This document provides tips for teens on how to safely use social media and the internet. It recommends setting privacy settings to "Friends Only" and not posting personal information publicly. It warns against accepting friend requests without validating the person, installing unknown apps, or clicking suspicious links. It also provides advice on using antivirus software and caution with downloading files and programs. The overall message is to be careful about sharing private information online and to verify requests before accepting.
These slides are from an online security class I taught at Darien Library in Darien, CT. They are the property of Darien Library.
Originally everything was nicely aligned, but then sending this up to Slideshare messed up the alignment, so I gave up! :-)
The web life is a great life, until you get hacked! Do yourself a favor and sit in on this presentation for a web security health check, just for higher education web professionals. See for yourself, the risks associated with the hottest web tools that we all love to use.
These slides are from an online security class I taught at Darien Library in Darien, CT. They are the property of Darien Library.
Originally everything was nicely aligned, but then sending this up to Slideshare messed up the alignment, so I gave up! :-)
The web life is a great life, until you get hacked! Do yourself a favor and sit in on this presentation for a web security health check, just for higher education web professionals. See for yourself, the risks associated with the hottest web tools that we all love to use.
October is observed as Cyber Security Month which is an annual campaign organized to raise awareness about the importance of cybersecurity. Here’s an infographic that puts together 31 tips on Internet Security that will help you protect your digital devices, identity, and personal information from all types of threats on the Internet.
October is observed as Cyber Security Month which is an annual campaign organized to raise awareness about the importance of cybersecurity. Here’s an infographic that puts together 31 tips on Internet Security that will help you protect your digital devices, identity, and personal information from all types of threats on the Internet.
How to Avoid Getting Malware on Your ComputerJillian Stone
If you have been a victim of being attacked by malware you'll want to take a look at this PowerPoint. Malware can be avoided by being alert and attentive when you surf the web. Check it out so you can avoid the pitfalls it addresses.
How to Avoid Getting Malware on your ComputerJillian Stone
If you've been a victim of being attacked by malware you'll want to see this presentation. You can avoid this by being alert and attentive when you surf the web. Check it out so you you can avoid the pitfalls it addresses.
Intro to Facebook Presentation – Facebook, How to Get Started Safelyhewie
Intro to Facebook Presentation – Facebook, How to Get Started Safely
March Program for the Central Florida Computer Society – Sunday, March 16, 2014 at 2:00 PM
Many people do not use Facebook for several reasons. Many are extremely concerned about their privacy and fearful of sharing information with the wrong people. Most of these people are not aware of how they can enjoy Facebook and limit their vulnerabilities and exposure. Hewie Poplock will present a program “Facebook, How to Get Started Safely” to CFCS on March 16.
He will show the many favorable uses of Facebook, and how you can connect easily to many old & new friends and places. He will also show how to use Facebook’s settings to protect your information, while enjoying the service. He will show you how you can be a “lurker” or be active and yet be safe.
There are more than 1.23 billion of Facebook active users. Of those 250 million play Facebook games. Over last 3 years, the number who are 55+ has exploded with +80.4% growth. As of Jan 2014, 32% of online seniors over 65 are using social networking sites and that number is about 15.6% of the Facebook users.
This presentation is aimed at those not using Facebook. However, those who do use it will gain some insights and will update their settings knowledge, as well as be helpful to those around them who have been hesitant to join Facebook.
The presentation will be at the General Meeting of The Central Florida Computer Society on Sunday March 16, 2014.
A great document by On Guard On-Line about the conversation parents need to have with their kids about being online.
http://get.mindmake.com/parentalcontrols/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
1. A Guide for Teens & ParentsA Guide for Teens & Parents
2.
3. DO have your security settings set toDO have your security settings set to
“Friends Only” or “Friends of Friends”. You“Friends Only” or “Friends of Friends”. You
don’t want all of your personal informationdon’t want all of your personal information
out for the entire world to see. Change yourout for the entire world to see. Change your
“Instant Personalization Pilot Program”“Instant Personalization Pilot Program”
setting to be unchecked and the “What yoursetting to be unchecked and the “What your
friends can share about you” setting to be allfriends can share about you” setting to be all
unchecked. Change your “Facebook Places”unchecked. Change your “Facebook Places”
settings to be private.settings to be private.
4. DO NOT post your address or phoneDO NOT post your address or phone
number on your Profile. If someonenumber on your Profile. If someone
doesn’t have your info, there’s probablydoesn’t have your info, there’s probably
a reason for it.a reason for it.
DO NOT post personal information onDO NOT post personal information on
someone’s Wall. If you have somethingsomeone’s Wall. If you have something
important to tell them, do it viaimportant to tell them, do it via
Message or tell them in person.Message or tell them in person.
5. DO validate friend requests.DO validate friend requests.
Make sure it’s from someoneMake sure it’s from someone
you actually know in person.you actually know in person.
Just because someone’s profileJust because someone’s profile
says they live in your town andsays they live in your town and
go to your school doesn’t meango to your school doesn’t mean
that they actually do.that they actually do.
6. DO be careful when installingDO be careful when installing
Applications. If an App asks you toApplications. If an App asks you to
input your email & password, it’sinput your email & password, it’s
an attempt to steal your login info,an attempt to steal your login info,
also known as phishing. If it wantsalso known as phishing. If it wants
you to complete a survey or offer inyou to complete a survey or offer in
order to access the App, the creatorsorder to access the App, the creators
of the App are trying to spam you.of the App are trying to spam you.
7.
8. Also, if you click on a link, and aAlso, if you click on a link, and a
page comes up that looks just likepage comes up that looks just like
the Facebook login page, check thethe Facebook login page, check the
address bar. If it’s notaddress bar. If it’s not
http://www.facebook.com/http://www.facebook.com/ oror
http://www.facebook.com/login.phphttp://www.facebook.com/login.php
then it is NOT a legit login page!then it is NOT a legit login page!
9.
10.
11.
12. DO NOT have your full name listed on yourDO NOT have your full name listed on your
profile.profile.
DO have your profile set to ‘Viewable by MyDO have your profile set to ‘Viewable by My
Friends Only’. Also DO edit your settings toFriends Only’. Also DO edit your settings to
have people have to input your last name orhave people have to input your last name or
email address to send you a friend request toemail address to send you a friend request to
prevent unwanted solicitation.prevent unwanted solicitation.
13. DO have the “Block all apps and third-partyDO have the “Block all apps and third-party
services I haven’t connected to from accessingservices I haven’t connected to from accessing
my profile information through the MySpacemy profile information through the MySpace
Developer Platform” and “Block all apps andDeveloper Platform” and “Block all apps and
third-party services I haven’t connected to fromthird-party services I haven’t connected to from
communicating with me through the MySpacecommunicating with me through the MySpace
Developer Platform” boxes checked underDeveloper Platform” boxes checked under
‘Application Settings’.‘Application Settings’.
14. DO NOT use custom profilesDO NOT use custom profiles
randomly found on the Internetrandomly found on the Internet
unless you or someone you knowunless you or someone you know
are able to go through the HTMLare able to go through the HTML
script bit by bit to verify that it’sscript bit by bit to verify that it’s
clean.clean.
15. DO validate friend requests. Make sureDO validate friend requests. Make sure
the request is from someone you know.the request is from someone you know.
DO NOT click on links in messages orDO NOT click on links in messages or
comments that say that someone has yourcomments that say that someone has your
information or there is a video of you, eveninformation or there is a video of you, even
from someone you know. It is very possiblefrom someone you know. It is very possible
that their login info has been stolen and thatthat their login info has been stolen and that
someone is trying to steal yours as well.someone is trying to steal yours as well.
16.
17. DO be careful when installingDO be careful when installing
applications. If you click on a link or toapplications. If you click on a link or to
install an App and a page pops up thatinstall an App and a page pops up that
looks JUST like the MySpace homepage,looks JUST like the MySpace homepage,
check the address bar. If it’s notcheck the address bar. If it’s not
http://www.myspace.com/http://www.myspace.com/ oror
http://login.myspace.comhttp://login.myspace.com, then it’s an, then it’s an
attempt to steal your login information.attempt to steal your login information.
18.
19.
20.
21.
22.
23.
24. DO NOT give out your emailDO NOT give out your email
or Facebook/Myspace/Twitteror Facebook/Myspace/Twitter
password to ANYONE, not yourpassword to ANYONE, not your
significant other, not your bestsignificant other, not your best
friend, NO ONE except yourfriend, NO ONE except your
parents.parents.
25. Beware of shortened links, especially onesBeware of shortened links, especially ones
posted on Facebook, MySpace, and Twitter.posted on Facebook, MySpace, and Twitter.
There are malicious websites out there whoseThere are malicious websites out there whose
web addresses are disguised with shortenedweb addresses are disguised with shortened
urls that will try to give you a virus as soon asurls that will try to give you a virus as soon as
you visit the website. Links such asyou visit the website. Links such as
http://tinyurl.com/24a3ku3http://tinyurl.com/24a3ku3 oror
http://bit.ly/c5Ao7ohttp://bit.ly/c5Ao7o could go to an infectedcould go to an infected
site.site.
26. DO make sure you haveDO make sure you have
anti-virus software installedanti-virus software installed
and that it is up-to-date.and that it is up-to-date.
27. If you’re surfing the Internet and get aIf you’re surfing the Internet and get a
popup that says that your computer ispopup that says that your computer is
infected with X number of viruses andinfected with X number of viruses and
that you need to download a certainthat you need to download a certain
program to get rid of them, DO NOTprogram to get rid of them, DO NOT
click OK. It is a fake anti-virus programclick OK. It is a fake anti-virus program
that will give you a very nasty virus thatthat will give you a very nasty virus that
is extremely difficult and expensive tois extremely difficult and expensive to
get rid of.get rid of.
32. If you receive an email fromIf you receive an email from
someone, even someone yousomeone, even someone you
know and trust, but there isknow and trust, but there is
nothing but a link in the bodynothing but a link in the body
of the e-mail, DO NOT click onof the e-mail, DO NOT click on
it unless you are expectingit unless you are expecting
something from them, in whichsomething from them, in which
case verify that it was sent .case verify that it was sent .
33.
34. DO be wary of e-mailDO be wary of e-mail
attachments. Download and scanattachments. Download and scan
all attachments before opening.all attachments before opening.
Most email clients come with aMost email clients come with a
built-in e-mail scanner, but nonebuilt-in e-mail scanner, but none
are perfect. New viruses pop upare perfect. New viruses pop up
every single day.every single day.
35. DO be wary of emails that claim toDO be wary of emails that claim to
be from Facebook, MySpace, or anybe from Facebook, MySpace, or any
“official”-looking source such as the“official”-looking source such as the
FBI, UPS, Fed-Ex, etc. Hackers andFBI, UPS, Fed-Ex, etc. Hackers and
spammers try to lure unsuspectingspammers try to lure unsuspecting
victims into giving out theirvictims into giving out their
information by duplicating the lookinformation by duplicating the look
of legitimate messaging systems.of legitimate messaging systems.
36.
37.
38. When downloading anything from theWhen downloading anything from the
internet, DO scan any executable files orinternet, DO scan any executable files or
archives before opening. There are manyarchives before opening. There are many
free multi-software antivirus scanningfree multi-software antivirus scanning
sites you can use to scan files. If the filesites you can use to scan files. If the file
or archive in question is too large to beor archive in question is too large to be
scanned from the sites, use your installedscanned from the sites, use your installed
anti-virus software(s) to scan the file.anti-virus software(s) to scan the file.
39. When on ANY MMORPG orWhen on ANY MMORPG or
online game, DO NOT give outonline game, DO NOT give out
any personal information. Youany personal information. You
don’t know who you are reallydon’t know who you are really
talking to. You may thinktalking to. You may think
you’re talking to 16-year-oldyou’re talking to 16-year-old
‘Sienna du Larc’ but you’re‘Sienna du Larc’ but you’re
really talking to some 40-year-really talking to some 40-year-
old guy named Fred.old guy named Fred.
40. DO remember that everythingDO remember that everything
you post on the Internet isyou post on the Internet is
there FOREVER. Unlessthere FOREVER. Unless
you're prepared to attachyou're prepared to attach
something in your Facebooksomething in your Facebook
or MySpace profile to aor MySpace profile to a
resume or scholarshipresume or scholarship
application, DO NOT post it.application, DO NOT post it.
41. Run C-Cleaner or Disk Cleanup.Run C-Cleaner or Disk Cleanup.
Run Disk Defragmenter.Run Disk Defragmenter.
***MAY require a restart after completing******MAY require a restart after completing***
Run Checkdisk. (This will check yourRun Checkdisk. (This will check your
harddrive for errors and repair any itharddrive for errors and repair any it
finds.)finds.)
***WILL REQUIRE A RESTART TO RUN******WILL REQUIRE A RESTART TO RUN***
42. Runs extremelyRuns extremely
slowly, but doing aslowly, but doing a
basic cleanup doesn’tbasic cleanup doesn’t
help.help.
Multiple Pop-ups,Multiple Pop-ups,
even when not in aneven when not in an
Internet browser.Internet browser.
43. Your computer restartsYour computer restarts
on its own and thenon its own and then
fails to run normally.fails to run normally.
Programs on yourPrograms on your
computer don't workcomputer don't work
correctly.correctly.
44. Your Web browser'sYour Web browser's
home pagehome page
unexpectedly changes.unexpectedly changes.
Web pages areWeb pages are
unexpectedly added tounexpectedly added to
your Favorites folder.your Favorites folder.
45. New toolbars areNew toolbars are
unexpectedly added tounexpectedly added to
your Web browser.your Web browser.
Strange music or soundsStrange music or sounds
unexpectedly play fromunexpectedly play from
your computer’s speakers.your computer’s speakers.
46. Disks or disk drives areDisks or disk drives are
inaccessible.inaccessible.
You can't print correctly.You can't print correctly.
You see unusual errorYou see unusual error
messages.messages.
You see distorted menusYou see distorted menus
and dialog boxes.and dialog boxes.
47. Anti-virus softwareAnti-virus software
has been disabled.has been disabled.
Antivirus softwareAntivirus software
that you did notthat you did not
install needs you toinstall needs you to
pay for “full access”.pay for “full access”.
48. Your computerYour computer
stops responding orstops responding or
freezes often.freezes often.
Your computerYour computer
crashes and restartscrashes and restarts
every few minutes.every few minutes.
49.
50.
51. Restart yourRestart your
computer incomputer in SafeSafe
ModeMode. (This can be. (This can be
done by restartingdone by restarting
and pressing F8and pressing F8
BEFORE theBEFORE the
Windows Load screenWindows Load screen
comes up.)comes up.)
52. Run your anti-virus software.Run your anti-virus software.
Do a full scan. If infected filesDo a full scan. If infected files
have been found once it’shave been found once it’s
finished, follow the instructionsfinished, follow the instructions
to get rid of the infected files,to get rid of the infected files,
and then run your anti-virusand then run your anti-virus
software again. If it doesn’t findsoftware again. If it doesn’t find
any infected files or you haveany infected files or you have
completed the second scan, trycompleted the second scan, try
running a backup anti-malwarerunning a backup anti-malware
program (such as Malwarebytes).program (such as Malwarebytes).
Editor's Notes
Will be up at start of program when people come in.
Welcome
A little about me
Have worked for the library about 5 years, have been interested in computers for a long time, was taught everything I know by my husband.
This can be done by going to Account -> Privacy Settings -> Applications and Websites and clicking “Edit Settings” next to both “Instant Personalization” and “Info accessible through your friends”.
***SHOW THEM HOW TO DO IT USING EXAMPLE FB ACCT.***
For gaming Apps, if it’s not an official app from the game developer, do not install it.
This can be done by going to Profile->My Privacy.
Also DO edit your settings to have people have to input your last name or email address to send you a friend request to prevent unwanted solicitation. This can be done by going to Profile -> My Privacy, and checking the box.
This can be done by going to Profile->My Privacy or My Account->Privacy and clicking “Go to Application Settings to Change Settings for Apps and Third-Parties.”
Make sure both boxes are checked.
Myspace now has a custom profile editor built into the site that you can use to spruce up your profile.
This includes messages such as “OMG this person has your information!” Or “Is that YOU in this video!?”
This includes messages such as “OMG this person has your information!” Or “Is that YOU in this video!?”
The only security setting Twitter has is to make your Tweets protected, but ANYONE ‘following’ you can see your Tweets, so be careful who you allow to follow you.
DO NOT click on links in Tweets that say that someone has your information, even if the comment or message is from someone you know. If you do click on the link and a page comes up that looks just like the Twitter login page, check the address bar. If it is not http://twitter.com/login, then DO NOT put your login information in.
There is a list of sites that check shortened urls in handout.
I recommend both MS Security Essentials & Malwarebytes. MS Security Essentials is free as long as you have a valid copy of Windows, and Malwarebytes is a good backup to have.
OR says that your registry has errors, speed up your computer, etc.
Example of software that pops up on computers running Windows XP.
Rogue Anti-virus programs will try to trick you by copying the look of legitimate software and using “scare tactics” to get you to download the software. May also try to copy the look of the Windows Security Center.
This one has tried to copy the look of the “My Computer” window in Windows 7.
Just because it’s from a trusted source, doesn’t mean that a file couldn’t have gotten infected while flying around in cyberspace.
If you use a multi-scanner site, if you don’t feel comfortable with the results of the scan, don’t open the file.
When you’re going for a job or college interview in the future, do you really want your potential boss or college scholarship committee to be able to see something you’re about to post? If the answer is NO, then DO NOT post it!
Can also use Defraggler or JKDefrag to defragment.
I.E. MS Office is disabled, Internet Explorer or Firefox doesn’t work, etc.
Big clue that comp is infected is that the Anti-Virus software is disabled.
Crash usually followed by the BLUE SCREEN OF DEATH.
Example of the Blue Screen of Death. Will have an error code, known as a STOP ERROR.
Not as funny when it happens to you though.
Depending on your computer’s speed, you can run both Malwarebytes and MS Security Essentials at the same time.