SlideShare une entreprise Scribd logo
1  sur  18
Four Things You Should Do to Your Computer Today Don Yarman OLC IT Division OLC Chapter Conferences Spring 2007
The Four Things ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
My Objectives ,[object Object],[object Object],[object Object]
Credit where it’s due ,[object Object],[object Object]
What I’m talking about ,[object Object],[object Object],[object Object]
1.  Enable Automatic Updates ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Older PC without Automatic Updates ,[object Object],[object Object]
2.  Install a good firewall ,[object Object],[object Object],[object Object]
Not Windows XP? ,[object Object],[object Object],[object Object],[object Object]
3.  Maintain Antivirus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Most programs are recommended by someone
WindowSecrets.com  Security Baseline ,[object Object],[object Object],[object Object],[object Object]
3.5.  Remove Ad/Spyware ,[object Object],[object Object],[object Object]
ConsumerSearch again
Spam & Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bottom line: Updates Updates Updates ,[object Object],[object Object],[object Object]
Other things that help ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object]

Contenu connexe

Tendances

Module ict society
Module ict societyModule ict society
Module ict society
Kak Yong
 

Tendances (18)

De-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCDe-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PC
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Safe_IT
Safe_ITSafe_IT
Safe_IT
 
How to remove malware from pc?
How to remove malware from pc?How to remove malware from pc?
How to remove malware from pc?
 
How to remove malware from your windows computer
How to remove malware from your windows computerHow to remove malware from your windows computer
How to remove malware from your windows computer
 
Remove gangnamgame.net from pc
Remove gangnamgame.net from pcRemove gangnamgame.net from pc
Remove gangnamgame.net from pc
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.com
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
 
Signs of a zombie computer!
Signs of a zombie computer!Signs of a zombie computer!
Signs of a zombie computer!
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Spyware
SpywareSpyware
Spyware
 
How to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PCHow to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PC
 
Increasing Value Of Security Assessment Services
Increasing Value Of Security Assessment ServicesIncreasing Value Of Security Assessment Services
Increasing Value Of Security Assessment Services
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
 
Computer virus
Computer virusComputer virus
Computer virus
 

En vedette

Presentacion . tic nuevas tendencias epistemicas (1) definitiva y final
Presentacion . tic nuevas tendencias epistemicas (1)    definitiva y finalPresentacion . tic nuevas tendencias epistemicas (1)    definitiva y final
Presentacion . tic nuevas tendencias epistemicas (1) definitiva y final
Pablo Moreno
 

En vedette (16)

Oplin Info
Oplin InfoOplin Info
Oplin Info
 
Don't Talk to Patients, Talk With Them
Don't Talk to Patients, Talk With ThemDon't Talk to Patients, Talk With Them
Don't Talk to Patients, Talk With Them
 
Advanced Therapies for Library Web Sites
Advanced Therapies for Library Web SitesAdvanced Therapies for Library Web Sites
Advanced Therapies for Library Web Sites
 
Using Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections versionUsing Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections version
 
Travel guide green turtle cay
Travel guide green turtle cayTravel guide green turtle cay
Travel guide green turtle cay
 
People are talking about you...but do you know what they're saying?
People are talking about you...but do you know what they're saying?People are talking about you...but do you know what they're saying?
People are talking about you...but do you know what they're saying?
 
teens n tech: where r wii?
teens n tech:  where r wii?teens n tech:  where r wii?
teens n tech: where r wii?
 
Youth And Social Media: It's All About Them
Youth And Social Media: It's All About ThemYouth And Social Media: It's All About Them
Youth And Social Media: It's All About Them
 
Teens, Tweens & Social Networking
Teens, Tweens & Social NetworkingTeens, Tweens & Social Networking
Teens, Tweens & Social Networking
 
Presentacion complejidad...
Presentacion complejidad...Presentacion complejidad...
Presentacion complejidad...
 
Grupo 4 objetivo 4 - exposicion
Grupo 4   objetivo 4 - exposicionGrupo 4   objetivo 4 - exposicion
Grupo 4 objetivo 4 - exposicion
 
The Pharma Marketer: Will there be an (r)evolution?
The Pharma Marketer: Will there be an (r)evolution?The Pharma Marketer: Will there be an (r)evolution?
The Pharma Marketer: Will there be an (r)evolution?
 
Fresh Look At Databases
Fresh Look At DatabasesFresh Look At Databases
Fresh Look At Databases
 
Some suggestions for Pharma 3.0: My experience
Some suggestions for Pharma 3.0: My experienceSome suggestions for Pharma 3.0: My experience
Some suggestions for Pharma 3.0: My experience
 
Cambioenlas tic
Cambioenlas ticCambioenlas tic
Cambioenlas tic
 
Presentacion . tic nuevas tendencias epistemicas (1) definitiva y final
Presentacion . tic nuevas tendencias epistemicas (1)    definitiva y finalPresentacion . tic nuevas tendencias epistemicas (1)    definitiva y final
Presentacion . tic nuevas tendencias epistemicas (1) definitiva y final
 

Similaire à Four Things You Should Do to Your Computer Today

La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and society
Azmiah Mahmud
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_society
Saktis Kesavan
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and society
Shuren Lew
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
EchelleOgatis
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tips
ar-rifke.com
 

Similaire à Four Things You Should Do to Your Computer Today (20)

7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and society
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_society
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and society
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tips
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Internet security
Internet securityInternet security
Internet security
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog com
 
Firewall intro
Firewall introFirewall intro
Firewall intro
 
Fixing browser redirection viruses
Fixing browser redirection virusesFixing browser redirection viruses
Fixing browser redirection viruses
 

Dernier

Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
CaitlinCummins3
 
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODFRATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
CaitlinCummins3
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 

Dernier (20)

Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
A Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettA Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob Badgett
 
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team Presentations
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
 
Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdf
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
Global Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdfGlobal Internal Audit Standards 2024.pdf
Global Internal Audit Standards 2024.pdf
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
Expert Cross-Border Financial Planning Advisors
Expert Cross-Border Financial Planning AdvisorsExpert Cross-Border Financial Planning Advisors
Expert Cross-Border Financial Planning Advisors
 
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODFRATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
1Q24_EN hyundai capital 1q performance
1Q24_EN   hyundai capital 1q performance1Q24_EN   hyundai capital 1q performance
1Q24_EN hyundai capital 1q performance
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdf
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 

Four Things You Should Do to Your Computer Today