A Guide for Teens & ParentsA Guide for Teens & Parents
 DO have your security settings set toDO have your security settings set to
“Friends Only” or “Friends of Friends”. You“F...
 DO NOT post your address or phoneDO NOT post your address or phone
number on your Profile. If someonenumber on your Prof...
 DO validate friend requests.DO validate friend requests.
Make sure it’s from someoneMake sure it’s from someone
you actu...
 DO be careful when installingDO be careful when installing
Applications. If an App asks you toApplications. If an App as...
 Also, if you click on a link, and aAlso, if you click on a link, and a
page comes up that looks just likepage comes up t...
 DO NOT have your full name listed on yourDO NOT have your full name listed on your
profile.profile.
 DO have your profi...
 DO have the “Block all apps and third-partyDO have the “Block all apps and third-party
services I haven’t connected to f...
 DO NOT use custom profilesDO NOT use custom profiles
randomly found on the Internetrandomly found on the Internet
unless...
 DO validate friend requests. Make sureDO validate friend requests. Make sure
the request is from someone you know.the re...
 DO be careful when installingDO be careful when installing
applications. If you click on a link or toapplications. If yo...
 DO NOT give out your emailDO NOT give out your email
or Facebook/Myspace/Twitteror Facebook/Myspace/Twitter
password to ...
 Beware of shortened links, especially onesBeware of shortened links, especially ones
posted on Facebook, MySpace, and Tw...
 DO make sure you haveDO make sure you have
anti-virus software installedanti-virus software installed
and that it is up-...
 If you’re surfing the Internet and get aIf you’re surfing the Internet and get a
popup that says that your computer ispo...
DO NOTDO NOT
CLICK OK!CLICK OK!
 If you receive an email fromIf you receive an email from
someone, even someone yousomeone, even someone you
know and tru...
 DO be wary of e-mailDO be wary of e-mail
attachments. Download and scanattachments. Download and scan
all attachments be...
 DO be wary of emails that claim toDO be wary of emails that claim to
be from Facebook, MySpace, or anybe from Facebook, ...
 When downloading anything from theWhen downloading anything from the
internet, DO scan any executable files orinternet, ...
 When on ANY MMORPG orWhen on ANY MMORPG or
online game, DO NOT give outonline game, DO NOT give out
any personal informa...
 DO remember that everythingDO remember that everything
you post on the Internet isyou post on the Internet is
there FORE...
 Run C-Cleaner or Disk Cleanup.Run C-Cleaner or Disk Cleanup.
 Run Disk Defragmenter.Run Disk Defragmenter.
 ***MAY req...
 Runs extremelyRuns extremely
slowly, but doing aslowly, but doing a
basic cleanup doesn’tbasic cleanup doesn’t
help.help...
 Your computer restartsYour computer restarts
on its own and thenon its own and then
fails to run normally.fails to run n...
 Your Web browser'sYour Web browser's
home pagehome page
unexpectedly changes.unexpectedly changes.
 Web pages areWeb pa...
 New toolbars areNew toolbars are
unexpectedly added tounexpectedly added to
your Web browser.your Web browser.
 Strange...
 Disks or disk drives areDisks or disk drives are
inaccessible.inaccessible.
 You can't print correctly.You can't print ...
 Anti-virus softwareAnti-virus software
has been disabled.has been disabled.
 Antivirus softwareAntivirus software
that ...
 Your computerYour computer
stops responding orstops responding or
freezes often.freezes often.
 Your computerYour compu...
 Restart yourRestart your
computer incomputer in SafeSafe
ModeMode. (This can be. (This can be
done by restartingdone by ...
 Run your anti-virus software.Run your anti-virus software.
Do a full scan. If infected filesDo a full scan. If infected ...
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Upcoming SlideShare
Loading in...5
×

Staying safe on_the_internet_presentation (2)

172
-1

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
172
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Will be up at start of program when people come in.
  • Welcome
    A little about me
    Have worked for the library about 5 years, have been interested in computers for a long time, was taught everything I know by my husband.
  • This can be done by going to Account -> Privacy Settings -> Applications and Websites and clicking “Edit Settings” next to both “Instant Personalization” and “Info accessible through your friends”.
    ***SHOW THEM HOW TO DO IT USING EXAMPLE FB ACCT.***
  • For gaming Apps, if it’s not an official app from the game developer, do not install it.
  • This can be done by going to Profile->My Privacy.
    Also DO edit your settings to have people have to input your last name or email address to send you a friend request to prevent unwanted solicitation. This can be done by going to Profile -> My Privacy, and checking the box.
  • This can be done by going to Profile->My Privacy or My Account->Privacy and clicking “Go to Application Settings to Change Settings for Apps and Third-Parties.”
    Make sure both boxes are checked.
  • Myspace now has a custom profile editor built into the site that you can use to spruce up your profile.
  • This includes messages such as “OMG this person has your information!” Or “Is that YOU in this video!?”
  • This includes messages such as “OMG this person has your information!” Or “Is that YOU in this video!?”
  • The only security setting Twitter has is to make your Tweets protected, but ANYONE ‘following’ you can see your Tweets, so be careful who you allow to follow you.
    DO NOT click on links in Tweets that say that someone has your information, even if the comment or message is from someone you know. If you do click on the link and a page comes up that looks just like the Twitter login page, check the address bar. If it is not http://twitter.com/login, then DO NOT put your login information in.
  • There is a list of sites that check shortened urls in handout.
  • I recommend both MS Security Essentials & Malwarebytes. MS Security Essentials is free as long as you have a valid copy of Windows, and Malwarebytes is a good backup to have.
  • OR says that your registry has errors, speed up your computer, etc.
  • Example of software that pops up on computers running Windows XP.
  • Rogue Anti-virus programs will try to trick you by copying the look of legitimate software and using “scare tactics” to get you to download the software. May also try to copy the look of the Windows Security Center.
  • This one has tried to copy the look of the “My Computer” window in Windows 7.
  • Just because it’s from a trusted source, doesn’t mean that a file couldn’t have gotten infected while flying around in cyberspace.
  • If you use a multi-scanner site, if you don’t feel comfortable with the results of the scan, don’t open the file.
  • When you’re going for a job or college interview in the future, do you really want your potential boss or college scholarship committee to be able to see something you’re about to post? If the answer is NO, then DO NOT post it!
  • Can also use Defraggler or JKDefrag to defragment.
  • I.E. MS Office is disabled, Internet Explorer or Firefox doesn’t work, etc.
  • Big clue that comp is infected is that the Anti-Virus software is disabled.
  • Crash usually followed by the BLUE SCREEN OF DEATH.
  • Example of the Blue Screen of Death. Will have an error code, known as a STOP ERROR.
  • Not as funny when it happens to you though. 
  • Depending on your computer’s speed, you can run both Malwarebytes and MS Security Essentials at the same time.
  • Staying safe on_the_internet_presentation (2)

    1. 1. A Guide for Teens & ParentsA Guide for Teens & Parents
    2. 2.  DO have your security settings set toDO have your security settings set to “Friends Only” or “Friends of Friends”. You“Friends Only” or “Friends of Friends”. You don’t want all of your personal informationdon’t want all of your personal information out for the entire world to see. Change yourout for the entire world to see. Change your “Instant Personalization Pilot Program”“Instant Personalization Pilot Program” setting to be unchecked and the “What yoursetting to be unchecked and the “What your friends can share about you” setting to be allfriends can share about you” setting to be all unchecked. Change your “Facebook Places”unchecked. Change your “Facebook Places” settings to be private.settings to be private.
    3. 3.  DO NOT post your address or phoneDO NOT post your address or phone number on your Profile. If someonenumber on your Profile. If someone doesn’t have your info, there’s probablydoesn’t have your info, there’s probably a reason for it.a reason for it.  DO NOT post personal information onDO NOT post personal information on someone’s Wall. If you have somethingsomeone’s Wall. If you have something important to tell them, do it viaimportant to tell them, do it via Message or tell them in person.Message or tell them in person.
    4. 4.  DO validate friend requests.DO validate friend requests. Make sure it’s from someoneMake sure it’s from someone you actually know in person.you actually know in person. Just because someone’s profileJust because someone’s profile says they live in your town andsays they live in your town and go to your school doesn’t meango to your school doesn’t mean that they actually do.that they actually do.
    5. 5.  DO be careful when installingDO be careful when installing Applications. If an App asks you toApplications. If an App asks you to input your email & password, it’sinput your email & password, it’s an attempt to steal your login info,an attempt to steal your login info, also known as phishing. If it wantsalso known as phishing. If it wants you to complete a survey or offer inyou to complete a survey or offer in order to access the App, the creatorsorder to access the App, the creators of the App are trying to spam you.of the App are trying to spam you.
    6. 6.  Also, if you click on a link, and aAlso, if you click on a link, and a page comes up that looks just likepage comes up that looks just like the Facebook login page, check thethe Facebook login page, check the address bar. If it’s notaddress bar. If it’s not http://www.facebook.com/http://www.facebook.com/ oror http://www.facebook.com/login.phphttp://www.facebook.com/login.php then it is NOT a legit login page!then it is NOT a legit login page!
    7. 7.  DO NOT have your full name listed on yourDO NOT have your full name listed on your profile.profile.  DO have your profile set to ‘Viewable by MyDO have your profile set to ‘Viewable by My Friends Only’. Also DO edit your settings toFriends Only’. Also DO edit your settings to have people have to input your last name orhave people have to input your last name or email address to send you a friend request toemail address to send you a friend request to prevent unwanted solicitation.prevent unwanted solicitation.
    8. 8.  DO have the “Block all apps and third-partyDO have the “Block all apps and third-party services I haven’t connected to from accessingservices I haven’t connected to from accessing my profile information through the MySpacemy profile information through the MySpace Developer Platform” and “Block all apps andDeveloper Platform” and “Block all apps and third-party services I haven’t connected to fromthird-party services I haven’t connected to from communicating with me through the MySpacecommunicating with me through the MySpace Developer Platform” boxes checked underDeveloper Platform” boxes checked under ‘Application Settings’.‘Application Settings’.
    9. 9.  DO NOT use custom profilesDO NOT use custom profiles randomly found on the Internetrandomly found on the Internet unless you or someone you knowunless you or someone you know are able to go through the HTMLare able to go through the HTML script bit by bit to verify that it’sscript bit by bit to verify that it’s clean.clean.
    10. 10.  DO validate friend requests. Make sureDO validate friend requests. Make sure the request is from someone you know.the request is from someone you know.  DO NOT click on links in messages orDO NOT click on links in messages or comments that say that someone has yourcomments that say that someone has your information or there is a video of you, eveninformation or there is a video of you, even from someone you know. It is very possiblefrom someone you know. It is very possible that their login info has been stolen and thatthat their login info has been stolen and that someone is trying to steal yours as well.someone is trying to steal yours as well.
    11. 11.  DO be careful when installingDO be careful when installing applications. If you click on a link or toapplications. If you click on a link or to install an App and a page pops up thatinstall an App and a page pops up that looks JUST like the MySpace homepage,looks JUST like the MySpace homepage, check the address bar. If it’s notcheck the address bar. If it’s not http://www.myspace.com/http://www.myspace.com/ oror http://login.myspace.comhttp://login.myspace.com, then it’s an, then it’s an attempt to steal your login information.attempt to steal your login information.
    12. 12.  DO NOT give out your emailDO NOT give out your email or Facebook/Myspace/Twitteror Facebook/Myspace/Twitter password to ANYONE, not yourpassword to ANYONE, not your significant other, not your bestsignificant other, not your best friend, NO ONE except yourfriend, NO ONE except your parents.parents.
    13. 13.  Beware of shortened links, especially onesBeware of shortened links, especially ones posted on Facebook, MySpace, and Twitter.posted on Facebook, MySpace, and Twitter. There are malicious websites out there whoseThere are malicious websites out there whose web addresses are disguised with shortenedweb addresses are disguised with shortened urls that will try to give you a virus as soon asurls that will try to give you a virus as soon as you visit the website. Links such asyou visit the website. Links such as http://tinyurl.com/24a3ku3http://tinyurl.com/24a3ku3 oror http://bit.ly/c5Ao7ohttp://bit.ly/c5Ao7o could go to an infectedcould go to an infected site.site.
    14. 14.  DO make sure you haveDO make sure you have anti-virus software installedanti-virus software installed and that it is up-to-date.and that it is up-to-date.
    15. 15.  If you’re surfing the Internet and get aIf you’re surfing the Internet and get a popup that says that your computer ispopup that says that your computer is infected with X number of viruses andinfected with X number of viruses and that you need to download a certainthat you need to download a certain program to get rid of them, DO NOTprogram to get rid of them, DO NOT click OK. It is a fake anti-virus programclick OK. It is a fake anti-virus program that will give you a very nasty virus thatthat will give you a very nasty virus that is extremely difficult and expensive tois extremely difficult and expensive to get rid of.get rid of.
    16. 16. DO NOTDO NOT CLICK OK!CLICK OK!
    17. 17.  If you receive an email fromIf you receive an email from someone, even someone yousomeone, even someone you know and trust, but there isknow and trust, but there is nothing but a link in the bodynothing but a link in the body of the e-mail, DO NOT click onof the e-mail, DO NOT click on it unless you are expectingit unless you are expecting something from them, in whichsomething from them, in which case verify that it was sent .case verify that it was sent .
    18. 18.  DO be wary of e-mailDO be wary of e-mail attachments. Download and scanattachments. Download and scan all attachments before opening.all attachments before opening. Most email clients come with aMost email clients come with a built-in e-mail scanner, but nonebuilt-in e-mail scanner, but none are perfect. New viruses pop upare perfect. New viruses pop up every single day.every single day.
    19. 19.  DO be wary of emails that claim toDO be wary of emails that claim to be from Facebook, MySpace, or anybe from Facebook, MySpace, or any “official”-looking source such as the“official”-looking source such as the FBI, UPS, Fed-Ex, etc. Hackers andFBI, UPS, Fed-Ex, etc. Hackers and spammers try to lure unsuspectingspammers try to lure unsuspecting victims into giving out theirvictims into giving out their information by duplicating the lookinformation by duplicating the look of legitimate messaging systems.of legitimate messaging systems.
    20. 20.  When downloading anything from theWhen downloading anything from the internet, DO scan any executable files orinternet, DO scan any executable files or archives before opening. There are manyarchives before opening. There are many free multi-software antivirus scanningfree multi-software antivirus scanning sites you can use to scan files. If the filesites you can use to scan files. If the file or archive in question is too large to beor archive in question is too large to be scanned from the sites, use your installedscanned from the sites, use your installed anti-virus software(s) to scan the file.anti-virus software(s) to scan the file.
    21. 21.  When on ANY MMORPG orWhen on ANY MMORPG or online game, DO NOT give outonline game, DO NOT give out any personal information. Youany personal information. You don’t know who you are reallydon’t know who you are really talking to. You may thinktalking to. You may think you’re talking to 16-year-oldyou’re talking to 16-year-old ‘Sienna du Larc’ but you’re‘Sienna du Larc’ but you’re really talking to some 40-year-really talking to some 40-year- old guy named Fred.old guy named Fred.
    22. 22.  DO remember that everythingDO remember that everything you post on the Internet isyou post on the Internet is there FOREVER. Unlessthere FOREVER. Unless you're prepared to attachyou're prepared to attach something in your Facebooksomething in your Facebook or MySpace profile to aor MySpace profile to a resume or scholarshipresume or scholarship application, DO NOT post it.application, DO NOT post it.
    23. 23.  Run C-Cleaner or Disk Cleanup.Run C-Cleaner or Disk Cleanup.  Run Disk Defragmenter.Run Disk Defragmenter.  ***MAY require a restart after completing******MAY require a restart after completing***  Run Checkdisk. (This will check yourRun Checkdisk. (This will check your harddrive for errors and repair any itharddrive for errors and repair any it finds.)finds.)  ***WILL REQUIRE A RESTART TO RUN******WILL REQUIRE A RESTART TO RUN***
    24. 24.  Runs extremelyRuns extremely slowly, but doing aslowly, but doing a basic cleanup doesn’tbasic cleanup doesn’t help.help.  Multiple Pop-ups,Multiple Pop-ups, even when not in aneven when not in an Internet browser.Internet browser.
    25. 25.  Your computer restartsYour computer restarts on its own and thenon its own and then fails to run normally.fails to run normally.  Programs on yourPrograms on your computer don't workcomputer don't work correctly.correctly.
    26. 26.  Your Web browser'sYour Web browser's home pagehome page unexpectedly changes.unexpectedly changes.  Web pages areWeb pages are unexpectedly added tounexpectedly added to your Favorites folder.your Favorites folder.
    27. 27.  New toolbars areNew toolbars are unexpectedly added tounexpectedly added to your Web browser.your Web browser.  Strange music or soundsStrange music or sounds unexpectedly play fromunexpectedly play from your computer’s speakers.your computer’s speakers.
    28. 28.  Disks or disk drives areDisks or disk drives are inaccessible.inaccessible.  You can't print correctly.You can't print correctly.  You see unusual errorYou see unusual error messages.messages.  You see distorted menusYou see distorted menus and dialog boxes.and dialog boxes.
    29. 29.  Anti-virus softwareAnti-virus software has been disabled.has been disabled.  Antivirus softwareAntivirus software that you did notthat you did not install needs you toinstall needs you to pay for “full access”.pay for “full access”.
    30. 30.  Your computerYour computer stops responding orstops responding or freezes often.freezes often.  Your computerYour computer crashes and restartscrashes and restarts every few minutes.every few minutes.
    31. 31.  Restart yourRestart your computer incomputer in SafeSafe ModeMode. (This can be. (This can be done by restartingdone by restarting and pressing F8and pressing F8 BEFORE theBEFORE the Windows Load screenWindows Load screen comes up.)comes up.)
    32. 32.  Run your anti-virus software.Run your anti-virus software. Do a full scan. If infected filesDo a full scan. If infected files have been found once it’shave been found once it’s finished, follow the instructionsfinished, follow the instructions to get rid of the infected files,to get rid of the infected files, and then run your anti-virusand then run your anti-virus software again. If it doesn’t findsoftware again. If it doesn’t find any infected files or you haveany infected files or you have completed the second scan, trycompleted the second scan, try running a backup anti-malwarerunning a backup anti-malware program (such as Malwarebytes).program (such as Malwarebytes).
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×