email tips watch your words maybe it's the fact that you can't see his face crumple in...
TRANSCRIPT
Email Tips
Watch your words
Maybe it's the fact that you can't see his face crumple in misery
as he reads your cruel words.
Whatever the reason, it's incredibly common.
It's frighteningly easy to forget that yourcorrespondent is a person with feelings more or less like your own.
One subject per messageOne subject only once except in reply
a pertinent (UNIQUE)subject title for the message, that way the user can locate the message quickly.
UseOur trip to New YorkMike’s absenceCongrat your new job2ndversion your paper
Don’t useYour mailUpdateQuestionCongratulations
Attachments
No Large filesNo .exe files
Acknowledgement
Attaching return receipts to a message may be considered an invasion of privacy.
But you should acknowledge
Watch Recipients
the easiest way to include the list address is often to perform a Reply To All action,
which replies to both the original sender and the list.
Tocc
bcc
Don’t make it public
Respect Other People's News –
You may wish to ask them in private email to check on their plans, but it can range from rude to distressing
to break important news for someone else.
Acronyms
Acronyms can be used to abbreviate when possible, however messages that are filled with acronyms can be confusing and annoying to the reader.
Examples: FYI = for your informationBTW = by the wayFlame = antagonistic criticismIMHO= in my humble/honest opinion
Security
Safety & Privacy & Copyright
Email Privacy
Never assume your email messages are private nor that they can be read by only yourself or the recipient.
Never send something that you would mind seeing on the evening news.
Power Abuse
Some people in cyberspace have more power than others. There are wizards and experts in every office,
and system administrators in every system.
Cheating & Download
How many illegal downloads?
How much Cheating?
In real life, most people are fairly law-abiding, either by disposition or because we're afraid of getting caught.
In cyberspace, the chances of getting caughtsometimes seem slim.
-In the decade since peer-to-peer (p2p) file-sharing site Napster emerged in 1999, music sales in the U.S. have dropped 47 percent, from $14.6 billion to $7.7 billion. -From 2004 through 2009 alone, approximately 30 billion songs were illegally downloaded on file-sharing networks. -NPD reports that only 37 percent of music acquired by U.S. consumers in 2009 was paid for.-According to the Information Technology & Innovation Foundation, the digital theft of music, movies and copyrighted content takes up huge amounts of Internet bandwidth – 24 percent globally, and 17.5 percent in the U.S.
ID & Password
Never give your user ID or password to another person.
What if?
Online shopping
Read independent reviews Ask around
Some offers are so appealing How do you know
You can trust or not?
Priceline
every time you use your credit card, corporations can find everything
about you.
Financial records, spending habits,..etc.
Shopping Cards
Not my problem
Does it matter if you or you are not involved in criminal activity?
You might be framedor jut being in the wrong place at the wrong time.
There is a black market for work histories.
Pharmaceuticals, Insurance companies, and some employers, are really interested in
your work history.
Black Market
Do you smoke?NO,Data base = 25 times cigarette purchase
SICKO http://movieclips.com/fBjo-sicko-movie-pre-existing-conditions
Your History
Cookies
A small text file of information that certain Web sites attach to a user's hard drive while the user is browsing the Web site. A Cookie can contain information such as user ID,
user preferences, archive shopping cart information, etc. Cookies can contain Personally Identifiable Information
Cookies
Spyware
Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.
Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else
Spayware detector remover
• Windows defender
• http://www.safer-networking.org/
• Anti-Spyware for Mac
• http://www.spywaredetector.us
Safe Browsing
• TOR
• Hide and Search
• Chrome (incognito)
• Yahoo (don’t follow)
firewall
• “hide” your computer from the internet.
• If the worms and crackers can’t see your computer, they [hopefully] won’t attack you.
• How do you hide your computer? Use a firewall.
How it Works
It only allows connections that you originate.– All other connections are automatically blocked at the
firewall.
Creation of the cashless society will eliminate most of the rewards
for robbers and muggers.computer-controlled smart houses and cars
will thwart burglars and auto thieve.
Cashless society
Implanted Chips
• Credit card – Cell phone
• https://www.youtube.com/watch?v=BWgUTrvRlA4
Remote body function control
bodily function monitors and chemical drips
(such as “sober-up” drugs and synthesized hormones) will keep most of sexually and physically
violent offenders under control.
Remote body function control
Internet Content
Hunt real live animals over the Internet
http://www.live-shot.com
See it
• http://www.cbsnews.com/video/watch/?id=680428n
Internet Content
30% of youth are exposed to unwanted sexual material
online each year
Approximately 6,000,000 children are exposed to
sexual material when they are not looking for it
With software such asSurfControl and Netmanning ,
you can set standards and limit access to material for your kids or your employees.
Filters
1- Lock your laptops and other small electronic devices .
2- Password- Protect It
3- Don’t set it on automatic log-in
4- Manage Your Passwords (how?)
5- In your Facebook only your friends should see your posts
6- Use Free AVG Anti-Virus FREE 2013 and Ad-Aware Free Antivirus+ 10.5
Security Tips
7- Watch out for phishing messages pretending to come from your bank, or even from your university.
8- A VPN (Virtual Private Network) utility will both protect your connection and let you surf anonymously.
9- Use anti-theft software which uses GPS even if the thief formats or swaps out the hard drive.
10- Secure Your Phone- Take cheap cellphone with you to animal parties.
11- Before selling or recycling your old computer, wipe the system with a file scrubber