Thursday, August 17, 2006

August 16, 2006

Prevent your laptop/computer from being stolen:

  • Lojack- for laptops, little piece of software that runs in the back of the web browser, scenario- some one steals the computer…lojack gets the IP #/address from the computer and sends it to the internet company
  • Tag your name on your laptop (ie. On the battery- sauder your name or write it with a sharpie)
  • Change your password
  • 2 accounts on your computer your account or guest account

Avoiding Viruses:

  • Malware/viruses- steals data or destroys files, can create traffic jams on your computer, you may not know it is there
  • Install virus fighting software, make sure it runs at all times when the computer runs, check it every week to make sure it runs good
  • Anti-virus software should scan files, emails, etc.
  • Auto protect- runs in the back of the screen
  • Viruses slow computer down, spam can also hurt you
  • Today most viruses come in e-mails or websites
  • Senders have found ways to use others’ email addresses to get the malware onto your computer
  • Pirated videos have started to get viruses, so when you download the video you will get viruses on your computer

Prevent INtrusions:

  • Whackers- wireless hackers
  • Firewall software-software designed to analyze and control incoming and outgoing packets on a network, used to enhance security by filtering out potential intrusion attempts
    Hackers can get information from your computer if you stay on the internet for a long period of time
  • To block hackers you should have an active firewall
  • How to check your firewall: click the Start buttonà then click control panelà click network connectionsà click the connection you use for internet accessà under network tasks, click change settings for this connectionà click the advanced tab and look for a check mark in front of the box labeled protect my computer and network
  • Ping of death- virus that gave computers’ viruses, it pings Microsoft continuously, when someone pings Microsoft more than about 50 times, Microsoft will shut down their computer
  • “In computer terminology, a honeypot is a trap set to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information or a resource that would be of value to attackers. A honeypot that masquerades as an open proxy is known as a sugarcane.” (wikipedia)

Wednesday, August 16, 2006

Day 1: August 15

Using the Orientation Chapter we did the following:

  • Review on the CD: how to navigate through pages
Insert the CD. The book on CD will pop up. Remember to create a tracking location if it is your first time. For your tracking device you should save to the memory key. Some things are on the website and others are on the CD depending on the icon to the left of the word in the book.

  • Tracking device: save to memory key

  • We took the pre-assessment test to see what we know in this chapter. The study guide was printed out for us to use for the test.

  • We are teaching sections on 8/16: avoiding viruses, preventing intrusions, blocking spyware and pop-up ads, protecting e-commerce or transactions, avoiding e-mail scams, and protecting your privacy tomorrow.

Monday, August 14, 2006

Welcome to Computer Science

Welcome to Computer Science for teenagers. This is where Mrs. Vicki's tenth grade Introduction to Computer Science Class at Westwood Schools
makes their home. Each day a different scribe will post the class notes so that the class can participate in the discussions. Welcome!