SlideShare a Scribd company logo
Internet Safety and   You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.com
Protecting Your Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com
Trojan Horses ,[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com ,[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com ,[object Object],[object Object],[object Object]
Protect Your Computer Install complete Anti-virus protection ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Available Anti-virus Software COMPUTER EXPLORERS ®  in no way endorses or warrants the purchase, download, or use of the listed software. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Adware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Infested Computers http://www.computerexplorers.com Severe Case  Mild Case
Prevention Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Available Spyware and Adware Products   COMPUTER EXPLORERS ®  in no way endorses or warrants the purchase, download, or use of the listed software. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Pop-up Blockers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com What’s a Firewall? A firewall is a hardware or software device  configured to allow or deny data through a computer network with different trust levels. ,[object Object],[object Object],[object Object]
Protecting Your Information ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Spam Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Spam  – any message, regardless of its content, that is sent to multiple mailing lists, individuals or newsgroups. Also called bulk e-mail or junk e-mail.
Fraudulent E-Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Fraudulent e-mails are “spoofing” or “phishing” messages. Scammers use these methods to “fish” for consumer’s financial or other identifying information. These messages will create the impression the user has an urgent need to update his/her personal information.
Tips to Protect Against “Phishing” ,[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
The Look of Fraudulent E-Mails http://www.computerexplorers.com Hovering over a link with the mouse cursor will reveal the real address the link will take you to. Don’t be fooled by the official looking header in this fraudulent e-mail.
General Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com
Protecting You or Your Children   Filtering and Site blocking http://www.computerexplorers.com ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Social Situations ,[object Object],[object Object],[object Object],http://www.computerexplorers.com
[object Object],[object Object],[object Object],Online Social Situations, cont. http://www.computerexplorers.com
Popular Social Sites for Teens and Pre-teens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Please note, your children are fickle. What may be popular today may not be popular tomorrow. Keep an eye on their surfing and investigate any unknown sites.
Can you decipher these? FWIW, I thnk U R gr8t! Btw, ur BFF is a PITA OMG!  LOL!  Cul8r, H&K, ttyl http://www.computerexplorers.com
Internet Safety Study   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Internet Safety Study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Safety Tips for Parents or Guardians ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Remember Three Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Safety Tips for Your Kids ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Don’t Be Afraid of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Contact Information Name: Phone: E-mail: www.computerexplorers.com   www.computerexplorers.com/yourCEsite YOUR PHOTO HERE

More Related Content

What's hot

Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
Michael Wells
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
mariagoel7
 
Safe Computing
Safe ComputingSafe Computing
IT security awareness
IT security awarenessIT security awareness
IT security awareness
Dr. Ramkumar Lakshminarayanan
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Sciencenicamos
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Instructions to remove ads by lolliscan
Instructions to remove ads by lolliscanInstructions to remove ads by lolliscan
Instructions to remove ads by lolliscan
MU
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Benandro Palor
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
fidel barrios
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
JohnnAlvarez
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 

What's hot (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Ppt123
Ppt123Ppt123
Ppt123
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
 
C 7
C 7C 7
C 7
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Instructions to remove ads by lolliscan
Instructions to remove ads by lolliscanInstructions to remove ads by lolliscan
Instructions to remove ads by lolliscan
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
M
MM
M
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 

Viewers also liked

Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside
Mothers' Zone
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Neha Gupta
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
PaloAltoNetworks
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
Dr. Ajith Sundaram
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentation
gtwaddell
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Employee safety and health
Employee safety and healthEmployee safety and health
Employee safety and healthrumel009
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (15)

Emergency planning for school safety
Emergency planning for school safetyEmergency planning for school safety
Emergency planning for school safety
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
CHILD SAFETY AT HOME
CHILD SAFETY AT HOMECHILD SAFETY AT HOME
CHILD SAFETY AT HOME
 
Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Employee safety and health
Employee safety and healthEmployee safety and health
Employee safety and health
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Keeping Your Children, your information and your equiptment safe

Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
SdhrYdv1
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
cat509
 
Spyware
SpywareSpyware
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
Khalil Jubran
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.ppt
amyray28
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 

Similar to Keeping Your Children, your information and your equiptment safe (20)

Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Spyware
SpywareSpyware
Spyware
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Recently uploaded

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Keeping Your Children, your information and your equiptment safe

  • 1. Internet Safety and You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. The Look of Fraudulent E-Mails http://www.computerexplorers.com Hovering over a link with the mouse cursor will reveal the real address the link will take you to. Don’t be fooled by the official looking header in this fraudulent e-mail.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Can you decipher these? FWIW, I thnk U R gr8t! Btw, ur BFF is a PITA OMG! LOL! Cul8r, H&K, ttyl http://www.computerexplorers.com
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Contact Information Name: Phone: E-mail: www.computerexplorers.com www.computerexplorers.com/yourCEsite YOUR PHOTO HERE

Editor's Notes

  1. Welcome to “Internet Safety and You”! I am ( your name ), ( owner, director, etc) of COMPUTER EXPLORERS. The presentation today is designed to help you arm yourself with facts and tips to keep you safe while using the Internet.