SlideShare a Scribd company logo
Submit Search
Upload
How To Protect Yourself and Your Computer Online
Report
Share
Charles Anderson
VP Engineering at EveryoneSocial
Follow
•
1 like
•
912 views
1
of
19
How To Protect Yourself and Your Computer Online
•
1 like
•
912 views
Report
Share
Download Now
Download to read offline
Technology
This is a talk I gave at the Monmouth Senior Center in February 2009.
Read more
Charles Anderson
VP Engineering at EveryoneSocial
Follow
Recommended
Understanding security and safe computing by
Understanding security and safe computing
Mukul Kumar
1.2K views
•
14 slides
Computing and ethics by
Computing and ethics
Nikki Shree
701 views
•
22 slides
List of Malwares by
List of Malwares
Vishalya Dulam
1.5K views
•
42 slides
Safe Computing by
Safe Computing
Dr. Dheeraj Mehrotra (National Awardee)
2.6K views
•
53 slides
Computer Malware by
Computer Malware
aztechtchr
26.4K views
•
28 slides
Web design premium by
Web design premium
jeannined_1
200 views
•
7 slides
More Related Content
What's hot
Promote Education Internet Security by
Promote Education Internet Security
Zoaib Mirza
312 views
•
18 slides
Introduction to Malware by
Introduction to Malware
amiable_indian
7.7K views
•
35 slides
Slideshow Alisha Schnapper by
Slideshow Alisha Schnapper
aschnapper
538 views
•
11 slides
Internet Phishing by
Internet Phishing
DigeratiGroup
616 views
•
29 slides
A Brief Overview of Adware by
A Brief Overview of Adware
SpeedMaxPC
238 views
•
4 slides
Computer Security Guide to Pc Security by
Computer Security Guide to Pc Security
MallTake
17 views
•
23 slides
What's hot
(19)
Promote Education Internet Security by Zoaib Mirza
Promote Education Internet Security
Zoaib Mirza
•
312 views
Introduction to Malware by amiable_indian
Introduction to Malware
amiable_indian
•
7.7K views
Slideshow Alisha Schnapper by aschnapper
Slideshow Alisha Schnapper
aschnapper
•
538 views
Internet Phishing by DigeratiGroup
Internet Phishing
DigeratiGroup
•
616 views
A Brief Overview of Adware by SpeedMaxPC
A Brief Overview of Adware
SpeedMaxPC
•
238 views
Computer Security Guide to Pc Security by MallTake
Computer Security Guide to Pc Security
MallTake
•
17 views
Spyware Adware by haldia institute of technology
Spyware Adware
haldia institute of technology
•
3.9K views
Spyware Adware1 by rubal_9
Spyware Adware1
rubal_9
•
5.4K views
Computer based crime by Taylor_Marie
Computer based crime
Taylor_Marie
•
314 views
How to Protect Your PC from Malware, Ransomware, Virus by HabFg
How to Protect Your PC from Malware, Ransomware, Virus
HabFg
•
15 views
Protect by Yamitza Rosas
Protect
Yamitza Rosas
•
557 views
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma) by Akhil Sharma
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
•
2.1K views
31 Internet Security Tips on CyberSecurity Month Ocotober by Quick Heal Technologies Ltd.
31 Internet Security Tips on CyberSecurity Month Ocotober
Quick Heal Technologies Ltd.
•
570 views
How to Uninstall Malwares-assistance.net from PC by Ashok Albert
How to Uninstall Malwares-assistance.net from PC
Ashok Albert
•
181 views
Cyber Security Presentation - IT Will Never Happen To Me by Simon Salter
Cyber Security Presentation - IT Will Never Happen To Me
Simon Salter
•
75 views
spyware by Akhil Kumar
spyware
Akhil Kumar
•
10.2K views
Guide to pc_security by Flora Runyenje
Guide to pc_security
Flora Runyenje
•
114 views
Phishing: Training Your Help Desk by Beth Sallay
Phishing: Training Your Help Desk
Beth Sallay
•
352 views
Mobile Device Security by Torian Group
Mobile Device Security
Torian Group
•
295 views
Viewers also liked
卓越销售 by
卓越销售
20004
302 views
•
25 slides
20040430162931 by
20040430162931
20004
185 views
•
108 slides
1 by
1
20004
372 views
•
37 slides
公司介绍 by
公司介绍
20004
395 views
•
6 slides
0010 by
0010
20004
335 views
•
3 slides
积极的心态 by
积极的心态
20004
397 views
•
17 slides
Viewers also liked
(20)
卓越销售 by 20004
卓越销售
20004
•
302 views
20040430162931 by 20004
20040430162931
20004
•
185 views
1 by 20004
1
20004
•
372 views
公司介绍 by 20004
公司介绍
20004
•
395 views
0010 by 20004
0010
20004
•
335 views
积极的心态 by 20004
积极的心态
20004
•
397 views
读懂人生的激励格言 by 20004
读懂人生的激励格言
20004
•
721 views
Psychotactics Uniqueness by Psychotactics—Sean D'Souza
Psychotactics Uniqueness
Psychotactics—Sean D'Souza
•
714 views
研发中心08年度计划书打印版 by 20004
研发中心08年度计划书打印版
20004
•
777 views
积极的心态6 by 20004
积极的心态6
20004
•
228 views
Garden villages and towns in the south west by Ben Lowndes
Garden villages and towns in the south west
Ben Lowndes
•
377 views
8020法则. by 20004
8020法则.
20004
•
271 views
科特勒营销案例 by 20004
科特勒营销案例
20004
•
562 views
高级销售技巧 by 20004
高级销售技巧
20004
•
447 views
《市场营销管理》 by 20004
《市场营销管理》
20004
•
745 views
September 16 General Meeting by MSU PRSSA
September 16 General Meeting
MSU PRSSA
•
542 views
启迪培训公司 by 20004
启迪培训公司
20004
•
382 views
How to get a Software Job w/o Experience by Charles Anderson
How to get a Software Job w/o Experience
Charles Anderson
•
611 views
7 by 20004
7
20004
•
376 views
Ibm R50产品 by 20004
Ibm R50产品
20004
•
894 views
Similar to How To Protect Yourself and Your Computer Online
CYBERSPACE SAFETY TIPS FOR SMEs.ppt by
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
5 views
•
59 slides
Cyber security 101 by
Cyber security 101
Travis Good
241 views
•
51 slides
Security Awareness Training by
Security Awareness Training
William Mann
1.1K views
•
47 slides
Protect Yourself and Your Devices.pdf by
Protect Yourself and Your Devices.pdf
techit ltd
30 views
•
6 slides
Protect Yourself From Internet Pests by
Protect Yourself From Internet Pests
peterhitch
639 views
•
57 slides
Cyber Security-Foundation.ppt by
Cyber Security-Foundation.ppt
ErAdityaSingh1
149 views
•
46 slides
Similar to How To Protect Yourself and Your Computer Online
(20)
CYBERSPACE SAFETY TIPS FOR SMEs.ppt by JOHN BABATUNDE LEE
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
•
5 views
Cyber security 101 by Travis Good
Cyber security 101
Travis Good
•
241 views
Security Awareness Training by William Mann
Security Awareness Training
William Mann
•
1.1K views
Protect Yourself and Your Devices.pdf by techit ltd
Protect Yourself and Your Devices.pdf
techit ltd
•
30 views
Protect Yourself From Internet Pests by peterhitch
Protect Yourself From Internet Pests
peterhitch
•
639 views
Cyber Security-Foundation.ppt by ErAdityaSingh1
Cyber Security-Foundation.ppt
ErAdityaSingh1
•
149 views
Computer Security 101 by Progressive Integrations
Computer Security 101
Progressive Integrations
•
11.1K views
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014 by John Bambenek
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
John Bambenek
•
700 views
Security Awareness 9 10 09 V4 Virus Trojan by Megan Bell
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell
•
493 views
Security Awareness 9 10 09 V4 Viruses by Catherine MacAllister
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
•
199 views
W A2 Group P P by tawnygsu
W A2 Group P P
tawnygsu
•
453 views
Cyber-savvy Cyber-safety by Tawose Olamide Timothy
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
•
1.1K views
091005 Internet Security by dkp205
091005 Internet Security
dkp205
•
1.9K views
Hotfix Essay by Lisa Stephens
Hotfix Essay
Lisa Stephens
•
2 views
Anti phishing by Shethwala Ridhvesh
Anti phishing
Shethwala Ridhvesh
•
2.1K views
computer_security.ppt by Asif Raza
computer_security.ppt
Asif Raza
•
5 views
Cyber security threats and its solutions by maryrowling
Cyber security threats and its solutions
maryrowling
•
294 views
Presented to Compass by tapan_sengupta
Presented to Compass
tapan_sengupta
•
356 views
26-Security.ppt by DhruvLuthra8
26-Security.ppt
DhruvLuthra8
•
8 views
Phishing, Pharming, and the latest potholes on the Information Highway by Kevin Lim
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
•
2K views
More from Charles Anderson
Modern php by
Modern php
Charles Anderson
77 views
•
26 slides
Literate Programming by
Literate Programming
Charles Anderson
422 views
•
19 slides
Inrastructure as Code by
Inrastructure as Code
Charles Anderson
234 views
•
23 slides
Docker - Hack Salem! - November 2014 by
Docker - Hack Salem! - November 2014
Charles Anderson
490 views
•
14 slides
A Brief Introduction to Redis by
A Brief Introduction to Redis
Charles Anderson
1.6K views
•
20 slides
A Shallow Survey of Alternative Languages on the JVM by
A Shallow Survey of Alternative Languages on the JVM
Charles Anderson
890 views
•
17 slides
More from Charles Anderson
(9)
Modern php by Charles Anderson
Modern php
Charles Anderson
•
77 views
Literate Programming by Charles Anderson
Literate Programming
Charles Anderson
•
422 views
Inrastructure as Code by Charles Anderson
Inrastructure as Code
Charles Anderson
•
234 views
Docker - Hack Salem! - November 2014 by Charles Anderson
Docker - Hack Salem! - November 2014
Charles Anderson
•
490 views
A Brief Introduction to Redis by Charles Anderson
A Brief Introduction to Redis
Charles Anderson
•
1.6K views
A Shallow Survey of Alternative Languages on the JVM by Charles Anderson
A Shallow Survey of Alternative Languages on the JVM
Charles Anderson
•
890 views
How to Get a Software Job w/o Experience by Charles Anderson
How to Get a Software Job w/o Experience
Charles Anderson
•
1.7K views
Jython: Integrating Python and Java by Charles Anderson
Jython: Integrating Python and Java
Charles Anderson
•
5.1K views
Groovy a Scripting Language for Java by Charles Anderson
Groovy a Scripting Language for Java
Charles Anderson
•
1.1K views
Recently uploaded
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue
222 views
•
23 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform
Mustafa Kuğu
365 views
•
30 slides
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue
79 views
•
17 slides
DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue
140 views
•
21 slides
Cencora Executive Symposium by
Cencora Executive Symposium
marketingcommunicati21
139 views
•
14 slides
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue
84 views
•
10 slides
Recently uploaded
(20)
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue
•
222 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform
Mustafa Kuğu
•
365 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue
•
79 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue
•
140 views
Cencora Executive Symposium by marketingcommunicati21
Cencora Executive Symposium
marketingcommunicati21
•
139 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue
•
84 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
•
153 views
CryptoBotsAI by chandureddyvadala199
CryptoBotsAI
chandureddyvadala199
•
40 views
Kyo - Functional Scala 2023.pdf by Flavio W. Brasil
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil
•
449 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue
•
88 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson
•
156 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE
•
69 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Digital Insurer
•
86 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue
•
103 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue
•
88 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue
•
144 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language Models
Yunyao Li
•
80 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook Presentation
Rob McCarty
•
62 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue
•
146 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue
•
120 views
How To Protect Yourself and Your Computer Online
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Phishing Example
13.
Phishing Example
14.
Phishing Shut Down
15.
Phishing Example
16.
Number of New
Phishing Sites Anti-Phishing Working Group October 2006
17.
18.
19.