COMPUTING FUNDAMENTALS I

Size: px
Start display at page:

Download "COMPUTING FUNDAMENTALS I"

Transcription

1 FALL 2017 / COMPUTER SCIENCE 105 COMPUTING FUNDAMENTALS I DAY 2 27 SEPTEMBER 2017

2 COURSE ADMIN

3 COURSE ADMIN NOTECARDS - ATTENDANCE & FEEDBACK Name Student ID One of: What did you learn or find most interesting? What are you confused about, or what wasn t clear? Any other course feedback.

4 COURSE WEBSITE CS.PDX.EDU/~HARMON8/CS105.HTML

5

6 DAY 2: DO YOU KNOW HOW TO Access the reading for Monday that s through the PSU library? (Sorry about the PDF. I will move the schedule over to HTML as soon as I can!) Log into Slack to ask questions? Turn in your reading response on D2L? We will talk about the first homework on MONDAY in class. It s going to be some spreadsheet stuff. If you have ideas for a dataset you care about, let me know by FRIDAY AT 5pm. Default: I will grab some Census data? Bring a laptop and/or ME BY FRIDAY AT 4pm if I need to bring a laptop for you.

7 QUESTIONS?

8 DAY 2: TODAY: PERSONAL SECURITY BEST PRACTICES Computer basics & terminology! Then some applications Password management with KeePass 2-factor authentication: PSU, Dropbox, Google Keeping your computer up to date Backing up data - time machine, windows backup, dropbox and google drive Slack + Can you access the reading for Monday? + Can you see the course on D2L and where to turn in reading response?

9

10 COMPUTER TERMINOLOGY WHAT S A COMPUTER MADE OF AND WHY DO LAPTOPS FROM JUST A FEW YEARS AGO SEEM SO SLUGGISH?

11 HARDWARE the physical stuff AND SOFTWARE the instructions for what to do

12 COMPUTER TERMINOLOGY SOFTWARE LEVEL 1: APPS OR APPLICATIONS

13 COMPUTER TERMINOLOGY SOFTWARE INSTRUCTIONS LEVEL 1: APPS OR APPLICATIONS

14 COMPUTER TERMINOLOGY SOFTWARE INSTRUCTIONS Mac OS Windows *nix Chrome OS LEVEL 2: OPERATING SYSTEM OS Android ios INFRASTRUCTURE & TRANSLATOR

15 SOFTWARE APPS RUN ON THE OPERATING SYSTEM THAT RUNS ON THE HARDWARE

16 COMPUTER TERMINOLOGY PROCESSOR OR CPU CENTRAL PROCESSING UNIT

17 COMPUTER TERMINOLOGY PROCESSOR OR CPU WHAT INTEL MAKES CENTRAL PROCESSING UNIT

18 COMPUTER TERMINOLOGY OTHER MICROPROCESSORS LIKE A GPU GRAPHICS PROCESSING UNIT

19 COMPUTER TERMINOLOGY MEMORY (OR, RAM) VOLATILE RANDOM ACCESS MEMORY

20 COMPUTER TERMINOLOGY MEMORY (OR, RAM) VOLATILE RANDOM ACCESS MEMORY

21 COMPUTER TERMINOLOGY HARD DISK DRIVE FIXED NON-VOLATILE (ALSO A KIND OF MEMORY)

22 COMPUTER TERMINOLOGY HARD DISK DRIVE (ALSO A KIND OF MEMORY)

23 COMPUTER TERMINOLOGY TODAY PERMANENT MEMORY IS OFTEN STORED ON AN SSD (SOLID STATE DRIVE) FASTER, RESILIENT, BUT EXPENSIVE

24 COMPUTER TERMINOLOGY OSS DESIGNED FOR NEW SSDS ARE TERRIBLE IF YOU HAVE AN OLD HDD A LOT MORE I/O

25

26 THE END

27 QUESTIONS?

28 INTERMISSION

29 THE WORKSHOP PART OF CLASS PERSONAL SECURITY BEST PRACTICES

30 1. KEEP YOUR COMPUTER UP TO DATE

31

32 The British hospitals hit by this latest attack, which weaponised a flaw in Microsoft s Windows operating system revealed in February, are hopelessly outgunned. They re running Windows XP, an operating system first released in September 2001, and which Microsoft itself gave up supporting in 2014; it has been kept on life support by extra payments to the company, but the Department of Health stopped making those in

33 PERSONAL SECURITY BEST PRACTICES UPDATING IS IMPORTANT Don t try to live like an underfunded government bureaucracy On both Mac and Windows machines, it s really straightforward to set up automatic updating. It should be enabled by default. Don t turn it off! Don t delay those updates for months on end!

34 PERSONAL SECURITY BEST PRACTICES WHY DON T PEOPLE UPDATE? Bad experiences with losing data A better alternative to not updating? Keeping your data backed up!

35 2. BACK UP YOUR DATA!

36 BACKING UP YOUR DATA BACKING UP YOUR DATA - EXTERNAL DRIVE Windows File History Mac Time Machine These require an EXTERNAL hard drive, usually this connects via some USB variant (e.g., USB or USB-C) which depends on your computer A good choice if you are willing to plug in an external drive from time to time and keep it somewhere safe!

37 BACKING UP YOUR DATA BACKING UP YOUR DATA - THE CLOUD Dropbox, Google Drive, icloud, OneDrive Security focused services like SpiderOak Business-focused like Box Your files are backed up to servers (computers) that Dropbox, Google, Apple, Microsoft, Box, SpiderOak operate Many of which may actually be operated by Amazon! A good choice if you also want to sync across multiple devices (e.g. your phone) or access your files remotely (e.g. from a lab computer) and feel comfortable putting your files on a remote server. Dropbox is the most user-friendly for sharing files with others and for multi-platform setups (e.g. windows computer + iphone), but they have also had some bad data breaches in the past. YMMV. SpiderOak has good security and reliability, but is more expensive and probably your friends aren t using it

38 3. GOOD PASSWORDS & A PASSWORD MANAGER

39 PASSW0RD! P4SSWORD#

40 PASSW0RD! P4SSWORD#

41 MAKING UP ONE REALLY GOOD PASSWORD AND USING IT FOR EVERYTHING

42 MAKING UP ONE REALLY GOOD PASSWORD AND USING IT FOR EVERYTHING

43 BETTER OPTION 1: PASSPHRASES

44

45 BETTER OPTION 2: PASSWORD MANAGER

46 DAY 2: PASSWORD MANAGERS ARE GREAT BECAUSE: Generates passwords for you that are arbitrarily long random strings meeting all the requirements of a particular site Stores all those passwords so you don t have to remember them Also great for those easy-to-guess security questions like what s your favorite color usually these can be any random string! use random strings!

47 KEEPASS KEEPASSXC keepass.info keepassxc.org

48 KEEPASS/KEEPASSXC + free + open source + regularly updated + available for many platforms + data file is encrypted and can be safely stored anywhere (i.e. dropbox) - manual syncing - not as user friendly as some others

49 ONEPASSWORD

50 1PASSWORD + super easy to set up + good reputation + seemingly good security + lots of apps for different devices - costs money - closed source

51 DAY 2: WHY WOULD YOU WANT SECURITY APPLICATIONS TO BE OPEN SOURCE? Doesn t that mean people can hack them easier?

52 DAY 2: WHY WOULD YOU WANT SECURITY APPLICATIONS TO BE OPEN SOURCE? Doesn t that mean people can hack them easier? NOPE! NOT REALLY!

53 DAY 2: KERCKHOFFS'S PRINCIPLE "A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. (a 19th c. military espionage theory)

54 DAY 2: OTHERS? Lastpass seems popular, but was hacked in 2016 Enpass expensive to use on mobile, but if you have a chromebook, maybe your best option? icloud keychain if you re all apple/mac products, this probably works. Safari has built in suggested passwords now when you re using the web that are pretty good. Wired ideas: Lifehacker ideas:

55 IF YOU USE A PASSWORD MANAGER, ITS SECURITY IS ONLY AS GOOD AS YOUR MASTER PASSWORD!!! AND THAT ONE YOU HAVE TO REMEMBER!

56 4. TWO FACTOR AUTHENTICATION (2FA) A/K/A TWO STEP VERIFICATION

57 DAY 2: FACTOR AUTHENTICATION FROM 2008

58 DAY 2: FACTOR AUTHENTICATION TO TODAY! Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it s becoming much more common across the web. With often just a few clicks in a given account s settings, 2FA adds an extra layer of security to your online accounts on top of your password.

59 DAY 2: SO.. WHAT IS IT?

60 DAY 2: FACTORS FOR AUTHENTICATION knowledge factors something you know, like a password possession factors a physical thing you have to have, like a key inherence or biometric factors something inherent to you, like a fingerprint

61 DAY 2: TWO FACTOR AUTHENTICATION USES TWO DIFFERENT THINGS + PIN NUMBER possession knowledge

62 DAY 2: TWO FACTOR AUTHENTICATION USES TWO DIFFERENT THINGS GENERATED TOKEN / + DETECTED PRESENCE PASSWORD possession knowledge

63 DAY 2: ESPECIALLY GOOD WHEN: You use public computers and your password might get accidentally saved to a browser or stolen by malicious software

64 DAY 2: ESPECIALLY GOOD FOR: Important stuff. Like, your password. If someone got access to your password, they could reset all your other passwords!

65 DAY 2: WILL THIS PROTECT YOU FROM THINGS LIKE THE EQUIFAX BREACH? No, and there s nothing you can do about that one. It was the result of very poor security on Equifax s part. BUT! Setting up 2FA does help with some things: Protects *other* accounts so information gained in one breach can t be as easily used against you to gain access to something else Can possibly help protect you against lazy password security by other companies

66 DAY 2: DANGERS! You lose your access to the extra factor (i.e. your phone is lost, stolen, or broken). Some services give you a list of single-use codes or backup contact options. A good thing to store in a password manager!

67 DAY 2: SET IT UP AT PORTLAND STATE Uses an system called Duo - your second step can be a phone call, a smartphone app, or an SMS SMS is not the most secure, but probably still better than nothing You are no longer forced to change your password every x days. No obvious backup codes that I can figure out. Don t lose your phone!

68 DAY 2: SET IT UP ON OTHER SYSTEMS - GMAIL, DROPBOX, ETC.

BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL

BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL CLASS OBJECTIVES Learn how to store your computer s content safely in case of catastrophic failure. Explore back up options for both Microsoft and Apple

More information

Keeping Important Data Safe and Secure Online. Norm Kaufman

Keeping Important Data Safe and Secure Online. Norm Kaufman Keeping Important Data Safe and Secure Online Norm Kaufman Examples of Important Data Passwords and Secret Answers Personal Documents (Licenses, Passports, Insurance Cards, Credit Cards) Social Security

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings

More information

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018 Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Password Storage. By Steve Maynard 10 July, 2018

Password Storage. By Steve Maynard 10 July, 2018 Password Storage By Steve Maynard 10 July, 2018 Steve s narrative: I m going to describe a few apps available for password storage. Mostly I ll talk about one particular app that wasn t intended for saving

More information

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically

More information

Malling U3A Computer Group. Cloud Storage. Chris Daly 3 rd April 2017

Malling U3A Computer Group. Cloud Storage. Chris Daly 3 rd April 2017 Malling U3A Computer Group Chris Daly 3 rd April 2017 Storage not memory In digital devices data has to be retained to make it work (i.e. operating system) You also want to keep any saved information (documents,

More information

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded

More information

IPHONE/IPAD PHOTO MANAGEMENT

IPHONE/IPAD PHOTO MANAGEMENT IPHONE/IPAD PHOTO MANAGEMENT Organization of Photos on iphone or ipad What Photo Management Means Storage of Photo on iphone or ipad Moving Photo between devices (iphone >> Desktop) Syncing Photos between

More information

How Do I Sync My Iphone To Another Computer Without Losing Everything

How Do I Sync My Iphone To Another Computer Without Losing Everything How Do I Sync My Iphone To Another Computer Without Losing Everything to transfer content from your current iphone, ipad, or ipod touch to another device. You should connect the device to itunes to sync

More information

Chromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast.

Chromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast. chromebook meet chromebook What is a chromebook? Chromebooks are... A new type of computer that is fast, simple and secure. Built for the web best of Google and access to thousands of online web apps.

More information

Duo Travel Guide. duo.com

Duo Travel Guide. duo.com Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access

More information

Take Control of Your Passwords

Take Control of Your Passwords Take Control of Your Passwords Joe Kissell Publisher, Take Control Books @joekissell takecontrolbooks.com The Password Problem Passwords are annoying! It s tempting to take the easy way out. There is an

More information

BackUp Strategies. ApplePickers April 12, 2017

BackUp Strategies. ApplePickers April 12, 2017 BackUp Strategies ApplePickers April 12, 2017 Why Backup? HDDs fail. It s not a matter of if; it is a matter of when Disk errors Possibility of theft, vandalism, or fire Stupid mistakes in deleting files

More information

Online Services. Sept 2017

Online Services. Sept 2017 Online Services Sept 2017 Why I use these services? Syncing between various devices is easy Sync between Desktop, Laptop and ipad Sharing files Better than sending attachments Online backup Keep additional

More information

1Password for Mac. by Marcia Bolsinga for AshMUG 1/12/2019

1Password for Mac. by Marcia Bolsinga for AshMUG 1/12/2019 Why do we need passwords? First of all - why passwords? Passwords are one of the Primary Pain Points in our modern digital existence. Despite all the advances of our modern technology, we haven t managed

More information

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) 10.10.18 1 Multi-Factor Authentication (MFA) What is it? Why should I use it? CYBERSECURITY Tech Fair 2018 10.10.18 2 Recent Password Hacks PlayStation Network (2011) 77 Million accounts hacked Adobe (2013)

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Instructions I Lost My Iphone 4 Password Yahoo

Instructions I Lost My Iphone 4 Password Yahoo Instructions I Lost My Iphone 4 Password Yahoo Linux software Android Apps Blackberry Apps iphone Apps Windows Phone Apps Report Niash- Mar 4, 2014 02:48PM I have faced a problem. i forgot my yahoo id

More information

icloud History & Services Dr. Leon Chapman

icloud History & Services Dr. Leon Chapman icloud History & Services Dr. Leon Chapman 1 icloud History & Services Apple ID & Accounts Overview Online Backup Services Cloud Storage & File Sharing 2 Off-Site Backup? icloud What is it? File storage?

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: iphone users that use a Windows

More information

Using the Cloud Howard Verne 7/10/2013

Using the Cloud Howard Verne 7/10/2013 Using the Cloud Howard Verne 7/10/2013 Simple Backup e.g. Carbonite Only Data Pictures Music Etc No Programs No Windows 1 HV1 Most Cloud Storage Only Data Pictures Music Etc No Programs No Windows Browser

More information

Storing your Data in the Cloud

Storing your Data in the Cloud Storing your Data in the Cloud Why store your data in the cloud Since the beginning of the internet, technology has been steadily moving away from local storage to remote, server-based storage and processing

More information

Manual Update Of Ios 7 For Iphone 4s Release

Manual Update Of Ios 7 For Iphone 4s Release Manual Update Of Ios 7 For Iphone 4s Release Date When Apple released ios 8.1.1, they promised that the update would fix some the test against the iphone 4S and ipad 2, comparing it to ios 7, and ios 7.1.2.

More information

Upgrading Your Home Network Security

Upgrading Your Home Network Security Upgrading Your Home Network Security For Free! Dr. Glen Sagers Illinois State University Outline Passwords & Passphrases Two-factor authentication Updates Viruses and Malware WiFi security Internet of

More information

Google Apps Iphone Exchange Cannot Get Mail >>>CLICK HERE<<<

Google Apps Iphone Exchange Cannot Get Mail >>>CLICK HERE<<< Google Apps Iphone Exchange Cannot Get Mail Doing gmail push using the Exchange and it wont populate my Mail at all. jediuia It is driving me nuts I can't get my work email account on my shiny new iphone

More information

Password Management. Eugene Davis UAH Information Security Club January 10, 2013

Password Management. Eugene Davis UAH Information Security Club January 10, 2013 Password Management Eugene Davis UAH Information Security Club January 10, 2013 Password Basics Passwords perform service across a broad range of applications Can act as a way to authenticate a user to

More information

Storing Data and Pictures in the Cloud for Free

Storing Data and Pictures in the Cloud for Free Storing Data and Pictures in the Cloud for Free By Phil Goff Branch 116 November 15, 2012 1 Cloud Storage is the Future 2 Storing Data and Pictures in the Cloud for Free Not Intended as Primary Backup

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What You Will Learn WHAT IS THE CLOUD? PAGE 03 Basic Vocabulary Advantages of the Cloud Disadvantages of the Cloud CLOUD STORAGE SERVICES

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Top 6 Mac user mistakes

Top 6 Mac user mistakes E-book Top 6 Mac user mistakes! applecoursesonline.com Bad habits can damage your Mac, make it messy and definitely give it a shorter lifespan. Make sure you stop doing this! Print this e-book and have

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

HPE 3PAR Storage - Hewlett Packard Enterprise

HPE 3PAR Storage - Hewlett Packard Enterprise Page 1 of 10 HPE 3PAR Storage - Hewlett Packard Enterprise Password Managers Compared: LastPass vs KeePass vs Dashlane vs 1Password by Jason Fitzpatrick on November 2nd, 2016 There are dozens of password

More information

Guide to Getting Started. Personal Online Banking & Bill Pay

Guide to Getting Started. Personal Online Banking & Bill Pay Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are

More information

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...

More information

Cybersecurity in 2016 and Lessons learned

Cybersecurity in 2016 and Lessons learned Cybersecurity in 2016 and Lessons learned Dr. Yu Cai Associate Professor Program Chair, Computer Network & System Administration School of Technology Michigan Technological University cai@mtu.edu A Quick

More information

The Cloud is Here Don t Get Left Behind. SuperCom Computer Club February 8, 2019

The Cloud is Here Don t Get Left Behind. SuperCom Computer Club February 8, 2019 The Cloud is Here Don t Get Left Behind SuperCom Computer Club February 8, 2019 What is the Cloud? Cloud Confusion Have you heard people using terms like the cloud, cloud computing, or cloud storage. And,

More information

Manual Sync Contacts On My Iphone To Gmail Account Without Itunes

Manual Sync Contacts On My Iphone To Gmail Account Without Itunes Manual Sync Contacts On My Iphone To Gmail Account Without Itunes You can keep contacts from your Google account up to date on your ios device. Apple Store Mac iphone Watch ipad ipod itunes Support not

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

XP: Backup Your Important Files for Safety

XP: Backup Your Important Files for Safety XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to

More information

How Do I Delete Files From My Startup Disk Macbook Pro

How Do I Delete Files From My Startup Disk Macbook Pro How Do I Delete Files From My Startup Disk Macbook Pro If your Apple/Mac computer is displaying the error message that the hard You need to make. The one place I least like to see a beach ball is on my

More information

icloud - Apple s suite of

icloud - Apple s suite of icloud - Apple s suite of Internet services Please sign in and add your email address only if it has changed or if you have not been getting my email blasts. And please silence your cell phone!! 1 The

More information

Tutor Lead Session Image Storage and the Cloud.

Tutor Lead Session Image Storage and the Cloud. Tutor Lead Session Image Storage and the Cloud. Storage There are many different types of storage when it comes to backing up your photos and keeping them safe. This guide will explain a few of the different

More information

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. The Learning Objectives summarize the knowledge that learners should have gained by the time they

More information

Case study on PhoneGap / Apache Cordova

Case study on PhoneGap / Apache Cordova Chapter 1 Case study on PhoneGap / Apache Cordova 1.1 Introduction to PhoneGap / Apache Cordova PhoneGap is a free and open source framework that allows you to create mobile applications in a cross platform

More information

Mobile Device Support. Jeff Dove February

Mobile Device Support. Jeff Dove February Mobile Device Support Jeff Dove February 18 2017 Apple is a vertical company. Apple and IOS Control of type and design of hardware components Control over phone operating system and updates Control over

More information

Synchronizing Your PC

Synchronizing Your PC Synchronizing Your PC A Guide to -- 2018 APCUG Spring VTC AN INTERNATIONAL ASSOCIATION OF TECHNOLOGY AND COMPUTER USER GROUPS Introduction There are numerous ways to sync desktops, laptops, tablets and

More information

Having said this, there are some workarounds you can use to integrate video into your course.

Having said this, there are some workarounds you can use to integrate video into your course. HOW TO SESSION : Options for creating & sharing video Overview Video is everywhere. We watch it on YouTube and Netflix. It s how we get our news, communicate with friends and family in other cities, and

More information

Formatting, Organising and Storing Data

Formatting, Organising and Storing Data Formatting, Organising and Storing Data Scott Summers UK Data Service University of Essex Cancer Research UK Data Sharing and Management 24 th May 2017 Overview Looking after research data for the longer-term

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

Password Managers. Victor (Vic) Daniel. Handout Page 1/38

Password Managers. Victor (Vic) Daniel. Handout Page 1/38 Victor (Vic) Daniel Handout Page 1/38 Authorization vs Authentication Authorization refers to rules that determine who is allowed to do what. Authentication is the process of determining that somebody

More information

Digital Workflow 10 Tech Rules to Guide You

Digital Workflow 10 Tech Rules to Guide You Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy

More information

User Guide: Adding a Device in Duo and Managing Settings

User Guide: Adding a Device in Duo and Managing Settings User Guide: Adding a Device in Duo and Managing Settings The Duo Mobile application provides an extra layer of security when it is incorporated into the login process for applications or web sites such

More information

A Guide to Finding the Best WordPress Backup Plugin: 10 Must-Have Features

A Guide to Finding the Best WordPress Backup Plugin: 10 Must-Have Features A Guide to Finding the Best WordPress Backup Plugin: 10 Must-Have Features \ H ow do you know if you re choosing the best WordPress backup plugin when it seems that all the plugins seem to do the same

More information

How to Backup Your Computer. Adele Berenstein Jan 17, 2018

How to Backup Your Computer. Adele Berenstein Jan 17, 2018 How to Backup Your Computer Adele Berenstein Jan 17, 2018 Agenda Why Backup? What is a Backup? Location of your Backup Your Backup Strategy What Files to Backup? Structure of your Backup External Hard

More information

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox. Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and

More information

It s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.

It s possible to get your  inbox to zero and keep it there, even if you get hundreds of  s a day. It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated, though it does take effort and discipline. Many people simply need

More information

How NOT To Get Hacked

How NOT To Get Hacked How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?

More information

imail Frequently Asked Questions (FAQs) 20 June 2014 Version 2.1

imail Frequently Asked Questions (FAQs) 20 June 2014 Version 2.1 imail Frequently Asked Questions (FAQs) 20 June 2014 Version 2.1 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 1 1. How to access to Sunway imail account?... 1 2. I can t login to my

More information

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) PRESENTED BY: Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) One of the main problems that customers face with the adoption of SaaS and cloud-based apps is how to deliver the

More information

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer

More information

DOWNLOAD PDF BACK UP YOUR SELL

DOWNLOAD PDF BACK UP YOUR SELL Chapter 1 : Productivity apps for ebay users If you back up your iphone, ipad, or ipod touch, you'll have a copy of your information to use in case your device is ever replaced, lost, or damaged. Choose

More information

Lecture 14 Passwords and Authentication

Lecture 14 Passwords and Authentication Lecture 14 Passwords and Authentication Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422 Major Portions Courtesy Ryan Cunningham AUTHENTICATION Authentication

More information

File systems, databases, cloud storage

File systems, databases, cloud storage File systems, databases, cloud storage file: a sequence of bytes stored on a computer content is arbitrary (just bytes); any structure is imposed by the creator of the file, not by the operating system

More information

Enterprise Mobile Management (EMM) Policies

Enterprise Mobile Management (EMM) Policies Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software

More information

IMB Apple Pay - Frequently Asked Questions

IMB Apple Pay - Frequently Asked Questions About Apple Pay What is Apple Pay? Apple Pay offers an easy, secure, and private way to pay on iphone, ipad, Apple Watch, and Mac. It enables you to link your IMB Visa Debit card to a eligible Apple Device

More information

Instructions I Lost My Iphone Contacts While Sync >>>CLICK HERE<<<

Instructions I Lost My Iphone Contacts While Sync >>>CLICK HERE<<< Instructions I Lost My Iphone Contacts While Sync During the initial sync, the contents of matching Gmail & iphone contacts will be combined with each Syncs groups in both directions including My Contacts

More information

Microsoft Office 365 (O365) and Office 2016 ProPlus Download FAQs For Students

Microsoft Office 365 (O365) and Office 2016 ProPlus Download FAQs For Students Microsoft Office 365 (O365) and Office 2016 ProPlus Download FAQs For Students Why is Colorado Technical University offering MS Office 365? Colorado Technical University is offering students a free subscription

More information

Six steps to control the uncontrollable

Six steps to control the uncontrollable Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Contents Getting Started 3 Backup & Sync 7 Using NeatCloud on the Web 9 Using NeatMobile 9 Using NeatVerify 10 Adding files to my NeatCloud 10 Searching my NeatCloud files and

More information

Photos, Photos. What to do with All Those Photos? Presented by Phil Goff Area 16 Computers and Technology August 17, 2017

Photos, Photos. What to do with All Those Photos? Presented by Phil Goff Area 16 Computers and Technology August 17, 2017 Photos, Photos. What to do with All Those Photos? Presented by Phil Goff Area 16 Computers and Technology August 17, 2017 1 Photos Have a Different Value Today With film cameras, pictures were taken and

More information

Welcome to Windows 10. Love it or Avoid it

Welcome to Windows 10. Love it or Avoid it 1 Welcome to Windows 10 Love it or Avoid it 2 What is an OPERATING SYSTEM??? 1) It s a set of programs that control the computer and make the components work together 2) It provides a interface between

More information

Web browsers - Firefox

Web browsers - Firefox N E W S L E T T E R IT Computer Technical Support Newsletter Web browsers - Firefox February 09, 2015 Vol.1, No.16 A Web Browser is a program that enables the user to view web pages. TABLE OF CONTENTS

More information

How To Install Flash Firefox Android Tablet Os On Hp

How To Install Flash Firefox Android Tablet Os On Hp How To Install Flash Firefox Android Tablet Os On Hp Adobe may have cut support for Flash in Android Jelly Bean and beyond, but it's not don't officially support Flash, it's really easy to add Flash support

More information

Hardware Recommendations by

Hardware Recommendations by Hardware Recommendations by Forrestt Williams Tech Support Office IT Website Graphic Design Jeremiah Farmer support@landfx.com CEO Developer Support Head Honcho Outline 1. Land F/X Technology Quick Explainer

More information

Bootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly.

Bootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly. Page 1 Backing up Mac How to develop a solid backup strategy, what your hardware and software choices are, how to set everything up, what pitfalls you may encounter, and how to restore your data if disaster

More information

MAC BASICS. 125 S. Prospect Avenue, Elmhurst, IL (630) elmhurstpubliclibrary.org. Start Using Computers, Tablets, and Internet

MAC BASICS. 125 S. Prospect Avenue, Elmhurst, IL (630) elmhurstpubliclibrary.org. Start Using Computers, Tablets, and Internet MAC BASICS WHAT IS MAC? Introduction What We ll Cover While many users are only familiar with Windows computers, working on a Mac is both extremely user friendly and offers a variety of included creative

More information

2 User Guide. Contents

2  User Guide. Contents E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an

More information

Windows 10 Hardware and Software

Windows 10 Hardware and Software Windows 10 Hardware and Software Presented by: G. ALLEN SONNTAG, RDR, CRR, FAPR Tucson, Arizona First a Little Philosophy One of my favorite isms: Do or Do Not. There is no Try Yoda. I m going to try to

More information

Gmail With Itunes Windows 7

Gmail With Itunes Windows 7 How To Sync Apple Iphone Contacts To Gmail With Itunes Windows 7 Oct 9, 2014. It is a real professional tool to help you to move contacts from iphone to PC. you have an Gmail account, then it's also very

More information

Ios 7 Manual Restore From Icloud Slow >>>CLICK HERE<<<

Ios 7 Manual Restore From Icloud Slow >>>CLICK HERE<<< Ios 7 Manual Restore From Icloud Slow Learn how to stop an icloud Restore that is stuck in progress in less than a minute. the content, maybe up to a day on a slow connection and an almost full iphone,

More information

DER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet?

DER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet? DER GOBBLE Good Secure Crypto Wallet Practices When it comes to crypto currencies and securing your money, the absolute best 99% guaranteed security for your wallets is YOU. You are the one that will expose

More information

How To Access Iphone Backup Without Itunes Windows 7 Using

How To Access Iphone Backup Without Itunes Windows 7 Using How To Access Iphone Backup Without Itunes Windows 7 Using You can copy and save the data on your iphone, ipad, or ipod touch by backing up Read more about making backups of your device using itunes and

More information

Online Services USER GUIDE. First Time Log In

Online Services USER GUIDE. First Time Log In Online Services USER GUIDE Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. First Time Log In Log In: BankMidwest.com

More information

Technology Checklist for End of the School Year. To prepare your classroom technology for summer, please confirm that the following are done:

Technology Checklist for End of the School Year. To prepare your classroom technology for summer, please confirm that the following are done: Technology Checklist for End of the School Year Classroom Technology To prepare your classroom technology for summer, please confirm that the following are done: Projector should be powered off, lens cap

More information

What Does Manually Manage Music And Videos Mean On Iphone

What Does Manually Manage Music And Videos Mean On Iphone What Does Manually Manage Music And Videos Mean On Iphone A computer (Windows or Mac), An iphone, ipad, or ipod, The USB cable that came Check the Manually manage music and videos box under "Options" (in.

More information

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru Seven secrets to making the most of your computer system Chris Jeffery Proprietor/Chief Guru CyberGuru 1. Backups If your computer died tomorrow how would your business cope? The cost of data recovery

More information

5 Online Security Tips

5 Online Security Tips 5 Online Security Tips Any business with Internet-based systems should be taking the appropriate steps to ensure that their activities and information are secure from the ever-expanding number of online

More information

Heuristic Evaluation of Mango

Heuristic Evaluation of Mango Heuristic Evaluation of Mango 1. Problem Mango is an application that makes it easier to plan group travel and collaborate on group itineraries by providing an interface to invite friends to a group trip,

More information

How to Secure SSH with Google Two-Factor Authentication

How to Secure SSH with Google Two-Factor Authentication How to Secure SSH with Google Two-Factor Authentication WELL, SINCE IT IS QUITE COMPLEX TO SET UP, WE VE DECIDED TO DEDICATE A WHOLE BLOG TO THAT PARTICULAR STEP! A few weeks ago we took a look at how

More information

Improving Password Management. Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL

Improving Password Management. Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL Improving Password Management Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL Password Management How many passwords do you have? Are they all

More information

Sync Manually Greyed Out Ipad Itunes Wifi >>>CLICK HERE<<<

Sync Manually Greyed Out Ipad Itunes Wifi >>>CLICK HERE<<< Sync Manually Greyed Out Ipad Itunes Wifi This should resolve syncing problems with both wi-fi syncing and USB cable syncing. wi-fi syncing enabled, sometimes just simply plugging the iphone or ipad into

More information

Follow these steps to redeem and use your itunes Gift Card or content code. Menu, Apple Apple Store Mac iphone Watch ipad ipod itunes Support.

Follow these steps to redeem and use your itunes Gift Card or content code. Menu, Apple Apple Store Mac iphone Watch ipad ipod itunes Support. Instructions How To Use Itunes Gift Card On Iphone Yahoo Remember, first, to back that data up via itunes or icloud pre-transfer. Below, a complete guide to prepping your iphone 6 or 6 Plus, for both first-time

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

Any conversation about virtualization for small- and medium-sized businesses (SMBs) usually starts around

Any conversation about virtualization for small- and medium-sized businesses (SMBs) usually starts around E-NEWS www.e-safetech.om 1-412-944-2402 2018 E-Safe Technologies All rights reserved. September 2018 In this issue Choose from 5 Virtualization Options 5 Cyber Security Measures Barracuda and E-Safe Top

More information

DOWNLOAD PDF REDIRECT FOR WINDOWS 7

DOWNLOAD PDF REDIRECT FOR WINDOWS 7 Chapter 1 : Deploy Folder Redirection with Offline Files Microsoft Docs From your description, it sounds as if you cannot access the redirection path in Windows Explorer, is that correct? before folder

More information

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better

More information

Getting Started with Duo Security Two-Factor Authentication (2FA)

Getting Started with Duo Security Two-Factor Authentication (2FA) Getting Started with Duo Security Two-Factor Authentication (2FA) Table of Contents What is Two-Factor Authentication (2FA)?... 1 Why 2FA at Bates College?... 2 2FA Technologies... 3 Duo Protected Resources

More information