1 / 6

Computer Safety

Computer Safety. By Taylor Massey. Virus Protection. Anti-virus Software protects your computer from viruses that can destroy your data and slow the performance of your computer. It works by scanning your computer and your incoming emails.

kaori
Télécharger la présentation

Computer Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Safety By Taylor Massey

  2. Virus Protection • Anti-virus Software protects your computer from viruses that can destroy your data and slow the performance of your computer. • It works by scanning your computer and your incoming emails. • It should update its self routinely with antidotes to the latest “bugs”

  3. Spyware • Spyware is installed on your computer with out your consent. • Spyware software monitors or controls your computer us. • I may be used to send you pop-ups or redirect your computer to websites.

  4. Internet safety • Never put your full name or phone number. • Don’t put things on the internet you wouldn’t want someone to see or know. • Consider not posting your photo. • And be wary if a new friend wants to meet you.

  5. Online shopping • Know who your dealing with. • Know exactly what your buying. • Know what it will cost. • Keep a paper trail. • Check the privacy.

  6. Wireless Security • Going wireless requires a broadband internet connection into your home called an “access point”. • This means your neighbors or hackers nearby can “piggyback” on your network. • Use encryption like WPA and WEP. • Don’t assume that public “Hotspots” are secure.

More Related