SlideShare una empresa de Scribd logo
1 de 19
Internet Safety Tips to Keep Students safe while  Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot;  width=&quot;470&quot;  height=&quot;275&quot;  bgcolor=&quot;undefined&quot;  allowscriptaccess=&quot;always&quot;  allowfullscreen=&quot;true&quot;  flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
With Social Networking, Your Safety’s at Sake… ,[object Object],[object Object],Image source morguefile:http://mrg.bz/oBLbEM
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile:   http://mrg.bz/0F6fg8
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/byySzY
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/qjMfce
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/GJc118
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/zfSgLy
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/xxyNdo
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/0B6o9J
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/dJwALA
Safety Concerns in General… ,[object Object],Image source: screenshot: rnappi
Safety Concerns in General… ,[object Object],Image source:screenshot, rnappi
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/nIkQsz
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/miTt5T
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/w2JBND
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/Xateje
The Case of the Cyber Criminal  ,[object Object],[object Object]
Where Do I Find More Information? ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spywarediwakar sharma
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Practica 3 manejo de repertorio
Practica 3 manejo de repertorioPractica 3 manejo de repertorio
Practica 3 manejo de repertorioPaoCarrasco-s
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation Bee255
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 PhpstudyYusuke Ando
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentationguest16e403
 

La actualidad más candente (11)

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Usable security
Usable securityUsable security
Usable security
 
Ideology
IdeologyIdeology
Ideology
 
King louis xvi
King louis xviKing louis xvi
King louis xvi
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Χρήσιμα URLs
Χρήσιμα URLsΧρήσιμα URLs
Χρήσιμα URLs
 
Practica 3 manejo de repertorio
Practica 3 manejo de repertorioPractica 3 manejo de repertorio
Practica 3 manejo de repertorio
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation
 
Blogs trucos
Blogs trucosBlogs trucos
Blogs trucos
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 Phpstudy
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentation
 

Destacado (6)

Licitação
LicitaçãoLicitação
Licitação
 
Anorexia
AnorexiaAnorexia
Anorexia
 
56365695 programacao-semic
56365695 programacao-semic56365695 programacao-semic
56365695 programacao-semic
 
Tendencia ambientales
Tendencia ambientalesTendencia ambientales
Tendencia ambientales
 
La responsabilidad
La responsabilidadLa responsabilidad
La responsabilidad
 
Calendario Layout 1
Calendario Layout 1Calendario Layout 1
Calendario Layout 1
 

Similar a Internet safety

Community presentation
Community presentation Community presentation
Community presentation ozesteph1992
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsPrajwal Panchmahalkar
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepapern|u - The Open Security Community
 
Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Shamal Aryan
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepatNie Andini
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017Codemotion
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Pixlr and small apps in the classroom
Pixlr and small apps in the classroomPixlr and small apps in the classroom
Pixlr and small apps in the classroomArtfulArtsyAmy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetystrifman
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityChristian Heilmann
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1BaileyFurman
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1BaileyFurman
 

Similar a Internet safety (20)

Community presentation
Community presentation Community presentation
Community presentation
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
 
Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Pixlr and small apps in the classroom
Pixlr and small apps in the classroomPixlr and small apps in the classroom
Pixlr and small apps in the classroom
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking Accessibility
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 

Último

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Internet safety

  • 1. Internet Safety Tips to Keep Students safe while Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
  • 2. Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot; width=&quot;470&quot; height=&quot;275&quot; bgcolor=&quot;undefined&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Notas del editor

  1. Think about how different sites work before deciding to join a site. Some sites will allow only a defined community of users to access posted content; others allow anyone and everyone to view postings.
  2. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people, for example, your friends from school, your club, your team, your community groups, or your family.
  3. Keep your information to yourself. Don’t post your full name, Social Security number, address, phone number, or bank and credit card account numbers — and don’t post other people’s information, either. Be cautious about posting information that could be used to identify you or locate you offline. This could include the name of your school, sports team, clubs, and where you work or hang out.
  4. Make sure your screen name doesn’t say too much about you. Don’t use your name, your age, or your hometown. Even if you think your screen name makes you anonymous, it doesn’t take a genius to combine clues to figure out who you are and where you can be found.
  5. Post only information that you are comfortable with others seeing — and knowing — about you. Many people can see your page, including your parents, your teachers, the police, the college you might want to apply to next year, or the job you might want to apply for in five years.
  6. Remember that once you post information online, you can’t take it back. Even if you delete the information from a site, older versions exist on other people’s computers.
  7. Flirting with strangers online could have serious consequences. Because some people lie about who they really are, you never really know who you’re dealing with
  8. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust and report it to the police and the social networking site. You could end up preventing someone else from becoming a victim.
  9. Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers. A good virus protection software program can protect you, but you must keep it up to date.
  10. The terms &amp;quot;spyware&amp;quot; and &amp;quot;adware&amp;quot; apply to several different technologies. The two important things to know about them is that 1) they can download themselves onto your computer without your permission (typically when you visit an unsafe Web site or via an attachment) and 2) they can make your computer do things you don&apos;t want it to do. That might be as simple as opening an advertisement you didn&apos;t want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.
  11. Although they sound like something out of a bad science fiction movie, botnets have become a very real danger on the Internet. Botnets are made up of large numbers of computers that have been infected by criminals (using some of the tools mentioned before). Often, the people whose computers are controlled by a botnet don&apos;t even know that they&apos;ve been infected. Criminals use these armies of infected computers to attack Web sites by flooding them with massive amounts of traffic or as engines for sending spam. These attacks can devastate companies, and even entire countries in some cases. Victims caught in botnets can also be subject to identity theft as their personal information is compromised.
  12. Three protections that every computer connected to the Internet should have installed are:Anti-Virus Software, a Firewall, and Anti-Spyware Software. This software suite, which sometimes can be purchased as a package, is your frontline defense against cyber criminals and intrusions. Installing these software packages is the first step. Equally important is keeping them up to date.
  13. Anti-virus software protects your computer from viruses by scanning your computer and your incoming email and deleting anything that is infected. Viruses can destroy your data, slow your computer&apos;s performance, cause a crash, or allow spammers to send email through your account.
  14. Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don&apos;t permit. Some operating systems come with a built-in firewall that may be set on the &amp;quot;off&amp;quot; mode. Make sure you turn it on and keep it updated. Check your online &amp;quot;Help&amp;quot; feature for specific instructions.
  15. Spyware is a form of malicious software that monitors your online activities and can potentially collect your personal information. Anti-spyware software helps protect your computer from spyware. It periodically scans your computer for spyware programs, and then gives you the opportunity to remove any harmful surveillance software found. Some anti-virus software also contains anti-spyware capability. Given the increasing sophistication of spyware programs, consider using two different anti-spyware programs. Each one looks for slightly different sets of threats, and together they may offer increased protection.