SlideShare a Scribd company logo
1 of 59
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
and
Being Online
Workshop
2015
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
You’re not back in school…
…this is a workshop
we’re here to help
Staying Connected
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Photo credits: top Stanley Kubrick circa1940
Staying Connected
When did we stop talking to each other?
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Photo credits: top Stanley Kubrick circa1940 bottom Nancy Slome 1to1interactive blog
In about half a century…
plus ça change plus c'est la même chose
Staying Connected
What’s changed?
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
In about a quarter a century…
Staying Connected
What’s changed?
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
And in less than a decade…
Staying Connected
What’s changed?
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
This workshop’s purpose is to assist older
adults demystify a digital online world
The following slides are not meant to be a
definitive set of answers to all possible
questions but triggers and reminders
Staying Connected
Being online
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Our grandchildren have never known a
world without mobile phones, text
messaging and the internet
We used to gather in community halls
and engage in conversations over the
back fence
What do social clubs have in common
with things like Facebook?
Staying Connected
with each other
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• What do you want or need to know
• Be engaged
• Stay in touch
– Text the grandchildren
– Share photos
– Use the internet
– Email
– Apps
• Choose your platform
• Make it meaningful – to you
• Understand your options
• Perceptions
– Usefulness
– Ease of use
– Trust
Staying Connected
with each other and the world
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Get the Silver Surfers on Facebook
• Experts say using social media can help prevent
decline in older adult’s health
• Older people should use Facebook and other social
media websites to prevent their health declining
• People aged 65-95 took part in the study by the
University of Exeter
• The group felt more confident and sociable after using
the internet
• Using Skype and email to contact relatives were among
their favourite usages
• Experts said the results could help stunt loneliness
– Pensioners who spend time online do not feel as lonely as
others their age, which could stunt deterioration of physical
and mental health, according to the research.
http://www.dailymail.co.uk/news/article-2873604/Older-people-use-Facebook-social-media-prevent-decline-health-study-finds.html#ixzz3SKzq2tRV
Staying Connected
Avoiding social isolation
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
Being online
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Are you connected using a mobile device?
– I bet it doesn’t look like these
– It’s probably a bit more like these
Staying Connected
Using mobiles and other wireless devices
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
A few tips when using phones and tablets
1. Turn off Bluetooth unless you need it
2. Disable automatic updates when on WiFi
3. Clear your phone or tablet of any texts from your bank
4. Never disclose financial information via text or email
5. Don’t save PINs, logins or passwords on your device
6. Use different PINs or passwords for unlocking your device
7. Avoid public Wi-Fi for online banking or shopping
8. Contact your bank if you lose your smart phone or tablet if
you receive bank updates via SMS message
9. Keep your software and apps up to date
10. When disposing of devices give them to a technology
recycling service like Mobile Muster for safe, secure and
proper breaking down and recycling of the components
http://www.netsafe.org.nz/how-to-keep-your-mobile-devices-safe-and-secure/
Staying Connected
Using mobiles and other wireless devices
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Writing and sending a text message is basically
the same on all mobiles but the functionality will
vary from phone to phone
– From the phone’s menu select ‘messaging’ (the menu
item name may vary phone to phone)
– Select ‘new message’ or ‘compose’ or similar
– Enter the recipient’s phone number or select it from your
‘contacts’ or ‘address book’
– Type in the message
– Press ‘send’
• One text message or SMS is 160 characters
– If you type more than 160 characters it may send as one
message but it will be charged as two
• When replying to text messages, the procedure
may vary phone by phone. However, with the
original text message open …
– Click on ‘options’
– Click on reply
– Type in your answer/message
– Press send
Staying Connected
Text messaging
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Google Hangouts are
video calls or IM chat
and it’s very simple to
use. You just need
Gmail or Google+
Viber uses your phone
number and the phone
numbers of your
contacts in your phone
You create a Skype
addresses which finds
you just like your phone
number does
Use the Skype chat
window for IM chat
(Instant Messages )
Or use Viber or Kik for
IM on mobile. It looks
and works like text
messaging but its free
Staying Connected
Video calling and Instant Messaging
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Skype
1. Skype addresses find you just like a phone number
2. Use the Skype chat window for IM, Instant Messages
3. Parts of Skype profiles are seen by everyone on Skype.
4. Do not put details in your profile you don’t want public
5. You don’t have to fill in your profile if you do not want to
6. You can change your profile at any time
7. To update your settings on a PC open Skype click Tools
> Options > Privacy. On Mac it's > Preferences > Privacy
Viber
1. If you use Viber for IM on mobile. It looks and works like
text messaging and uses your phone number and the
phone numbers of your contacts in your phone
2. In Settings you adjust privacy, accessing contacts etc
Google Hangouts
1. Google Hangouts are video calls or IM chat and it’s very
simple to use. You just need Gmail or Google+
Staying Connected
Video calling and Instant Messaging
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Connect a wireless router to your internet at
home to create your own ‘private’ WiFi
network
Consider using your own portable WiFi
You can take it anywhere (including overseas)
It will work anywhere there is a mobile network
You can connect multiple devices to it
It is just as secure as your private WiFi
All network providers have them available
Staying Connected
WiFi: Private, Portable and Public
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Too many plans to choose from so…
– Keep the decision making simple
– Just ask for something basic
– A data plans vary in their price per Mb
– Consider pre-paid
Data plans and WiFi
– If you want to use your phone for email or internet you
need a data plan and / or use WiFi at home or while out
– Make sure you have data and MMS set up if you want to
send and receive pictures by message
– Ask how to switch data on and off when using the carrier
network
– When travelling overseas make sure you have the right
data plan
What to look for in a Service Provider / Carrier
– There is nothing tricky to look out for keep it simple
– Ask about coverage and check with friends in your area.
– You need to double check the coverage and the plan if
you travel a lot around Australia or overseas
Staying Connected
WiFi: Private, Portable and Public
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Using public wireless networks
1. Libraries, fast-food outlets, airports etc have safe WiFi
2. Avoid using WiFi run by people you don't know or trust
3. Always connect as 'public' when using public WiFi
4. Turn off sharing
5. Be aware of your surroundings
6. Be careful about what you do online
7. Avoid banking, shopping or using important passwords
8. If possible use secure URLs https:// instead of http://
9. Always log out and close your browser when finished
10. Disable wireless networking when you are not using it
Staying Connected
WiFi: Private, Portable and Public
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The NBN is replacing most of the traditional
landline networks for phone and internet
services
What does it mean to you?
Speed and
Bandwidth
New services
like e-Health
You can check your location:
http://www.nbnco.com.au/connect-home-or-business/check-your-address/rfs-sc0-home.html
and the final cut-over date
Staying Connected
NBN the National Broadband Network
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
‘The Cloud’
The Cloud is the use of remote servers
networked together to allow data storage
and online access to resources and
services. Things like:
– Google Drive, One Drive, iCloud, DropBox, etc
– Accounting like Xero and MYOB etc
– Photos stored for sharing - Flickr, Picasa etc
– Music - Spotify, Pandora, iTunes, Beats etc
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
‘The Cloud’
I have stored this set of slides
in the cloud
– It is in Dropbox so I can access
it while mobile if I want to
– And it can be downloaded from
Dropbox if I invite people to
share that particular Dropbox
folder
– It can also be downloaded from
the cloud by anyone who has
the link to it in SlideShare
• http://www.slideshare.net/bradatslice
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The Cloud
1. Backing up, storing and/or sharing via the cloud is
reasonably safe for files you don’t want to lose if your PC
is lost or destroyed
2. Do not back up sensitive information to the cloud
Sharing
1. Never open an attachment from a source you don't know
2. Peer-to-peer (P2P) file sharing carries risks including
potential breaches of copyright
Storing
1. Never insert a used removable storage device unless
you a) know where it came from and b) have up to date
ant-virus software installed
2. Backup your important personal and critical files (and
those photos you cherish) onto an external hard drive
Staying Connected
‘The Cloud’
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
We’ve been writing on ‘walls’ for centuries
These are from Pompeii 79AD
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Sometimes called
Social Networking – in
fact that’s what you do
on Social Media
• People connect in
different ways on
different sites
• Some sites are
designed for special
purposes - like
sharing video or
pictures or just things
you like
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Which of these do you use?
OR you would like to use?
OR you would like to know more about?
Setting up accounts is very similar for any
online social platform all you need is an
email address
AND/OR Once you have Twitter or
Facebook you can usually use either to set
up and login to other platforms
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Facebook is about staying in touch with
people you know and for catching up with
friends you used to know
• Twitter is for following people you don’t
know, would like to know, or should know
• LinkedIn is a combination of both but
used for business and recruitment
• Instagram is primarily for sharing day-to-
day images and short videos
• Tumblr is a blogging platform that allows
you to do all of the above
• Pinterest is all about sharing things you
like on a virtual pin board . It’s a bit like
scrap-booking
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Snapchat
With this app you can take
photos, record videos, add
text, or draw things, then
send them to a controlled
list of friends. And the post
only stays up for a few
seconds
Kik
Kik Messenger is an instant
messaging app for most
mobile devices which
allows you to avoid the text
messaging system
And there are apps for fans of all sorts of things from
Celebrities to Music and Video
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The things you write and upload to the
internet, especially on social media
platforms, may not always be secure
• It’s important to understand how to use the privacy
features these social media sites have to offer
• Remember, each platform has its own settings, and some
are more complicated than others.
Let’s start with Facebook
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Facebook is probably the platform used by
most which requires a good initial privacy
set-up then an occasional check-up
Facebook Privacy Tab
1. Click the lock icon
2. Go to Privacy Settings and Tools
3. Check “Who can see my stuff?”
4. Adjust things like who can send friend requests, who can
tag you and how people can find you
5. Little known: you can limit the audience for old posts
Facebook Profile Settings
1. Next, update your privacy settings on your profile
2. Click About on your profile to view basic information
3. Click the icon left of ‘Edit’ You can set privacy for each
Facebook Photo Settings
1. You can go back to check settings by album or image
2. For albums: click audience indicator on the bottom right
3. For images uploaded individually click each image and
enter the privacy setting
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Instagram
1. Open your Instagram mobile app tap the user icon
2. Tap Edit Your Profile and scroll down
3. Toggle private profiles on and off
4. Private means only accepted followers see your photos
Twitter
1. Open the Settings menu. Click Security and Privacy
2. Select Protect my Tweets if you want to approve each
follower instead of allowing anyone to read your tweets
Pinterest
1. Click on your name, Select Account Settings
2. Change the Search Privacy to “yes” if you don’t want
your pins to show up in search engines
3. You can also create secret boards The option is at the
bottom of your board screen
LinkedIn
1. Go to Settings in the top right corner (your profile
picture) and select Review next to Privacy & Settings
Google+
1. The Settings menu is found on the left side of the screen
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Think of Twitter as being a bit like talk-
back radio… on steroids!
ABC Radio uses Twitter extensively now.
Take sport for example. ABC Grandstand
is on both Twitter and Facebook
Commercial TV News Variety and
Current Affairs programmes use them too
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• You can use Twitter on the Web or Mobile
• Or use a downloadable application which operates like
a dashboard making it easier filter topics
• You can also look at Twitter accounts without having an
account yourself
• Or you can set up at Twitter.com
– Use your own name or a nick name Upload a photo
and a bio
• Follow people
– Celebrities, politicians, anyone of personal interest
• Follow topics or events often grouped together by using
what is known as a hash tag
• Filter your timeline by creating lists of groups of people
you follow or topics you are interested in
• Your timeline is what you see when you log on
– It’s the tweets being posted by the people you
follow going up in real time
• Notifications, Mentions and Replies are public
engagements with others
• Direct Messages ‘DM’s are private
• Have your say: Write your first Tweet
Staying Connected
Social Media
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The Trading Post is only online now and
others too like Gumtree and Craig’s List
Staying Connected
Banking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
There are apps for almost anything…
– Your doctor or healthcare professional will
soon offer you Telehealth options using video
calling and a smart phone app
– You can make Medicare claims via your smart
phone or tablet (you’ll need a My.Gov login
but once done it’s pretty easy)
– You can do all your banking online and on
mobile with apps
– eBay and PayPal both have apps
Staying Connected
Banking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Using Internet banking
1. It is safest to type the bank’s URL into the browser
2. It’s best to memorise your password
3. Banks using non-keystroke passcodes are safest
especially in public places or on shared PCs
4. Always log out when you are finished
Shopping
1. Use common sense. Trust your instincts
2. Know who you are dealing with
3. Know what you are buying
4. Know what currency you are using
5. On auction websites always deal within the site
6. Avoid private contact with sellers - scammers will often
use this ploy to 'offer a better deal'
7. Only pay on a secure web page https:// not http://
8. Avoid money transfers and direct debit
9. Use secure payment methods like PayPal or credit card
10. Consider ‘MasterCard SecureCode’ or ‘Verified by Visa’
Staying Connected
Banking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Downloading apps…
1. Each device operating system (OS) has a way to
download apps – Google Play (Android) and iTunes
(Apple iOS) Windows Store (Windows 8) for example
2. This is not the app’s source The source is the developer
3. Check the app’s source, its ratings and reviews
4. You can download apps when you are online or mobile
5. For each ‘store’ you will need a login ID
6. Once you have selected an app you can download it
directly to your mobile device or to your PC/Mac and
then transfer it to your mobile device with a ‘sync’ - by
synchronising the device with your PC/Mac
Staying Connected
Banking Shopping and Apps
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
How many passwords do you have?
• How do you remember them?
• Make them easy to remember but not simple
• Never store them online
Is your screen locked?
• Should it be locked?
• If you often leave your device unattended and ‘on’ lock it
Staying Connected
Passwords
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
Identity theft. Myths and Mysteries
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
A few simple myths
1. Cybersecurity is unlike any challenge we have faced
Not so Imagine how it felt in the Victorian era with the
introduction of the motor vehicle and the telegraph
2. Every Day We Face “Millions of Cyber Attacks”
Maybe so. However, counting individual attacks is like
counting bacteria but all we really care about is the impact
and the source
3. This Is a Technology Problem
So, so. Technology, yes however all too often, the problem
exists between the chair and the keyboard
“Having a sense of history can guide our
responses to the novelties of our own era”
http://www.wired.com/2014/07/debunking-5-major-cyber-security-myths/
Staying Connected
Identity theft. Myths and Mysteries
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Install and activate anti-virus, anti-spyware
software and install or activate a firewall
Adware and Spyware
1. These are information gathering software typically used
for advertisers but they gather information secretly
2. Adware is the software used to assist advertisers place
relevant ads onto the pages you visit
3. These may not be as bad as they sound. They may be
annoying but they are rarely malicious viruses
4. Most top brand anti-virus software will prevent your PC
from being attacked by these
5. Never click on those pop-up ads that say things like your
computer may be at risk or run a scan now etc
Staying Connected
Online Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Spam clogs up your email inbox and can
include scams and phishing expeditions but
there’s little you can do other than be alert
and use common sense
Scams
1. If it sounds too good to be true…
Phishing
1. These are emails purporting to come from a valid source
like your bank or Australia Post
2. Do not open them.
3. Never click on links or provide information
Staying Connected
Online Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Online dating is just dating. However it is
important to treat it the same way you
treated meeting people in any social
environment
1. Keep your personal information private
2. Only meet offline when you are ready and not before
3. Do not get financially involved online
Staying Connected
Dating
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
As it sounds, they are photos of yourself
usually taken by yourself…
…or with others hence ‘selfie’
https://www.facebook.com/ellentv/photos/a.182755292239.124686.26012002239/10152299789332240/?type=1&theater
Staying Connected
Selfies
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
Terminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Account harvesting
The illegal practice of collecting email accounts from information in the
public domain
Adware
Software that is covertly installed on your computer and designed to
deliver advertisements or other content which encourages you to
purchase goods or services.
Antivirus
Software that is designed to prevent infection from computer viruses.
Bot
A single compromised computer (a robot computer), sometimes called
a zombie.
Browser
A software application that enables the retrieval and presentation of
websites and other internet resources.
Browser hijacking
A symptom of a malware infection in which your browser persistently
redirects to fraudulent web sites, usually in an attempt to extort money
Cookie
A string of text stored by your web browser enabling a website to
remember you and your personal settings.
Staying Connected
Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Digital certificate
A way for browsers to verify the identity and authenticity of a website. A
digital certificate is issued to a website by a trusted third party
certificate authority.
Domain Name System (DNS)
A hierarchical naming system for resources connected to the internet.
The DNS translates domain names to numerical identifiers (IP
addresses) which are readable to networking equipment, allowing the
routing of data from one point on the internet to another.
Encryption
The process of transforming documents and files for safe transmission
over a public network. The information is then converted or deciphered
back into its original format.
Firewall
Hardware or software which monitors information going in and out of
your computer or network.
Freeware
Copyrighted computer software which is made available for use free of
charge, for an unlimited time.
Hacker
Someone who attempts to gain unauthorized access to a computer
system, often for fraudulent purposes.
Hotspot
An area in which Wi-Fi is available to the general public as a wireless
local area network, as in a coffee shop.
Staying Connected
Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Identity theft
Use of personal details by someone else to deceive, to support some
type of crime, or even just to play a joke. Identity theft is a form of
identity crime (where somebody uses a false identity to commit a
crime).
Internet Service Provider (ISP)
A company that provides access to the internet.
Keystroke logger
A malware program hidden on a computer that records and 'logs' each
key the you press. It is used to record your personal data, e.g.
usernames, passwords, credit card and bank account numbers which
is then sent to the malware operator without your knowledge.
Malicious software (malware)
A catch-all term used to describe software designed to be installed into
a computer system for the purpose of causing harm to the you or
others. This would include viruses, spyware, trojans, worms, etc.
NFC
Near Field Communications – the technology used for PayPass
Padlock
A padlock display in a browser is intended to indicate a secure
connection or website, although it may not always be a reliable
indicator. Users should look instead for 'HTTPS'.
Peer-to-peer file sharing network (P2P)
A decentralized file sharing system. Files are stored on and served by
the personal computers of the users.
Staying Connected
Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Pharming
A way of harvesting personal information, where a hacker puts a
malicious code on your computer that redirects you to a fake site.
Phishing (email/website)
Phishing refers to fraudulent email messages or web sites used to gain
access to personal information for illegal purposes such as transferring
funds or purchasing goods over the internet.
Pop-up
A pop-up is a small window, which suddenly appears (pops-up) in the
foreground of the normal screen.
Privacy settings
Settings which control how a user's data is shared with other people or
systems. Privacy settings apply to web browsers and social networking
services.
Ransomware
Malware which handicaps computer functionality, e.g. through browser
hijacking or encrypting personal data, and offers to restore the
functionality for a fee.
Remote access
Communication with a computer or network from a remote location
through a link such as the internet or mobile phone.
Scam
A commonly used term to describe a confidence trick, relying on email
or a website to deliver the trick to unsuspecting users.
Staying Connected
Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Scareware
Malware that causes frightening messages to appear, e.g. that your
computer is infected with malware or that you are guilty of a crime, and
attempts to extort money from you to resolve the alleged issue. Similar
to ransomware.
Secure Socket Layer (SSL)
The most widely used security protocol on the internet, used for online
banking and shopping sites. Website digital certificates are commonly
implemented through SSL. The presence of 'https' in the
browseraddress bar demonstrates that the connection between the
your computer and the website is encrypted. However, 'https' can still
be present when connecting to a website with an invalid digital
certificate.
Spam
Unsolicited email. Most email spam is commercial advertising, often for
dubious products, get-rich-quick schemes, or illegal services. Users
are advised that if an offer in an email appears too good to be true then
it probably is and should not be actioned in any way.
Spyware
Software that is covertly installed on a computing device and takes
information from it without your the consent or knowledge of the user.
Trojan horse
Malicious code which is hidden in a computer program or file that may
appear to be useful, interesting, or at the very least harmless to you
when using your computer. When this computer program or file is run,
the malicious code is also triggered, resulting in the set up or
installation of malware.
Staying Connected
Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
URL
Universal Resource Locator is the technical term for the address
(location) of an internet resource on the internet such as a website or
image within a website.
USB stick
Universal Serial Bus. A small piece of hardware which stores data,
sometimes called a jump drive, thumb drive or flash drive.
Virus
Malware designed to infect and corrupt a computer and to copy itself.
Viruses can disrupt programs installed on a computer.
VoIP
The routing of real time voice conversations (telephone calls) over the
internet rather than over an analog or circuit switched network.
Wi-Fi
A set of wireless communication protocols that can transmit traffic to
Wi-Fi-enabled devices within a local area. A Wi-Fi-enabled device such
as a laptop or mobile device can connect to the internet when within
range of a wireless network connected to the internet. An area covered
by one or more Wi-Fi access points is commonly called a hotspot.
Worm
A self-replicating virus that does not alter files but resides in active
memory and duplicates itself.
Zombie
A compromised computer
Staying Connected
Safety and Security
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• 3G and 4G
– Generic term for most modern high speed mobile
networks
• # or “hash” key
– You are often asked to press the hash key after entering
numbers into automated systems
• Android
– A new phone & operating system from Google which
competes with iPhone
• Blackberry
– A type of mobile phone that is designed primarily for
sending and receiving email as its main feature
• Bluetooth
– Personal or close range radio frequency (RF) network
• Broadband
– High speed internet
• Cellular
– Generically it’s the current type of mobile phone network
• Cell-phone
– Just another term for a mobile phone
• Desk Top
– The main or home screen of your PC or phone
• GSM
– Generic term for mobile network (originally Groupe
Speciale Mobile then Global System for Mobile)
Staying Connected
Terminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• ICE
– In Case of Emergency
• iPad – also known as a tablet
– Apple Corporation’s touch-screen mobile computing
device with internet access
• Java
– A type of software often used in phones
• Multi-media
– Generic term for pictures and video as opposed to simple
text
• MMS
– A message with a picture in it sent from phone to phone
(Multi-Media Service)
•PDA
– Generic term for a phone with its main feature being a
diary/calendar, notes, and detailed contact list (Personal
Digital Assistant)
• Predictive Text & Auto-Correct
– A feature in most mobiles that predicts the word you are
typing in as you type
• Premium Text Message
– A normal text message that’s charged at a higher rate –
for example voting on TV shows usually costs 55c
• QWERTY
– Typewriter style key pad layout
Staying Connected
Terminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• RF
– Radio frequency
• SMS often called a Text
– A short message typed into a phone and sent to another
phone (Short Message Service)
• Smart Phone
– Generic term for a phone with advanced PDA and internet
services installed
• Texting
– Same as SMS (SMS-ing)
• URL
– The “www” address you type into an internet browser to
go to a web site (Uniform Resource Locator)
• Voicemail
– A message left on an automatic answering machine
usually built into the mobile network
• Wallpaper
– The background image on the ‘desk-top’ or screen of your
phone or PC
• WAP
– An old generic term for mobile internet – a WAP site is a
mobile internet site
Staying Connected
Terminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Avatar
– Usually the image you put up of yourself in your social
media site’s profile
• Blog (or web log)
– A blog is a frequently updated website consisting of dated
entries arranged in reverse chronological order - most
recent post first.
• Chat & Chat rooms
– Web-based text conversation - not always but often in
real time (often called IM & vice versa)
– Dedicated chat sites about a specific subject
• IM (Instant Message)
– A real-time personal message sent between two or more
users typically fast moving
– IM is possible withGmail, MSN, Skype, Viber and on many
sites like Facebook (called chat)
• Mashup
– Website or application that uses content from more than
one source to create a completely new service or
presentation of the content
• MSN Messenger
– An Instant Message service or application
Staying Connected
Terminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Podcast
– An audio blog or recording of (say) a radio programme.
You don't have to have an Apple, iPod to listen to a
podcast; you can also listen to podcasts on a PC, or many
mp3 players.
• Post or Posting
– A message added to an online discussion, or an update to
your social media site status, commenting on a blog,
writing on a Facebook ‘Wall’.
• Skype
– The worlds largest Voice over IP application which can be
used for instant messaging and file transfers between
users
• Status update
– A message you write about yourself on your own social
media site – like Facebook
• Tag or Tagging
– Tags are the keywords people add to articles or photos in
a blog or to web pages to assist in search and
identification (Photos can be tagged in Facebook to help
identifying people)
• Thread
– A series of posts on a single topic
Staying Connected
Terminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Tweet
– A posting to Twitter – must be 140 characters or less
• Upload
– Copying a file from a hard drive to a website or application
thus making the file available to other members of the
same site or application.
• VoIP - Voice over IP (Internet Protocol)
– Enabling people to use the internet as the transmission
medium for telephone calls
– One advantage of VoIP is that calls over the Internet do
not incur a surcharge beyond what the user is paying for
Internet access.
• Widget
– A little “Window Gadget” downloadable to your PC
allowing access to another programme or application
• Wiki
– A Wiki is a website that allows users to freely create and
edit the website content themselves.
• Wikipedia
– A website information service like an encyclopaedia
entirely created by users
Staying Connected
Terminology
Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Good Luck

More Related Content

Viewers also liked

#Inclasswithbrad tafe preso aug13
#Inclasswithbrad tafe preso  aug13#Inclasswithbrad tafe preso  aug13
#Inclasswithbrad tafe preso aug13Brad Keeling
 
Country Matters Nml Music Segments
Country Matters Nml Music SegmentsCountry Matters Nml Music Segments
Country Matters Nml Music SegmentsBrad Keeling
 
LinkedIn A simple how to
LinkedIn A simple how toLinkedIn A simple how to
LinkedIn A simple how toBrad Keeling
 
Country Matters Series 2
Country Matters Series 2Country Matters Series 2
Country Matters Series 2Brad Keeling
 
Everything is public
Everything is publicEverything is public
Everything is publicBrad Keeling
 
Reliability success 4th generation (2)
Reliability success 4th generation (2)Reliability success 4th generation (2)
Reliability success 4th generation (2)Daryl Mather
 
Co2 And Waste Water
Co2 And Waste WaterCo2 And Waste Water
Co2 And Waste Wateruni_gaz
 
Staying Connected U3A Newcastle 2016
Staying Connected U3A Newcastle 2016Staying Connected U3A Newcastle 2016
Staying Connected U3A Newcastle 2016Brad Keeling
 
Country Matters 2009 Combining Social Media
Country Matters 2009 Combining Social MediaCountry Matters 2009 Combining Social Media
Country Matters 2009 Combining Social MediaBrad Keeling
 
Il valore degli #opendata. Esperienze a confronto
Il valore degli #opendata. Esperienze a confrontoIl valore degli #opendata. Esperienze a confronto
Il valore degli #opendata. Esperienze a confrontoVincenzo Patruno
 
Dati geografici e indicatori territoriali: Il ruolo delle comunità
Dati geografici e indicatori territoriali: Il ruolo delle comunitàDati geografici e indicatori territoriali: Il ruolo delle comunità
Dati geografici e indicatori territoriali: Il ruolo delle comunitàVincenzo Patruno
 
PDO Basics - PHPMelb 2014
PDO Basics - PHPMelb 2014PDO Basics - PHPMelb 2014
PDO Basics - PHPMelb 2014andrewdotcom
 
African Animals
African AnimalsAfrican Animals
African Animalssluiterb
 

Viewers also liked (17)

Pp Lesson Plan
Pp Lesson PlanPp Lesson Plan
Pp Lesson Plan
 
#Inclasswithbrad tafe preso aug13
#Inclasswithbrad tafe preso  aug13#Inclasswithbrad tafe preso  aug13
#Inclasswithbrad tafe preso aug13
 
Country Matters Nml Music Segments
Country Matters Nml Music SegmentsCountry Matters Nml Music Segments
Country Matters Nml Music Segments
 
LinkedIn A simple how to
LinkedIn A simple how toLinkedIn A simple how to
LinkedIn A simple how to
 
Country Matters Series 2
Country Matters Series 2Country Matters Series 2
Country Matters Series 2
 
Case studies uts
Case studies utsCase studies uts
Case studies uts
 
Everything is public
Everything is publicEverything is public
Everything is public
 
Reliability success 4th generation (2)
Reliability success 4th generation (2)Reliability success 4th generation (2)
Reliability success 4th generation (2)
 
New Business
New Business New Business
New Business
 
Co2 And Waste Water
Co2 And Waste WaterCo2 And Waste Water
Co2 And Waste Water
 
Staying Connected U3A Newcastle 2016
Staying Connected U3A Newcastle 2016Staying Connected U3A Newcastle 2016
Staying Connected U3A Newcastle 2016
 
Country Matters 2009 Combining Social Media
Country Matters 2009 Combining Social MediaCountry Matters 2009 Combining Social Media
Country Matters 2009 Combining Social Media
 
Il valore degli #opendata. Esperienze a confronto
Il valore degli #opendata. Esperienze a confrontoIl valore degli #opendata. Esperienze a confronto
Il valore degli #opendata. Esperienze a confronto
 
Dati geografici e indicatori territoriali: Il ruolo delle comunità
Dati geografici e indicatori territoriali: Il ruolo delle comunitàDati geografici e indicatori territoriali: Il ruolo delle comunità
Dati geografici e indicatori territoriali: Il ruolo delle comunità
 
Whole of life
Whole of lifeWhole of life
Whole of life
 
PDO Basics - PHPMelb 2014
PDO Basics - PHPMelb 2014PDO Basics - PHPMelb 2014
PDO Basics - PHPMelb 2014
 
African Animals
African AnimalsAfrican Animals
African Animals
 

Similar to Staying Connected Bateau Bay Workshop Nov 2015

The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2venturepointsa
 
Web 2 0 Projects 7 12
Web 2 0 Projects 7 12Web 2 0 Projects 7 12
Web 2 0 Projects 7 12ahamric
 
Digital Forensic
Digital Forensic Digital Forensic
Digital Forensic Ravi Nayak
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devices Digital communication protocols, methods and devices
Digital communication protocols, methods and devices brownjordan
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxBryanBangiban1
 
Distributed Scrum: Dangerous Waters-Be Prepared!
Distributed Scrum: Dangerous Waters-Be Prepared!Distributed Scrum: Dangerous Waters-Be Prepared!
Distributed Scrum: Dangerous Waters-Be Prepared!TechWell
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
Socialisation networks 1
Socialisation networks 1Socialisation networks 1
Socialisation networks 1Dileep Pradeep
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
Web 2 0 Projects 7 12
Web 2 0 Projects 7 12Web 2 0 Projects 7 12
Web 2 0 Projects 7 12aboodcr
 
Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Childrennickswebtsv
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11William Mann
 
Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9 Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9 Jaypee Tan
 
How to Effectively Manage Virtual Teams
How to Effectively Manage Virtual TeamsHow to Effectively Manage Virtual Teams
How to Effectively Manage Virtual TeamsCisco Webex
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxBluechip Gulf IT Services
 

Similar to Staying Connected Bateau Bay Workshop Nov 2015 (20)

The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Web 2 0 Projects 7 12
Web 2 0 Projects 7 12Web 2 0 Projects 7 12
Web 2 0 Projects 7 12
 
Digital Forensic
Digital Forensic Digital Forensic
Digital Forensic
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devices Digital communication protocols, methods and devices
Digital communication protocols, methods and devices
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
 
Distributed Scrum: Dangerous Waters-Be Prepared!
Distributed Scrum: Dangerous Waters-Be Prepared!Distributed Scrum: Dangerous Waters-Be Prepared!
Distributed Scrum: Dangerous Waters-Be Prepared!
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Socialisation networks 1
Socialisation networks 1Socialisation networks 1
Socialisation networks 1
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
Skyping awesomeness
Skyping awesomenessSkyping awesomeness
Skyping awesomeness
 
Web 2 0 Projects 7 12
Web 2 0 Projects 7 12Web 2 0 Projects 7 12
Web 2 0 Projects 7 12
 
Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Children
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9 Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9
 
How to Effectively Manage Virtual Teams
How to Effectively Manage Virtual TeamsHow to Effectively Manage Virtual Teams
How to Effectively Manage Virtual Teams
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
 

More from Brad Keeling

Brad joins Newport Capital
Brad joins Newport CapitalBrad joins Newport Capital
Brad joins Newport CapitalBrad Keeling
 
Newport Capital Breakfast Invitation
Newport Capital Breakfast InvitationNewport Capital Breakfast Invitation
Newport Capital Breakfast InvitationBrad Keeling
 
Bondi_cyber_safetyworkshop
Bondi_cyber_safetyworkshopBondi_cyber_safetyworkshop
Bondi_cyber_safetyworkshopBrad Keeling
 
Australian Unity Tech Workshop Constitution Hill
Australian Unity Tech Workshop Constitution HillAustralian Unity Tech Workshop Constitution Hill
Australian Unity Tech Workshop Constitution HillBrad Keeling
 
Seniors Techno Workshops 2014
Seniors Techno Workshops 2014Seniors Techno Workshops 2014
Seniors Techno Workshops 2014Brad Keeling
 
Seniors Tech Workshops Constitution Hill 2013
Seniors Tech Workshops Constitution Hill 2013Seniors Tech Workshops Constitution Hill 2013
Seniors Tech Workshops Constitution Hill 2013Brad Keeling
 
Willandra Village Seniors Techno 2013
Willandra Village Seniors Techno 2013Willandra Village Seniors Techno 2013
Willandra Village Seniors Techno 2013Brad Keeling
 
What used to take days, even weeks
What used to take days, even weeksWhat used to take days, even weeks
What used to take days, even weeksBrad Keeling
 
Willandra Village Technology Workshops
Willandra Village Technology WorkshopsWillandra Village Technology Workshops
Willandra Village Technology WorkshopsBrad Keeling
 

More from Brad Keeling (9)

Brad joins Newport Capital
Brad joins Newport CapitalBrad joins Newport Capital
Brad joins Newport Capital
 
Newport Capital Breakfast Invitation
Newport Capital Breakfast InvitationNewport Capital Breakfast Invitation
Newport Capital Breakfast Invitation
 
Bondi_cyber_safetyworkshop
Bondi_cyber_safetyworkshopBondi_cyber_safetyworkshop
Bondi_cyber_safetyworkshop
 
Australian Unity Tech Workshop Constitution Hill
Australian Unity Tech Workshop Constitution HillAustralian Unity Tech Workshop Constitution Hill
Australian Unity Tech Workshop Constitution Hill
 
Seniors Techno Workshops 2014
Seniors Techno Workshops 2014Seniors Techno Workshops 2014
Seniors Techno Workshops 2014
 
Seniors Tech Workshops Constitution Hill 2013
Seniors Tech Workshops Constitution Hill 2013Seniors Tech Workshops Constitution Hill 2013
Seniors Tech Workshops Constitution Hill 2013
 
Willandra Village Seniors Techno 2013
Willandra Village Seniors Techno 2013Willandra Village Seniors Techno 2013
Willandra Village Seniors Techno 2013
 
What used to take days, even weeks
What used to take days, even weeksWhat used to take days, even weeks
What used to take days, even weeks
 
Willandra Village Technology Workshops
Willandra Village Technology WorkshopsWillandra Village Technology Workshops
Willandra Village Technology Workshops
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Staying Connected Bateau Bay Workshop Nov 2015

  • 1. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected and Being Online Workshop 2015
  • 2. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop You’re not back in school… …this is a workshop we’re here to help Staying Connected
  • 3. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Photo credits: top Stanley Kubrick circa1940 Staying Connected When did we stop talking to each other?
  • 4. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Photo credits: top Stanley Kubrick circa1940 bottom Nancy Slome 1to1interactive blog In about half a century… plus ça change plus c'est la même chose Staying Connected What’s changed?
  • 5. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop In about a quarter a century… Staying Connected What’s changed?
  • 6. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop And in less than a decade… Staying Connected What’s changed?
  • 7. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop This workshop’s purpose is to assist older adults demystify a digital online world The following slides are not meant to be a definitive set of answers to all possible questions but triggers and reminders Staying Connected Being online
  • 8. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Our grandchildren have never known a world without mobile phones, text messaging and the internet We used to gather in community halls and engage in conversations over the back fence What do social clubs have in common with things like Facebook? Staying Connected with each other
  • 9. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • What do you want or need to know • Be engaged • Stay in touch – Text the grandchildren – Share photos – Use the internet – Email – Apps • Choose your platform • Make it meaningful – to you • Understand your options • Perceptions – Usefulness – Ease of use – Trust Staying Connected with each other and the world
  • 10. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Get the Silver Surfers on Facebook • Experts say using social media can help prevent decline in older adult’s health • Older people should use Facebook and other social media websites to prevent their health declining • People aged 65-95 took part in the study by the University of Exeter • The group felt more confident and sociable after using the internet • Using Skype and email to contact relatives were among their favourite usages • Experts said the results could help stunt loneliness – Pensioners who spend time online do not feel as lonely as others their age, which could stunt deterioration of physical and mental health, according to the research. http://www.dailymail.co.uk/news/article-2873604/Older-people-use-Facebook-social-media-prevent-decline-health-study-finds.html#ixzz3SKzq2tRV Staying Connected Avoiding social isolation
  • 11. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected Being online
  • 12. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Are you connected using a mobile device? – I bet it doesn’t look like these – It’s probably a bit more like these Staying Connected Using mobiles and other wireless devices
  • 13. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop A few tips when using phones and tablets 1. Turn off Bluetooth unless you need it 2. Disable automatic updates when on WiFi 3. Clear your phone or tablet of any texts from your bank 4. Never disclose financial information via text or email 5. Don’t save PINs, logins or passwords on your device 6. Use different PINs or passwords for unlocking your device 7. Avoid public Wi-Fi for online banking or shopping 8. Contact your bank if you lose your smart phone or tablet if you receive bank updates via SMS message 9. Keep your software and apps up to date 10. When disposing of devices give them to a technology recycling service like Mobile Muster for safe, secure and proper breaking down and recycling of the components http://www.netsafe.org.nz/how-to-keep-your-mobile-devices-safe-and-secure/ Staying Connected Using mobiles and other wireless devices
  • 14. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • Writing and sending a text message is basically the same on all mobiles but the functionality will vary from phone to phone – From the phone’s menu select ‘messaging’ (the menu item name may vary phone to phone) – Select ‘new message’ or ‘compose’ or similar – Enter the recipient’s phone number or select it from your ‘contacts’ or ‘address book’ – Type in the message – Press ‘send’ • One text message or SMS is 160 characters – If you type more than 160 characters it may send as one message but it will be charged as two • When replying to text messages, the procedure may vary phone by phone. However, with the original text message open … – Click on ‘options’ – Click on reply – Type in your answer/message – Press send Staying Connected Text messaging
  • 15. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Google Hangouts are video calls or IM chat and it’s very simple to use. You just need Gmail or Google+ Viber uses your phone number and the phone numbers of your contacts in your phone You create a Skype addresses which finds you just like your phone number does Use the Skype chat window for IM chat (Instant Messages ) Or use Viber or Kik for IM on mobile. It looks and works like text messaging but its free Staying Connected Video calling and Instant Messaging
  • 16. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Skype 1. Skype addresses find you just like a phone number 2. Use the Skype chat window for IM, Instant Messages 3. Parts of Skype profiles are seen by everyone on Skype. 4. Do not put details in your profile you don’t want public 5. You don’t have to fill in your profile if you do not want to 6. You can change your profile at any time 7. To update your settings on a PC open Skype click Tools > Options > Privacy. On Mac it's > Preferences > Privacy Viber 1. If you use Viber for IM on mobile. It looks and works like text messaging and uses your phone number and the phone numbers of your contacts in your phone 2. In Settings you adjust privacy, accessing contacts etc Google Hangouts 1. Google Hangouts are video calls or IM chat and it’s very simple to use. You just need Gmail or Google+ Staying Connected Video calling and Instant Messaging
  • 17. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Connect a wireless router to your internet at home to create your own ‘private’ WiFi network Consider using your own portable WiFi You can take it anywhere (including overseas) It will work anywhere there is a mobile network You can connect multiple devices to it It is just as secure as your private WiFi All network providers have them available Staying Connected WiFi: Private, Portable and Public
  • 18. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Too many plans to choose from so… – Keep the decision making simple – Just ask for something basic – A data plans vary in their price per Mb – Consider pre-paid Data plans and WiFi – If you want to use your phone for email or internet you need a data plan and / or use WiFi at home or while out – Make sure you have data and MMS set up if you want to send and receive pictures by message – Ask how to switch data on and off when using the carrier network – When travelling overseas make sure you have the right data plan What to look for in a Service Provider / Carrier – There is nothing tricky to look out for keep it simple – Ask about coverage and check with friends in your area. – You need to double check the coverage and the plan if you travel a lot around Australia or overseas Staying Connected WiFi: Private, Portable and Public
  • 19. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Using public wireless networks 1. Libraries, fast-food outlets, airports etc have safe WiFi 2. Avoid using WiFi run by people you don't know or trust 3. Always connect as 'public' when using public WiFi 4. Turn off sharing 5. Be aware of your surroundings 6. Be careful about what you do online 7. Avoid banking, shopping or using important passwords 8. If possible use secure URLs https:// instead of http:// 9. Always log out and close your browser when finished 10. Disable wireless networking when you are not using it Staying Connected WiFi: Private, Portable and Public
  • 20. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop The NBN is replacing most of the traditional landline networks for phone and internet services What does it mean to you? Speed and Bandwidth New services like e-Health You can check your location: http://www.nbnco.com.au/connect-home-or-business/check-your-address/rfs-sc0-home.html and the final cut-over date Staying Connected NBN the National Broadband Network
  • 21. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected ‘The Cloud’ The Cloud is the use of remote servers networked together to allow data storage and online access to resources and services. Things like: – Google Drive, One Drive, iCloud, DropBox, etc – Accounting like Xero and MYOB etc – Photos stored for sharing - Flickr, Picasa etc – Music - Spotify, Pandora, iTunes, Beats etc
  • 22. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected ‘The Cloud’ I have stored this set of slides in the cloud – It is in Dropbox so I can access it while mobile if I want to – And it can be downloaded from Dropbox if I invite people to share that particular Dropbox folder – It can also be downloaded from the cloud by anyone who has the link to it in SlideShare • http://www.slideshare.net/bradatslice
  • 23. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop The Cloud 1. Backing up, storing and/or sharing via the cloud is reasonably safe for files you don’t want to lose if your PC is lost or destroyed 2. Do not back up sensitive information to the cloud Sharing 1. Never open an attachment from a source you don't know 2. Peer-to-peer (P2P) file sharing carries risks including potential breaches of copyright Storing 1. Never insert a used removable storage device unless you a) know where it came from and b) have up to date ant-virus software installed 2. Backup your important personal and critical files (and those photos you cherish) onto an external hard drive Staying Connected ‘The Cloud’
  • 24. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected Social Media
  • 25. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop We’ve been writing on ‘walls’ for centuries These are from Pompeii 79AD Staying Connected Social Media
  • 26. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • Sometimes called Social Networking – in fact that’s what you do on Social Media • People connect in different ways on different sites • Some sites are designed for special purposes - like sharing video or pictures or just things you like Staying Connected Social Media
  • 27. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Which of these do you use? OR you would like to use? OR you would like to know more about? Setting up accounts is very similar for any online social platform all you need is an email address AND/OR Once you have Twitter or Facebook you can usually use either to set up and login to other platforms Staying Connected Social Media
  • 28. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • Facebook is about staying in touch with people you know and for catching up with friends you used to know • Twitter is for following people you don’t know, would like to know, or should know • LinkedIn is a combination of both but used for business and recruitment • Instagram is primarily for sharing day-to- day images and short videos • Tumblr is a blogging platform that allows you to do all of the above • Pinterest is all about sharing things you like on a virtual pin board . It’s a bit like scrap-booking Staying Connected Social Media
  • 29. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Snapchat With this app you can take photos, record videos, add text, or draw things, then send them to a controlled list of friends. And the post only stays up for a few seconds Kik Kik Messenger is an instant messaging app for most mobile devices which allows you to avoid the text messaging system And there are apps for fans of all sorts of things from Celebrities to Music and Video Staying Connected Social Media
  • 30. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop The things you write and upload to the internet, especially on social media platforms, may not always be secure • It’s important to understand how to use the privacy features these social media sites have to offer • Remember, each platform has its own settings, and some are more complicated than others. Let’s start with Facebook Staying Connected Social Media
  • 31. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Facebook is probably the platform used by most which requires a good initial privacy set-up then an occasional check-up Facebook Privacy Tab 1. Click the lock icon 2. Go to Privacy Settings and Tools 3. Check “Who can see my stuff?” 4. Adjust things like who can send friend requests, who can tag you and how people can find you 5. Little known: you can limit the audience for old posts Facebook Profile Settings 1. Next, update your privacy settings on your profile 2. Click About on your profile to view basic information 3. Click the icon left of ‘Edit’ You can set privacy for each Facebook Photo Settings 1. You can go back to check settings by album or image 2. For albums: click audience indicator on the bottom right 3. For images uploaded individually click each image and enter the privacy setting Staying Connected Social Media
  • 32. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Instagram 1. Open your Instagram mobile app tap the user icon 2. Tap Edit Your Profile and scroll down 3. Toggle private profiles on and off 4. Private means only accepted followers see your photos Twitter 1. Open the Settings menu. Click Security and Privacy 2. Select Protect my Tweets if you want to approve each follower instead of allowing anyone to read your tweets Pinterest 1. Click on your name, Select Account Settings 2. Change the Search Privacy to “yes” if you don’t want your pins to show up in search engines 3. You can also create secret boards The option is at the bottom of your board screen LinkedIn 1. Go to Settings in the top right corner (your profile picture) and select Review next to Privacy & Settings Google+ 1. The Settings menu is found on the left side of the screen Staying Connected Social Media
  • 33. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Think of Twitter as being a bit like talk- back radio… on steroids! ABC Radio uses Twitter extensively now. Take sport for example. ABC Grandstand is on both Twitter and Facebook Commercial TV News Variety and Current Affairs programmes use them too Staying Connected Social Media
  • 34. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • You can use Twitter on the Web or Mobile • Or use a downloadable application which operates like a dashboard making it easier filter topics • You can also look at Twitter accounts without having an account yourself • Or you can set up at Twitter.com – Use your own name or a nick name Upload a photo and a bio • Follow people – Celebrities, politicians, anyone of personal interest • Follow topics or events often grouped together by using what is known as a hash tag • Filter your timeline by creating lists of groups of people you follow or topics you are interested in • Your timeline is what you see when you log on – It’s the tweets being posted by the people you follow going up in real time • Notifications, Mentions and Replies are public engagements with others • Direct Messages ‘DM’s are private • Have your say: Write your first Tweet Staying Connected Social Media
  • 35. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop The Trading Post is only online now and others too like Gumtree and Craig’s List Staying Connected Banking Shopping and Apps
  • 36. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop There are apps for almost anything… – Your doctor or healthcare professional will soon offer you Telehealth options using video calling and a smart phone app – You can make Medicare claims via your smart phone or tablet (you’ll need a My.Gov login but once done it’s pretty easy) – You can do all your banking online and on mobile with apps – eBay and PayPal both have apps Staying Connected Banking Shopping and Apps
  • 37. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Using Internet banking 1. It is safest to type the bank’s URL into the browser 2. It’s best to memorise your password 3. Banks using non-keystroke passcodes are safest especially in public places or on shared PCs 4. Always log out when you are finished Shopping 1. Use common sense. Trust your instincts 2. Know who you are dealing with 3. Know what you are buying 4. Know what currency you are using 5. On auction websites always deal within the site 6. Avoid private contact with sellers - scammers will often use this ploy to 'offer a better deal' 7. Only pay on a secure web page https:// not http:// 8. Avoid money transfers and direct debit 9. Use secure payment methods like PayPal or credit card 10. Consider ‘MasterCard SecureCode’ or ‘Verified by Visa’ Staying Connected Banking Shopping and Apps
  • 38. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Downloading apps… 1. Each device operating system (OS) has a way to download apps – Google Play (Android) and iTunes (Apple iOS) Windows Store (Windows 8) for example 2. This is not the app’s source The source is the developer 3. Check the app’s source, its ratings and reviews 4. You can download apps when you are online or mobile 5. For each ‘store’ you will need a login ID 6. Once you have selected an app you can download it directly to your mobile device or to your PC/Mac and then transfer it to your mobile device with a ‘sync’ - by synchronising the device with your PC/Mac Staying Connected Banking Shopping and Apps
  • 39. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop How many passwords do you have? • How do you remember them? • Make them easy to remember but not simple • Never store them online Is your screen locked? • Should it be locked? • If you often leave your device unattended and ‘on’ lock it Staying Connected Passwords
  • 40. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected Identity theft. Myths and Mysteries
  • 41. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop A few simple myths 1. Cybersecurity is unlike any challenge we have faced Not so Imagine how it felt in the Victorian era with the introduction of the motor vehicle and the telegraph 2. Every Day We Face “Millions of Cyber Attacks” Maybe so. However, counting individual attacks is like counting bacteria but all we really care about is the impact and the source 3. This Is a Technology Problem So, so. Technology, yes however all too often, the problem exists between the chair and the keyboard “Having a sense of history can guide our responses to the novelties of our own era” http://www.wired.com/2014/07/debunking-5-major-cyber-security-myths/ Staying Connected Identity theft. Myths and Mysteries
  • 42. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Install and activate anti-virus, anti-spyware software and install or activate a firewall Adware and Spyware 1. These are information gathering software typically used for advertisers but they gather information secretly 2. Adware is the software used to assist advertisers place relevant ads onto the pages you visit 3. These may not be as bad as they sound. They may be annoying but they are rarely malicious viruses 4. Most top brand anti-virus software will prevent your PC from being attacked by these 5. Never click on those pop-up ads that say things like your computer may be at risk or run a scan now etc Staying Connected Online Safety and Security
  • 43. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Spam clogs up your email inbox and can include scams and phishing expeditions but there’s little you can do other than be alert and use common sense Scams 1. If it sounds too good to be true… Phishing 1. These are emails purporting to come from a valid source like your bank or Australia Post 2. Do not open them. 3. Never click on links or provide information Staying Connected Online Safety and Security
  • 44. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Online dating is just dating. However it is important to treat it the same way you treated meeting people in any social environment 1. Keep your personal information private 2. Only meet offline when you are ready and not before 3. Do not get financially involved online Staying Connected Dating
  • 45. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop As it sounds, they are photos of yourself usually taken by yourself… …or with others hence ‘selfie’ https://www.facebook.com/ellentv/photos/a.182755292239.124686.26012002239/10152299789332240/?type=1&theater Staying Connected Selfies
  • 46. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Staying Connected Terminology
  • 47. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Account harvesting The illegal practice of collecting email accounts from information in the public domain Adware Software that is covertly installed on your computer and designed to deliver advertisements or other content which encourages you to purchase goods or services. Antivirus Software that is designed to prevent infection from computer viruses. Bot A single compromised computer (a robot computer), sometimes called a zombie. Browser A software application that enables the retrieval and presentation of websites and other internet resources. Browser hijacking A symptom of a malware infection in which your browser persistently redirects to fraudulent web sites, usually in an attempt to extort money Cookie A string of text stored by your web browser enabling a website to remember you and your personal settings. Staying Connected Safety and Security
  • 48. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Digital certificate A way for browsers to verify the identity and authenticity of a website. A digital certificate is issued to a website by a trusted third party certificate authority. Domain Name System (DNS) A hierarchical naming system for resources connected to the internet. The DNS translates domain names to numerical identifiers (IP addresses) which are readable to networking equipment, allowing the routing of data from one point on the internet to another. Encryption The process of transforming documents and files for safe transmission over a public network. The information is then converted or deciphered back into its original format. Firewall Hardware or software which monitors information going in and out of your computer or network. Freeware Copyrighted computer software which is made available for use free of charge, for an unlimited time. Hacker Someone who attempts to gain unauthorized access to a computer system, often for fraudulent purposes. Hotspot An area in which Wi-Fi is available to the general public as a wireless local area network, as in a coffee shop. Staying Connected Safety and Security
  • 49. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Identity theft Use of personal details by someone else to deceive, to support some type of crime, or even just to play a joke. Identity theft is a form of identity crime (where somebody uses a false identity to commit a crime). Internet Service Provider (ISP) A company that provides access to the internet. Keystroke logger A malware program hidden on a computer that records and 'logs' each key the you press. It is used to record your personal data, e.g. usernames, passwords, credit card and bank account numbers which is then sent to the malware operator without your knowledge. Malicious software (malware) A catch-all term used to describe software designed to be installed into a computer system for the purpose of causing harm to the you or others. This would include viruses, spyware, trojans, worms, etc. NFC Near Field Communications – the technology used for PayPass Padlock A padlock display in a browser is intended to indicate a secure connection or website, although it may not always be a reliable indicator. Users should look instead for 'HTTPS'. Peer-to-peer file sharing network (P2P) A decentralized file sharing system. Files are stored on and served by the personal computers of the users. Staying Connected Safety and Security
  • 50. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Pharming A way of harvesting personal information, where a hacker puts a malicious code on your computer that redirects you to a fake site. Phishing (email/website) Phishing refers to fraudulent email messages or web sites used to gain access to personal information for illegal purposes such as transferring funds or purchasing goods over the internet. Pop-up A pop-up is a small window, which suddenly appears (pops-up) in the foreground of the normal screen. Privacy settings Settings which control how a user's data is shared with other people or systems. Privacy settings apply to web browsers and social networking services. Ransomware Malware which handicaps computer functionality, e.g. through browser hijacking or encrypting personal data, and offers to restore the functionality for a fee. Remote access Communication with a computer or network from a remote location through a link such as the internet or mobile phone. Scam A commonly used term to describe a confidence trick, relying on email or a website to deliver the trick to unsuspecting users. Staying Connected Safety and Security
  • 51. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Scareware Malware that causes frightening messages to appear, e.g. that your computer is infected with malware or that you are guilty of a crime, and attempts to extort money from you to resolve the alleged issue. Similar to ransomware. Secure Socket Layer (SSL) The most widely used security protocol on the internet, used for online banking and shopping sites. Website digital certificates are commonly implemented through SSL. The presence of 'https' in the browseraddress bar demonstrates that the connection between the your computer and the website is encrypted. However, 'https' can still be present when connecting to a website with an invalid digital certificate. Spam Unsolicited email. Most email spam is commercial advertising, often for dubious products, get-rich-quick schemes, or illegal services. Users are advised that if an offer in an email appears too good to be true then it probably is and should not be actioned in any way. Spyware Software that is covertly installed on a computing device and takes information from it without your the consent or knowledge of the user. Trojan horse Malicious code which is hidden in a computer program or file that may appear to be useful, interesting, or at the very least harmless to you when using your computer. When this computer program or file is run, the malicious code is also triggered, resulting in the set up or installation of malware. Staying Connected Safety and Security
  • 52. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop URL Universal Resource Locator is the technical term for the address (location) of an internet resource on the internet such as a website or image within a website. USB stick Universal Serial Bus. A small piece of hardware which stores data, sometimes called a jump drive, thumb drive or flash drive. Virus Malware designed to infect and corrupt a computer and to copy itself. Viruses can disrupt programs installed on a computer. VoIP The routing of real time voice conversations (telephone calls) over the internet rather than over an analog or circuit switched network. Wi-Fi A set of wireless communication protocols that can transmit traffic to Wi-Fi-enabled devices within a local area. A Wi-Fi-enabled device such as a laptop or mobile device can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot. Worm A self-replicating virus that does not alter files but resides in active memory and duplicates itself. Zombie A compromised computer Staying Connected Safety and Security
  • 53. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • 3G and 4G – Generic term for most modern high speed mobile networks • # or “hash” key – You are often asked to press the hash key after entering numbers into automated systems • Android – A new phone & operating system from Google which competes with iPhone • Blackberry – A type of mobile phone that is designed primarily for sending and receiving email as its main feature • Bluetooth – Personal or close range radio frequency (RF) network • Broadband – High speed internet • Cellular – Generically it’s the current type of mobile phone network • Cell-phone – Just another term for a mobile phone • Desk Top – The main or home screen of your PC or phone • GSM – Generic term for mobile network (originally Groupe Speciale Mobile then Global System for Mobile) Staying Connected Terminology
  • 54. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • ICE – In Case of Emergency • iPad – also known as a tablet – Apple Corporation’s touch-screen mobile computing device with internet access • Java – A type of software often used in phones • Multi-media – Generic term for pictures and video as opposed to simple text • MMS – A message with a picture in it sent from phone to phone (Multi-Media Service) •PDA – Generic term for a phone with its main feature being a diary/calendar, notes, and detailed contact list (Personal Digital Assistant) • Predictive Text & Auto-Correct – A feature in most mobiles that predicts the word you are typing in as you type • Premium Text Message – A normal text message that’s charged at a higher rate – for example voting on TV shows usually costs 55c • QWERTY – Typewriter style key pad layout Staying Connected Terminology
  • 55. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • RF – Radio frequency • SMS often called a Text – A short message typed into a phone and sent to another phone (Short Message Service) • Smart Phone – Generic term for a phone with advanced PDA and internet services installed • Texting – Same as SMS (SMS-ing) • URL – The “www” address you type into an internet browser to go to a web site (Uniform Resource Locator) • Voicemail – A message left on an automatic answering machine usually built into the mobile network • Wallpaper – The background image on the ‘desk-top’ or screen of your phone or PC • WAP – An old generic term for mobile internet – a WAP site is a mobile internet site Staying Connected Terminology
  • 56. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • Avatar – Usually the image you put up of yourself in your social media site’s profile • Blog (or web log) – A blog is a frequently updated website consisting of dated entries arranged in reverse chronological order - most recent post first. • Chat & Chat rooms – Web-based text conversation - not always but often in real time (often called IM & vice versa) – Dedicated chat sites about a specific subject • IM (Instant Message) – A real-time personal message sent between two or more users typically fast moving – IM is possible withGmail, MSN, Skype, Viber and on many sites like Facebook (called chat) • Mashup – Website or application that uses content from more than one source to create a completely new service or presentation of the content • MSN Messenger – An Instant Message service or application Staying Connected Terminology
  • 57. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • Podcast – An audio blog or recording of (say) a radio programme. You don't have to have an Apple, iPod to listen to a podcast; you can also listen to podcasts on a PC, or many mp3 players. • Post or Posting – A message added to an online discussion, or an update to your social media site status, commenting on a blog, writing on a Facebook ‘Wall’. • Skype – The worlds largest Voice over IP application which can be used for instant messaging and file transfers between users • Status update – A message you write about yourself on your own social media site – like Facebook • Tag or Tagging – Tags are the keywords people add to articles or photos in a blog or to web pages to assist in search and identification (Photos can be tagged in Facebook to help identifying people) • Thread – A series of posts on a single topic Staying Connected Terminology
  • 58. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop • Tweet – A posting to Twitter – must be 140 characters or less • Upload – Copying a file from a hard drive to a website or application thus making the file available to other members of the same site or application. • VoIP - Voice over IP (Internet Protocol) – Enabling people to use the internet as the transmission medium for telephone calls – One advantage of VoIP is that calls over the Internet do not incur a surcharge beyond what the user is paying for Internet access. • Widget – A little “Window Gadget” downloadable to your PC allowing access to another programme or application • Wiki – A Wiki is a website that allows users to freely create and edit the website content themselves. • Wikipedia – A website information service like an encyclopaedia entirely created by users Staying Connected Terminology
  • 59. Copyright Brad Keeling and Slice Wireless Pty Limited 2015 Workshop Good Luck