COMPUTING FUNDAMENTALS I
|
|
- Kerry Conley
- 5 years ago
- Views:
Transcription
1 FALL 2017 / COMPUTER SCIENCE 105 COMPUTING FUNDAMENTALS I DAY 2 27 SEPTEMBER 2017
2 COURSE ADMIN
3 COURSE ADMIN NOTECARDS - ATTENDANCE & FEEDBACK Name Student ID One of: What did you learn or find most interesting? What are you confused about, or what wasn t clear? Any other course feedback.
4 COURSE WEBSITE CS.PDX.EDU/~HARMON8/CS105.HTML
5
6 DAY 2: DO YOU KNOW HOW TO Access the reading for Monday that s through the PSU library? (Sorry about the PDF. I will move the schedule over to HTML as soon as I can!) Log into Slack to ask questions? Turn in your reading response on D2L? We will talk about the first homework on MONDAY in class. It s going to be some spreadsheet stuff. If you have ideas for a dataset you care about, let me know by FRIDAY AT 5pm. Default: I will grab some Census data? Bring a laptop and/or ME BY FRIDAY AT 4pm if I need to bring a laptop for you.
7 QUESTIONS?
8 DAY 2: TODAY: PERSONAL SECURITY BEST PRACTICES Computer basics & terminology! Then some applications Password management with KeePass 2-factor authentication: PSU, Dropbox, Google Keeping your computer up to date Backing up data - time machine, windows backup, dropbox and google drive Slack + Can you access the reading for Monday? + Can you see the course on D2L and where to turn in reading response?
9
10 COMPUTER TERMINOLOGY WHAT S A COMPUTER MADE OF AND WHY DO LAPTOPS FROM JUST A FEW YEARS AGO SEEM SO SLUGGISH?
11 HARDWARE the physical stuff AND SOFTWARE the instructions for what to do
12 COMPUTER TERMINOLOGY SOFTWARE LEVEL 1: APPS OR APPLICATIONS
13 COMPUTER TERMINOLOGY SOFTWARE INSTRUCTIONS LEVEL 1: APPS OR APPLICATIONS
14 COMPUTER TERMINOLOGY SOFTWARE INSTRUCTIONS Mac OS Windows *nix Chrome OS LEVEL 2: OPERATING SYSTEM OS Android ios INFRASTRUCTURE & TRANSLATOR
15 SOFTWARE APPS RUN ON THE OPERATING SYSTEM THAT RUNS ON THE HARDWARE
16 COMPUTER TERMINOLOGY PROCESSOR OR CPU CENTRAL PROCESSING UNIT
17 COMPUTER TERMINOLOGY PROCESSOR OR CPU WHAT INTEL MAKES CENTRAL PROCESSING UNIT
18 COMPUTER TERMINOLOGY OTHER MICROPROCESSORS LIKE A GPU GRAPHICS PROCESSING UNIT
19 COMPUTER TERMINOLOGY MEMORY (OR, RAM) VOLATILE RANDOM ACCESS MEMORY
20 COMPUTER TERMINOLOGY MEMORY (OR, RAM) VOLATILE RANDOM ACCESS MEMORY
21 COMPUTER TERMINOLOGY HARD DISK DRIVE FIXED NON-VOLATILE (ALSO A KIND OF MEMORY)
22 COMPUTER TERMINOLOGY HARD DISK DRIVE (ALSO A KIND OF MEMORY)
23 COMPUTER TERMINOLOGY TODAY PERMANENT MEMORY IS OFTEN STORED ON AN SSD (SOLID STATE DRIVE) FASTER, RESILIENT, BUT EXPENSIVE
24 COMPUTER TERMINOLOGY OSS DESIGNED FOR NEW SSDS ARE TERRIBLE IF YOU HAVE AN OLD HDD A LOT MORE I/O
25
26 THE END
27 QUESTIONS?
28 INTERMISSION
29 THE WORKSHOP PART OF CLASS PERSONAL SECURITY BEST PRACTICES
30 1. KEEP YOUR COMPUTER UP TO DATE
31
32 The British hospitals hit by this latest attack, which weaponised a flaw in Microsoft s Windows operating system revealed in February, are hopelessly outgunned. They re running Windows XP, an operating system first released in September 2001, and which Microsoft itself gave up supporting in 2014; it has been kept on life support by extra payments to the company, but the Department of Health stopped making those in
33 PERSONAL SECURITY BEST PRACTICES UPDATING IS IMPORTANT Don t try to live like an underfunded government bureaucracy On both Mac and Windows machines, it s really straightforward to set up automatic updating. It should be enabled by default. Don t turn it off! Don t delay those updates for months on end!
34 PERSONAL SECURITY BEST PRACTICES WHY DON T PEOPLE UPDATE? Bad experiences with losing data A better alternative to not updating? Keeping your data backed up!
35 2. BACK UP YOUR DATA!
36 BACKING UP YOUR DATA BACKING UP YOUR DATA - EXTERNAL DRIVE Windows File History Mac Time Machine These require an EXTERNAL hard drive, usually this connects via some USB variant (e.g., USB or USB-C) which depends on your computer A good choice if you are willing to plug in an external drive from time to time and keep it somewhere safe!
37 BACKING UP YOUR DATA BACKING UP YOUR DATA - THE CLOUD Dropbox, Google Drive, icloud, OneDrive Security focused services like SpiderOak Business-focused like Box Your files are backed up to servers (computers) that Dropbox, Google, Apple, Microsoft, Box, SpiderOak operate Many of which may actually be operated by Amazon! A good choice if you also want to sync across multiple devices (e.g. your phone) or access your files remotely (e.g. from a lab computer) and feel comfortable putting your files on a remote server. Dropbox is the most user-friendly for sharing files with others and for multi-platform setups (e.g. windows computer + iphone), but they have also had some bad data breaches in the past. YMMV. SpiderOak has good security and reliability, but is more expensive and probably your friends aren t using it
38 3. GOOD PASSWORDS & A PASSWORD MANAGER
39 PASSW0RD! P4SSWORD#
40 PASSW0RD! P4SSWORD#
41 MAKING UP ONE REALLY GOOD PASSWORD AND USING IT FOR EVERYTHING
42 MAKING UP ONE REALLY GOOD PASSWORD AND USING IT FOR EVERYTHING
43 BETTER OPTION 1: PASSPHRASES
44
45 BETTER OPTION 2: PASSWORD MANAGER
46 DAY 2: PASSWORD MANAGERS ARE GREAT BECAUSE: Generates passwords for you that are arbitrarily long random strings meeting all the requirements of a particular site Stores all those passwords so you don t have to remember them Also great for those easy-to-guess security questions like what s your favorite color usually these can be any random string! use random strings!
47 KEEPASS KEEPASSXC keepass.info keepassxc.org
48 KEEPASS/KEEPASSXC + free + open source + regularly updated + available for many platforms + data file is encrypted and can be safely stored anywhere (i.e. dropbox) - manual syncing - not as user friendly as some others
49 ONEPASSWORD
50 1PASSWORD + super easy to set up + good reputation + seemingly good security + lots of apps for different devices - costs money - closed source
51 DAY 2: WHY WOULD YOU WANT SECURITY APPLICATIONS TO BE OPEN SOURCE? Doesn t that mean people can hack them easier?
52 DAY 2: WHY WOULD YOU WANT SECURITY APPLICATIONS TO BE OPEN SOURCE? Doesn t that mean people can hack them easier? NOPE! NOT REALLY!
53 DAY 2: KERCKHOFFS'S PRINCIPLE "A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. (a 19th c. military espionage theory)
54 DAY 2: OTHERS? Lastpass seems popular, but was hacked in 2016 Enpass expensive to use on mobile, but if you have a chromebook, maybe your best option? icloud keychain if you re all apple/mac products, this probably works. Safari has built in suggested passwords now when you re using the web that are pretty good. Wired ideas: Lifehacker ideas:
55 IF YOU USE A PASSWORD MANAGER, ITS SECURITY IS ONLY AS GOOD AS YOUR MASTER PASSWORD!!! AND THAT ONE YOU HAVE TO REMEMBER!
56 4. TWO FACTOR AUTHENTICATION (2FA) A/K/A TWO STEP VERIFICATION
57 DAY 2: FACTOR AUTHENTICATION FROM 2008
58 DAY 2: FACTOR AUTHENTICATION TO TODAY! Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it s becoming much more common across the web. With often just a few clicks in a given account s settings, 2FA adds an extra layer of security to your online accounts on top of your password.
59 DAY 2: SO.. WHAT IS IT?
60 DAY 2: FACTORS FOR AUTHENTICATION knowledge factors something you know, like a password possession factors a physical thing you have to have, like a key inherence or biometric factors something inherent to you, like a fingerprint
61 DAY 2: TWO FACTOR AUTHENTICATION USES TWO DIFFERENT THINGS + PIN NUMBER possession knowledge
62 DAY 2: TWO FACTOR AUTHENTICATION USES TWO DIFFERENT THINGS GENERATED TOKEN / + DETECTED PRESENCE PASSWORD possession knowledge
63 DAY 2: ESPECIALLY GOOD WHEN: You use public computers and your password might get accidentally saved to a browser or stolen by malicious software
64 DAY 2: ESPECIALLY GOOD FOR: Important stuff. Like, your password. If someone got access to your password, they could reset all your other passwords!
65 DAY 2: WILL THIS PROTECT YOU FROM THINGS LIKE THE EQUIFAX BREACH? No, and there s nothing you can do about that one. It was the result of very poor security on Equifax s part. BUT! Setting up 2FA does help with some things: Protects *other* accounts so information gained in one breach can t be as easily used against you to gain access to something else Can possibly help protect you against lazy password security by other companies
66 DAY 2: DANGERS! You lose your access to the extra factor (i.e. your phone is lost, stolen, or broken). Some services give you a list of single-use codes or backup contact options. A good thing to store in a password manager!
67 DAY 2: SET IT UP AT PORTLAND STATE Uses an system called Duo - your second step can be a phone call, a smartphone app, or an SMS SMS is not the most secure, but probably still better than nothing You are no longer forced to change your password every x days. No obvious backup codes that I can figure out. Don t lose your phone!
68 DAY 2: SET IT UP ON OTHER SYSTEMS - GMAIL, DROPBOX, ETC.
BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL
BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL CLASS OBJECTIVES Learn how to store your computer s content safely in case of catastrophic failure. Explore back up options for both Microsoft and Apple
More informationKeeping Important Data Safe and Secure Online. Norm Kaufman
Keeping Important Data Safe and Secure Online Norm Kaufman Examples of Important Data Passwords and Secret Answers Personal Documents (Licenses, Passports, Insurance Cards, Credit Cards) Social Security
More informationPassword & Tutorials Packet
& Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings
More informationPersonal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018
Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About
More informationPassword & Tutorials Packet
& Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationPassword Storage. By Steve Maynard 10 July, 2018
Password Storage By Steve Maynard 10 July, 2018 Steve s narrative: I m going to describe a few apps available for password storage. Mostly I ll talk about one particular app that wasn t intended for saving
More informationDATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE
DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically
More informationMalling U3A Computer Group. Cloud Storage. Chris Daly 3 rd April 2017
Malling U3A Computer Group Chris Daly 3 rd April 2017 Storage not memory In digital devices data has to be retained to make it work (i.e. operating system) You also want to keep any saved information (documents,
More informationUnlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.
Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded
More informationIPHONE/IPAD PHOTO MANAGEMENT
IPHONE/IPAD PHOTO MANAGEMENT Organization of Photos on iphone or ipad What Photo Management Means Storage of Photo on iphone or ipad Moving Photo between devices (iphone >> Desktop) Syncing Photos between
More informationHow Do I Sync My Iphone To Another Computer Without Losing Everything
How Do I Sync My Iphone To Another Computer Without Losing Everything to transfer content from your current iphone, ipad, or ipod touch to another device. You should connect the device to itunes to sync
More informationChromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast.
chromebook meet chromebook What is a chromebook? Chromebooks are... A new type of computer that is fast, simple and secure. Built for the web best of Google and access to thousands of online web apps.
More informationDuo Travel Guide. duo.com
Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access
More informationTake Control of Your Passwords
Take Control of Your Passwords Joe Kissell Publisher, Take Control Books @joekissell takecontrolbooks.com The Password Problem Passwords are annoying! It s tempting to take the easy way out. There is an
More informationBackUp Strategies. ApplePickers April 12, 2017
BackUp Strategies ApplePickers April 12, 2017 Why Backup? HDDs fail. It s not a matter of if; it is a matter of when Disk errors Possibility of theft, vandalism, or fire Stupid mistakes in deleting files
More informationOnline Services. Sept 2017
Online Services Sept 2017 Why I use these services? Syncing between various devices is easy Sync between Desktop, Laptop and ipad Sharing files Better than sending attachments Online backup Keep additional
More information1Password for Mac. by Marcia Bolsinga for AshMUG 1/12/2019
Why do we need passwords? First of all - why passwords? Passwords are one of the Primary Pain Points in our modern digital existence. Despite all the advances of our modern technology, we haven t managed
More informationMulti-Factor Authentication (MFA)
10.10.18 1 Multi-Factor Authentication (MFA) What is it? Why should I use it? CYBERSECURITY Tech Fair 2018 10.10.18 2 Recent Password Hacks PlayStation Network (2011) 77 Million accounts hacked Adobe (2013)
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More informationInstructions I Lost My Iphone 4 Password Yahoo
Instructions I Lost My Iphone 4 Password Yahoo Linux software Android Apps Blackberry Apps iphone Apps Windows Phone Apps Report Niash- Mar 4, 2014 02:48PM I have faced a problem. i forgot my yahoo id
More informationicloud History & Services Dr. Leon Chapman
icloud History & Services Dr. Leon Chapman 1 icloud History & Services Apple ID & Accounts Overview Online Backup Services Cloud Storage & File Sharing 2 Off-Site Backup? icloud What is it? File storage?
More informationPassword & Tutorials Packet
& Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: iphone users that use a Windows
More informationUsing the Cloud Howard Verne 7/10/2013
Using the Cloud Howard Verne 7/10/2013 Simple Backup e.g. Carbonite Only Data Pictures Music Etc No Programs No Windows 1 HV1 Most Cloud Storage Only Data Pictures Music Etc No Programs No Windows Browser
More informationStoring your Data in the Cloud
Storing your Data in the Cloud Why store your data in the cloud Since the beginning of the internet, technology has been steadily moving away from local storage to remote, server-based storage and processing
More informationManual Update Of Ios 7 For Iphone 4s Release
Manual Update Of Ios 7 For Iphone 4s Release Date When Apple released ios 8.1.1, they promised that the update would fix some the test against the iphone 4S and ipad 2, comparing it to ios 7, and ios 7.1.2.
More informationUpgrading Your Home Network Security
Upgrading Your Home Network Security For Free! Dr. Glen Sagers Illinois State University Outline Passwords & Passphrases Two-factor authentication Updates Viruses and Malware WiFi security Internet of
More informationGoogle Apps Iphone Exchange Cannot Get Mail >>>CLICK HERE<<<
Google Apps Iphone Exchange Cannot Get Mail Doing gmail push using the Exchange and it wont populate my Mail at all. jediuia It is driving me nuts I can't get my work email account on my shiny new iphone
More informationPassword Management. Eugene Davis UAH Information Security Club January 10, 2013
Password Management Eugene Davis UAH Information Security Club January 10, 2013 Password Basics Passwords perform service across a broad range of applications Can act as a way to authenticate a user to
More informationStoring Data and Pictures in the Cloud for Free
Storing Data and Pictures in the Cloud for Free By Phil Goff Branch 116 November 15, 2012 1 Cloud Storage is the Future 2 Storing Data and Pictures in the Cloud for Free Not Intended as Primary Backup
More informationINTRODUCTION TO CLOUD STORAGE
INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What You Will Learn WHAT IS THE CLOUD? PAGE 03 Basic Vocabulary Advantages of the Cloud Disadvantages of the Cloud CLOUD STORAGE SERVICES
More informationMulti-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
More informationTop 6 Mac user mistakes
E-book Top 6 Mac user mistakes! applecoursesonline.com Bad habits can damage your Mac, make it messy and definitely give it a shorter lifespan. Make sure you stop doing this! Print this e-book and have
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationHPE 3PAR Storage - Hewlett Packard Enterprise
Page 1 of 10 HPE 3PAR Storage - Hewlett Packard Enterprise Password Managers Compared: LastPass vs KeePass vs Dashlane vs 1Password by Jason Fitzpatrick on November 2nd, 2016 There are dozens of password
More informationGuide to Getting Started. Personal Online Banking & Bill Pay
Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are
More informationThe Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication
White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...
More informationCybersecurity in 2016 and Lessons learned
Cybersecurity in 2016 and Lessons learned Dr. Yu Cai Associate Professor Program Chair, Computer Network & System Administration School of Technology Michigan Technological University cai@mtu.edu A Quick
More informationThe Cloud is Here Don t Get Left Behind. SuperCom Computer Club February 8, 2019
The Cloud is Here Don t Get Left Behind SuperCom Computer Club February 8, 2019 What is the Cloud? Cloud Confusion Have you heard people using terms like the cloud, cloud computing, or cloud storage. And,
More informationManual Sync Contacts On My Iphone To Gmail Account Without Itunes
Manual Sync Contacts On My Iphone To Gmail Account Without Itunes You can keep contacts from your Google account up to date on your ios device. Apple Store Mac iphone Watch ipad ipod itunes Support not
More informationAccessing CharityMaster data from another location
Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto
More informationXP: Backup Your Important Files for Safety
XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to
More informationHow Do I Delete Files From My Startup Disk Macbook Pro
How Do I Delete Files From My Startup Disk Macbook Pro If your Apple/Mac computer is displaying the error message that the hard You need to make. The one place I least like to see a beach ball is on my
More informationicloud - Apple s suite of
icloud - Apple s suite of Internet services Please sign in and add your email address only if it has changed or if you have not been getting my email blasts. And please silence your cell phone!! 1 The
More informationTutor Lead Session Image Storage and the Cloud.
Tutor Lead Session Image Storage and the Cloud. Storage There are many different types of storage when it comes to backing up your photos and keeping them safe. This guide will explain a few of the different
More informationHave a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.
This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. The Learning Objectives summarize the knowledge that learners should have gained by the time they
More informationCase study on PhoneGap / Apache Cordova
Chapter 1 Case study on PhoneGap / Apache Cordova 1.1 Introduction to PhoneGap / Apache Cordova PhoneGap is a free and open source framework that allows you to create mobile applications in a cross platform
More informationMobile Device Support. Jeff Dove February
Mobile Device Support Jeff Dove February 18 2017 Apple is a vertical company. Apple and IOS Control of type and design of hardware components Control over phone operating system and updates Control over
More informationSynchronizing Your PC
Synchronizing Your PC A Guide to -- 2018 APCUG Spring VTC AN INTERNATIONAL ASSOCIATION OF TECHNOLOGY AND COMPUTER USER GROUPS Introduction There are numerous ways to sync desktops, laptops, tablets and
More informationHaving said this, there are some workarounds you can use to integrate video into your course.
HOW TO SESSION : Options for creating & sharing video Overview Video is everywhere. We watch it on YouTube and Netflix. It s how we get our news, communicate with friends and family in other cities, and
More informationFormatting, Organising and Storing Data
Formatting, Organising and Storing Data Scott Summers UK Data Service University of Essex Cancer Research UK Data Sharing and Management 24 th May 2017 Overview Looking after research data for the longer-term
More informationDeprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018
Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy
More informationPassword Managers. Victor (Vic) Daniel. Handout Page 1/38
Victor (Vic) Daniel Handout Page 1/38 Authorization vs Authentication Authorization refers to rules that determine who is allowed to do what. Authentication is the process of determining that somebody
More informationDigital Workflow 10 Tech Rules to Guide You
Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy
More informationUser Guide: Adding a Device in Duo and Managing Settings
User Guide: Adding a Device in Duo and Managing Settings The Duo Mobile application provides an extra layer of security when it is incorporated into the login process for applications or web sites such
More informationA Guide to Finding the Best WordPress Backup Plugin: 10 Must-Have Features
A Guide to Finding the Best WordPress Backup Plugin: 10 Must-Have Features \ H ow do you know if you re choosing the best WordPress backup plugin when it seems that all the plugins seem to do the same
More informationHow to Backup Your Computer. Adele Berenstein Jan 17, 2018
How to Backup Your Computer Adele Berenstein Jan 17, 2018 Agenda Why Backup? What is a Backup? Location of your Backup Your Backup Strategy What Files to Backup? Structure of your Backup External Hard
More informationCloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.
Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and
More informationIt s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.
It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated, though it does take effort and discipline. Many people simply need
More informationHow NOT To Get Hacked
How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?
More informationimail Frequently Asked Questions (FAQs) 20 June 2014 Version 2.1
imail Frequently Asked Questions (FAQs) 20 June 2014 Version 2.1 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 1 1. How to access to Sunway imail account?... 1 2. I can t login to my
More informationRelated Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)
PRESENTED BY: Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) One of the main problems that customers face with the adoption of SaaS and cloud-based apps is how to deliver the
More informationProtecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series
Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer
More informationDOWNLOAD PDF BACK UP YOUR SELL
Chapter 1 : Productivity apps for ebay users If you back up your iphone, ipad, or ipod touch, you'll have a copy of your information to use in case your device is ever replaced, lost, or damaged. Choose
More informationLecture 14 Passwords and Authentication
Lecture 14 Passwords and Authentication Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422 Major Portions Courtesy Ryan Cunningham AUTHENTICATION Authentication
More informationFile systems, databases, cloud storage
File systems, databases, cloud storage file: a sequence of bytes stored on a computer content is arbitrary (just bytes); any structure is imposed by the creator of the file, not by the operating system
More informationEnterprise Mobile Management (EMM) Policies
Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software
More informationIMB Apple Pay - Frequently Asked Questions
About Apple Pay What is Apple Pay? Apple Pay offers an easy, secure, and private way to pay on iphone, ipad, Apple Watch, and Mac. It enables you to link your IMB Visa Debit card to a eligible Apple Device
More informationInstructions I Lost My Iphone Contacts While Sync >>>CLICK HERE<<<
Instructions I Lost My Iphone Contacts While Sync During the initial sync, the contents of matching Gmail & iphone contacts will be combined with each Syncs groups in both directions including My Contacts
More informationMicrosoft Office 365 (O365) and Office 2016 ProPlus Download FAQs For Students
Microsoft Office 365 (O365) and Office 2016 ProPlus Download FAQs For Students Why is Colorado Technical University offering MS Office 365? Colorado Technical University is offering students a free subscription
More informationSix steps to control the uncontrollable
Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today
More informationFrequently Asked Questions
Frequently Asked Questions Contents Getting Started 3 Backup & Sync 7 Using NeatCloud on the Web 9 Using NeatMobile 9 Using NeatVerify 10 Adding files to my NeatCloud 10 Searching my NeatCloud files and
More informationPhotos, Photos. What to do with All Those Photos? Presented by Phil Goff Area 16 Computers and Technology August 17, 2017
Photos, Photos. What to do with All Those Photos? Presented by Phil Goff Area 16 Computers and Technology August 17, 2017 1 Photos Have a Different Value Today With film cameras, pictures were taken and
More informationWelcome to Windows 10. Love it or Avoid it
1 Welcome to Windows 10 Love it or Avoid it 2 What is an OPERATING SYSTEM??? 1) It s a set of programs that control the computer and make the components work together 2) It provides a interface between
More informationWeb browsers - Firefox
N E W S L E T T E R IT Computer Technical Support Newsletter Web browsers - Firefox February 09, 2015 Vol.1, No.16 A Web Browser is a program that enables the user to view web pages. TABLE OF CONTENTS
More informationHow To Install Flash Firefox Android Tablet Os On Hp
How To Install Flash Firefox Android Tablet Os On Hp Adobe may have cut support for Flash in Android Jelly Bean and beyond, but it's not don't officially support Flash, it's really easy to add Flash support
More informationHardware Recommendations by
Hardware Recommendations by Forrestt Williams Tech Support Office IT Website Graphic Design Jeremiah Farmer support@landfx.com CEO Developer Support Head Honcho Outline 1. Land F/X Technology Quick Explainer
More informationBootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly.
Page 1 Backing up Mac How to develop a solid backup strategy, what your hardware and software choices are, how to set everything up, what pitfalls you may encounter, and how to restore your data if disaster
More informationMAC BASICS. 125 S. Prospect Avenue, Elmhurst, IL (630) elmhurstpubliclibrary.org. Start Using Computers, Tablets, and Internet
MAC BASICS WHAT IS MAC? Introduction What We ll Cover While many users are only familiar with Windows computers, working on a Mac is both extremely user friendly and offers a variety of included creative
More information2 User Guide. Contents
E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an
More informationWindows 10 Hardware and Software
Windows 10 Hardware and Software Presented by: G. ALLEN SONNTAG, RDR, CRR, FAPR Tucson, Arizona First a Little Philosophy One of my favorite isms: Do or Do Not. There is no Try Yoda. I m going to try to
More informationGmail With Itunes Windows 7
How To Sync Apple Iphone Contacts To Gmail With Itunes Windows 7 Oct 9, 2014. It is a real professional tool to help you to move contacts from iphone to PC. you have an Gmail account, then it's also very
More informationIos 7 Manual Restore From Icloud Slow >>>CLICK HERE<<<
Ios 7 Manual Restore From Icloud Slow Learn how to stop an icloud Restore that is stuck in progress in less than a minute. the content, maybe up to a day on a slow connection and an almost full iphone,
More informationDER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet?
DER GOBBLE Good Secure Crypto Wallet Practices When it comes to crypto currencies and securing your money, the absolute best 99% guaranteed security for your wallets is YOU. You are the one that will expose
More informationHow To Access Iphone Backup Without Itunes Windows 7 Using
How To Access Iphone Backup Without Itunes Windows 7 Using You can copy and save the data on your iphone, ipad, or ipod touch by backing up Read more about making backups of your device using itunes and
More informationOnline Services USER GUIDE. First Time Log In
Online Services USER GUIDE Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. First Time Log In Log In: BankMidwest.com
More informationTechnology Checklist for End of the School Year. To prepare your classroom technology for summer, please confirm that the following are done:
Technology Checklist for End of the School Year Classroom Technology To prepare your classroom technology for summer, please confirm that the following are done: Projector should be powered off, lens cap
More informationWhat Does Manually Manage Music And Videos Mean On Iphone
What Does Manually Manage Music And Videos Mean On Iphone A computer (Windows or Mac), An iphone, ipad, or ipod, The USB cable that came Check the Manually manage music and videos box under "Options" (in.
More informationSeven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru
Seven secrets to making the most of your computer system Chris Jeffery Proprietor/Chief Guru CyberGuru 1. Backups If your computer died tomorrow how would your business cope? The cost of data recovery
More information5 Online Security Tips
5 Online Security Tips Any business with Internet-based systems should be taking the appropriate steps to ensure that their activities and information are secure from the ever-expanding number of online
More informationHeuristic Evaluation of Mango
Heuristic Evaluation of Mango 1. Problem Mango is an application that makes it easier to plan group travel and collaborate on group itineraries by providing an interface to invite friends to a group trip,
More informationHow to Secure SSH with Google Two-Factor Authentication
How to Secure SSH with Google Two-Factor Authentication WELL, SINCE IT IS QUITE COMPLEX TO SET UP, WE VE DECIDED TO DEDICATE A WHOLE BLOG TO THAT PARTICULAR STEP! A few weeks ago we took a look at how
More informationImproving Password Management. Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL
Improving Password Management Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL Password Management How many passwords do you have? Are they all
More informationSync Manually Greyed Out Ipad Itunes Wifi >>>CLICK HERE<<<
Sync Manually Greyed Out Ipad Itunes Wifi This should resolve syncing problems with both wi-fi syncing and USB cable syncing. wi-fi syncing enabled, sometimes just simply plugging the iphone or ipad into
More informationFollow these steps to redeem and use your itunes Gift Card or content code. Menu, Apple Apple Store Mac iphone Watch ipad ipod itunes Support.
Instructions How To Use Itunes Gift Card On Iphone Yahoo Remember, first, to back that data up via itunes or icloud pre-transfer. Below, a complete guide to prepping your iphone 6 or 6 Plus, for both first-time
More informationIntroduction to the Internet. Part 1. What is the Internet?
Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected
More informationAny conversation about virtualization for small- and medium-sized businesses (SMBs) usually starts around
E-NEWS www.e-safetech.om 1-412-944-2402 2018 E-Safe Technologies All rights reserved. September 2018 In this issue Choose from 5 Virtualization Options 5 Cyber Security Measures Barracuda and E-Safe Top
More informationDOWNLOAD PDF REDIRECT FOR WINDOWS 7
Chapter 1 : Deploy Folder Redirection with Offline Files Microsoft Docs From your description, it sounds as if you cannot access the redirection path in Windows Explorer, is that correct? before folder
More informationTechnology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University
Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better
More informationGetting Started with Duo Security Two-Factor Authentication (2FA)
Getting Started with Duo Security Two-Factor Authentication (2FA) Table of Contents What is Two-Factor Authentication (2FA)?... 1 Why 2FA at Bates College?... 2 2FA Technologies... 3 Duo Protected Resources
More information