SlideShare a Scribd company logo
Internet Safety Tips to Keep Students safe while  Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot;  width=&quot;470&quot;  height=&quot;275&quot;  bgcolor=&quot;undefined&quot;  allowscriptaccess=&quot;always&quot;  allowfullscreen=&quot;true&quot;  flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
With Social Networking, Your Safety’s at Sake… ,[object Object],[object Object],Image source morguefile:http://mrg.bz/oBLbEM
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile:   http://mrg.bz/0F6fg8
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/byySzY
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/qjMfce
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/GJc118
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/zfSgLy
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/xxyNdo
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/0B6o9J
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/dJwALA
Safety Concerns in General… ,[object Object],Image source: screenshot: rnappi
Safety Concerns in General… ,[object Object],Image source:screenshot, rnappi
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/nIkQsz
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/miTt5T
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/w2JBND
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/Xateje
The Case of the Cyber Criminal  ,[object Object],[object Object]
Where Do I Find More Information? ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
diwakar sharma
 
Usable security
Usable securityUsable security
Usable security
Rachel Ilan Simpson
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Χρήσιμα URLs
Χρήσιμα URLsΧρήσιμα URLs
Χρήσιμα URLs
Penelope Markellou
 
Practica 3 manejo de repertorio
Practica 3 manejo de repertorioPractica 3 manejo de repertorio
Practica 3 manejo de repertorio
PaoCarrasco-s
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation Bee255
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 PhpstudyYusuke Ando
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentationguest16e403
 

What's hot (11)

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Usable security
Usable securityUsable security
Usable security
 
Ideology
IdeologyIdeology
Ideology
 
King louis xvi
King louis xviKing louis xvi
King louis xvi
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Χρήσιμα URLs
Χρήσιμα URLsΧρήσιμα URLs
Χρήσιμα URLs
 
Practica 3 manejo de repertorio
Practica 3 manejo de repertorioPractica 3 manejo de repertorio
Practica 3 manejo de repertorio
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation
 
Blogs trucos
Blogs trucosBlogs trucos
Blogs trucos
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 Phpstudy
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentation
 

Viewers also liked

Anorexia
AnorexiaAnorexia
Anorexia
mariel4205
 
56365695 programacao-semic
56365695 programacao-semic56365695 programacao-semic
56365695 programacao-semicIFCE
 
Tendencia ambientales
Tendencia ambientalesTendencia ambientales
Tendencia ambientales
Lisana Maria Galindo Barrera
 
Calendario Layout 1
Calendario Layout 1Calendario Layout 1
Calendario Layout 1guestf982e6
 

Viewers also liked (6)

Licitação
LicitaçãoLicitação
Licitação
 
Anorexia
AnorexiaAnorexia
Anorexia
 
56365695 programacao-semic
56365695 programacao-semic56365695 programacao-semic
56365695 programacao-semic
 
Tendencia ambientales
Tendencia ambientalesTendencia ambientales
Tendencia ambientales
 
La responsabilidad
La responsabilidadLa responsabilidad
La responsabilidad
 
Calendario Layout 1
Calendario Layout 1Calendario Layout 1
Calendario Layout 1
 

Similar to Internet safety

Community presentation
Community presentation Community presentation
Community presentation ozesteph1992
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
teachesict
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
Christian Heilmann
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepapern|u - The Open Security Community
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
Prajwal Panchmahalkar
 
Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan
Shamal Aryan
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepatNie Andini
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
Codemotion
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
ProjectsByJen.com
 
Pixlr and small apps in the classroom
Pixlr and small apps in the classroomPixlr and small apps in the classroom
Pixlr and small apps in the classroom
ArtfulArtsyAmy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
strifman
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityChristian Heilmann
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
BaileyFurman
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
BaileyFurman
 

Similar to Internet safety (20)

Community presentation
Community presentation Community presentation
Community presentation
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
 
Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Pixlr and small apps in the classroom
Pixlr and small apps in the classroomPixlr and small apps in the classroom
Pixlr and small apps in the classroom
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking Accessibility
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Internet safety

  • 1. Internet Safety Tips to Keep Students safe while Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
  • 2. Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot; width=&quot;470&quot; height=&quot;275&quot; bgcolor=&quot;undefined&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Editor's Notes

  1. Think about how different sites work before deciding to join a site. Some sites will allow only a defined community of users to access posted content; others allow anyone and everyone to view postings.
  2. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people, for example, your friends from school, your club, your team, your community groups, or your family.
  3. Keep your information to yourself. Don’t post your full name, Social Security number, address, phone number, or bank and credit card account numbers — and don’t post other people’s information, either. Be cautious about posting information that could be used to identify you or locate you offline. This could include the name of your school, sports team, clubs, and where you work or hang out.
  4. Make sure your screen name doesn’t say too much about you. Don’t use your name, your age, or your hometown. Even if you think your screen name makes you anonymous, it doesn’t take a genius to combine clues to figure out who you are and where you can be found.
  5. Post only information that you are comfortable with others seeing — and knowing — about you. Many people can see your page, including your parents, your teachers, the police, the college you might want to apply to next year, or the job you might want to apply for in five years.
  6. Remember that once you post information online, you can’t take it back. Even if you delete the information from a site, older versions exist on other people’s computers.
  7. Flirting with strangers online could have serious consequences. Because some people lie about who they really are, you never really know who you’re dealing with
  8. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust and report it to the police and the social networking site. You could end up preventing someone else from becoming a victim.
  9. Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers. A good virus protection software program can protect you, but you must keep it up to date.
  10. The terms &amp;quot;spyware&amp;quot; and &amp;quot;adware&amp;quot; apply to several different technologies. The two important things to know about them is that 1) they can download themselves onto your computer without your permission (typically when you visit an unsafe Web site or via an attachment) and 2) they can make your computer do things you don&apos;t want it to do. That might be as simple as opening an advertisement you didn&apos;t want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.
  11. Although they sound like something out of a bad science fiction movie, botnets have become a very real danger on the Internet. Botnets are made up of large numbers of computers that have been infected by criminals (using some of the tools mentioned before). Often, the people whose computers are controlled by a botnet don&apos;t even know that they&apos;ve been infected. Criminals use these armies of infected computers to attack Web sites by flooding them with massive amounts of traffic or as engines for sending spam. These attacks can devastate companies, and even entire countries in some cases. Victims caught in botnets can also be subject to identity theft as their personal information is compromised.
  12. Three protections that every computer connected to the Internet should have installed are:Anti-Virus Software, a Firewall, and Anti-Spyware Software. This software suite, which sometimes can be purchased as a package, is your frontline defense against cyber criminals and intrusions. Installing these software packages is the first step. Equally important is keeping them up to date.
  13. Anti-virus software protects your computer from viruses by scanning your computer and your incoming email and deleting anything that is infected. Viruses can destroy your data, slow your computer&apos;s performance, cause a crash, or allow spammers to send email through your account.
  14. Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don&apos;t permit. Some operating systems come with a built-in firewall that may be set on the &amp;quot;off&amp;quot; mode. Make sure you turn it on and keep it updated. Check your online &amp;quot;Help&amp;quot; feature for specific instructions.
  15. Spyware is a form of malicious software that monitors your online activities and can potentially collect your personal information. Anti-spyware software helps protect your computer from spyware. It periodically scans your computer for spyware programs, and then gives you the opportunity to remove any harmful surveillance software found. Some anti-virus software also contains anti-spyware capability. Given the increasing sophistication of spyware programs, consider using two different anti-spyware programs. Each one looks for slightly different sets of threats, and together they may offer increased protection.