SlideShare a Scribd company logo
1 of 18
Online Security The slides for this presentation are available on the web.  For directions to get to them see “Sharing Your Presentation” at http:// WhiteHouseComputing.Blogspot.Com JIM change the access directions below
Improving Security ,[object Object],[object Object],Microsoft Critical Security Bulletins for February 2007   Lets click above and take a look at the six “critical” fixes “ An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.” Or in other words…  THE HACKER OWNS YOU
Improving Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Security ,[object Object],[object Object],For Virus and Spyware gunk that gets in anyway… 2. Install and run Anti Virus software – keep subscription current
Improving Security ,[object Object],AntiVirus includes two critical components: 1. Software - purchased 2. Virus Descriptions – subscribed to What happens to protection when the subscription runs out? Answer: a virus created after that date will be much harder – maybe impossible – for your antivirus software to detect.
Improving Security ,[object Object],[object Object],For Virus and Spyware gunk that gets in anyway… 2. Install and run Anti Virus software – keep subscription current 3. Install and run AntiSpyware software–keep subscription current
Improving Security ,[object Object],[object Object],For Virus and Spyware gunk that gets in anyway… 2. Install and run Anti Virus software – keep subscription current 3. Install and run AntiSpyware software–keep subscription current 4. Run a Firewall ,[object Object],[object Object],[object Object],4. Windows Firewall 5. On Note – assumes you are not running a different firewall already
Improving Security ,[object Object],[object Object],[object Object],[object Object],[object Object],** CREATE A SYSTEM RESTORE POINT **
Improving Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Restoring TO a Previous Point ,[object Object],2. Click Restore my Computer.. 3. Click Next, Follow Directions
De-Gunk a  New  Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fini ,[object Object],[object Object],Contact Info: JimWhite@OptOnline.Net Note – the above contact information is NOT in the presentation on the web
Online Security
Online Security
Online Security
Online Security
Online Security
Online Security

More Related Content

What's hot

Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Os structure
Os structureOs structure
Os structureMohd Arif
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowkaran saini
 
Operating system 11 system calls
Operating system 11 system callsOperating system 11 system calls
Operating system 11 system callsVaibhav Khanna
 
Quality attributes(Non operational) of embedded systems
Quality attributes(Non operational) of embedded systemsQuality attributes(Non operational) of embedded systems
Quality attributes(Non operational) of embedded systemsShreyaBhoje
 
CPU Architecture - Basic
CPU Architecture - BasicCPU Architecture - Basic
CPU Architecture - BasicYong Heui Cho
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemPrankit Mishra
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Presentation on Segmentation
Presentation on SegmentationPresentation on Segmentation
Presentation on SegmentationPriyanka bisht
 
我的 Windows 平台自動化經驗:基礎批次檔撰寫實務
我的 Windows 平台自動化經驗:基礎批次檔撰寫實務我的 Windows 平台自動化經驗:基礎批次檔撰寫實務
我的 Windows 平台自動化經驗:基礎批次檔撰寫實務Will Huang
 
Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ahmar Hashmi
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
INTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptxINTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptxLECO9
 

What's hot (20)

Protection and security
Protection and securityProtection and security
Protection and security
 
Os structure
Os structureOs structure
Os structure
 
Chapter 8 - Main Memory
Chapter 8 - Main MemoryChapter 8 - Main Memory
Chapter 8 - Main Memory
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Unix case-study
Unix case-studyUnix case-study
Unix case-study
 
Operating system 11 system calls
Operating system 11 system callsOperating system 11 system calls
Operating system 11 system calls
 
Memory management OS
Memory management OSMemory management OS
Memory management OS
 
System bus
System busSystem bus
System bus
 
Quality attributes(Non operational) of embedded systems
Quality attributes(Non operational) of embedded systemsQuality attributes(Non operational) of embedded systems
Quality attributes(Non operational) of embedded systems
 
CPU Architecture - Basic
CPU Architecture - BasicCPU Architecture - Basic
CPU Architecture - Basic
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Introduction to embedded system
Introduction to embedded systemIntroduction to embedded system
Introduction to embedded system
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Presentation on Segmentation
Presentation on SegmentationPresentation on Segmentation
Presentation on Segmentation
 
我的 Windows 平台自動化經驗:基礎批次檔撰寫實務
我的 Windows 平台自動化經驗:基礎批次檔撰寫實務我的 Windows 平台自動化經驗:基礎批次檔撰寫實務
我的 Windows 平台自動化經驗:基礎批次檔撰寫實務
 
Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)
 
OPERATING SYSTEM.pptx
OPERATING SYSTEM.pptxOPERATING SYSTEM.pptx
OPERATING SYSTEM.pptx
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
INTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptxINTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptx
 

Viewers also liked

Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Becky Benishek
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settingsAbhishek Gupta
 
3.5.09 Powerpoint Facebook For Beginners DWC Teleclass
3.5.09 Powerpoint Facebook For Beginners DWC Teleclass3.5.09 Powerpoint Facebook For Beginners DWC Teleclass
3.5.09 Powerpoint Facebook For Beginners DWC TeleclassErin Murphy
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.comKrishan Majumder
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentationahazley
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpointmyra14
 

Viewers also liked (9)

Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)
 
Facebook security
Facebook securityFacebook security
Facebook security
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
3.5.09 Powerpoint Facebook For Beginners DWC Teleclass
3.5.09 Powerpoint Facebook For Beginners DWC Teleclass3.5.09 Powerpoint Facebook For Beginners DWC Teleclass
3.5.09 Powerpoint Facebook For Beginners DWC Teleclass
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.com
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 
Facebook ppt
Facebook pptFacebook ppt
Facebook ppt
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 

Similar to Online Security

De-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCDe-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCJimWhite
 
so big ppt
so big pptso big ppt
so big pptcainem
 
so big
so bigso big
so bigcainem
 
so big 22
so big 22so big 22
so big 22cainem
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Ted Whittemore
 
Common tasks oct 2012
Common tasks oct 2012Common tasks oct 2012
Common tasks oct 2012mike2977
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Troubleshoot Can’t Install Sophos Antivirus Issue
Troubleshoot Can’t Install Sophos Antivirus IssueTroubleshoot Can’t Install Sophos Antivirus Issue
Troubleshoot Can’t Install Sophos Antivirus IssueKevin Pierce
 
Fixing windows 10 automatic updates install problem
Fixing windows 10 automatic updates install problemFixing windows 10 automatic updates install problem
Fixing windows 10 automatic updates install problemscarlet christer
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guidejameszzzzz
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guidejameszzzz
 

Similar to Online Security (20)

Four Things You Should Do to Your Computer Today
Four Things You Should Do to Your Computer TodayFour Things You Should Do to Your Computer Today
Four Things You Should Do to Your Computer Today
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
De-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCDe-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PC
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
so big ppt
so big pptso big ppt
so big ppt
 
so big
so bigso big
so big
 
so big 22
so big 22so big 22
so big 22
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
Common tasks oct 2012
Common tasks oct 2012Common tasks oct 2012
Common tasks oct 2012
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Troubleshoot Can’t Install Sophos Antivirus Issue
Troubleshoot Can’t Install Sophos Antivirus IssueTroubleshoot Can’t Install Sophos Antivirus Issue
Troubleshoot Can’t Install Sophos Antivirus Issue
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
 
Fixing windows 10 automatic updates install problem
Fixing windows 10 automatic updates install problemFixing windows 10 automatic updates install problem
Fixing windows 10 automatic updates install problem
 
Girl Gets Ring
Girl Gets RingGirl Gets Ring
Girl Gets Ring
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guide
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guide
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 

More from JimWhite

Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013JimWhite
 
Computer safety on a mac
Computer safety on a macComputer safety on a mac
Computer safety on a macJimWhite
 
Neat useful things to do on the internet
Neat useful things to do on the internetNeat useful things to do on the internet
Neat useful things to do on the internetJimWhite
 
301 Intro To Internet
301 Intro To Internet301 Intro To Internet
301 Intro To InternetJimWhite
 
Web 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet PossibleWeb 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet PossibleJimWhite
 
Maintaining Your Computer
Maintaining Your ComputerMaintaining Your Computer
Maintaining Your ComputerJimWhite
 
De-Gunking Your Computer
De-Gunking Your ComputerDe-Gunking Your Computer
De-Gunking Your ComputerJimWhite
 

More from JimWhite (7)

Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013
 
Computer safety on a mac
Computer safety on a macComputer safety on a mac
Computer safety on a mac
 
Neat useful things to do on the internet
Neat useful things to do on the internetNeat useful things to do on the internet
Neat useful things to do on the internet
 
301 Intro To Internet
301 Intro To Internet301 Intro To Internet
301 Intro To Internet
 
Web 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet PossibleWeb 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet Possible
 
Maintaining Your Computer
Maintaining Your ComputerMaintaining Your Computer
Maintaining Your Computer
 
De-Gunking Your Computer
De-Gunking Your ComputerDe-Gunking Your Computer
De-Gunking Your Computer
 

Recently uploaded

Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...JeylaisaManabat1
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi OneDay18
 
Call Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls AgencyCall Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls Agencykojalkojal131
 
ingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet saucesingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet saucesJessicaEscao
 
Benefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in IndiaBenefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in IndiaBrantfordIndia
 
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Mikko Kangassalo
 
English basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdfEnglish basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdfbromerom1
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfAmitRout25
 
The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)Shakti Savarn
 

Recently uploaded (9)

Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi
 
Call Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls AgencyCall Girls Dubai O525547819 Favor Dubai Call Girls Agency
Call Girls Dubai O525547819 Favor Dubai Call Girls Agency
 
ingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet saucesingrediendts needed in preparing dessert and sweet sauces
ingrediendts needed in preparing dessert and sweet sauces
 
Benefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in IndiaBenefits of Co working & Shared office space in India
Benefits of Co working & Shared office space in India
 
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
 
English basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdfEnglish basic for beginners Future tenses .pdf
English basic for beginners Future tenses .pdf
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdf
 
The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)The 5 sec rule - Mel Robins (Hindi Summary)
The 5 sec rule - Mel Robins (Hindi Summary)
 

Online Security

  • 1. Online Security The slides for this presentation are available on the web. For directions to get to them see “Sharing Your Presentation” at http:// WhiteHouseComputing.Blogspot.Com JIM change the access directions below
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.