SlideShare a Scribd company logo
1 of 11
Hotspot Shield
List Of Content
•   Introduction
•   What is hotspot shield?
•   How does it work?
•   Conclusion
•   Reference
Hotspot shield
• Hotspot shield can be very useful especially in
  the UAE due to the site blocking.
• With hotspot shield you can access all the
  blocked sites and can also protect you’re
  identity online.
Hotspot Shield
• Hotspot Shield is a free program that uses an
  intermediate server to obtain access to the
  internet making the user able to bypass firewalls
  and censors. Its encryption makes it virtually
  impossible to trace someone who is using it.
  Hotspot Shield affects all internet communication
  so it can encrypt video communication, chat, and
  other services. All content such as flash, Voip, and
  video streaming can be accessed through Hotspot
  Shield.
It is used to:
• Secure your web session, data, online
  shopping, and personal information online
  with HTTPS encryption.
• Protect yourself from identity theft online.
• Hide your IP address for your privacy online.
• Access all content privately without
  censorship; bypass firewalls.
• Protect yourself from snoopers at Wi-Fi
  hotspots, hotels, airports, corporate offices.
How does it work?
• Go to http://www.hotspotshield.com/
• You can download the free version
Downloading
* Note that the hotspot
shield website is blocked in
the UAE but you can access
it in the ZU campus.
Install and use
         After Installing the program, you will see
         the hotspot shield icon on you’re menu
         bar at the right corner of you’re screen.




         Right click on it and connected it, it will
         turn yellow and load, then it should
         turn Green and you are ready to use it.
Ready
• As long as the Green icon is ON you will be
  able to use hotspot shield, to turn it off just
  right click it and click on ‘disconnect/off’.
Conclusion
• Hotspot shield is a great program to use to
  secure you’re connection and hide you’re
  identity online.
• Remember ! Don’t use it to do haram things!
  Allah watch's you.
Reference
• Hotshot shield. (n.d.). Retrieved from
  http://www.internetsafetyproject.org/wiki/ho
  tspot-shield
• Hotspot shield: Security, privacy, freedom.
  (n.d.). Retrieved from
  http://hotspotshield.com/wiki/hotspot-shield
• Jon L., J. (2012). Retrieved from
  https://www.pcworld.com/downloads/file/fid,
  71209/description.html

More Related Content

What's hot

Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
reidcollins42
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
IT Tech
 
A brief look at the new face of cybercrime
A brief look at the new face of cybercrimeA brief look at the new face of cybercrime
A brief look at the new face of cybercrime
Iraskan Limited
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 

What's hot (19)

Computer security
Computer securityComputer security
Computer security
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
IT Security Awareness - How to?
IT Security Awareness - How to?IT Security Awareness - How to?
IT Security Awareness - How to?
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on security
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecurity
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
A brief look at the new face of cybercrime
A brief look at the new face of cybercrimeA brief look at the new face of cybercrime
A brief look at the new face of cybercrime
 
RATs
RATsRATs
RATs
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 

Similar to It hotspot shield new

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
Vong Borey
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
Vong Borey
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
Liberteks
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
Ravishankar Kumar
 

Similar to It hotspot shield new (20)

Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
spyware
spyware spyware
spyware
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking Bad
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Internet security
Internet securityInternet security
Internet security
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

It hotspot shield new

  • 2. List Of Content • Introduction • What is hotspot shield? • How does it work? • Conclusion • Reference
  • 3. Hotspot shield • Hotspot shield can be very useful especially in the UAE due to the site blocking. • With hotspot shield you can access all the blocked sites and can also protect you’re identity online.
  • 4. Hotspot Shield • Hotspot Shield is a free program that uses an intermediate server to obtain access to the internet making the user able to bypass firewalls and censors. Its encryption makes it virtually impossible to trace someone who is using it. Hotspot Shield affects all internet communication so it can encrypt video communication, chat, and other services. All content such as flash, Voip, and video streaming can be accessed through Hotspot Shield.
  • 5. It is used to: • Secure your web session, data, online shopping, and personal information online with HTTPS encryption. • Protect yourself from identity theft online. • Hide your IP address for your privacy online. • Access all content privately without censorship; bypass firewalls. • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.
  • 6. How does it work? • Go to http://www.hotspotshield.com/ • You can download the free version
  • 7. Downloading * Note that the hotspot shield website is blocked in the UAE but you can access it in the ZU campus.
  • 8. Install and use After Installing the program, you will see the hotspot shield icon on you’re menu bar at the right corner of you’re screen. Right click on it and connected it, it will turn yellow and load, then it should turn Green and you are ready to use it.
  • 9. Ready • As long as the Green icon is ON you will be able to use hotspot shield, to turn it off just right click it and click on ‘disconnect/off’.
  • 10. Conclusion • Hotspot shield is a great program to use to secure you’re connection and hide you’re identity online. • Remember ! Don’t use it to do haram things! Allah watch's you.
  • 11. Reference • Hotshot shield. (n.d.). Retrieved from http://www.internetsafetyproject.org/wiki/ho tspot-shield • Hotspot shield: Security, privacy, freedom. (n.d.). Retrieved from http://hotspotshield.com/wiki/hotspot-shield • Jon L., J. (2012). Retrieved from https://www.pcworld.com/downloads/file/fid, 71209/description.html

Editor's Notes

  1. Secure your web session, data, online shopping, and personal information online with HTTPS encryption.Protect yourself from identity theft online.Hide your IP address for your privacy online.Access all content privately without censorship; bypass firewalls.Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.Yes, this will block anyone from seeing what you are doing.