PC Troubleshooting 101


Published on

  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • This presentation does not address all of these threats listed but are mentioned because these issues affect your home computer as well. 1. Adware - Programs that secretly gather personal information through the Internet and relay it back to another computer, generally for advertising purposes. This is often accomplished by tracking information related to Internet browser usage or habits. 2. Dialers - Programs that use a system, without your permission or knowledge, to dial out through the Internet to a 900 number or FTP site, typically to accrue charges. 3. Hack Tools - Tools used by a hacker to gain unauthorized access to your computer. One example of a hack tool is a keystroke logger -- a program that tracks and records individual keystrokes and can send this information back to the hacker. Hoax – explained further in this presentation Remote Access - Programs that allow another computer to gain information or to attack or alter your computer, usually over the Internet. Remote access programs detected in virus scans may be recognizable commercial software, which are brought to the user's attention during the scan. Spyware - Stand-alone programs that can secretly monitor system activity. These may detect passwords or other confidential information and transmit them to another computer. Spyware can be downloaded from Web sites (typically in shareware or freeware), email messages, and instant messengers. A user may unknowingly trigger spyware by accepting an End User License Agreement from a software program linked to the spyware. Trojan Horse – discussed in this presentation Virus Worm
  • 1. Some districts do not allow users to install such software
  • If sending an attachment via email, send as Rich Text Format (.rtf)—viruses cannot attach to these files. Insert a bogus email address at the beginning of your address book (email will be returned to you, i.e. aa@none.com). Can send itself via shared files (disable file sharing).
  • Nachi has an expiration date for January 2004—should stop working then Bugbear continues to be circulated by email from people who do not know any better Hackers often use Microsoft Security Patches to target computers since they know there a lot who do not regularly update their operating systems with patches
  • Generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file.
  • The computer user becomes the virus by forwarding it to the masses via email
  • 1. This will be a warning to you that something has been sent out via your email account…run your antivirus software immediately! It will be returned to you “mailer damon – undeliverable email” 2. If downloading .zip files make sure that your AntiVirus software is up-to-date and running!
  • You can set your system to check for Microsoft Updates (Start, Programs, Windows Update or Accessories, System Tools)
  • This may be one of the most common error messages reported to technicians with many a classroom teacher not having use of their computer for days, even weeks. the system always reads the floppy drive to detect a boot disk before following the startup process
  • If ejected before the system was finished reading/writing to the diskette this message will appear. Happens often when students are working and the bell rings! You MUST insert the exact diskette that was being worked on, press Enter then once the green light turns off eject the diskette. If you cannot find the exact diskette to re-insert you will have to restart the computer.
  • PC Troubleshooting 101

    1. 1. Classroom PC Troubleshooting 101 Presented by Rima Duhon Region 4 Teaching, Learning and Technology Center Branch Lab LACUE, December 2003 Fatal Error
    2. 2. PC Troubleshooting Topics <ul><li>Protecting your computer & the network </li></ul><ul><ul><li>Types of Threats </li></ul></ul><ul><ul><li>Antivirus Software </li></ul></ul><ul><ul><li>Windows Updates </li></ul></ul><ul><li>Hardware Issues </li></ul><ul><ul><li>Computer, Monitor, Printer & Network </li></ul></ul><ul><ul><li>Shortcut Keys </li></ul></ul><ul><ul><li>Defragmenting and Scan Disc </li></ul></ul><ul><li>Software Issues </li></ul><ul><ul><li>Freezing </li></ul></ul><ul><ul><li>Error Messages </li></ul></ul><ul><ul><li>Other </li></ul></ul><ul><li>Questions </li></ul>
    3. 3. Protecting Your Computer and the Network <ul><li>Types of Threats </li></ul><ul><li>Operating System Updates </li></ul><ul><li>Antivirus Software </li></ul>
    4. 4. Types of Threats <ul><li>Adware </li></ul><ul><li>Dialers </li></ul><ul><li>Hack Tools </li></ul><ul><li>Hoax </li></ul><ul><li>Remote Access </li></ul><ul><li>Spyware </li></ul><ul><li>Trojan Horse </li></ul><ul><li>Virus </li></ul><ul><li>Worm </li></ul>
    5. 5. Types of Threats <ul><li>What you can do about Ad Ware or Spy Ware: </li></ul><ul><ul><li>Regularly delete cookies and temporary internet files, and empty cache </li></ul></ul><ul><ul><li>Install Ad Ware program and run regularly i.e. Ad-aware from Lavasoft (free) – http://www.lavasoft.de/support/download/#free </li></ul></ul><ul><ul><li>Install Spyware software and run regularly, i.e. Spybot </li></ul></ul>
    6. 6. Viruses <ul><li>Unwanted program or code that replicates </li></ul><ul><ul><li>spreads from computer to computer and can sometimes be very malicious. </li></ul></ul><ul><li>Runs without the user knowing it. </li></ul><ul><li>Can change system files without your knowledge and cause computer to do strange things, even crash. </li></ul><ul><li>Can send itself out via email to infect others. </li></ul><ul><ul><li>email attachment </li></ul></ul><ul><ul><li>Be cautious of downloading files that contain macros </li></ul></ul>
    7. 7. Viruses: Current Alerts <ul><li>Win32.Swen.A - email Microsoft Update notice </li></ul><ul><li>Win32.Mimail.J – PayPal expired account notice </li></ul><ul><li>Win32.Bugbear.B - jdbgmgr.exe </li></ul><ul><li>Win32.Holar.G - When the worm counter reaches 31, the worm attempts to disable the mouse and keyboard and deletes files from the local hard disk. </li></ul><ul><li>Win32.Nachi.A - worm exploits Dcom RPC vulnerability (Windows XP, 2000, NT 4.0) </li></ul><ul><li>Win32.Poza - worm using the exploit described in MS03-026 to gain access to unpatched Windows installations </li></ul>
    8. 8. Viruses: Trojan Horses <ul><li>Trojan Horses are impostors--files that claim to be something desirable but, in fact, are malicious. </li></ul><ul><ul><li>They do not replicate themselves. </li></ul></ul><ul><ul><li>Contain malicious code that when triggered can cause loss, or even theft, of data. </li></ul></ul><ul><ul><li>Sent by email to you – it does not email itself. </li></ul></ul><ul><ul><ul><li>opening an email attachment or downloading and running a file from the Internet. </li></ul></ul></ul>
    9. 9. Viruses: Trojan Horses <ul><li>Backdoor.SubSeven is a Trojan horse, similar to Netbus or Back Orifice. It enables unauthorized people to access your computer over the Internet without your knowledge. </li></ul><ul><li>PWSteal.Trojan attempts to steal login names and passwords. </li></ul><ul><ul><li>Do not save passwords on your computer! </li></ul></ul><ul><li>JS.Seeker </li></ul>
    10. 10. Viruses: Worms <ul><li>Worms are programs that replicate themselves from system to system without the use of a host file. </li></ul><ul><ul><li>In contrast to viruses which requires the spreading of an infected host file. </li></ul></ul><ul><ul><li>There is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the &quot;worm&quot; macro inside the document. The entire document will travel from computer to computer via the network, so the entire document should be considered the worm. </li></ul></ul>
    11. 11. Hoax <ul><li>Also called “viruses” </li></ul><ul><li>Email in chain letter fashion </li></ul><ul><ul><li>describes some devastating, highly unlikely type of virus or a big pay off if you forward the email </li></ul></ul><ul><ul><li>Microsoft is not going to pay you for beta testing anything! </li></ul></ul><ul><ul><li>Victoria’s Secret is not going to send you a coupon for forwarding an email! </li></ul></ul><ul><ul><li>The “Teddy Bear” hoax has you delete a program that was installed with Windows. jdbmgr.exe is the Java Debugger Manager and does have an icon that looks like a Teddy Bear. </li></ul></ul><ul><ul><li>With this, YOU are the virus! </li></ul></ul>
    12. 12. Hoax <ul><li>How do you know if something is a hoax? </li></ul><ul><li>Access one of the following web sites: </li></ul><ul><ul><li>Hoaxbusters </li></ul></ul><ul><ul><li>http:// hoaxbusters.ciac.org / </li></ul></ul><ul><ul><ul><li>This site is a Federal computer system and is the property of the United States Government. It is maintained by the US Department of Energy. </li></ul></ul></ul><ul><ul><ul><li>They maintain a list of known hoaxes. </li></ul></ul></ul><ul><ul><li>Symnantec Security Response http://www.symantec.com/avcenter/hoax.html </li></ul></ul><ul><ul><li>Sophos http://www.sophos.com/virusinfo/explained/teachers.html </li></ul></ul>
    13. 13. Anti-Virus Software <ul><li>“ The best defense is a good offense”--Install anti-virus software, update it regularly (daily) and run it DAILY. </li></ul><ul><li>Free: AVG from Grisoft available at www.grisoft.com </li></ul><ul><li>Use the licensed version of the Anti-Virus software purchased by your district. </li></ul>
    14. 14. Protect Your Computer <ul><li>Create a bogus email address in your address book, i.e. aa@none.com </li></ul><ul><li>Do not open or download files from unknown or forwarded emails and be cautious of those from people you do know. File extensions to look for: </li></ul><ul><ul><li>.pif or a dual extension .exe.pif </li></ul></ul><ul><ul><li>If on a network you open the whole system up for infection. </li></ul></ul><ul><li>Do not run or download executable files (.exe or .zip extension) from the Internet or any attached to an email. </li></ul>
    15. 15. Protect Your Computer <ul><li>Rather than sending a document as an attachment, whenever possible paste the text from the document into the body of your email. </li></ul><ul><li>Save any Word files in Rich Text Format (RTF) as opposed to DOCs. RTF files do not support the macro language and cannot carry viruses. </li></ul><ul><li>Do not download games from web sites. </li></ul><ul><li>Check for Microsoft’s security updates regularly. </li></ul><ul><li>Write-protect floppy disks before inserting them into other users' computers. </li></ul>
    16. 16. Protect Your Computer <ul><li>Establish, and enforce, a “SCAN FIRST” policy if you allow others/students to use floppies from outside of the classroom/home. </li></ul><ul><ul><li>Insert diskette then run an anti-virus scan on the 3-1/2 floppy drive before allowing any file to be opened. </li></ul></ul><ul><ul><li>Insert CD-ROM then run an anti-virus scan on the CD-ROM drive before allowing any file to be opened (generally applies to CD-R or CD-RW’s) </li></ul></ul>
    17. 17. Protect Your Computer <ul><li>Backup important data regularly. </li></ul><ul><ul><li>If data can be easily reproduced don’t worry about it. </li></ul></ul><ul><li>Schedule regular (daily) tests by anti-virus software and make sure the computer is on prior to the scheduled run time! </li></ul>
    18. 18. Protect Your Computer <ul><li>There are two things that are most important in protecting your computer and your systems network: </li></ul><ul><li>Install, Update and Run Anti-Virus Software DAILY. </li></ul><ul><li>Update Windows operating system directly from the Microsoft web site ( www.microsoft.com ) or set your computer to check for updates automatically. </li></ul><ul><li>Note: Windows XP requires log in as administrator to receive & install updates </li></ul>
    19. 19. PC Troubleshooting Hardware Issues
    20. 20. Hardware Issues: <ul><li>The computer, monitor or printer will not power up. </li></ul><ul><ul><li>Check the cable connections to assure they are tightly inserted (pushing, never rocking--Bent pins can cause a problem). </li></ul></ul><ul><ul><li>Check the surge protector, it may be unplugged or turned off. </li></ul></ul><ul><ul><li>Unplug from surge protector and plug directly into power source (surge protector may be bad). </li></ul></ul>
    21. 21. Hardware Issues: <ul><ul><li>If a printer will not power up and all connections are tightly inserted, get another printer power supply and try it. </li></ul></ul><ul><ul><ul><li>If it works the power supply needs to be replaced. </li></ul></ul></ul><ul><ul><li>Check with school custodian, inform of power problem and ask him/her to check switches/breakers to your classroom. </li></ul></ul><ul><ul><li>If all of the above fails follow your district’s technology department procedures for requesting technical/repair assistance. </li></ul></ul>
    22. 22. Hardware Issues: <ul><li>If monitor screen is black </li></ul><ul><ul><li>Make sure the monitor is turned on. </li></ul></ul><ul><ul><li>If energy saving feature is “on” the system may be sleeping, press a key on the keyboard or move the mouse around a bit and wait to see if the monitor comes on. Power light on monitor will be amber rather than green if sleeping (timed out). </li></ul></ul><ul><ul><li>Check power cord for tight connection and see that is plugged into power supply. </li></ul></ul>
    23. 23. Hardware Issues: <ul><ul><li>If power is on and cables are connected but still have a dark screen, check brightness and/or contrast controls and adjust settings. </li></ul></ul><ul><ul><li>Get another monitor that you know is working and establish that the video card is working. </li></ul></ul><ul><ul><ul><li>If the other monitor works, the original monitor may be faulty. </li></ul></ul></ul><ul><ul><ul><li>If the other monitor does not work, the video card may be at fault. </li></ul></ul></ul>
    24. 24. Hardware Issues: <ul><li>The computer started up with a blue screen stating that the system had not been properly shut down and a scan started running. </li></ul><ul><ul><li>Let the scan run and once completed normal startup will begin. </li></ul></ul><ul><ul><li>This will occur when the power button is pushed to turn the computer off without going to Start, Shut Down. </li></ul></ul>
    25. 25. Hardware Issues: <ul><li>A red, green and blue striped box is displayed on the monitor with the text “No Sync Input.” </li></ul><ul><ul><li>This means that the monitor is on but it is not receiving a signal from the system. </li></ul></ul><ul><ul><li>Turn the desktop/tower on at the power switch. </li></ul></ul>
    26. 26. Hardware Issues: <ul><li>I cannot print. </li></ul><ul><ul><li>There are many things that can cause this problem: </li></ul></ul><ul><ul><ul><li>Check to see that printer is turned on. </li></ul></ul></ul><ul><ul><ul><li>Shared Printer </li></ul></ul></ul><ul><ul><ul><ul><li>If the printer is connected to another computer, make sure that the shared computer is turned on. </li></ul></ul></ul></ul><ul><ul><li>Default Printer </li></ul></ul><ul><ul><ul><li>Make sure that you are trying to print to the right printer by going to File, Print and double-checking which printer is identified in the printer name box. </li></ul></ul></ul><ul><li>Check/Change Cable </li></ul>
    27. 27. Hardware Issues: <ul><ul><ul><li>Connect printer to another computer and try printing from it. </li></ul></ul></ul><ul><ul><ul><ul><li>If prints problem may be within the computer </li></ul></ul></ul></ul><ul><ul><ul><ul><li>If does not print problem may be with the printer. </li></ul></ul></ul></ul><ul><ul><ul><li>Check manufacturer web site for updated printer drivers, download and install. Try printing again. </li></ul></ul></ul><ul><ul><ul><li>Uninstall then reinstall printer software. Try printing again. </li></ul></ul></ul><ul><ul><ul><li>Access the printer diagnostic program. </li></ul></ul></ul><ul><ul><ul><li>Turn the printer off and restart the computer. </li></ul></ul></ul>
    28. 28. Hardware Issues: <ul><li>The numeric keypad does not work. </li></ul><ul><ul><li>The Num Lock must be on, indicated by a green light. </li></ul></ul><ul><ul><li>If Num Lock is off, push the Num Lock key in the upper left corner of the numeric keypad. </li></ul></ul>
    29. 29. <ul><li>The keyboard is frozen. </li></ul><ul><ul><li>Shut the computer down. </li></ul></ul><ul><ul><li>Unplug the keyboard from the port and reinsert tightly. </li></ul></ul><ul><ul><li>Wait about 60 seconds then turn power back on. </li></ul></ul><ul><ul><ul><li>If you did not save prior to the keyboard freezing you may lose all data entered after the last save. </li></ul></ul></ul>Hardware Issues:
    30. 30. Hardware Issues: <ul><li>The mouse is frozen. </li></ul><ul><ul><li>If it is a new mouse you may need to install the mouse software. </li></ul></ul><ul><ul><li>Check to make sure that the connection is tight (push, never wiggle). Check pins. </li></ul></ul><ul><ul><li>Save what you’re working on by using the shortcut keys “Ctrl + S” then shut the computer down. Unplug and reconnect mouse cable to the port tightly (pushing not wiggling). Wait 60 seconds and then power up again. </li></ul></ul>
    31. 31. Hardware Issues: <ul><ul><li>Check to see that mouse ball is inserted (children love to take them and use them as a marble!). </li></ul></ul><ul><ul><ul><li>If the mouse ball is missing you can still work using shortcut keys—see handout. </li></ul></ul></ul><ul><ul><li>Clean the inside of the mouse, gunk collects inside the housing for the mouse ball which may cause problems. </li></ul></ul>
    32. 32. Hardware Issues: <ul><ul><li>To clean the wheels inside the mouse: </li></ul></ul><ul><ul><ul><li>Remove the cover from the back of the mouse. </li></ul></ul></ul><ul><ul><ul><li>Remove the mouse ball. </li></ul></ul></ul><ul><ul><ul><li>Use a Q-Tip dipped in rubbing alcohol to gently rub buildup from wheels. </li></ul></ul></ul><ul><ul><ul><li>Replace mouse ball and cover. </li></ul></ul></ul>
    33. 33. Hardware Issues: <ul><li>Computer is frequently freezing, hanging, or crashing. </li></ul><ul><ul><li>Freezing usually describes the system suddenly becoming completely inactive while running with no error messages on the screen, the mouse pointer will not move, and pressing keys has no effect (yet system beeps may be heard). </li></ul></ul>
    34. 34. Hardware Issues: <ul><ul><li>You will probably lose all work if you have not saved prior to the system freezing. </li></ul></ul><ul><ul><li>Press “Ctrl + Alt + Del” simultaneously. The Close Program dialog box will open. If a program is not responding this will be noted. </li></ul></ul><ul><ul><ul><li>Click on the program name. </li></ul></ul></ul><ul><ul><ul><li>Press the End Task button. If another window opens press End Task again. </li></ul></ul></ul>
    35. 35. Hardware Issues: <ul><ul><ul><ul><li>Press “Ctrl + Alt + Del” again then press Shut Down button. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Press the “Reboot” button, not the power button, to restart the system. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Press the Power button on the desktop/tower and let system cool down for several minutes before restarting. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Last resort, unplug from power supply then reconnect and power up again. </li></ul></ul></ul></ul>If system remains frozen then you must shut down:
    36. 36. Hardware Issues: <ul><li>Computer is slow to load or run programs. </li></ul><ul><ul><li>Delete “Findfast” from your system. </li></ul></ul><ul><ul><li>Check the space available on the C: drive. </li></ul></ul><ul><ul><ul><li>Delete all temporary internet files and cookies (If not emptied on a regular basis they can consume a lot of memory). </li></ul></ul></ul><ul><ul><ul><li>Delete unnecessary programs or files. </li></ul></ul></ul><ul><ul><li>Run Scan Disc and then Defragment the C: drive – see handout. </li></ul></ul>
    37. 37. Scan Disc & Defragment <ul><li>Open My Computer then right-click on the C: drive. Click Properties in the pop-up menu. </li></ul><ul><li>The Properties dialog box opens with the General tab active. </li></ul><ul><ul><li>DiskCleanup </li></ul></ul><ul><li>Click the Tools tab. </li></ul><ul><ul><li>Error Checking </li></ul></ul><ul><ul><li>Defragment </li></ul></ul>
    38. 38. Hardware Issues: <ul><li>Computer started in Safe Mode. </li></ul><ul><ul><li>You can still use your computer but Windows loads minimal or limited options. </li></ul></ul><ul><ul><li>This is Windows way of indicating that there is a problem. </li></ul></ul><ul><ul><li>You can restart the computer and it should start up in normal mode. </li></ul></ul>
    39. 39. Network Issues: <ul><li>I cannot access the Internet. </li></ul><ul><ul><li>Did you log on to the network correctly? </li></ul></ul><ul><ul><li>Check the T1-line into the computer to make sure that it is tightly inserted and that a green light is on. </li></ul></ul><ul><ul><li>Remove and reinsert line. </li></ul></ul><ul><ul><li>Try another T1-line. </li></ul></ul><ul><ul><li>See if other computers in school </li></ul></ul><ul><ul><li>are having the same problem. </li></ul></ul><ul><ul><li>Reset the hub/check with school </li></ul></ul><ul><ul><li>technology liaison. </li></ul></ul><ul><ul><li>Contact Technical Department if </li></ul></ul><ul><ul><li>school’s network access is down. </li></ul></ul>
    40. 40. PC Troubleshooting Software Issues
    41. 41. Software Issues: <ul><li>To find out what version of Windows is installed, what type of processor is installed or how much RAM the computer has: </li></ul><ul><ul><li>Right click on the My Computer icon on the desktop. A pop-up menu appears. </li></ul></ul><ul><ul><li>On the pop-up menu click Properties . </li></ul></ul><ul><ul><li>In the System Properties dialog box the General tab will be active and displaying all system information. </li></ul></ul>
    42. 42. Software Issues Operating System & Version Registration Number Processor RAM
    43. 43. Software Issues: <ul><li>The program I’m working in has frozen. </li></ul><ul><ul><li>Press “Ctrl + Alt + Del” simultaneously. The Close Program dialog box will open. If a program is “Not Responding” this will be noted. </li></ul></ul><ul><ul><li>Note: See Hardware Issues: Freezing and follow same procedures </li></ul></ul>
    44. 44. Software Issues: <ul><li>While working on a document my system froze. I received a “Fatal Error Message” after pressing “End Task” from the Close Program dialog box. </li></ul><ul><li>OR </li></ul><ul><li>While running a program you received a full blue screen that said there was a Fatal Exception Error. </li></ul>This is called the “Blue Screen of Death”!
    45. 45. Software Issues: <ul><li>Two options were provided, which do I choose: “Hit any key to continue” or “press Ctrl+Alt+Del” ? </li></ul><ul><li>Press any key to continue: If you choose this option you may or may not get back to the document that you were working on prior to this error occurring. </li></ul><ul><li>Press Ctrl+Alt+Del: This will reboot the system and restart it. </li></ul>
    46. 46. Software Issues: <ul><li>I turned the computer on, my system will not boot up, and the following message appeared: </li></ul><ul><ul><li>There is a floppy diskette in the 3-1/2 Floppy drive. Eject the floppy diskette then press any key. </li></ul></ul>
    47. 47. Software Issues: <ul><li>After saving to a floppy diskette I ejected the disk and the following screen appeared. I cannot get back to my desktop. </li></ul>
    48. 48. Software Issues: <ul><li>When I try to start a program from the shortcut I get a “Missing Program” error. </li></ul><ul><ul><li>If the program was moved from it’s original location, delete the old shortcut and create a new shortcut to the new location. </li></ul></ul><ul><ul><li>The program may have been deleted without being properly uninstalled – see handout on how to uninstall a program. </li></ul></ul>
    49. 49. Software Issues: <ul><ul><li>The shortcut is trying to access the program from the CD-ROM drive but the program is not in the drive. </li></ul></ul><ul><ul><li>A second hard drive or another drive has been installed which kicked the CD-ROM letter up to a new letter—see handout for instructions on how to redirect shortcut. </li></ul></ul>
    50. 50. Software Issues: <ul><li>One of my students has downloaded a picture from the Internet onto the desktop. How do I get the picture off and get back to the regular desktop? </li></ul><ul><ul><li>See handout for instructions on Display Properties. </li></ul></ul>
    51. 51. Software Issues: <ul><li>My desktop, mouse pointer and sounds have been changed. How do I go back to the original settings? </li></ul><ul><ul><li>See handout for instructions on Display Properties, how to reset the mouse pointer and how to reset sounds. </li></ul></ul>
    52. 52. Software Issues: <ul><li>I was inserting text into a document and it was erasing the text as I typed rather than inserting. </li></ul><ul><ul><li>The “Insert” key was toggled off. </li></ul></ul><ul><ul><li>Push the “Insert” key located between the alpha-numeric keys and the numeric keypad. </li></ul></ul><ul><ul><li>If working in MS Word, you can “Undo” back to the original text--see handout for alternate method of toggling the Insert option on and off in Word. </li></ul></ul>
    53. 53. Credits <ul><li>Computer Associates (CA) available at </li></ul><ul><ul><li>http://www3.ca.com/virusinfo/glossary.aspx </li></ul></ul><ul><li>Donald Gremilion, Network Specialist, Vermilion Parish School Board </li></ul><ul><li>Grisoft, Inc. (AVG) available at www.grisoft.com Kim Bergeron, IT Facilitator, Lafayette Parish School System </li></ul><ul><li>Symantec available at </li></ul><ul><ul><li>http://securityresponse.symantec.com/avcenter/refa.html#Distribution </li></ul></ul><ul><li>Mike Dartez, Instructional Assistant, Region 4 TLTC </li></ul><ul><li>Wendel Zerangue, Network Administrator, Lafayette Parish School System </li></ul>
    54. 54. Do you have any Questions?
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.