Keeping Your Computer Secure Quick Reference Guide

Size: px
Start display at page:

Download "Keeping Your Computer Secure Quick Reference Guide"

Transcription

1 Keeping Your Computer Secure Quick Reference Guide Created: 3/16/2010 Page 1 of 1

2 Table Of Contents 1. Introduction Keeping Your Computer Up to Date Windows Mac Malware and Antivirus Protection Campus Solution Personal Solutions Strong Passwords Use a passphrase instead of a password Add complexity Test your passphrase/password Other Tips When to Change a Password Creating Backups of Your Files Campus Options Backup Software Commercial Options The Dangers of Wireless Networks Safe Browsing Tips Clearing Private Data Peer 2 Peer Phishing and Scams Resources Created: 3/16/2010 Page 2 of 2

3 1. Introduction Information technology is becoming essential in our everyday lives, including at work, on campus and at home. As such, computer security is becoming increasingly important. This guide is a supplement to the Kennesaw State University Information Technology Services miniworkshop entitled Keeping Your Computer Secure. This Quick Reference is not intended to replace the mini workshop, but instead is intended to supplement and provide a quick reference to the topics covered in the mini workshop. This Quick Reference covers the following topics: Keeping Your Computer Up to Date Malware and Antivirus Protection Strong Passwords Creating Backups of Your Files The Dangers of Wireless Networks Safe Browsing Tips Peer 2 Peer (P2P) Technology Phishing and Scams Created: 3/16/2010 Page 3 of 3

4 2. Keeping Your Computer Up to Date Note: Campus computers are set to download and install critical updates automatically. 2.1 Windows To update your PC manually 1. In Windows Internet Explorer go to or click on the Safety menu, then Windows Update. Windows Update may also be located under Tools or Help when using older versions of Internet Explorer. 2. Then, do one of the following: a. Click Express to check for High priority updates. Windows Update will check for High priority updates for your PC and display them for your review. Click Install Updates to install high priority updates. b. Click Custom to check for Optional updates. Windows Update will check for the latest updates for your PC. Created: 3/16/2010 Page 4 of 4

5 Note: If you click Custom, High priority updates will be presented for your review. Select Optional Updates from the left side of the web page by type: "Software, Optional" or "Hardware, Optional. " Source: To turn on Automatic Updates in Windows XP (SP2) 1. Click Start, and then click Control Panel. 2. Double click Automatic Updates. 3. Choose Automatic (recommended). Source: Created: 3/16/2010 Page 5 of 5

6 2.2 Mac Manually getting updates 1. Click on the Apple menu in the upper left corner of your screen. 2. Click Software Update in the drop down menu. 3. Your computer will search for available updates. When it finishes, select the updates you wish to apply and click Install Automatically Get Updates 1. Click on the Apple menu in the upper left corner of your screen. 2. Click on System Preferences 3. From the View menu, choose software update 4. Select the interval you would like your computer to check for updates. Created: 3/16/2010 Page 6 of 6

7 Note: If you are new to Apple computers, ITS Technology Outreach offers an online course as well as downloadable documentation to KSU faculty and staff. Visit for information. 3. Malware and Antivirus Protection 3.1 Campus Solution Information Technology Services provides Symantec antivirus protection to faculty, staff and students on the ITS Website at You must use your NetID and password to sign in to download the software. Created: 3/16/2010 Page 7 of 7

8 The Faculty and Staff downloads include compatibility for both 32bit and 64bit versions of Windows XP, Windows Vista and Windows 7. The Student version is only compatible with 32bit versions of Windows XP. 3.2 Personal Solutions There are a variety of other solutions available that are either free or charge a small fee. Some examples are below: AVG o Microsoft Security Essentials o Avast o Avira o ClamAV o Note: Running more than one antivirus solution at a time may cause adverse effects. Uninstall your old antivirus solution before installing a new one. Note: If you believe a file might have a virus, you can upload it to or and scan it with various antivirus products. After the scan is complete, either of the websites will tell you if the file is infected and what product detected it. Please note that no single product detects all instances of malware. 4. Strong Passwords 4.1 Use a passphrase instead of a password Passphrases can be much more complex than passwords making them more secure. Example: thetrafficon575washorribletoday Created: 3/16/2010 Page 8 of 8

9 4.2 Add complexity For a stronger password, use capital and lower case letters, numbers and special characters. For example: password becomes P@$$w012d 4.3 Test your passphrase/password Microsoft s Password Checker: Note: Keep your password a secret. Information Technology Support Professionals, either on campus or in your personal life, should never need your password. 4.4 Other Tips Keep your password a secret Do not type passwords on computers that you do not trust o Especially passwords to sensitive accounts (i.e. KSU , Banking, etc) Use more than one password 4.5 When to Change a Password There are several theories about when you should change your password. Below are just a few options but you should always change your password when you believe it has been compromised and ideally passwords should also be changed regularly. Every 30 / 60 / 90 days KSU User Accounts & Password Policy: Semiannually 5. Creating Backups of Your Files 5.1 Campus Options The I Drive or M Drive USB External Drives USB Thumb Drives CDs / DVDs 5.2 Backup Software Backup And Restore for Windows Time Machine for Mac Created: 3/16/2010 Page 9 of 9

10 Note: Securely store any media you may use for backups. 5.3 Commercial Options There are several options available for personal backups. However, you should never use personal backup services to store Kennesaw State University data. Doing so violates University policy and may violate several laws. Some of the more reputable services are below: Carbonite o Mozy o MobileMe o DropBox o 6. The Dangers of Wireless Networks Do not trust unencrypted connections. Be leery of free wifi as what you are doing could be seen by someone under the right circumstances. Also, free wifi hotspots might also be malicious in nature (i.e. they may monitor your actions or capture what you type.) Look for the lock either in your browser s address bar windows or at the bottom of the browser to indicate a secure connection. Always be mindful of who is behind you and who can see your screen in a public place. 7. Safe Browsing Tips When possible, use secure connections Use the security features within your browser Clear any private data stored in your browser regularly Avoid using sites that you do not personally trust Lock your workstation whenever you leave it o Windows Press the Windows Key and L 7.1 Clearing Private Data Internet Explorer Created: 3/16/2010 Page 10 of 10

11 1. Click Tools > Delete Browsing History 2. Click Delete all 3. Click Yes to confirm that you wish to delete all files from the cache. 4. Close and restart your browser Firefox 1. Click Tools > Clear Recent History Created: 3/16/2010 Page 11 of 11

12 2. In the drop down box, select Everything 3. Click Clear Now 4. Close and restart your browser Safari 1. Open Safari 2. In the Safari Menu, select Safari then select Reset Safari Created: 3/16/2010 Page 12 of 12

13 3. Ensure all of the check boxes are checked then click Reset 8. Peer 2 Peer Peer 2 Peer (P2P) technology presents a great way to share legal materials in a distributed fashion but this technology is easily abused for illegal purposes. Illegal copies of music, videos, software, etc can contain malware and violate the owners copy right protection. Malicious material may cause irreparable harm to your computer and data. Violating copy right law can result in result in fines and other legal action. Created: 3/16/2010 Page 13 of 13

14 9. Phishing and Scams Avoid clicking on links in s, instead type the address in manually Avoid opening unexpected attachments or attachments from unexpected senders Verify contact information for someone before trusting it If it sounds suspicious or to good to be true, then it probably is ITS will never ask for your password or other personal information via When in doubt about the validity of an or communication, contact the KSU Service Desk Resources UITS Website o Main Website: Faculty and Staff Service Desk o service@kennesaw.edu o Student Service Desk o studenthelpdesk@kennesaw.edu o Anonymously Report Computer Abuse o o abuse@kennesaw.edu Created: 3/16/2010 Page 14 of 14

Connecting to KSUGuest WiFi on Windows 10

Connecting to KSUGuest WiFi on Windows 10 University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Connecting to KSUGuest WiFi on Windows 10 The following guide walks you through connecting to the KSUGuest

More information

Registering an ipad for Duo Two-Factor Authentication

Registering an ipad for Duo Two-Factor Authentication University Information Technology Services Technology Outreach Registering an ipad for Duo Two-Factor Authentication Duo is a two-factor authentication solution for campus community members. Using Duo,

More information

Connecting to KSUGuest WiFi on Windows 8.1

Connecting to KSUGuest WiFi on Windows 8.1 University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Connecting to KSUGuest WiFi on Windows 8.1 The following guide walks you through connecting to the KSUGuest

More information

Registering an Android Tablet for Duo Two-Factor Authentication

Registering an Android Tablet for Duo Two-Factor Authentication University Information Technology Services Technology Outreach Registering an Android Tablet for Duo Two-Factor Authentication Duo is a two-factor authentication solution for campus community members.

More information

Registering an iphone for Duo Two-Factor Authentication

Registering an iphone for Duo Two-Factor Authentication University Information Technology Services Technology Outreach Registering an iphone for Duo Two-Factor Authentication Duo is a two-factor authentication solution for campus community members. Using Duo,

More information

NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007

NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007 NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007 Roger Safian, Senior Data Security Analyst, NUIT Agenda Introduction and brief bio Security statistics Protecting yourself

More information

SoftChalk Cloud and D2L Quick Guide This document was created with SoftChalk Create 10, available at

SoftChalk Cloud and D2L Quick Guide This document was created with SoftChalk Create 10, available at University Information Technology Services Learning Technologies, Training & Audiovisual Outreach SoftChalk Cloud and D2L Quick Guide This document was created with SoftChalk Create 10, available at https://uits.kennesaw.edu/downloads/

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Accessing DocuSign and Changing User Settings

Accessing DocuSign and Changing User Settings University Information Technology Services Technology Outreach Accessing DocuSign and Changing User Settings DocuSign allows you to create, distribute, and sign forms and documents online. The following

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley Keeping Your PC Safe Tips on Safe Computing from Doug Copley Don t be an Administrator Administrator is an account that can do ANYTHING on the PC Most computers start with 1 account with administrator

More information

Virtual Owl. Guide for Windows. Office of the Chief Information Officer. Learning Technologies, Training, Audiovisual, and Outreach

Virtual Owl. Guide for Windows. Office of the Chief Information Officer. Learning Technologies, Training, Audiovisual, and Outreach Virtual Owl Guide for Windows Office of the Chief Information Officer Learning Technologies, Training, Audiovisual, and Outreach Copyright 2018 Kennesaw State University Office of the Chief Information

More information

Adding Attachments in the Microsoft Outlook Web App

Adding  Attachments in the Microsoft Outlook Web App University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Adding Email Attachments in the Microsoft Outlook Web App Attaching OneDrive Files The following explains

More information

Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC

Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC University Information Technology Services Technology Outreach Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC The following describes how to set up and connect remotely to your office

More information

NUIT Tech Talk: Agenda

NUIT Tech Talk: Agenda NUIT Tech Talk: May 14, 2008 Leigh Underwood NUIT Senior Consultant Agenda Tips for Staying Secure Tips for Staying Connected Forwarding E-mail Special Instructions for Graduates Where to Go for Help Keep

More information

Connecting from Off Campus to Your Campus PC on MacOS. Preparing to Connect to Your Campus (Office) Windows 10 PC

Connecting from Off Campus to Your Campus PC on MacOS. Preparing to Connect to Your Campus (Office) Windows 10 PC University Information Technology Services Learning Technologies, Training, Audiovisual, and Outreach Connecting from Off Campus to Your Campus PC on MacOS The following demonstrates how to connect remotely

More information

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software

More information

How To Remove Software Manually Windows Xp Password Login

How To Remove Software Manually Windows Xp Password Login How To Remove Software Manually Windows Xp Password Login It burns a password key on a CD that can reset administrator and user passwords in Windows XP to 8.1, including most Server editions. It accepts

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

Manual Removal Norton Internet Security Won't Open Or

Manual Removal Norton Internet Security Won't Open Or Manual Removal Norton Internet Security Won't Open Or Dec 3, 2014. Finally during the reinstall - I had to delete a key to get a new key other wise I would I have it shown on the prgrams and features -

More information

Computing at MIT: Basics

Computing at MIT: Basics Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing

More information

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Topics: Antivirus / DSSO/ Email Computer Backups Security On The Go Mobile Safety Your first line of defense

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Connecting from Off Campus to Your Campus PC Using ios Devices

Connecting from Off Campus to Your Campus PC Using ios Devices University Information Technology Services Learning Technologies, Training, Audiovisual, and Outreach Connecting from Off Campus to Your Campus PC Using ios Devices Kennesaw State University VPN is the

More information

Creating Folder Shares in the Microsoft Outlook Web App

Creating Folder Shares in the Microsoft Outlook Web App University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Creating Folder Shares in the Microsoft Outlook Web App Sharing folders in Microsoft Outlook Web App requires

More information

Getting Started with Remotix for Remote Connection to a Mac Using Windows 10

Getting Started with Remotix for Remote Connection to a Mac Using Windows 10 University Information Technology Services Learning Technologies, Training, Audiovisual, and Outreach Getting Started with Remotix for Remote Connection to a Mac Using Windows 10 The following describes

More information

School of Computing & Information Systems

School of Computing & Information Systems Colours red School of Computing & Information Systems Windows Guide 2013 2 Windows Guide Contents Introduction... 3 Your Windows Account Further Assistance Apple imac Keyboard mapping... 4 Logging In &

More information

Xp Activation Message

Xp Activation Message How To Manually Remove Itunes Windows Xp Activation Message If an iphone, ipad, or ipod touch is not recognized in itunes on Windows, the Windows XP Completely uninstall AMDS, itunes, and all Apple software.

More information

NUIT Tech Talk: Get to Know Your Computer

NUIT Tech Talk: Get to Know Your Computer NUIT Tech Talk: Get to Know Your Computer January 16, 2007 Jay Bagley Assistant Manager, Distributed Support Services Agenda A Word About Security Staying Secure 7 Steps for New Computers Maximizing Performance

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Security Awareness Training June 2016

Security Awareness Training June 2016 Security Awareness Training June 2016 What is Information Security Awareness? The University of North Carolina at Chapel Hill protects its data network from thousands of daily intrusion attempts, but technical

More information

Download firefox with virus protection

Download firefox with virus protection P ford residence southampton, ny Download firefox with virus protection 3-11-2015 Protect your devices with the best free antivirus on the market. Download Avast antivirus and anti-spyware protection for

More information

Creating Calendar Shares in Microsoft Outlook 2016 for PC Sharing a Calendar

Creating Calendar Shares in Microsoft Outlook 2016 for PC Sharing a Calendar University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Creating Calendar Shares in Microsoft Outlook 2016 for PC Sharing a Calendar You can share your calendars

More information

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

KSI/KAI Cyber Security Policy / Procedures For Registered Reps KSI/KAI Cyber Security Policy / Procedures For Registered Reps Password Protection 1) All electronic devices used in any way for KSI/KAI business must be password protected. 2) Passwords, where applicable,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Firewall Antivirus For Windows Xp Full Version 2013

Firewall Antivirus For Windows Xp Full Version 2013 Firewall Antivirus For Windows Xp Full Version 2013 Advanced Firewall, Antivirus & Anti-spyware Engine, Advanced Real-Time Antivirus, Enhanced Browser Protection, Identity Protection, Anti-Keylogging,

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

Symantec Endpoint Protection Installation Guide

Symantec Endpoint Protection Installation Guide Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Desire2Learn. Student Guide. Information Technology Services. Outreach and Distance Learning Technologies

Desire2Learn. Student Guide. Information Technology Services. Outreach and Distance Learning Technologies Desire2Learn Student Guide Information Technology Services Outreach and Distance Learning Technologies Copyright 2013 - KSU Department of Information Technology Services This document may be downloaded,

More information

Perform Manual System Restore Xp Safe Mode Not Working

Perform Manual System Restore Xp Safe Mode Not Working Perform Manual System Restore Xp Safe Mode Not Working If you computer has system problem, you first priority should be to make sure you Windows Advanced Options Menu Please select an option: Safe Mode

More information

How to use a computer safely Tips and Tricks. Dr. Pierre Darmon

How to use a computer safely Tips and Tricks. Dr. Pierre Darmon How to use a computer safely Tips and Tricks Dr. Pierre Darmon 2 Agenda Routers Software firewall Wireless encryption Antivirus Backups Windows updates Application updates OS X updates Passwords User accounts

More information

I Want To Wipe My Computer Clean And Start Over Windows 7

I Want To Wipe My Computer Clean And Start Over Windows 7 I Want To Wipe My Computer Clean And Start Over Windows 7 How to delete everything on your laptop and start all over again You saved my life. How to wipe a laptop: Make sure your data is deleted before

More information

HallPass Instructions for Connecting to PC with an Android Device

HallPass Instructions for Connecting to PC with an Android Device University Information Technology Services Training, Outreach, Learning Technologies & Video Production HallPass Instructions for Connecting to PC with an Android Device This guides explains how to setup

More information

Securing the SMB Cloud Generation

Securing the SMB Cloud Generation Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product

More information

Manually Remove Of Xp Internet Security Protect

Manually Remove Of Xp Internet Security Protect Manually Remove Of Xp Internet Security Protect McAfee Family Protection McAfee Internet Security NOTE: To determine which McAfee Security software version you have installed, You must uninstall your McAfee

More information

PRACTICING SAFE COMPUTING AT HOME

PRACTICING SAFE COMPUTING AT HOME PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS

More information

How To Remove Xp Internet Security 2011 Virus Manually

How To Remove Xp Internet Security 2011 Virus Manually How To Remove Xp Internet Security 2011 Virus Manually Contact your anti-malware vendor for assistance with identifying or removing virus or worm infections. If you need more help with malware removal

More information

Get Max Internet Security where to buy software for students ]

Get Max Internet Security where to buy software for students ] Get Max Internet Security where to buy software for students ] Description: Features of Max Secure Internet Security 2013 Exciting, Easy to understand GUI Easy, Quick installation Get immediate protection

More information

SIGNiX: Digital Signature Service

SIGNiX: Digital Signature Service SIGNiX: Digital Signature Service First Time Set-up University Information Technology Services Training, Outreach, Learning Technologies, and Video Production Copyright 2014 KSU Department of University

More information

Citrix Access Firefox Browser

Citrix Access Firefox Browser Citrix Access Firefox Browser Windows or Mac Computers and Laptops Version 1.1 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment...

More information

Manually Remove Of Xp Internet Security Protect Virus Manually

Manually Remove Of Xp Internet Security Protect Virus Manually Manually Remove Of Xp Internet Security Protect Virus Manually We show you how to remove malware from a PC or laptop. You may also wish to read: Windows users: how to protect your PC from Check now: do

More information

SharePoint Guide for Reviewers

SharePoint Guide for Reviewers SharePoint Guide for Reviewers In this guide, you will find: I. What to do with the SharePoint link II. How to view the files and folders in SharePoint III. How to clear your browser s history and cache

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

COMPUTER HEALTH CHECKLIST

COMPUTER HEALTH CHECKLIST COMPUTER HEALTH CHECKLIST Disk Cleanup Clear Browser Data Google Chrome Mozilla Firefox Safari Install Antivirus Update Software Windows Mac Remove Unused Programs Windows Mac Install Essential Programs

More information

Student Tech Guide. Get Help from the Information and Technology Solutions Center! link.mnsu.edu/studenttech. Big ideas. Real-world thinking.

Student Tech Guide. Get Help from the Information and Technology Solutions Center! link.mnsu.edu/studenttech. Big ideas. Real-world thinking. Student Tech Guide Get Help from the Information and Technology Solutions Center! Find this Student Tech Guide online at link.mnsu.edu/studenttech Big ideas. Real-world thinking. Get Started Your StarID

More information

Presidential Transition Taskforce

Presidential Transition Taskforce Presidential Transition Taskforce Office 365 OneDrive for Business Sharepoint Online University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Introduction This

More information

Microsoft Office Word 2013

Microsoft Office Word 2013 Microsoft Office Word 2013 Reviewing your Document University Information Technology Services Training, Outreach, Learning Technologies and Video Production Copyright 2014 KSU Department of University

More information

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what

More information

Microsoft Office Word 2016 for Mac

Microsoft Office Word 2016 for Mac Microsoft Office Word 2016 for Mac Reviewing Your Document University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Copyright 2016 KSU Division of University Information

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Endpoint Protection...3 Dashboard...3 Alerts...4 Root Cause Analysis...9 Logs & Reports... 11 People... 24 Computers...33 Computer Groups...40

More information

Schematic Antivirus 2013 For Windows Xp Sp2 32

Schematic Antivirus 2013 For Windows Xp Sp2 32 Schematic Antivirus 2013 For Windows Xp Sp2 32 Bit Operating System:Windows XP/Vista/7/8 32-bit program. Can run on both a 32-bit and 64-bit OS. Version:15.6.30.1. File Size:5.37 MBs. Downloads:34,216,583.

More information

Windows Xp User Manual Full Version With Key For Pc

Windows Xp User Manual Full Version With Key For Pc Windows Xp User Manual Full Version With Key For Pc Have you finally decided to upgrade from Windows XP? When you move your mouse over the preview, you will see a temporary full size view of the window.

More information

STUDENT ICT ACCEPTABLE USE POLICY

STUDENT ICT ACCEPTABLE USE POLICY The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched

More information

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52 Contents Getting Started.....................................................1 Installing the Software...........................................1 Using the Maxtor System Tray Icon................................6

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

Blackboard Student Guide

Blackboard Student Guide Blackboard Student Guide Blackboard is an Internet application used by many instructors to put their courses online. Typically, your instructor will let you know on the first day of class if he or she

More information

D2L Brightspace. The Environment. University Information Technology Services. Learning Technologies, Training, & Audiovisual Outreach

D2L Brightspace. The Environment. University Information Technology Services. Learning Technologies, Training, & Audiovisual Outreach D2L Brightspace The Environment University Information Technology Services Learning Technologies, Training, & Audiovisual Outreach Copyright 2016 Kennesaw State University Department of University Information

More information

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How to find out if malware--a Trojan, virus, or worm got past your anti-virus and firewall, how to remove the malicious code manually.

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

How To Remove Virus Without Antivirus In >>>CLICK HERE<<<

How To Remove Virus Without Antivirus In >>>CLICK HERE<<< How To Remove Virus Without Antivirus In Windows 7 Pdf Remove virus without antivirus, Here I have all necessary things and also I have steps to Few Effective Steps To Remove Virus Without Antivirus In

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Staying Safe on the Internet. Mark Schulman

Staying Safe on the Internet. Mark Schulman Staying Safe on the Internet Mark Schulman 1 Your Presenter Mark Schulman IT professional for almost 40 years No affiliation with any product 2 What We ll Talk About Passwords Email Safety Staying Safe

More information

Developing Podcasts with the PC - Level 1

Developing Podcasts with the PC - Level 1 Developing Podcasts with the PC - Level 1 Getting Started with Podcasting Copyright 2010 Informa on Technology Services Kennesaw State University This document may be downloaded, printed, or copied, for

More information

Cyber Security Basics. Presented by Darrel Karbginsky

Cyber Security Basics. Presented by Darrel Karbginsky Cyber Security Basics Presented by Darrel Karbginsky What s to come In the following slides I am going to discuss amongst other things and in no particular order things to enlighten, frighten, educate,

More information

Using Word 2011 at Kennesaw State University

Using Word 2011 at Kennesaw State University Using Word 2011 at Kennesaw State University Mail Merge Information Technology Services Outreach and Distance Learning Technologies Copyright 2012 - Information Technology Services Kennesaw State University

More information

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva IT resources for McGill students IT User accounts First time login to Minerva McGill ID - 260123456 ( a 9 digit number) Minerva PIN - (yymmdd) Will be prompted to change the initial Minerva PIN 1 IT User

More information

Unable To Uninstall Avira Antivirus Error Code 7

Unable To Uninstall Avira Antivirus Error Code 7 Unable To Uninstall Avira Antivirus Error Code 7 20:15:35 (UPD) (ERROR) Failed to get update bridge data: WinHTTP: Failed to send Since I have Avira Antivirus Pro (paid for product) I contacted Avira email

More information

NUIT Tech Talk: Spring Cleaning Remembering the Technology?

NUIT Tech Talk: Spring Cleaning Remembering the Technology? NUIT Tech Talk: Spring Cleaning Remembering the Technology? April 23, 2008 Alex Escalona Distributed Support Specialist Distributed Support Services Northwestern University Information Technology Spring

More information

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by: Welcome Password Management & Public Wi-Fi Security Hosted by: Content by: Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome Foster & Motley Clients to Security Education

More information

How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode

How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode The System Restore function on Windows 7 allows you to roll backhome,» Categories,» Computers and Electronics,» Operating Systems Select

More information

Student Guide to Blackboard

Student Guide to Blackboard Student Guide to Blackboard Blackboard is an Internet application used by many instructors to put their courses online. Typically, your instructor will let you know on the first day of class if he or she

More information

Norton Internet Security 2008 Manual Uninstall Tools

Norton Internet Security 2008 Manual Uninstall Tools Norton Internet Security 2008 Manual Uninstall Tools To download, save and run the Norton Removal tool for versions 2003 to 2010, click Follow the on-screen instructions to uninstall Norton Internet Security.

More information

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies

More information

Desire2Learn. Student Guide for Mobile Devices. Information Technology Services. Outreach and Distance Learning Technologies

Desire2Learn. Student Guide for Mobile Devices. Information Technology Services. Outreach and Distance Learning Technologies Desire2Learn Student Guide for Mobile Devices Information Technology Services Outreach and Distance Learning Technologies Copyright 2013 Kennesaw State University Department of Information Technology Services

More information

Backing up Your ipad

Backing up Your ipad Backing up Your ipad August 2017 1 Table of Contents Introduction... 2 Backing up using icloud... 3 Accessing iwork files in icloud... Backing up using a computer... 10 Introduction This document has been

More information

Transferring Files from Panopto to MediaSpace

Transferring Files from Panopto to MediaSpace University Information Technology Services Learning Technologies, Training, Audiovisual, and Outreach Transferring Files from Panopto to MediaSpace After April 15, 2018, Panopto will be inaccessible to

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Avira Ultimate Protection Suite. Short guide

Avira Ultimate Protection Suite. Short guide Avira Ultimate Protection Suite Short guide 01 Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

How to reset Internet Explorer

How to reset Internet Explorer 1 of 5 24.09.2015 08:53 Search for support Manage my account Ask the community Contact Answer Desk Find downloads Email Print You can reset Internet Explorer settings to return them to the state they were

More information

Guide to using Simply Web

Guide to using Simply Web Guide to using Simply Web Simply Web offers high performance access to Northumbria IT facilities from a wide range of devices which have a connection to the Internet including smartphones, tablets and

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Instructions for using Citrix to access applications for students in the Department of Mathematics and Statistics.

Instructions for using Citrix to access applications for students in the Department of Mathematics and Statistics. Instructions for using Citrix to access applications for students in the Department of Mathematics and Statistics. What is Citrix? Citrix is a product that provides remote access to applications. Important

More information

Creating a Website with Publisher 2016

Creating a Website with Publisher 2016 Creating a Website with Publisher 2016 Getting Started University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Copyright 2017 KSU Division of University Information

More information

Computing Resources. at the University of Pittsburgh Tuesday, June 27, 2017

Computing Resources. at the University of Pittsburgh Tuesday, June 27, 2017 Computing Resources at the University of Pittsburgh Tuesday, June 27, 2017 Who We Are Computing Services & Systems Development (CSSD) provides computing resources at the University for students, faculty,

More information