SlideShare a Scribd company logo
1 of 5
Computer Security
Bellingham Technical College Student Technology
Support Desk – Sean Dyvig
Password Security
●Safe password practices
●A symbol will significantly increase the strength of a password
●Do not share passwords between sites
●Avoid writing passwords down
●Do not share passwords with others
●https://howsecureismypassword.net/
●Password Managers
●http://www.roboform.com/
●https://lastpass.com/
https://xato.net/passwords/more-top-worst-passwords/
Internet security
●What's safe?
– https://www.mywot.com/
●Stop malicious advertisements
– https://adblockplus.org/en/
– http://noscript.net/
– https://www.ghostery.com/
●Take control of your privacy
– ctrl+shift+p (firefox) ctrl+shift+n (chrome) for private / incognito mode
Windows Security
●Firewalls
– Understanding Windows Firewall
● Allow a program through
– Zone Alarm
●Anti-virus
– https://www.malwarebytes.org/
– adwcleaner
– CwShredder
– TDSSKiller
– ComboFix
Wireless security
●Open WiFi is public WiFi
– Use public, home, and work network profiles accordingly
– Do not send sensitive data on an open wireless
– Power off WiFi when not in use
●Bluetooth
– Change your Bluetooth's default PIN
– Power off Bluetooth when not in use

More Related Content

What's hot

How to protect your mac (mac os)
How to protect your mac (mac os)How to protect your mac (mac os)
How to protect your mac (mac os)Amani Lion
 
Multimedia streaming e content curation
Multimedia streaming e content curationMultimedia streaming e content curation
Multimedia streaming e content curationRoberto Perissa
 
Cyber Security Briefing for Beginners
Cyber Security Briefing for BeginnersCyber Security Briefing for Beginners
Cyber Security Briefing for BeginnersIstván Lőrincz
 
UNIDAD I Codigos Frame 4to grupo
UNIDAD I Codigos Frame 4to grupo UNIDAD I Codigos Frame 4to grupo
UNIDAD I Codigos Frame 4to grupo Caterin Mishel
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroJames Jara
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrentJames Jara
 
Bolo Bhi Digital Security
Bolo Bhi Digital SecurityBolo Bhi Digital Security
Bolo Bhi Digital SecurityBoloBhiSlides
 
The Price Of Computer Security
The Price Of Computer SecurityThe Price Of Computer Security
The Price Of Computer Securityjvonschilling
 

What's hot (11)

How to protect your mac (mac os)
How to protect your mac (mac os)How to protect your mac (mac os)
How to protect your mac (mac os)
 
Multimedia streaming e content curation
Multimedia streaming e content curationMultimedia streaming e content curation
Multimedia streaming e content curation
 
Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2
 
Cyber Security Briefing for Beginners
Cyber Security Briefing for BeginnersCyber Security Briefing for Beginners
Cyber Security Briefing for Beginners
 
UNIDAD I Codigos Frame 4to grupo
UNIDAD I Codigos Frame 4to grupo UNIDAD I Codigos Frame 4to grupo
UNIDAD I Codigos Frame 4to grupo
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
 
Bolo Bhi Digital Security
Bolo Bhi Digital SecurityBolo Bhi Digital Security
Bolo Bhi Digital Security
 
A day in web 2.0 training
A day in web 2.0 trainingA day in web 2.0 training
A day in web 2.0 training
 
The Price Of Computer Security
The Price Of Computer SecurityThe Price Of Computer Security
The Price Of Computer Security
 

Viewers also liked

An ii, var.15,mai 2014
An ii, var.15,mai 2014An ii, var.15,mai 2014
An ii, var.15,mai 2014liviuc
 
Reconocimientos 2011 2012
Reconocimientos 2011 2012Reconocimientos 2011 2012
Reconocimientos 2011 2012subirdoc2014
 
Alternative Computing
Alternative ComputingAlternative Computing
Alternative Computingbtcgrant
 
Classifications of matter
Classifications of matterClassifications of matter
Classifications of matternaz10
 
La robotica victor moya
La robotica  victor moyaLa robotica  victor moya
La robotica victor moyaVíctor Moya
 
Reading 85 - Reading Online
Reading 85 - Reading OnlineReading 85 - Reading Online
Reading 85 - Reading Onlinebtcgrant
 
Computer Boot Camp, July 1, 2014
Computer Boot Camp, July 1, 2014Computer Boot Camp, July 1, 2014
Computer Boot Camp, July 1, 2014btcgrant
 
Multimedia y educación Bianny Espinal y Víctor Moya
Multimedia y educación Bianny Espinal y Víctor  Moya Multimedia y educación Bianny Espinal y Víctor  Moya
Multimedia y educación Bianny Espinal y Víctor Moya Víctor Moya
 
Computer Boot Camp Orientation Fall 2015
Computer Boot Camp Orientation Fall 2015Computer Boot Camp Orientation Fall 2015
Computer Boot Camp Orientation Fall 2015btcgrant
 
Creacion empresa: FUNDITEC
Creacion empresa: FUNDITECCreacion empresa: FUNDITEC
Creacion empresa: FUNDITECIrene Gonsalves
 
Eye lasik healthy foods 5-15pdf
Eye lasik healthy foods 5-15pdfEye lasik healthy foods 5-15pdf
Eye lasik healthy foods 5-15pdfSDBCreativeGroup
 
Cloud - Google Drive & Dropbox
Cloud - Google Drive & DropboxCloud - Google Drive & Dropbox
Cloud - Google Drive & Dropboxbtcgrant
 
Bhagavad gita
Bhagavad gitaBhagavad gita
Bhagavad gitaAna KLein
 

Viewers also liked (15)

An ii, var.15,mai 2014
An ii, var.15,mai 2014An ii, var.15,mai 2014
An ii, var.15,mai 2014
 
Reconocimientos 2011 2012
Reconocimientos 2011 2012Reconocimientos 2011 2012
Reconocimientos 2011 2012
 
Alternative Computing
Alternative ComputingAlternative Computing
Alternative Computing
 
Classifications of matter
Classifications of matterClassifications of matter
Classifications of matter
 
La robotica victor moya
La robotica  victor moyaLa robotica  victor moya
La robotica victor moya
 
Reading 85 - Reading Online
Reading 85 - Reading OnlineReading 85 - Reading Online
Reading 85 - Reading Online
 
Computer Boot Camp, July 1, 2014
Computer Boot Camp, July 1, 2014Computer Boot Camp, July 1, 2014
Computer Boot Camp, July 1, 2014
 
Multimedia y educación Bianny Espinal y Víctor Moya
Multimedia y educación Bianny Espinal y Víctor  Moya Multimedia y educación Bianny Espinal y Víctor  Moya
Multimedia y educación Bianny Espinal y Víctor Moya
 
Computer Boot Camp Orientation Fall 2015
Computer Boot Camp Orientation Fall 2015Computer Boot Camp Orientation Fall 2015
Computer Boot Camp Orientation Fall 2015
 
Creacion empresa: FUNDITEC
Creacion empresa: FUNDITECCreacion empresa: FUNDITEC
Creacion empresa: FUNDITEC
 
Capadocia
CapadociaCapadocia
Capadocia
 
Eye lasik healthy foods 5-15pdf
Eye lasik healthy foods 5-15pdfEye lasik healthy foods 5-15pdf
Eye lasik healthy foods 5-15pdf
 
Cloud - Google Drive & Dropbox
Cloud - Google Drive & DropboxCloud - Google Drive & Dropbox
Cloud - Google Drive & Dropbox
 
Mount nemrut
Mount nemrutMount nemrut
Mount nemrut
 
Bhagavad gita
Bhagavad gitaBhagavad gita
Bhagavad gita
 

Similar to Computer Security Workshop

Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Linuxmalaysia Malaysia
 
How I Learnt hacking in High School - BSidesLV - 2015
How I Learnt hacking in High School - BSidesLV - 2015How I Learnt hacking in High School - BSidesLV - 2015
How I Learnt hacking in High School - BSidesLV - 2015lokeshpidawekar
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksCiNPA Security SIG
 
Web Security attacks and defense
Web Security attacks and defenseWeb Security attacks and defense
Web Security attacks and defenseJose Mato
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 lokeshpidawekar
 
Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security onlineChristopherTalib
 
Building a Security Program at Grammarly - XP Days 2019
Building a Security Program at Grammarly - XP Days 2019Building a Security Program at Grammarly - XP Days 2019
Building a Security Program at Grammarly - XP Days 2019Dmitry Tiagulskyi
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsKevin Wall
 
Secure at Speed @ Solent.tech
Secure at Speed @ Solent.techSecure at Speed @ Solent.tech
Secure at Speed @ Solent.techStuart Gunter
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applicationsMohammed A. Imran
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansendrewz lin
 
Understanding and implementing website security
Understanding and implementing website securityUnderstanding and implementing website security
Understanding and implementing website securityDrew Gorton
 
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...cyberforgeacademy
 
[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answersOWASP
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingOWASP Delhi
 
Web Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your websiteWeb Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your websiteAndrew Sorensen
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...CiNPA Security SIG
 

Similar to Computer Security Workshop (20)

Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
 
How I Learnt hacking in High School - BSidesLV - 2015
How I Learnt hacking in High School - BSidesLV - 2015How I Learnt hacking in High School - BSidesLV - 2015
How I Learnt hacking in High School - BSidesLV - 2015
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
Web Security attacks and defense
Web Security attacks and defenseWeb Security attacks and defense
Web Security attacks and defense
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
 
Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security online
 
Building a Security Program at Grammarly - XP Days 2019
Building a Security Program at Grammarly - XP Days 2019Building a Security Program at Grammarly - XP Days 2019
Building a Security Program at Grammarly - XP Days 2019
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
 
Secure at Speed @ Solent.tech
Secure at Speed @ Solent.techSecure at Speed @ Solent.tech
Secure at Speed @ Solent.tech
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applications
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansen
 
Understanding and implementing website security
Understanding and implementing website securityUnderstanding and implementing website security
Understanding and implementing website security
 
Flipping the script
Flipping the scriptFlipping the script
Flipping the script
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
 
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
 
[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Web Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your websiteWeb Security: What's wrong, and how the bad guys can break your website
Web Security: What's wrong, and how the bad guys can break your website
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
 

More from btcgrant

Hawley benefits challenges of oer
Hawley benefits challenges of oerHawley benefits challenges of oer
Hawley benefits challenges of oerbtcgrant
 
Collaborate Digital Literacy Workshop
Collaborate Digital Literacy WorkshopCollaborate Digital Literacy Workshop
Collaborate Digital Literacy Workshopbtcgrant
 
Evernote & OneDrive
Evernote & OneDriveEvernote & OneDrive
Evernote & OneDrivebtcgrant
 
IT Academy Boot Camp DL Presentation
IT Academy Boot Camp DL Presentation IT Academy Boot Camp DL Presentation
IT Academy Boot Camp DL Presentation btcgrant
 
Videoconferencing DL Presentation
Videoconferencing DL PresentationVideoconferencing DL Presentation
Videoconferencing DL Presentationbtcgrant
 
Cloud - Dropbox & Google Drive - digital literacy grant
Cloud - Dropbox & Google Drive - digital literacy grantCloud - Dropbox & Google Drive - digital literacy grant
Cloud - Dropbox & Google Drive - digital literacy grantbtcgrant
 
Cloud - Dropbox & Google Drive
Cloud - Dropbox & Google DriveCloud - Dropbox & Google Drive
Cloud - Dropbox & Google Drivebtcgrant
 

More from btcgrant (7)

Hawley benefits challenges of oer
Hawley benefits challenges of oerHawley benefits challenges of oer
Hawley benefits challenges of oer
 
Collaborate Digital Literacy Workshop
Collaborate Digital Literacy WorkshopCollaborate Digital Literacy Workshop
Collaborate Digital Literacy Workshop
 
Evernote & OneDrive
Evernote & OneDriveEvernote & OneDrive
Evernote & OneDrive
 
IT Academy Boot Camp DL Presentation
IT Academy Boot Camp DL Presentation IT Academy Boot Camp DL Presentation
IT Academy Boot Camp DL Presentation
 
Videoconferencing DL Presentation
Videoconferencing DL PresentationVideoconferencing DL Presentation
Videoconferencing DL Presentation
 
Cloud - Dropbox & Google Drive - digital literacy grant
Cloud - Dropbox & Google Drive - digital literacy grantCloud - Dropbox & Google Drive - digital literacy grant
Cloud - Dropbox & Google Drive - digital literacy grant
 
Cloud - Dropbox & Google Drive
Cloud - Dropbox & Google DriveCloud - Dropbox & Google Drive
Cloud - Dropbox & Google Drive
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Computer Security Workshop

  • 1. Computer Security Bellingham Technical College Student Technology Support Desk – Sean Dyvig
  • 2. Password Security ●Safe password practices ●A symbol will significantly increase the strength of a password ●Do not share passwords between sites ●Avoid writing passwords down ●Do not share passwords with others ●https://howsecureismypassword.net/ ●Password Managers ●http://www.roboform.com/ ●https://lastpass.com/ https://xato.net/passwords/more-top-worst-passwords/
  • 3. Internet security ●What's safe? – https://www.mywot.com/ ●Stop malicious advertisements – https://adblockplus.org/en/ – http://noscript.net/ – https://www.ghostery.com/ ●Take control of your privacy – ctrl+shift+p (firefox) ctrl+shift+n (chrome) for private / incognito mode
  • 4. Windows Security ●Firewalls – Understanding Windows Firewall ● Allow a program through – Zone Alarm ●Anti-virus – https://www.malwarebytes.org/ – adwcleaner – CwShredder – TDSSKiller – ComboFix
  • 5. Wireless security ●Open WiFi is public WiFi – Use public, home, and work network profiles accordingly – Do not send sensitive data on an open wireless – Power off WiFi when not in use ●Bluetooth – Change your Bluetooth's default PIN – Power off Bluetooth when not in use