SlideShare a Scribd company logo
1 of 27
ICT Associate - United Nations Office
IT Consultant - Mindspring Networks
Student - Bar-Ilan University for Management
Khalil Jubran
How Secured is your PC
Watch the Video about Internet Safety for Kids
Next Slide
Protect your System information
1) Use a firewall
A firewall is a software system that will
handle outgoing and incoming Internet
connections of your computer.. i will like
to recommend Comodo Firewall / Zone
Alarm which is free and straightforward
to use. Using Firewall is just one
of Computer Security tip that i want to
mention
2) Use antivirus
There are obvious reasons to use Anti virus
Programs, but there are People that don’t
have any antivirus or those who have,
However there are quite powerful free
antivirus Available. One must Install
Antivirus to Protect and Keep their
Computer Secure
I recommend: Widows essential Security /
Avast free Antivirus
3) Updating software system:
New vulnerabilities are found in software system or operative systems like Windows
each day. So one must always updates their software system. Keeping your installed
Software up to date is Important, as it will Keep hackers away from breaking into your
System and its Said that any up to date program Works smooth without any glitch.
4) Use complicated passwords
Users like you and me use too
weak passwords that are very simple to detect
for hackers, there are so many software which
will try all Possible Combinations to Crack your
Password, this is known as Bruteforce
technique . If your secret word(password)
Consists of just 4 or 5 characters, it will easily
discover it.
Your Password becomes harder to crack if it
consists of 8 or 9 characters which also
includes numbers, letters and special
characters.To check the strength of your
Password, there are plenty tools over internet.
This is an important Computer Security tip that
everyone must Consider.
5) Use totally different passwords
Most common mistake people make is that they use same password everywhere over
internet. Yes, its very hard to remember passwords for all accounts but its highly
advisible to have different passwords for different accounts.
This Practice Comes handy if one of your account gets Compromised/Hacked, then
your other accounts are still safe.
6) Always Beware:
Finally, Abstain from getting hacked, Always
beware while Browsing Internet, don’t
transfer and install everything and anything
on your PC or Laptop.
Always check the sources of software system
and websites that you just use to download
programs.
Don’t be silly and amateur hackers won’t be
able to do anything to you (while serious and
skilled hackers will not have any interest to
hack you)
Watch the Video OF VPN Secured
Connection behind the Firewall
Next Slide
Do not ignore Picture:
If your computer is giving you this alert, it’s best not to
ignore it. The Web is littered with viruses, so don't take
any chances with having your PC without an antivirus
AND firewall. Protect your PC with ZoneAlarm Free
Antivirus + Firewall! Download FREE here:
http://on.fb.me/NYekB8
FireFox : Image Related Picture
If you use Firefox to browse the Internet, make
sure you’re running version 20, Mozilla’s latest
version. Firefox 20 patches 11 potentially
serious security flaws.
To update to Firefox 20, follow these simple
steps:
1) Click ‘Help’ in Firefox browser
2) Click on ‘About Firefox’
3) A window will appear indicating it’s
downloading updates
4) Click ‘Restart to Update’
Internet Explorer
NSS Labs tested Safari 5, Chrome, Firefox,
Internet Explore, and Opera to determine
which browser was best at blocking malware.
Internet Explorer won this battle.
Will this make you consider switching to
Internet Explorer, or will you continue to use
your preferred browser? Check out the NSS
report here: http://bit.ly/10LXnV2
A Trojan Horse is a malicious program
disguised as something harmless or
desirable. It is designed to infect a host
computer and steal personal
information. Cyber criminals trick users
into taking the bait by disguising the
Trojan Horse as something desirable,
like a desktop screensaver, pirated song
or movie, a word document, image, or
e-card.
Here are some ways you can prevent yourself from falling prey:
1) Never click on email attachments from unknown senders
2) Download software or applications only from trusted sources or original
vendors
3) Always run an antivirus and two-way firewall. (Download ZoneAlarm Free
Antivirus + Firewall here: http://bit.ly/IT1IKe )
Don’t fall for their bait! Be sure to share with your friends and family to keep
them safe online!
Don’t risk browsing the Web without any
protection! Protect your PC with
ZoneAlarm Free Antivirus + Firewall.
Download it FREE here: http://bit.ly/IT1IKe
Every time you browse the Web, there are
threats lurking in the shadows. Could malware
be just around the corner? Don’t find out the
hard way! Make sure your PC is protected with
ZoneAlarm Free Antivirus + Firewall.
Download it FREE here: http://bit.ly/IT1IKe
Keep your friends and family safe from
malware by sharing this with them!
Internet Browsing Safety using Private Session
Firefox:
Open up the bright orange Firefox menu in the top-left corner of your browser window.
Click "Start Private Browsing."
Google Chrome:
Open up the Settings menu. It's the little wrench-shaped icon in the top-right corner.
Click "New incognito window." That's right. You're about to go incognito.
Internet Explorer:
Next, mouse-over the Safety menu. Click
"InPrivate Browsing. “Click it.
Security tips:
1. Never keep same password for different services you use online like gmail
, Facebook, bank accounts etc.,
2. Use multiple accounts so that you dont get spams in your personal/
official email address.
3. Install good Antivirus and Two way firewall.
4. Use VPN for hiding identity and secure browsing when using internet out
of your home.
5. Update your OS, Antivirus, Firewall and Browsers regularly.
6. Install a good spyware & Ad-ware scanner .
7. Never provide personal information openly in public websites. Share your
information carefully.
8. Never click on unwanted or suspicious links. It may be hacking attempt.
9. Change your passwords regularly to increase the security of your daily
activities.
Above Tips Is Posted By © Cyber Elite .If You Find This Post Anywhere Else
Without This message Feel Free To Report Us at
Join our Facebook page to stay updated .
The End
Many thanks
Hope you enjoyed

More Related Content

What's hot

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.comkingh05
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking IT Department Akre
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)NamanKikani
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?Sunjoonah Kambbs
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 

What's hot (18)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
Malware
MalwareMalware
Malware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Spyware
SpywareSpyware
Spyware
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Adware
AdwareAdware
Adware
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 

Viewers also liked

Listas pilas colas_carlos_rosario10-1337
Listas pilas colas_carlos_rosario10-1337Listas pilas colas_carlos_rosario10-1337
Listas pilas colas_carlos_rosario10-1337CJrosario2
 
Carlos rosario IA_appt
Carlos rosario IA_apptCarlos rosario IA_appt
Carlos rosario IA_apptCJrosario2
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 

Viewers also liked (8)

Listas pilas colas_carlos_rosario10-1337
Listas pilas colas_carlos_rosario10-1337Listas pilas colas_carlos_rosario10-1337
Listas pilas colas_carlos_rosario10-1337
 
Carlos rosario IA_appt
Carlos rosario IA_apptCarlos rosario IA_appt
Carlos rosario IA_appt
 
IT Essentials Chapter 9
IT Essentials Chapter 9IT Essentials Chapter 9
IT Essentials Chapter 9
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 

Similar to Protect Your PC with These Computer Security Tips

Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 

Similar to Protect Your PC with These Computer Security Tips (20)

Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Internet security
Internet securityInternet security
Internet security
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Protect Your PC with These Computer Security Tips

  • 1. ICT Associate - United Nations Office IT Consultant - Mindspring Networks Student - Bar-Ilan University for Management Khalil Jubran
  • 2. How Secured is your PC
  • 3. Watch the Video about Internet Safety for Kids Next Slide
  • 4.
  • 5. Protect your System information 1) Use a firewall A firewall is a software system that will handle outgoing and incoming Internet connections of your computer.. i will like to recommend Comodo Firewall / Zone Alarm which is free and straightforward to use. Using Firewall is just one of Computer Security tip that i want to mention
  • 6. 2) Use antivirus There are obvious reasons to use Anti virus Programs, but there are People that don’t have any antivirus or those who have, However there are quite powerful free antivirus Available. One must Install Antivirus to Protect and Keep their Computer Secure I recommend: Widows essential Security / Avast free Antivirus
  • 7. 3) Updating software system: New vulnerabilities are found in software system or operative systems like Windows each day. So one must always updates their software system. Keeping your installed Software up to date is Important, as it will Keep hackers away from breaking into your System and its Said that any up to date program Works smooth without any glitch.
  • 8. 4) Use complicated passwords Users like you and me use too weak passwords that are very simple to detect for hackers, there are so many software which will try all Possible Combinations to Crack your Password, this is known as Bruteforce technique . If your secret word(password) Consists of just 4 or 5 characters, it will easily discover it. Your Password becomes harder to crack if it consists of 8 or 9 characters which also includes numbers, letters and special characters.To check the strength of your Password, there are plenty tools over internet. This is an important Computer Security tip that everyone must Consider.
  • 9. 5) Use totally different passwords Most common mistake people make is that they use same password everywhere over internet. Yes, its very hard to remember passwords for all accounts but its highly advisible to have different passwords for different accounts. This Practice Comes handy if one of your account gets Compromised/Hacked, then your other accounts are still safe.
  • 10. 6) Always Beware: Finally, Abstain from getting hacked, Always beware while Browsing Internet, don’t transfer and install everything and anything on your PC or Laptop. Always check the sources of software system and websites that you just use to download programs. Don’t be silly and amateur hackers won’t be able to do anything to you (while serious and skilled hackers will not have any interest to hack you)
  • 11.
  • 12. Watch the Video OF VPN Secured Connection behind the Firewall Next Slide
  • 13. Do not ignore Picture: If your computer is giving you this alert, it’s best not to ignore it. The Web is littered with viruses, so don't take any chances with having your PC without an antivirus AND firewall. Protect your PC with ZoneAlarm Free Antivirus + Firewall! Download FREE here: http://on.fb.me/NYekB8
  • 14. FireFox : Image Related Picture If you use Firefox to browse the Internet, make sure you’re running version 20, Mozilla’s latest version. Firefox 20 patches 11 potentially serious security flaws. To update to Firefox 20, follow these simple steps: 1) Click ‘Help’ in Firefox browser 2) Click on ‘About Firefox’ 3) A window will appear indicating it’s downloading updates 4) Click ‘Restart to Update’
  • 15. Internet Explorer NSS Labs tested Safari 5, Chrome, Firefox, Internet Explore, and Opera to determine which browser was best at blocking malware. Internet Explorer won this battle. Will this make you consider switching to Internet Explorer, or will you continue to use your preferred browser? Check out the NSS report here: http://bit.ly/10LXnV2
  • 16. A Trojan Horse is a malicious program disguised as something harmless or desirable. It is designed to infect a host computer and steal personal information. Cyber criminals trick users into taking the bait by disguising the Trojan Horse as something desirable, like a desktop screensaver, pirated song or movie, a word document, image, or e-card.
  • 17. Here are some ways you can prevent yourself from falling prey: 1) Never click on email attachments from unknown senders 2) Download software or applications only from trusted sources or original vendors 3) Always run an antivirus and two-way firewall. (Download ZoneAlarm Free Antivirus + Firewall here: http://bit.ly/IT1IKe ) Don’t fall for their bait! Be sure to share with your friends and family to keep them safe online!
  • 18. Don’t risk browsing the Web without any protection! Protect your PC with ZoneAlarm Free Antivirus + Firewall. Download it FREE here: http://bit.ly/IT1IKe
  • 19. Every time you browse the Web, there are threats lurking in the shadows. Could malware be just around the corner? Don’t find out the hard way! Make sure your PC is protected with ZoneAlarm Free Antivirus + Firewall. Download it FREE here: http://bit.ly/IT1IKe Keep your friends and family safe from malware by sharing this with them!
  • 20. Internet Browsing Safety using Private Session
  • 21. Firefox: Open up the bright orange Firefox menu in the top-left corner of your browser window. Click "Start Private Browsing."
  • 22. Google Chrome: Open up the Settings menu. It's the little wrench-shaped icon in the top-right corner. Click "New incognito window." That's right. You're about to go incognito.
  • 23. Internet Explorer: Next, mouse-over the Safety menu. Click "InPrivate Browsing. “Click it.
  • 24. Security tips: 1. Never keep same password for different services you use online like gmail , Facebook, bank accounts etc., 2. Use multiple accounts so that you dont get spams in your personal/ official email address. 3. Install good Antivirus and Two way firewall. 4. Use VPN for hiding identity and secure browsing when using internet out of your home. 5. Update your OS, Antivirus, Firewall and Browsers regularly.
  • 25. 6. Install a good spyware & Ad-ware scanner . 7. Never provide personal information openly in public websites. Share your information carefully. 8. Never click on unwanted or suspicious links. It may be hacking attempt. 9. Change your passwords regularly to increase the security of your daily activities. Above Tips Is Posted By © Cyber Elite .If You Find This Post Anywhere Else Without This message Feel Free To Report Us at
  • 26. Join our Facebook page to stay updated .