is turned on by default, and should not be turned off • Another way to protect your privacy and reduce power consumption is to let your computer go to sleep after a specified amount of idle time New Perspectives on Microsoft Windows Vista

  27. Securing and Sharing Folders • If more than one person uses your computer, you can share files and folders with them in two ways: • Explicitly allowing another user to share a folder • Storing files in the Public folder • When you explicitly share files, you set sharing permissions that determine who can change your files and what kinds of changes they can make New Perspectives on Microsoft Windows Vista

  28. Assigning Permissions to Folders • To specify which users can access a folder you want to share, click the folder in a folder window, click Share on the toolbar, and then enter the account name of another user on the computer New Perspectives on Microsoft Windows Vista

  29. Assigning Permissions to Folders New Perspectives on Microsoft Windows Vista

More Related