You are on page 1of 79

COMP-131

Computer Skill

Part 2

First Semester 2016/2017

Dr monther Tarawneh
! Have you ever managed you emails using a
program?
! How do you arrange many windows on disktop?
! What is the best search engine?
! Do purchase a software, rent, or pay per use ony?
! Do you store your files locally or on the net?
! What are the features your best anti-virus program?
Working with Windows

! A window is a boxed area in which you view


programs, files, folders, drives, icons representing
and other elements.
Dealing with windows
! Moving a window:
! Point to its title bar with the mouse pointer.
! Then drag the window to the location that you want
! Resize of the window:
! Point to any of the window's borders or corners.
! When the mouse pointer changes to a two-headed arrow drag the border or corner to shrink or
enlarge the window.


! To make a window fill the entire screen, click its Maximize button or double-click the window's
title bar.
! To return a maximized window to its former size, click its Restore button (this appears in place
of the Maximize button). Or, double-click the window's title bar.
Dealing with windows
! Minimizing (Hiding) a window ( )
! Click itsMinimizebutton.
! The window disappears from the desktop and is visible only as a button on the taskbar.
! To make it visible again, click on its button on the taskbar

! Closing a window
! Closing a window removes it from the desktop and taskbar.
! To close a window, click itsClosebutton

! Switching between windows


! If you open more than one program or document, your desktop can quickly become
cluttered with windows.
! Each window has a corresponding button on the taskbar.
! To switch to another window, just click its taskbar button. The window appears in front of
all other windows, becoming theactivewindow Active window:
! Press ALT+Tab and move between windows.
Aero features


! Aero is a visual desktop experience that combines
translucent windows, appealing color, and graphics
effects with convenient functionality.
! Aeroincludes:
! Snap
! Peek
! Shake
! Flip.
Snap
! Snapallows you to resize open
windows to make reviewing
and comparing easier.

..
()
Peek:
()

! You can view your open windows on thetaskbarby


usingPeek. Simply scroll the mouse over the taskbar
icons, and a thumbnail preview of the open windows
will appear.

1. Hover the mouse over the


windows in Peek, and the
full window will appear on
your screen.
2. Click the Peek preview to
open the window, or click
the X to close the window
from the Peek view.

Shake
)
(


! When your desktop is cluttered with open windows, you can
useShaketo select a single window and close the rest.
1. Click on the top of the window you want to focus on and
shake your mouse, and the rest of the windows will disappear.
2. Simply shake the window again, and the closed windows will
reappear.
Flip
1. Press and hold the Alt key,
then press Tab to open the
Flip view of your open
windows.
2. Stop on the window you
want to open, and it will
appear on the full screen.

( tap Alt )


()

1. Press and hold the Windows


key, then press Tab for a 3D
version of Flip.
2. Use the Tab key or Arrow
keys to flip through your
open windows.

windows key
Try out

! Open 5 windows by running 5 programs


! Minimize all of them in the task bar
! Make one of them active
! Close the active one
! Arrange them using Aero features
The Internet

! The Internet is a global network that links computer networks
all over the world so that users can share resources and
communicate with each other.
! People use it as a medium to connect with other people, sharing
files, entertainment, information and lots of other activities
that are useful and beneficial in many terms. ( )
Entertainment:
! Connection could be:
! wired using telephone lines or cables
! wireless based on communication satellites .
! Internet Service Providers (ISP): companies that provide the
user with access to the internet. ISP:
STC, Mobily.

why people use internet?



! Information: people brows and find some information using
search engine (i.e. Google, Yahoo) and some special websites such
as Wikipedia and others.
! Social networking: An essential medium to communicate with
friend and family members. For example, Facebook, twitter, and
LinkedIn.
! Communication: People connect via each other through various
IM services like Gtalk, Skype, and Yahoo messenger.

! Transfer files: From office to schools, from business person to


college students everyone sends files through internet. People use
various mail services like Gmail, Yahoomail, AOL, and Hotmail
etc. to send files.
! Current buzz: Its either latest news or Football match score,
people love to surf internet to get a live update of any news.

..

why people use internet?



! Entertainment: Watching videos in YouTube, playing live games, or
downloading movies;
! Internet Transactions: Known as internet banking facility through which
people can deposit any bill, transfer money through accounts, and make
internet banking
internet reservations on time from their home.

! Making money: People can make money online by many factual ways.
There are lots of options available. Designing, Freelancing, consultancies,
software providers, application always help people to work in an easier way.
! Marketing: There are lots of social media enthusiasts who promote others
product online via various social media sites. There are lots of publishers
available who promote others product by advertising on various websites
blogs etc.
! Online education: Various websites such as the university
Blackboard and Free Video Lectures offer online courses to learn various
things like designing, programming, engineering, medical, finance and other
subjects.
Internet keywords
! Protocol: In general protocol means a system of rules.

! Packet: it is a basic unit of data being transferred on the internet. It can be


thought as an envelop that takes our data from one computer to another.

) ( units of data

! Communication Protocol: a common set of rules or instructions that every


computer has to follow, when communicating with other computers over the
internet.

! There are a lot of protocols on the internet, sometimes referred to as the
Internet Protocol Suite, control all the processes on the network.
..

! The most common protocols used on the internet are TCP/IP (Transmission
Control Protocol/Internet Protocol )which define how to send and receive
data and how to select the route of the data packet during their way from
computer to another on the internet. Before sending files, the information is
broken down into smaller pieces, called packets

. TCP/IP

! Other protocols like SMTP, FTP, UDP, POP, and HTTP also used.

^

Internet keywords
! HTTP (HyperText Transfer Protocol): HTTP
(Hypertext Transfer Protocol) is the set of rules for
transferring files (text, graphic images, sound, video,
and other multimedia files) on theWorld Wide Web
! A network request / respond protocol used on the www to
retrieve HTML documents.
! HTTP defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in
response to various commands.( e.g. when we click a
hyperlink on a webpage. )
. HTTP


:
Cont.

! Internet Protocol (IP) Address:
This is a 32-bit number which consists of 4 parts separated by dots and usually
written in the form: 125.110.158.10.
( Each of the decimal numbers represents a string of eight binary digits. Thus,
the above IP address really is a string of 0s and 1s:
10000010.00000101.00000101.00011001
! Each computer or device connected to the internet is given a unique address
known as the INTERNET PROTOCOL ADDRESS (IP address).
! A home computer is given a unique IP address (assigned by the ISP) when it
connects to the internet.
! It is not a permanent number. Every time a different IP address is assigned to
the device when it is connected to the internet.
! The only IP addresses that remain unchanged are the web servers. (e.g. mail
servers like yahoo, Gmail, Google etc.)
! An IP address can be used instead of typing in the full URL(like
www.google.com).
! For example: http://125.110.158.10 would take you straight to the server
corresponding to this address

! IP addresses and MAC (Machine Access Control) addresses:


MAC address is the physical address which is unique number that
identifies a device connected to the internet, and usually written in the
form: 00-A0-5A-44-AB-7BA.
MAC address is ahardware number assigned to everynetwork
card during manufacturing process. It is a permanent address
associated with each computer. whereas, the IP address gives the
location of a device on the internet.
! You can think of the IP address as the address of the house you
live in (it will have some unique way of identifying it, such as a
postal code, or a street number). Using this example, the MAC
address can be thought of as a way of uniquely identifying each
person living in that house. It is possible to move house (so your
IP address will change) but the same people will be living in the
new house (so their MAC addresses will remain unchanged).
IP Address Mac Address
usually written in the form: 125.110.158.10. usually written in the form: 00-A0-5A-44-AB-7BA.

Each computer or device connected to the MAC address is ahardware number


internet is given a unique address assigned to everynetwork card during
known as Internet Protocol Address (IP manufacturing process.
Address)
) (
IP .
IP number is not permanent (it will be changed
every time we connect to the internet.) It is a permanent address associated with
it gives the location of a device on the internet. each computer.

, IP
.
..
But, the web serves like google, yahoo, gmail IP Address
the IP number is permanent.


MAC Address
IP Address

Cont.

! HyperText Mark-up Language (HTML): is a standard markup language, used


to display and create web pages.

! HTML isnt a programming language but is simply a mark-up language.


! HTML consists of a set of markups and codes which tells the web browsers
how to display the contents of a web page.
! Web Browser: Software applications that are used to locate and display Web
pages.

! The web browser reads the HTML symbols or tags and use them to determine
how to display the page.
! There are many web browsers available today such as Explorer, Safari,
Chrome, Opera, and Firefox.
HTML


WWW
! The World Wide Web: Known as the Web, it is a global interactive system
that lets you access information on the Internet. It is a way of accessing
information over the internet using web-browsers.

! People often use the term Web to refer to the Internet, but they are not
exactly the same thing. The Internet is the underlying network of
computers and the WWW is the system which uses the Internet to access
the information. (WWW)

WWW

! Website: A location on the World Wide Web (and Internet) that contains
information about a specific topic. A website usually contains multiple pages
with different types of information about the topic.



Con.


! Home Page: The first page you see when you open a website,. It is usually
gives information about the site and provide hyperlinks to other pages on the
site.

! Link (or hyperlink): A highlighted or underlined feature on a web page that,


when clicked, will take you to another web page.
! A link most often appears as underlined words or an image.



..

! Web Address or URL: Stands for (Uniform Resource Locator.) web


addresses usually start with the letters www (for World Wide Web) and end
with a dot followed by letters that indicate the type of website or called
domain. WWW


! Domains divided the web sites into categories based on their natures or
provided services. Common domains are:

Domains

1. .com = commercial enterprise or business ( making some profit) ( )


2. .org = non-profit organization (formed for the purpose of public benefit e.g.
UNICEF : United Nations Childrens Fund) ( )


3. .edu = educational institution
4. .gov = government agency
5. .mil = military agency
6. .net = another ending for a commercial website
Url Anatomy URL
Internet Explorer Pre-installed:
! Internet Explorer is a web browser from Microsoft
! Internet Explorer comes pre-installed, so you won't have to do anything to install it
! To open Internet Explorer:
From the desktop, locate and select the Internet Explorer icon on the taskbar.
You can access it from the Start menu.

! Internet Explorer makes browsing the Web easy and there are Common Toolbar
Buttons in all internet Browsers:

Back Takes you to the last viewed screen.


Forward Returns you to the last page viewed before using the Back button.
Stop Stops the browser from accessing a link.
Refresh Updates the page you are currently viewing if the content has changed.
Home Brings you to the Home Page that you can choose and set in your browser.
Searching the Web
! Internet search sites can search enormous databases of Web
pages, using titles, keywords or text
! The challenge is to locate the material that you need
! Google is one of the most popular search engine
! while so many people use it, few actually get formal
instructions on how to search with Google.

How to search on Google


! Step 1: Open your web browser like Google chrome, Microsofts Internet Explorer, Apples Safari and
Mozillas Firefox

! Step 2: On the Adress bar write http://www.google.com this will take your to the google web site.

! Step 3: In the search box, enter your search keywords for example "google istant". You will get
suggestions based on your keywords and the actual results will begin to display on your page.
Cont.

! Step 4: Press enter or click on search, then review Your Search


Results.
! The results might be images , news, videos, or other contents, as
you can see below
Efficient Google search
( )
! Use the tabs:
! helps you to define what kind of search results you need (All, Image, Videos,
News and More).

! Use quotes:
! Putting your search in a quotes tells the search engine to search for documents
that contain that phrase exactly as you type, while without quotes it will search
for the documents which contain that phrase with any order of its words. for
example:
How to pray correctly
CONT.

OR AND NOT

! Booleans and parenthesis:
! By default, if you search for several words, most search engines will
show results where both or all of the words are found.
! This is known as an AND search as though you wanted this and this.
! if you want results with either (or any) of your words, use the OR
keyword. It means that either (or any) of your search terms were found.
For example:
pray OR worship
This will find pages containing either the word pray or worship. Some
page results will contain both.
! When you place search terms in a set of parenthesis, they are treated as a
single unit. So
(pray OR worship) (Alawadi Alghamisi)
This will find pages containing either the word pray or the worship,
and also the name of either "Alawadi" or "Alghamisi".
Cont.

! Exclude Words:
! Let's say you want to search for content about Quran, but you want to
exclude any results that contain the term AlAfasi.
! To do this, simply use the minus sign (-) in front of the word you want to exclude
(or NOT) NOT ( -)
Quran -AlAfasi
! Searching in a specific sites:
! Search about something in a certain website.
! For example, if you want to search for assessment in Dammam
University website you can use the following syntax:
Assessment site:uod.edu.sa
This will search for all content about assessment, but only on uod.edu.sa.
All other search results will be removed.
Try out

! Using Google search engine :


! Find all information about yourself
! Search again about yourself and exclude facebook from
the result.
! Search again about yourself or your friend next to you.
! Practice on the search using different options.
The Clouds
cloud computing cloud
What is The Cloud? ( . )

Cloud computing lets you keep information on a remote


server (the cloud), instead of trapped in a computer. You can
access your data from a smartphone, a tablet, a laptop, or a
desktopwherever you have an Internet google docs /

connection.

For example Google Docs, you can create your documents


online and manage them from anywhere when connected to
internet.
Similar goes for email and social-networking websites.
Cloud Computing
The Clouds
! The cloud or sometimes called cloud computing.
! It is a general term used to describe a new class of network based services.
! storing and accessing data and programs over the Internet instead of your
computer's hard drive.
! Think of it:
! As a virtual server on the internet, where we can store data, or as a software
we can access and do computations from any connected computer to the
internet.

! As a platform where we can create our customized programs.


! As an infrastructure where companies like Amazon, Microsoft, and Google


provide a backbone that can be "rented out" by other companies.

.
What is cloud computing?
clouds NIST

! National Institute of Standards and Technology (NIST) defines the cloud computing
as:
"Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool(group) of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider interaction".
(rapidly provisioned : quickly provided)


the resources of clouds are easy to use
and provided to users according to their demands.
and they are provided very quickly.
The resources include networks, servers and storage.

. clouds


! This cloud model composed of five essential characteristics,
three service models, and four deployment models
clouds

Clouds Essential Characteristics


:as much as we need 1.
()
1. On-demand self-service. A consumer can have unilaterally
provision(something provided for a single person according to his needs)
computing capabilities, such as server time and network storage, as needed
automatically without requiring human interaction with each services
provider.
Demand: need ,


Every user is provided with the resources according to his demand.
.
..

2.
wide
()
2. Broad network access. Capabilities are available over the network and
accessed through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g., mobile phones,
laptops, and PDAs (personal digital assistant: a small handheld PC)).

heterogeneous: diffrenet types of ()


Clouds applications are accessible through different type of devices
(e.g mobile phones, laptops)
clouds
( ):
..

Cloud providers:
collecting 3. cloud
() : google apps
3. Resource pooling. The providers computing resources are
pooled to serve multiple consumers using a multi-tenant model,
with different physical and virtual resources dynamically
assigned and reassigned according to consumer demand. There
is a sense of location independence in that the customer
generally has no control or knowledge over the exact location
of the provided resources but may be able to specify location at
a higher level of abstraction (e.g., country, state, or datacenter).
Examples of resources include storage, processing, memory,
network bandwidth, and virtual machines.

The resources of cloud provider are grouped together
so that multiple users can use them on the same time according to their needs.
could provider
.

.

..

3.

4. Rapid elasticity. (ability to add or remove capacity e.g. processing and memory)
Capabilities can be rapidly and elastically provisioned, in some cases automatically, to
quickly scale out and rapidly released to quickly scale in. To the consumer, the
capabilities available for provisioning often appear to be unlimited and can be purchased
in any quantity at any time.
(capabilities can be stretched out according to the needs and released back when not
required)

The cloud provider increase or decrease the resources


according to the requirements of consumers.

Consumers can buy the resources in any quantity at any time.


. cloud

.
..

5.

5. Measured Service. This is a reference to services where the cloud provider measures or
monitors the provision of services for various reasons, including billing, effective use of
resources, or overall predictive planning.
Cloud systems automatically control and optimize resource (make the best use of resource) use
by leveraging( use something to maximum advantage ) a metering capability at some level of
abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active
user accounts). Resource usage can be monitored, controlled, and reported providing
transparency for both the provider and consumer of the utilized service.


Cloud system is controlling and measuring the use of resources,
so that the resources can be fully utilized,
and their performance can be improved.
cloud

.
Clouds Service Models
! Cloud Software as a Service (SaaS)
! Cloud Platform as a Service (PaaS)
! Cloud Infrastructure as a Service (IaaS)

Cloud Software as a Service (SaaS):


! Look at the cloud as an applications provider, where the
consumer can use the applications provided on the cloud.
For example, Google Apps is a cloud where we can access from any device
connected to the internet.
( Google Appsis a set of webapplicationsprovided byGoogle. These
webapplicationsincludeGoogleEmail,GoogleCalendar,GoogleDocs,G)oogleTal
k (Chat),GoogleMobile andGoogleSites.

! The benefits of SaaS are:


You can access your data from any connected device
You data is saved on the cloud
Flexibility on increasing or decreasing your storage capacity.

Cloud Platform as a Service (PaaS):


! The consumer can deploy his applications on the cloud, and we can manage
our applications after that.
! The service providers offer tools to the consumer to create and manage his
applications.
! One of the PaaS providers is Google by offering Google Apps engine.
! The capability provided to the consumer is to deploy onto the cloud
infrastructure consumer-created or acquired applications created using
programming languages and tools supported by the provider.
! The consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, or storage.

! The benefits of PaaS are :


Fast delivery for your applications to the market
Easy to deploy new web applications on the cloud

Cloud Infrastructure as a Service


(IaaS)
! the service provider provides companies with computing
resources including cloud based platforms to deploy their
applications, data storage to store their data, and data
centers to host their web applications.
! The benefits of IaaS are:
No need to invest in your own hardware
Infrastructure scales on demand to support dynamic
workloads
Flexible, innovative services available on demand
SaaS PaaS IaaS

Used by users() Used by developers () Used by companies ()


While using PaaS, the developers will the service provider provides
Where the consumers can use just deploy it to cloud, so that companies with computing
the application provided on applications will be available to the resources including cloud based
market. platforms to deploy their
the cloud. PaaS
applications, data storage to store
. cloud
cloud their data, and data centers to host
And the developer isn't worried about their web applications.
The benefits: : internal functions inside the cloud
(cloud platform)
-You can access your data )
from any connected device. ( .

They should use a programming The benefits:
.
language and tools supported by the -no need to invest your own
-your data is save provider(the cloud) hardware.
.
. -infrastructure scales on demand to
The benefits:
-flexibility on increasing and support dynamic workloads.
-fast delivery for your applications to
decreasing your storage . -flexible, innovative(new) service
the market
capacity available on demand.
-easy to deploy new web applications

on the cloud
. . .^ )(
Clouds Deployment Models
+

.
)(levels of security

Cont.

organizations:

! Private cloud:
! Infrastructure operated solely for an organization. It may be managed by the organization or a
third party and hosted either internally or externally.

. ) (

! Private clouds offer a consumer support and deliver on demand IT resources. It also provides a
high level of security to meet their consumers need.

.
! Public cloud:
! Infrastructure made available to the general public and offers access to cloud services (over
public network.)
! Architecture of public and private clouds almost the same, however, security may be
substantially different for public to private clouds.
( )
( )

! Generally, public cloud service providers like Amazon Web Services (AWS), Microsoft and
Google own and operate the infrastructure at their data center and access is generally via the
Internet.
:(public cloud servies provider)
Amazon Web Servies(AWS) Microsoft, Google

! AWS and Microsoft also offer direct connect services called "AWS Direct Connect" and "Azure
ExpressRoute" respectively, such connections require customers to purchase or lease a private
connection to a peering point offered by the cloud provider


Example of Azure ExpressRoute

WAN WAN
. ) (
.
AWS direct connect
! Hybrid cloud:
! Infrastructure that uses a private cloud organization with integration and use of public cloud
services.

( )

! Most companies use public clouds to Scale up or down quickly and easily to meet demand,
they keep their important applications and sensitive data on private cloud while use public
cloud resources for IaaS.


.
Email system o using outlook
! Microsoft Outlook is an extremely popular e-mail program
! We will learn:
How to Set up email Account
Compose & send emails
Format email
Attach a file to an email
Unread email view
Reply to an email
Search inbox
Create new mail folder
quiz
! Which of the following can you do online? Check all that apply.
! Use social networking platforms
! Use search engines to find information
! Watchmovies and TV shows
! Pay bills and manage bank accounts
! Send and receive email and instant messages
! rue or False: When something is storedin the cloud, it means it's stored on the
Internet instead of your computer's hard drive.
! False
! True
! What is the Internet?
! A global network of computers and electronic devices
! A type of web browser
! A global collection of different websites
! A group of online communication tools, including email and instant messaging
! You can view load multiplewebsites in the same browser window using _____.
! Links
! Windows
! Tabs
! URLs
Set up an email account
1. Start Outlook for the first time.
2. When prompted to set up an email account, select Next.
3. To add an email account, select Yes, and then select Next
4. Enter your name, email address, and password, and then
select Next
5. Wait while Outlook completes the setup.
6. Check the box for Change account settings and click Next.
7. ClickFinish, Outlook will now test your account settings by
trying to send a test message.
Multiple email accounts
! You can add more than one email account and Outlook
will manage all of them for you.
! To add additional email accounts simply:
! SelectFile>Add Account.
! On theAdd Accountpage, enter your name, email address,
and password, and then selectNext.
! SelectFinish.

! Note that if you added an Exchange account, you will


need to exit and restart Outlook.
Use this diagram to apply steps for
the following section.
Compose and send emails
1. Select New Email, or press Ctrl + N.

2. In the Subject box (area labeled 2), type the subject of the
message.

3. Enter the recipients' email addresses or names in the To box


(Separate multiple recipients with a semicolon)(area labled 1)

4. To select recipients' names from a list in the Address Book,


select To and then select the names that you want

5. Write your message on the content area (area labeled4).


Format emails text
! To Change the font of your email message:

1. On the Message tab, in the Basic Text group (area labeled 5), you can select the
font, font size, font style (bold, italic, and underline), font color, and text
highlighting.

2. On the Format tab, in the Font group, you can select the font and font size;
increase or decrease the size by one increment; change the font style (bold, italic,
underline, strikethrough, subscript, superscript); change the case, the font color,
and the text highlighting; and remove all font formatting.

3. On the Mini toolbar that appears when you select text, you can select the font,
increase or decrease the size by one increment, select a theme, use the Format
Painter, select the font style (bold, italic, and underline), and highlight text.

4. On the Format tab, in the Style group, you can select styles.
Attachment
! To attach any file simply click Attach File and select one of the
options:
Cont.

! To attach an email:
1. Click on Attach Item in the message tab
2. Choose Outlook Item then go to the folder where the
email is, and select the email. You can also choose to attach
the email as text only or as an attachment.
! To attach an electronic business card
An Electronic Business Card is another view of a contact that
displays the contact's information in a highly recognizable form.
To attach an electronic business card:
1. Click on Attach Item in the message tab
2. Select Business Card. You get the option to choose recent
ones that you've attached or Other Business cards.
Unread emails view
1. From yourInbox, selectUnreadabove the email list.
2. The emails that you havent read yet appear in your
email list.
Reply email
1. In the Reading Pane, select Reply, Reply All, or Forward. If
the Reading Pane is off or if youve opened the message in its own
window, on the Home or Message tab, select Reply, Reply All,
or Forward.

2. Write your message.


3. Select Send.
Search the Inbox
1. From your Inbox - or any other
email folder find the Search box
at the top of your messages.

2. To find a word that you know is in a


message, or a message from a
particular person, type the word or
person's name in the Search box.
Messages that contain the word or
name you specified appear with the
search text highlighted in the
results.
Create new mail folder
! Folders provide a way to organize email messages,
calendars, contacts, and tasks in Outlook.
! To add a folder to the folder pane, do the
following:
1. In the left pane of Mail, Contacts, Tasks,
or Calendar, right-click where you want to
add the folder, and then click New Folder.
NOTE: When in Calendar, the New
Folder command is replaced with New
Calendar.

2. In the Name box, enter a name for the folder,


and press Enter. new folder will appear in the
inbox.
quiz
! Generally, when you receive an email, it will appear
in your _________.
! Message pane
! Inbox
! Compose pane
! Calendar
Internet Security ( ) ..

! In the past, Internet safety was mostly about protecting your


computer fromviruses.
! Today, the Internet's vast reach, constantly changing technologies,
and growing social nature have made users more vulnerable to
identity theft, privacy violations, and evenharassment.
! Consider the following the questions:
! Have you ever Googled yourself to see what information can be found on
you?
! Have you set your computer's security program to make sure you are
getting regular updates?
! Do you have an external backup source for your computer?
! Are you enticed by emails or advertisements with special discount offers?
! When shopping online, do you check a website's security status before
entering your billing information?
! Have you customized your privacy settings for your social networking
accounts like Facebook, Twitter, and Skype?
Internet Threats legitimate: legal ()
illegitimate: illegal ()

! Before we can learn how to protect ourselves, we need to understand what the threats are on
the Internet.
! There are common Internet safety terms that pertain to our computers and identity theft:

1. Pharming is a technique used to redirect a legitimate website's traffic to another


illegitimate website in order to gain access to a user's personal information.
.


2. A virus is a self-replicating program that is designed to infect a computer by
rapidly spreading from one file to another, sometimes causing great harm.

*Worms are similar, except they are usually spread over a network without human help
worms

3. 3. Phishing is mail or instant message scams that are disguised to look like official
communications from a legitimate website. They fool users into providing sensitive
information like passwords, credit card details, etc.
phishing
cont malware

4. Malware is intentionally malicious software or code that is designed to damage


your computer or collect information without your knowledge.Viruses, Trojan
horses, worms, spyware and keystroke-logging snoop ware are all considered
malware. Sometimes adware and freeware can be malicious.

5. Spyware is a type of malware that collects information about users without


their knowledge, often to track browsing habits and to create pop-up
advertisements. Along with invading your privacy, it can sometimes interfere with
a computer's functions.Spyware is sometimes bundled with other software.
Before downloading software, it's a good idea to read the reviews to see if it has a
good reputation. malware
.

6. hoax is an email chain letter that warns of impending viruses and tries to scare
users into forwarding and continuing the hoax email ( false email)

7. Trojan horse is a type of malware that appears to be benign or desirable and


thus tricks the user into allowing the program access to their computer, usually
through a download or email attachment.
)(
(the most dangerous)
Cont

8. Spam is unsolicited email or junk mail. Sometimes, it comes from legitimate


companies, but it can also be used for scams, phishing, and malware.
junk mail

9. Browser hijacking occurs when malware or spyware replaces your browser's


home page with its own in order to force more hits to a particular website.
..

10. Click jacking is a technique that tricks users into clicking on a malicious link by
adding the link to a transparent layer over what appears to be a legitimate web
page.Users think they are clicking on buttons or links in the legitimate page, when
in reality they are clicking on the concealed links in the hidden page and often
providing access to confidential information in the process.

()

11. Mousetrapping keeps visitors from leaving a website by locking them into a
window, opening multiple windows on the desktop, or relaunching their website in
a window that can't be closed.

Protect Your Self


! Get a goodantivirus software
! Antivirus software can protect you from infected email attachments, corrupt
websites, Internet worms, and spyware
! The protection you obtain should include the following three components

1. Antivirus: Specifically protects against viruses



2. Anti-spyware: Protects against malicious software that may be gathering your
information without your knowledge
Malware
3. Firewall: Screens out threats that try to reach your computer over the Internet

( Firewall)

Some security suites offer several additional protections, but these are the three main
components you will need.
Tips to keep your computer
healthy ( )

! Restart your computer regularly:

! It is a good practice to turn it off and restart it at least once a week. This gives your computer a chance
to perform regular diagnostic checks and fix minor issues before they become a problem.
! Install software updates:
! When your operating system informs you of a software update, download and install it. Software
updates are designed to fix security vulnerabilities and other bugs in your operating system.
! This will help protect your computer against some of the latest threats.
! Use system restore:
! If you have a download that is causing problems, try your operating system's system restore function.
! This feature allows you to restore your computer to how it was before it began having issues.
! Back up your computer:
! With antivirus protection, your chances of losing your files to damaging malware are greatly reduced.
However, no product offers 100 percent security; therefore, it's a good idea to back up your files on
an external source.
! Windows 7 come with internal backup systems, but this will not help you if your computer
is lost, damaged, or stolen. For externally backing up your files, there are two basic options for home
users: external hard drives and online backup services

You might also like