Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Start playing the spam song a few minutes before class starts
  • yada yada yada
  • What are you hoping to find out about or learn today?
  • spelling does not come from group Phish but from the fact that hackers often use ph for the letter F
  • note handouts: paypal.pdf and topemailtips.pdf
  • group debrief: In your groups, discuss the email problems that you have encountered with phishing. Has anyone ever clicked on any of the links in a fake email? If you did what happened? What sort of advice have you/would you give your patrons to help them avoid phishers? THEN move on to speed teaching minute (next slide)
  • Look for extensions like .pif, .exe, .com, .scr - common virus extensions in attachments Handouts: virusprotection_tips.pdf
  • note the fact that hotmail account address books CAN’T be exported! gmail okay but hard to get (invitation only) most free webmail accounts offer upgrades for $$$
  • note that ISPs generally have pretty generous email limits - much higher than 2MB. Explain POP mail vs webmail
  • On by default is good. On by default. Keep it on. By default, spam gets saved for a month in the Bulk folder. This allows you to make sure no good email gets stuck in there, and if it does you can tell Mail it’s not junk. You want to add new spam to the spam filter, and you want to add good email to your address book, so Mail won’t continue to think it’s spam. Image blocking - hmmm. Images are safe, but loading them will slow your email viewing down. So let SpamGuard make the choice for you. You can always view them later.
  • Plain text can be read by all email programs and loads much faster for dialup folks very useful in work-related emails or when sending to large numbers of people - discuss this in class so they understand the difference!
  • Please include a slide like this for each exercise with the numberof the exercise and exercise name. Feel free to add a graphic or sound appropriate to the exercise (humor is fine)
  • Handouts for this section: spywarepervasive.pdf
  • demo anti-spyware software here. show spybot and microsoft’s tool. mention spybot is on the cd.
  • activex settings are controlled in Internet Options in IE
  • Spybot on the class cds
  • show netscape and its advertising. also use yahoo mail as an example - adware is there, too
  • note adaware is on cd demo adaware show popup blocking in IE 6 note it’s not available in IE 6 without service pack 2 in windows xp
  • this is a small group exercise. they should trade off being staff and patron.
  • ppt

    1. 1. Desktop Self-Defense Instructor: Eileen O’Shea [email_address] An Infopeople Workshop Fall/Winter 2005
    2. 2. This Workshop Is Brought to You By the Infopeople Project Infopeople is a federally-funded grant project supported by the California State Library. It provides a wide variety of training to California libraries. Infopeople workshops are offered around the state and are open registration on a first-come, first-served basis. For a complete list of workshops, and for other information about the project, go to the Infopeople website at infopeople.org.
    3. 3. Introductions <ul><li>Name </li></ul><ul><li>Library </li></ul><ul><li>Position </li></ul>
    4. 4. Desktop Self-Defense Overview <ul><li>Spam, scams & viruses & what you can do to protect yourself </li></ul><ul><li>Why webmail is useful - and what to look for in a webmail account </li></ul><ul><li>Firewalls & Internet Explorer security options </li></ul><ul><li>How to protect your computer from spyware & adware </li></ul>
    5. 5. Desktop Self-Defense: A Few Important Tips <ul><li>Make sure automatic updates are turned ON & you install the updates </li></ul><ul><li>Make sure you have file extension viewing turned ON </li></ul><ul><li>Make sure you have antivirus software on your computer & you update it AT LEAST once a month (weekly is better!) </li></ul><ul><li>Be smart about your passwords! </li></ul>
    6. 6. first up… Getting a Grip on Email!
    7. 7. What Is Spam? <ul><li>Spamming is the use of any electronic communications medium to send unsolicited messages in bulk. While its definition is usually limited to indiscriminate bulk mailing and not any targeted marketing, the term &quot;spam&quot; can refer to any commercially oriented, unsolicited bulk mailing perceived as being excessive and undesired. </li></ul>
    8. 8. How Much Spam? <ul><li>Spam accounted for 77% of all email traffic in 2004 </li></ul><ul><li>Telephone-based survey of adults who use the Internet found that more than 75% receive spam daily </li></ul><ul><li>The average spam messages per day is 18.5 and the average time spent per day deleting them is 2.8 minutes </li></ul><ul><li>More than two in five spam emails are medically related </li></ul>
    9. 9. What Is Phishing? <ul><li>Phishing (also known as carding and spoofing) is an attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishing arises from the use of increasingly sophisticated lures to &quot;fish&quot; for users' financial information and passwords. </li></ul>
    10. 10. Tips to Avoid Spam & Phishing Scams <ul><li>Don’t open strange attachments </li></ul><ul><li>Never email personal or financial info </li></ul><ul><li>Keep virus software up-to-date </li></ul><ul><li>Never click on links in email that say “click here” or “login here” </li></ul><ul><li>Don’t buy into any email promising you large sums of money if you email them personal information </li></ul><ul><li>Email that starts “dear customer” is NOT legitimate! </li></ul>
    11. 11. Using Bookmarks in Class <ul><li>Go to: http:// bookmarks.infopeople.org/desktopselfdefense_bk.html </li></ul><ul><li>With the page showing in Internet Explorer, click the Favorites menu, choose Add to Favorites… </li></ul><ul><li>Notice the name in the Name: box so that you can use the Favorites list to get back to the class bookmarks for the rest of the day. </li></ul>
    12. 12. Exercise #1 How to Spot an Email Scam
    13. 13. What Is a Computer Virus? <ul><li>A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. A computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. basic rule is that computer viruses cannot directly damage hardware, only software is damaged directly. </li></ul>
    14. 14. Viruses <ul><li>Enable file extension viewing in Windows </li></ul><ul><ul><li>so you know what you’re getting! </li></ul></ul><ul><li>Don’t open email attachments that seem unusual - what you don’t open can’t hurt you! </li></ul><ul><li>Keep antivirus software current! </li></ul><ul><li>Set up automatic updates for antivirus software and Windows when possible </li></ul>
    15. 15. Exercise #2 Dealing with Viruses & Other Annoyances
    16. 16. Why Use Webmail? <ul><li>Harder to get viruses </li></ul><ul><li>All you need is an Internet connection & a web browser </li></ul><ul><li>Allows you to have multiple accounts for various activities - office, personal, Ebay, hobbies </li></ul><ul><li>No hard drive crash woes! </li></ul>
    17. 17. What You Want in a Webmail Account <ul><li>Ability to send & receive attachments </li></ul><ul><li>Address book can be imported & exported </li></ul><ul><li>Calendar </li></ul><ul><li>Virus & spam protection </li></ul><ul><li>Ability to create folders & filters </li></ul>
    18. 18. Using Webmail - Minuses <ul><li>Often less space than email programs </li></ul><ul><ul><li>Yahoo! Mail gives you one gigabyte for free </li></ul></ul><ul><ul><li>ISP determines email storage limit </li></ul></ul><ul><li>Limits on attachment sizes </li></ul><ul><li>Slower than email programs like outlook </li></ul><ul><li>Less “user-friendly” interfaces than outlook or other email programs </li></ul><ul><li>Some sites don’t accept email from webmail addresses like yahoo.com or hotmail.com </li></ul>
    19. 19. Why Use Yahoo! for Webmail? <ul><li>Address book can be exported & imported </li></ul><ul><li>One gigabyte of free space </li></ul><ul><li>Offers virus/spam protection </li></ul><ul><li>Calendar can be public/shared </li></ul><ul><ul><li>handy for libraries! </li></ul></ul>
    20. 20. Spam Protection in Yahoo! Mail <ul><li>On by default </li></ul><ul><li>Save or delete immediately? </li></ul><ul><li>Mark Spam + Not Spam </li></ul><ul><ul><li>default settings are good </li></ul></ul><ul><li>Image Blocking </li></ul><ul><ul><li>safest is to let SpamGuard block as needed </li></ul></ul>
    21. 21. Email Tips <ul><li>CC vs BCC: know the difference! </li></ul><ul><li>Plain text vs. HTML </li></ul><ul><ul><li>Choose plain text! </li></ul></ul><ul><li>Use folders to organize email </li></ul><ul><li>Use filters to put email into folders </li></ul><ul><li>Use a spam filter! </li></ul>
    22. 22. Exercise #3 Getting Familiar with Yahoo! Mail
    23. 23. Okay, enough about SPAM— What about SPYWARE and other web browser evils?
    24. 24. Web Browser Woes <ul><li>Spyware </li></ul><ul><ul><li>Anti-spyware software </li></ul></ul><ul><li>Adware </li></ul><ul><ul><li>Anti-adware software </li></ul></ul><ul><li>Intruders/hackers </li></ul><ul><ul><li>IE security options </li></ul></ul><ul><ul><li>firewalls </li></ul></ul>
    25. 25. Spyware <ul><li>What Is It? </li></ul><ul><ul><li>“ a broad category of malicious software intended to intercept or take partial control of a computer's operation without the user's informed consent. While the term taken literally suggests software that surreptitiously monitors the user, it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party.” </li></ul></ul><ul><ul><ul><ul><ul><li> --Wikipedia </li></ul></ul></ul></ul></ul>
    26. 26. How Pervasive Is Spyware? <ul><li>49% of Internet users see spyware as a serious threat to their online security </li></ul><ul><li>63% of Internet users have been plagued by spyware in the past year </li></ul><ul><li>81% of Internet users say they have stopped opening email attachments unless they are sure these documents are safe </li></ul><ul><li>18% of Internet users say they have started using a different web browser to avoid software intrusions. </li></ul><ul><ul><ul><ul><ul><li>-- Pew Internet & American Life Project </li></ul></ul></ul></ul></ul>
    27. 27. How to Combat It <ul><li>Anti-Spyware Software </li></ul><ul><ul><li>free/shareware - SpyBot </li></ul></ul><ul><ul><li>commercial - Norton </li></ul></ul><ul><li>Alternative Browsers </li></ul><ul><ul><li>Firefox, Opera, Netscape </li></ul></ul><ul><li>Check your ActiveX settings </li></ul><ul><li>Look for https:// in the URL when ordering or entering personal info online! </li></ul>
    28. 28. What is ActiveX? <ul><li>A Microsoft technology used on the Internet to make interactive web pages that look and behave like computer programs, rather than static pages. ActiveX controls may be used with Microsoft's Internet Explorer browser to interact with web pages. ActiveX controls provide functions similar to Java Applets. </li></ul>
    29. 29. Pros and Cons of ActiveX Controls <ul><li>Good: view sophisticated web content </li></ul><ul><li>Bad: lack of security </li></ul><ul><li>Good: interact with anything on the desktop </li></ul><ul><li>Bad: interact with anything on the desktop - making spyware able to exploit it </li></ul>
    30. 30. Anti-Spyware Software: Some Good Options <ul><li>Spybot </li></ul><ul><ul><li>freeware, no requirements </li></ul></ul><ul><li>Microsoft Anti-spyware </li></ul><ul><ul><li>freeware </li></ul></ul><ul><ul><li>Must have a registered version of Windows to install </li></ul></ul>
    31. 31. Adware - What Is It? <ul><li>“ Adware or advertising-supported software is any computer program or software package in which advertisements or other marketing material are included with or automatically loaded by the software and displayed or played back after installation or in which information about the computer or its users activities is uploaded automatically when the user has not requested it.” </li></ul><ul><li>--Wikipedia </li></ul>
    32. 32. Adware Is Not Spyware - Usually! <ul><li>Often the price you pay for “freeware” -- as with Eudora or Netscape </li></ul><ul><li>Adware passes Info on to advertisers </li></ul><ul><li>Doesn’t put malicious software on your computer </li></ul><ul><li>Has come to be associated with spyware </li></ul>
    33. 33. Stopping Adware <ul><li>Anti-adware software </li></ul><ul><ul><li>freeware: Ad-Aware </li></ul></ul><ul><ul><li>Commercial: Norton, McAfee </li></ul></ul><ul><li>Turn on popup blocking </li></ul><ul><ul><li>can block good popups </li></ul></ul><ul><ul><li>can be customized </li></ul></ul>
    34. 34. Exercise #4 Spotting the Symptoms of Spyware or Adware
    35. 35. Increasing Security in Internet Explorer <ul><li>Deleting cookies & cache settings </li></ul><ul><li>Adjusting Security zone settings for greater privacy </li></ul><ul><ul><li>what it does & doesn’t do </li></ul></ul><ul><li>Turn on pop-up blocking </li></ul><ul><ul><li>how much is too much? </li></ul></ul>
    36. 36. Pop-ups <ul><li>Not all are created equal! </li></ul><ul><li>Good pop-ups: </li></ul><ul><ul><li>part of a program (as with videoconferencing </li></ul></ul><ul><ul><li>part of a sign-up or sign-in system </li></ul></ul><ul><li>Bad pop-ups </li></ul><ul><ul><li>ads </li></ul></ul><ul><ul><li>spyware or malware </li></ul></ul>
    37. 37. What to Do About Pop-ups <ul><li>Built-in browser pop-up blocking </li></ul><ul><ul><li>most new browsers offer this, including IE </li></ul></ul><ul><li>Pop-up blocking software </li></ul><ul><ul><li>many freeware, shareware options </li></ul></ul><ul><ul><li>commercial Internet security packages also offer pop-up blocking </li></ul></ul><ul><ul><li>Toolbars - free from Google, Yahoo </li></ul></ul><ul><ul><li>you only need one </li></ul></ul>
    38. 38. Firewalls <ul><li>Block attempts to hack your computer (zombie computers) </li></ul><ul><li>Can block good content as well as bad </li></ul><ul><li>You only need one firewall - if your local network is running one, you don’t need another on your computer </li></ul>
    39. 39. Firewall-Related Problems <ul><li>May not be able to connect to sites like the Infopeople webcasts </li></ul><ul><li>Videoconferencing software often won’t work </li></ul><ul><li>File and printer sharing may not work </li></ul>
    40. 40. Is Windows Firewall Enough? <ul><li>It won’t prevent viruses or spam from reaching your inbox </li></ul><ul><li>It won’t stop you from opening bad attachments </li></ul><ul><li>It will let you know when bad stuff attempts to get out & will block it </li></ul><ul><li>It will provide you with a log of suspicious activity </li></ul>
    41. 41. Exercise #5 Dealing with Pop-ups & Browser Security
    42. 42. Review of the Day’s Big Points <ul><li>Turn on file extension viewing </li></ul><ul><li>Turn on Windows Automatic Updates </li></ul><ul><li>Don’t open strange attachments </li></ul><ul><li>Use spam filters </li></ul><ul><li>Use anti-virus software </li></ul><ul><li>Install and use anti-spyware software </li></ul>
    43. 43. Exercise #6 On the Reference Desk