SlideShare a Scribd company logo
1 of 11
Ten important rules  for safe Internet usage   Aimed at higher education students
1. Enable a firewall A firewall will help prevent unauthorised access to your PC from potential hackers.
2. Clear cache/history Clearing the internet cache & history will stop other people that use the same computer gaining access to e-mail accounts. The cache/history saves passwords and other personal information.
3. Use Anti-Virus software Install a good anti-virus  program and keep it up to date to protect your PC from viruses.
4. Keep your PC up to date Keep your PC up to date with the latest patches and service packs.
5. Credit card details Never give out your credit card details to other people on the internet, when shopping online always make sure the site is a secure site.
6. POP UPS Enable a popup blocker on your PC.
7. Personal Details Never give your personal details to people over the Internet. Name Address Tel no
8. Don’t believe everything you see or read online.
9. Pictures Never post your pictures online were anyone can gain access to them.
10. Never arrange to meet someone you have met online, unless you have known them for sometime.

More Related Content

What's hot

Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remembersherireid89
 
CSS Module 6 - Configure a DHCP Server
CSS Module 6 - Configure a DHCP ServerCSS Module 6 - Configure a DHCP Server
CSS Module 6 - Configure a DHCP Serverkenjifritz
 
Installing Windows-10
Installing Windows-10Installing Windows-10
Installing Windows-10YvannAdolfo
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingGene Carboni
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgradeDana Popescu
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenanceCornelius Micah
 
How to format a computer windows 7
How to format a computer windows 7How to format a computer windows 7
How to format a computer windows 7Md Aftab
 
Web Site Design Principles
Web Site Design PrinciplesWeb Site Design Principles
Web Site Design PrinciplesMukesh Tekwani
 
Installing windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usbInstalling windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usbArsalan Qureshi
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenanceDanladi Gambo
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)Dev Dorse
 
Installing software
Installing softwareInstalling software
Installing softwareAjay Jassi
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system errorRachel Espino
 
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptxLadyChristianneCalic
 

What's hot (20)

Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
 
CSS Module 6 - Configure a DHCP Server
CSS Module 6 - Configure a DHCP ServerCSS Module 6 - Configure a DHCP Server
CSS Module 6 - Configure a DHCP Server
 
Installing Windows-10
Installing Windows-10Installing Windows-10
Installing Windows-10
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgrade
 
windows 10
windows 10 windows 10
windows 10
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
 
Google chrome
Google chromeGoogle chrome
Google chrome
 
How to format a computer windows 7
How to format a computer windows 7How to format a computer windows 7
How to format a computer windows 7
 
Web Site Design Principles
Web Site Design PrinciplesWeb Site Design Principles
Web Site Design Principles
 
Installing windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usbInstalling windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usb
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
 
Installing software
Installing softwareInstalling software
Installing software
 
PHP.ppt
PHP.pptPHP.ppt
PHP.ppt
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
1st quarter css week 1
1st quarter css week 11st quarter css week 1
1st quarter css week 1
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
 
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
 

Viewers also liked

Defending Medical Malpractice
Defending Medical MalpracticeDefending Medical Malpractice
Defending Medical MalpracticeMedicineAndHealth
 
Eusidic, The Outlook And The Future
Eusidic, The Outlook And The FutureEusidic, The Outlook And The Future
Eusidic, The Outlook And The Futuremmmmmrob
 
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015 Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015 Travis Leonardi
 
RestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De CarcabosoRestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De Carcabosomontemorcillo
 
Mgs Power Point Jan 2008
Mgs Power Point Jan 2008Mgs Power Point Jan 2008
Mgs Power Point Jan 2008guestf71fee
 

Viewers also liked (9)

Defending Medical Malpractice
Defending Medical MalpracticeDefending Medical Malpractice
Defending Medical Malpractice
 
MONTREAL
MONTREALMONTREAL
MONTREAL
 
Presentation Test
Presentation TestPresentation Test
Presentation Test
 
Home
HomeHome
Home
 
Dia De La Amistad
Dia De La AmistadDia De La Amistad
Dia De La Amistad
 
Eusidic, The Outlook And The Future
Eusidic, The Outlook And The FutureEusidic, The Outlook And The Future
Eusidic, The Outlook And The Future
 
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015 Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
 
RestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De CarcabosoRestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De Carcaboso
 
Mgs Power Point Jan 2008
Mgs Power Point Jan 2008Mgs Power Point Jan 2008
Mgs Power Point Jan 2008
 

Similar to Ten Important Rules

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Jay Nagar
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 

Similar to Ten Important Rules (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 

Recently uploaded

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 

Recently uploaded (20)

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 

Ten Important Rules

  • 1. Ten important rules for safe Internet usage Aimed at higher education students
  • 2. 1. Enable a firewall A firewall will help prevent unauthorised access to your PC from potential hackers.
  • 3. 2. Clear cache/history Clearing the internet cache & history will stop other people that use the same computer gaining access to e-mail accounts. The cache/history saves passwords and other personal information.
  • 4. 3. Use Anti-Virus software Install a good anti-virus program and keep it up to date to protect your PC from viruses.
  • 5. 4. Keep your PC up to date Keep your PC up to date with the latest patches and service packs.
  • 6. 5. Credit card details Never give out your credit card details to other people on the internet, when shopping online always make sure the site is a secure site.
  • 7. 6. POP UPS Enable a popup blocker on your PC.
  • 8. 7. Personal Details Never give your personal details to people over the Internet. Name Address Tel no
  • 9. 8. Don’t believe everything you see or read online.
  • 10. 9. Pictures Never post your pictures online were anyone can gain access to them.
  • 11. 10. Never arrange to meet someone you have met online, unless you have known them for sometime.