Title: Windows Tutorial 5 Protecting Your Computer
1Windows Tutorial 5Protecting Your Computer
2Objectives
- Set up Windows Firewall and Windows Update
- Protect your computer from viruses and other
malicious software - Use Windows Defender to protect against spyware
- Manage Windows Mail security
3Objectives
- Manage Microsoft Internet Explorer security
- Set up user accounts
- Control access to your computer
- Secure and share folders
4Using the Windows Vista Security Center
- Improved features in Windows Vista keep your
computer safe from threats such as viruses,
worms, hackers, crackers, and spyware - Security Center
- Windows Defender
- User Account Control
- Back Up and Restore
5Using the Windows Vista Security Center
6Adding a Program to the Windows Firewall
Exception List
- Click the Start button, click Control Panel,
click Security, and then click Windows Firewall - In the left pane, click Allow a program through
Windows Firewall, then click the Continue button,
if necessary - In the Program or port list, click to select a
program check box. If a program does not appear
in this list, click the Add program button, click
a program in the Add a Program dialog box, or
click the Browse button to locate and select a
program - Click the OK button
7Setting Up Windows Update
- An update is a change to software that can
prevent or repair problems, enhance the security
of the computer, or improve the computers
performance - In the left pane of the Windows Security Center
window, click Windows Update
8Setting Up Windows Update
9Protecting Your Computer from Malware
- In the Windows Security Center window, examine
the settings in the Malware protection section
10Defending Against Spyware
- Spyware is software that can install itself or
run on your computer without your consent or
control - Adware
- Pop-up ads
- To perform a scan with Windows Defender
- Click the Start button, click Control Panel,
click Security, and then click Windows Defender - Click the Scan button arrow on the toolbar, and
then click Quick Scan
11Defending Against Spyware
12Scheduling a Spyware Scan
- In the Windows Defender window, click the Tools
button on the toolbar to open the Tools and
Settings page, and then click Options
13Defending Against E-mail Viruses with Windows Mail
- An annoying and potentially dangerous type of
privacy invasion is spam, or junk e-mail - Start Windows Mail
- Click Tools on the menu bar, and then click
Options - Click the Security tab
14Defending Against E-mail Viruses with Windows Mail
15Adding a Sender to the Blocked Senders or Safe
Senders List
- To block a sender in Windows Mail, right-click a
message whose sender you want to add to the
Blocked Senders list, point to Junk E-mail, and
then click Add Sender to Blocked Senders List on
the shortcut menu - To always allow a sender, right-click a message
whose sender you want to add to the Safe Senders
list, point to Junk E-mail, and then click Add
Sender to Safe Senders List on the shortcut menu - Click the OK button
16Managing Microsoft Internet Explorer Security
- Internet Explorer offers the following security
and privacy features - Phishing filter
- Protected mode
- Digital signatures
- Pop-up Blocker
- Add-on Manager
- Privacy settings and alerts
- Secure connections
17Managing Microsoft Internet Explorer Security
- Click the Tools button on the toolbar, point to
Phishing Filter, and then click Check This Website
18Blocking Pop-up Ads
- Click Tools on the Internet Explorer toolbar,
point to Pop-up Blocker, and then click Pop-up
Blocker Settings - Click the current Filter level setting, and then
click a setting ranging from High to Low - Click the Close button
19Managing Add-on Programs
- A browser add-on is a program offered by any
software vendor that provides enhancements such
as a toolbar or improved search feature
20Selecting Privacy Settings
- Click Tools on the Internet Explorer toolbar, and
then click Internet Options - Click the Privacy tab in the Internet Options
dialog box - Drag the slider to select a privacy setting
ranging from Block All Cookies to Accept All
Cookies - Click the OK button
21Selecting Privacy Settings
22Internet Explorer Advanced Settings
- You can manage advanced Internet Explorer
settings to enhance the security of your computer - Enable third-party browser extensions
- Do not save encrypted pages to disk
- Empty Temporary Internet Files folder when
browser is closed - Warn if changing between secure and not secure
mode
23Setting Up User Accounts
- Open the Control Panel in Category view, click
User Accounts and Family Safety, and then click
User Accounts - Click Manage another account
- Click Create a new account
- Type the new account name, click the Standard
user option button or the Administrator option
button, and then click the Create Account button
24Setting Up User Accounts
- Click Create a Password
- Click in the New password text box, and then type
your password - Click in the Confirm new password text box, and
then type your password again - Click in the Type a password hint text box, and
then type a hint to help you remember your
password - Click the Create password button
25Setting Up User Accounts
26Controlling Access to Your Computer
- One way to manage access to your computer is to
take advantage of User Account Control (UAC) - The UAC feature is turned on by default, and
should not be turned off - Another way to protect your privacy and reduce
power consumption is to let your computer go to
sleep after a specified amount of idle time
27Securing and Sharing Folders
- If more than one person uses your computer, you
can share files and folders with them in two
ways - Explicitly allowing another user to share a
folder - Storing files in the Public folder
- When you explicitly share files, you set sharing
permissions that determine who can change your
files and what kinds of changes they can make
28Assigning Permissions to Folders
- To specify which users can access a folder you
want to share, click the folder in a folder
window, click Share on the toolbar, and then
enter the account name of another user on the
computer
29Assigning Permissions to Folders