SlideShare a Scribd company logo
Ten important rules  for safe Internet usage   Aimed at higher education students
1. Enable a firewall A firewall will help prevent unauthorised access to your PC from potential hackers.
2. Clear cache/history Clearing the internet cache & history will stop other people that use the same computer gaining access to e-mail accounts. The cache/history saves passwords and other personal information.
3. Use Anti-Virus software Install a good anti-virus  program and keep it up to date to protect your PC from viruses.
4. Keep your PC up to date Keep your PC up to date with the latest patches and service packs.
5. Credit card details Never give out your credit card details to other people on the internet, when shopping online always make sure the site is a secure site.
6. POP UPS Enable a popup blocker on your PC.
7. Personal Details Never give your personal details to people over the Internet. Name Address Tel no
8. Don’t believe everything you see or read online.
9. Pictures Never post your pictures online were anyone can gain access to them.
10. Never arrange to meet someone you have met online, unless you have known them for sometime.

More Related Content

What's hot

ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
MeiaGuzman1
 
Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316
Live Angga
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
josbor61
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
Juvywen
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
Jesus Rances
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
bloodyblade06
 
SHS_Media-and-Sources-of-Information.pptx
SHS_Media-and-Sources-of-Information.pptxSHS_Media-and-Sources-of-Information.pptx
SHS_Media-and-Sources-of-Information.pptx
Jennifer Maico
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
wacasr12
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
Angelito Quiambao
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
joelphillipGranada2
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
Raiza Janelle
 
LESSON 5 ADVANCE PRESENTATION SKILLS
LESSON 5 ADVANCE PRESENTATION SKILLSLESSON 5 ADVANCE PRESENTATION SKILLS
LESSON 5 ADVANCE PRESENTATION SKILLS
bonzy_30
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
Jesus Rances
 
Hyperlink,animation,transition - empowerment technology - grade 11/12
Hyperlink,animation,transition - empowerment technology - grade 11/12Hyperlink,animation,transition - empowerment technology - grade 11/12
Hyperlink,animation,transition - empowerment technology - grade 11/12
Ashley Minerva
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
Jill Stassie
 
ICT introduction
ICT introductionICT introduction
ICT introduction
Angelito Quiambao
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
empowerment cot.pptx
empowerment cot.pptxempowerment cot.pptx
empowerment cot.pptx
VincentAcapen1
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
EILLEN IVY PORTUGUEZ
 

What's hot (20)

ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
 
Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
SHS_Media-and-Sources-of-Information.pptx
SHS_Media-and-Sources-of-Information.pptxSHS_Media-and-Sources-of-Information.pptx
SHS_Media-and-Sources-of-Information.pptx
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
LESSON 5 ADVANCE PRESENTATION SKILLS
LESSON 5 ADVANCE PRESENTATION SKILLSLESSON 5 ADVANCE PRESENTATION SKILLS
LESSON 5 ADVANCE PRESENTATION SKILLS
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
Hyperlink,animation,transition - empowerment technology - grade 11/12
Hyperlink,animation,transition - empowerment technology - grade 11/12Hyperlink,animation,transition - empowerment technology - grade 11/12
Hyperlink,animation,transition - empowerment technology - grade 11/12
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
ICT introduction
ICT introductionICT introduction
ICT introduction
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
empowerment cot.pptx
empowerment cot.pptxempowerment cot.pptx
empowerment cot.pptx
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
 

Viewers also liked

Defending Medical Malpractice
Defending Medical MalpracticeDefending Medical Malpractice
Defending Medical MalpracticeMedicineAndHealth
 
Home
HomeHome
Dia De La Amistad
Dia De La AmistadDia De La Amistad
Dia De La Amistad
robertotakuyaroberto
 
Eusidic, The Outlook And The Future
Eusidic, The Outlook And The FutureEusidic, The Outlook And The Future
Eusidic, The Outlook And The Futuremmmmmrob
 
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015 Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015 Travis Leonardi
 
RestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De CarcabosoRestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De Carcabosomontemorcillo
 
Mgs Power Point Jan 2008
Mgs Power Point Jan 2008Mgs Power Point Jan 2008
Mgs Power Point Jan 2008
guestf71fee
 

Viewers also liked (9)

Defending Medical Malpractice
Defending Medical MalpracticeDefending Medical Malpractice
Defending Medical Malpractice
 
MONTREAL
MONTREALMONTREAL
MONTREAL
 
Presentation Test
Presentation TestPresentation Test
Presentation Test
 
Home
HomeHome
Home
 
Dia De La Amistad
Dia De La AmistadDia De La Amistad
Dia De La Amistad
 
Eusidic, The Outlook And The Future
Eusidic, The Outlook And The FutureEusidic, The Outlook And The Future
Eusidic, The Outlook And The Future
 
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015 Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
 
RestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De CarcabosoRestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De Carcaboso
 
Mgs Power Point Jan 2008
Mgs Power Point Jan 2008Mgs Power Point Jan 2008
Mgs Power Point Jan 2008
 

Similar to Ten Important Rules

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Securitytips
SecuritytipsSecuritytips
Securitytips
Santosh Khadsare
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
Jay Nagar
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
alvindalejoyosa1
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
Scott Penton
 
Safe Computing
Safe ComputingSafe Computing
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
Zoro18
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
JeffUrgelles
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
ACE Software n Web Solutions
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 

Similar to Ten Important Rules (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Ten Important Rules

  • 1. Ten important rules for safe Internet usage Aimed at higher education students
  • 2. 1. Enable a firewall A firewall will help prevent unauthorised access to your PC from potential hackers.
  • 3. 2. Clear cache/history Clearing the internet cache & history will stop other people that use the same computer gaining access to e-mail accounts. The cache/history saves passwords and other personal information.
  • 4. 3. Use Anti-Virus software Install a good anti-virus program and keep it up to date to protect your PC from viruses.
  • 5. 4. Keep your PC up to date Keep your PC up to date with the latest patches and service packs.
  • 6. 5. Credit card details Never give out your credit card details to other people on the internet, when shopping online always make sure the site is a secure site.
  • 7. 6. POP UPS Enable a popup blocker on your PC.
  • 8. 7. Personal Details Never give your personal details to people over the Internet. Name Address Tel no
  • 9. 8. Don’t believe everything you see or read online.
  • 10. 9. Pictures Never post your pictures online were anyone can gain access to them.
  • 11. 10. Never arrange to meet someone you have met online, unless you have known them for sometime.