SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Christopher W. Schneider - Portfolio
Christopher W. Schneider - Portfolio
Christopher W. Schneider - Portfolio
Christopher W. Schneider - Portfolio
Already have an Apple ID/iTunes Account?
Terrific! Go ahead and use it with these precautions:
Do NOT plug your Ecolab devices into your PC or 1) Set up as new or 2) Restore an iTunes back-up.
If you do, you will lose all Ecolab configurations on your iPhone or iPad. Sign in at Step 2, choose to
allow your Ecolab devices to merge information, and allow iCloud to Use the Location of Your iPhone.
You will need to open and confirm the verification email that will be sent to the email you used.
What’s an Apple ID and why do I need one?
The Apple ID is an account that you can use to access all of Apple's services. You can use it to buy music
and apps from the iTunes Store. For work, you'll need it to download helpful or required apps found in
the Pest App Store. You’ll also need an Apple ID in order to use iCloud which can help you find a lost
device. To create a brand new Apple ID from your Ecolab iPhone, follow the steps below.
Method 2 instructions:
1. From the Home screen, tap
on the Settings icon.
3. Enter your Birthday.2. Scroll to and tap iCloud
and Get a free Apple ID.
4. Enter your First Name and
Last Name.
5. Select Get a free iCloud
email address.
6. Create the Apple ID.
Christopher W. Schneider - Portfolio
1.
8. Enter a rescue email and
(optional) allow email updates.
7. Select 3 security questions
and provide answers.
9. Agree to terms and
conditions.
11. Return to Home Screen
and tap on Pest App Store.
10. Allow iCloud to Use
Location finder for iPhone.
12. Scroll to the ADP app and
tap install.
13. Tap Install to confirm. 14. Sign in with Apple ID. 15. Tap Install to finish.
Christopher W. Schneider - Portfolio
16. Return to Home Screen
and tap on the ADP app.
17. Allow ADP Mobile to Use
Current Location.
18. Sign in with User ID you
received from Ecolab HR.
Christopher W. Schneider - Portfolio
This is a sample of instructions I was asked to submit to a private business client to help his employees
understand that they have to own why their computers are having problems.
How Does My Windows Operating System Get Infected?
Your internet surfing behavior needs improvement
Websites are becoming annoying mazes of ads and popups; it is best to exercise caution when going to
any new site. Both the pop-culture internet sites and the social network sites are super-saturated with
paths that can easily lead to infection and popup headaches. The people most commonly targeted are
those who play the games offered on Facebook--especially the games that cost money. Avoid gaming on
all these sites. When in doubt, don’t click it.
You use the same password for everything
This is a bad idea, but if you insist on doing so, a good password has to be at least 8 alphanumeric
(letters and numbers) characters and contain at least one capital letter and one punctuation mark. Even
if you follow these guidelines, it’s still a temptation to take the easy way out. For example, if your
password was “fryingpan” and you change it to “Frying5pan!”, while it is an improvement, it still might
not be secure. It is too common to capitalize the first letter and put a special character at the end. A
number could be a substitute for a letter and should not always be in an obvious breaking point.
Consider a phrase instead: “veryrus7yfryingP@n”. And finally, change all your passwords annually.
You try to get something for nothing (which is called theft) via file sharing sites
For example: 4shared, Megaupload, Mediafire, Filestube, Rapidshare, The Pirate Bay, Fileserve, Hotfile,
Torrentz.eu, Depositfile, MiniNova, WhereToWatch.com, Bittorent.AM, etc. If you try to download
movies, music, television shows, software, or pornography from a site that offers them to you free of
charge, you are putting yourself in harm’s way. Avoid trying to get something for nothing; it is always
best to purchase items from a reputable source. Ask yourself if your integrity and security worth is it.
You often ignore Microsoft Updates
On the second Tuesday of every month, Microsoft makes updates available that are designed to plug
holes that develop in the Windows operating system. If you ignore these updates, you are in effect
saying, “Thanks, Mr. Gates, for the amazing and comparatively inexpensive operating system that
dominates the entire world computer market, but I can take it from here.” This is wrong. Do not do this.
These updates are important and they are free. Install these updates when you are notified, then restart
your computer once they’ve been installed. Don’t starve your operating system.
You open infected links in emails or email attachments
Opening any spam email or suspected spam email is high risk behavior, even if it comes from a close
friend or family member. Spam email typically has no text in the Subject field, and the only text in the
body of the email is the offending link. Don’t click on the link and don’t reply to the sender from this
email. Call or text the sender, and ask, "Did you mean to send this to me?" Odds are you’ll be doing
them a favor as well--they’re probably unaware that this is happening. Lastly, open the trash bin in your
email and delete it there as well.

Contenu connexe

En vedette

En vedette (10)

Azioni legali: tempi e prospettive del ricorso al TAR
Azioni legali: tempi e prospettive del ricorso al TARAzioni legali: tempi e prospettive del ricorso al TAR
Azioni legali: tempi e prospettive del ricorso al TAR
 
艺术照明
艺术照明艺术照明
艺术照明
 
Daniel munoz pouerpoin
Daniel munoz pouerpoinDaniel munoz pouerpoin
Daniel munoz pouerpoin
 
BéCquer Rima Iv
BéCquer   Rima IvBéCquer   Rima Iv
BéCquer Rima Iv
 
Sintesi - Laudato Sii di Papa Francesco
Sintesi - Laudato Sii di Papa FrancescoSintesi - Laudato Sii di Papa Francesco
Sintesi - Laudato Sii di Papa Francesco
 
Ombudsman
OmbudsmanOmbudsman
Ombudsman
 
Is technology innocent?
Is technology innocent?Is technology innocent?
Is technology innocent?
 
Evaporators
EvaporatorsEvaporators
Evaporators
 
Marko kraljevic english 1
Marko kraljevic   english 1Marko kraljevic   english 1
Marko kraljevic english 1
 
Eu sei que vou te amar quarteto de trompete
Eu sei que vou te amar   quarteto de trompeteEu sei que vou te amar   quarteto de trompete
Eu sei que vou te amar quarteto de trompete
 

Christopher W Schneider Portfolio Nov2015

  • 4. Christopher W. Schneider - Portfolio Already have an Apple ID/iTunes Account? Terrific! Go ahead and use it with these precautions: Do NOT plug your Ecolab devices into your PC or 1) Set up as new or 2) Restore an iTunes back-up. If you do, you will lose all Ecolab configurations on your iPhone or iPad. Sign in at Step 2, choose to allow your Ecolab devices to merge information, and allow iCloud to Use the Location of Your iPhone. You will need to open and confirm the verification email that will be sent to the email you used. What’s an Apple ID and why do I need one? The Apple ID is an account that you can use to access all of Apple's services. You can use it to buy music and apps from the iTunes Store. For work, you'll need it to download helpful or required apps found in the Pest App Store. You’ll also need an Apple ID in order to use iCloud which can help you find a lost device. To create a brand new Apple ID from your Ecolab iPhone, follow the steps below. Method 2 instructions: 1. From the Home screen, tap on the Settings icon. 3. Enter your Birthday.2. Scroll to and tap iCloud and Get a free Apple ID. 4. Enter your First Name and Last Name. 5. Select Get a free iCloud email address. 6. Create the Apple ID.
  • 5. Christopher W. Schneider - Portfolio 1. 8. Enter a rescue email and (optional) allow email updates. 7. Select 3 security questions and provide answers. 9. Agree to terms and conditions. 11. Return to Home Screen and tap on Pest App Store. 10. Allow iCloud to Use Location finder for iPhone. 12. Scroll to the ADP app and tap install. 13. Tap Install to confirm. 14. Sign in with Apple ID. 15. Tap Install to finish.
  • 6. Christopher W. Schneider - Portfolio 16. Return to Home Screen and tap on the ADP app. 17. Allow ADP Mobile to Use Current Location. 18. Sign in with User ID you received from Ecolab HR.
  • 7. Christopher W. Schneider - Portfolio This is a sample of instructions I was asked to submit to a private business client to help his employees understand that they have to own why their computers are having problems. How Does My Windows Operating System Get Infected? Your internet surfing behavior needs improvement Websites are becoming annoying mazes of ads and popups; it is best to exercise caution when going to any new site. Both the pop-culture internet sites and the social network sites are super-saturated with paths that can easily lead to infection and popup headaches. The people most commonly targeted are those who play the games offered on Facebook--especially the games that cost money. Avoid gaming on all these sites. When in doubt, don’t click it. You use the same password for everything This is a bad idea, but if you insist on doing so, a good password has to be at least 8 alphanumeric (letters and numbers) characters and contain at least one capital letter and one punctuation mark. Even if you follow these guidelines, it’s still a temptation to take the easy way out. For example, if your password was “fryingpan” and you change it to “Frying5pan!”, while it is an improvement, it still might not be secure. It is too common to capitalize the first letter and put a special character at the end. A number could be a substitute for a letter and should not always be in an obvious breaking point. Consider a phrase instead: “veryrus7yfryingP@n”. And finally, change all your passwords annually. You try to get something for nothing (which is called theft) via file sharing sites For example: 4shared, Megaupload, Mediafire, Filestube, Rapidshare, The Pirate Bay, Fileserve, Hotfile, Torrentz.eu, Depositfile, MiniNova, WhereToWatch.com, Bittorent.AM, etc. If you try to download movies, music, television shows, software, or pornography from a site that offers them to you free of charge, you are putting yourself in harm’s way. Avoid trying to get something for nothing; it is always best to purchase items from a reputable source. Ask yourself if your integrity and security worth is it. You often ignore Microsoft Updates On the second Tuesday of every month, Microsoft makes updates available that are designed to plug holes that develop in the Windows operating system. If you ignore these updates, you are in effect saying, “Thanks, Mr. Gates, for the amazing and comparatively inexpensive operating system that dominates the entire world computer market, but I can take it from here.” This is wrong. Do not do this. These updates are important and they are free. Install these updates when you are notified, then restart your computer once they’ve been installed. Don’t starve your operating system. You open infected links in emails or email attachments Opening any spam email or suspected spam email is high risk behavior, even if it comes from a close friend or family member. Spam email typically has no text in the Subject field, and the only text in the body of the email is the offending link. Don’t click on the link and don’t reply to the sender from this email. Call or text the sender, and ask, "Did you mean to send this to me?" Odds are you’ll be doing them a favor as well--they’re probably unaware that this is happening. Lastly, open the trash bin in your email and delete it there as well.