internet technology assign

Upload: arumugam6

Post on 07-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Internet Technology Assign.

    1/103

    InternetSecurity

    M.Jayakumar CT230 Internet Technology

    Individual Assignment 1

  • 8/6/2019 Internet Technology Assign.

    2/103

    P art 1 The Threats

  • 8/6/2019 Internet Technology Assign.

    3/103

    The threats

    most peopleare not awareof.

    The threatsmany of us areaware of.

  • 8/6/2019 Internet Technology Assign.

    4/103

    The Global Scope of the P roblem

    Estonia, a tiny buthighly wired country

    on the Baltic Sea,was essentially shutdown for 3 weeksduring April and Mayof 2007 by organizedcyber attacks.

  • 8/6/2019 Internet Technology Assign.

    5/103

    The Global Scope of the P roblem

    2 dozen SouthKorean & U.S.Government

    agencies & otherswere attacked inJuly 2009. Targetsincluded the DoD,

    FAA, HomelandSecurity, NYSE,NASDAQ, etc.

  • 8/6/2019 Internet Technology Assign.

    6/103

    The National Scope of the P roblem

    Database breach by hackers personalinformation on 160,00 current and former students and alumni stolen.

    530,000 medical records stolen includingsocial security numbers.

    Sensitive information on 65,000 currentand former employees stolen.

    A few of the many major security breachesthat became public in the 2 nd Quarter of 2009.

  • 8/6/2019 Internet Technology Assign.

    7/103

    The P ersonal Scope of the P roblem

    E-mail scamsIdentity theft

    Damage, repairs & replacementsP roductivity loss

  • 8/6/2019 Internet Technology Assign.

    8/103

    Malware Headlines YouMight Have Missed

    10-11-09 - Spam dominates e-mail traffic (86%)10-11-09 - Malware threats in search engine results

    10-08-09 - FBI nets 100 people in phishing ring10-07-09 - Fox Sports site hacked toserve malware

    10-06-09 - Malware flea market pays hackersto hijack P C

    10-06-09 - Weak passwords dominateHotmail phishing leak

  • 8/6/2019 Internet Technology Assign.

    9/103

    Malware Headlines YouMight Have Missed

    10-05-09 - P hony Facebook profilesspreading malware

    09-30-09 - Malware re-writes online bankstatements cover fraud

    09-30-09 Earthquake / tsunami searcherstargeted by malware

    09-15-09 - Malware ads hit NY Times09-15-09 - Operating systems not thekey security risk anymore

    08-20-09 - Malware designed to stealIDs increased 600%

  • 8/6/2019 Internet Technology Assign.

    10/103

    Malware malicious software

    Intent is todamage, disrupt,

    steal, or otherwise inflictproblems on

    data, hosts, or networks.

  • 8/6/2019 Internet Technology Assign.

    11/103

    The Scope of the P roblemThe number of NEW malware threats is increasing

    New malicious codesignatures - Symantec

    2007

    2008

  • 8/6/2019 Internet Technology Assign.

    12/103

    What are the Threats?

    Tracking CookiesFlash CookiesAdwareHoaxesScamsP hishingVishing

    Not malwareBackdoor KeyloggersViruses & WormsWormsTrojansSpywareRootkitsBots

    Malware

  • 8/6/2019 Internet Technology Assign.

    13/103

    Tracking CookiesNot malwareTag containinginfo, sometimes

    useful to youNo personal infounless offeredCookie storage canbe limitedMay expireEasy to remove

  • 8/6/2019 Internet Technology Assign.

    14/103

    Flash CookiesLargely unknown,widely usedInstalled by a FlashpluginNever expireMore cumbersome

    to removeCan send info w/ouser permission

    Adobe

    Flashlogo

  • 8/6/2019 Internet Technology Assign.

    15/103

    Flash Cookies

    Widelyused

    includingin Extension

  • 8/6/2019 Internet Technology Assign.

    16/103

    AdwareFree software thatplays, displays or downloads advertising

    May be toolbars,search boxes, games,utilitiesMostly safe but some isspywareRead privacy policies

  • 8/6/2019 Internet Technology Assign.

    17/103

    Social Engineering

    Means:Manipulatingpeople to dothings or todivulge

    confidentialinformation

  • 8/6/2019 Internet Technology Assign.

    18/103

    P hishing

    Aim is to stealvaluable informationsuch as credit cards,social securitynumbers, user IDsand passwordsUsually done by e-mailSocial engineering

  • 8/6/2019 Internet Technology Assign.

    19/103

    P hishingOften masquerades as legitimateperson or business, even governmentOften contains a threat or consequenceE-mail may look genuine, trustworthyAlways points to different website thanit appears to come from.Legitimate organizations never ask for sensitive information through e-mail

  • 8/6/2019 Internet Technology Assign.

    20/103

    P harming

    Intent is to redirect alegitimate website's

    traffic to another,nearly identical butbogus website for

    the purpose of stealing sensitiveinformation.

  • 8/6/2019 Internet Technology Assign.

    21/103

    Scams

    Based on socialengineeringOften appeal tocompassion or greedDisasters typically

    generate largenumbers of scamsAppear legitimate

  • 8/6/2019 Internet Technology Assign.

    22/103

    ScamsDont click on linksin these e-mailsTypically offer something of value,ask for money in advanceNearly impossible to track themonetary transactionsScammers are accomplished socialengineers

  • 8/6/2019 Internet Technology Assign.

    23/103

    ScamsNigerian money fraud scams began in1997 or before by fax!These scams have spreadto 80 countries or more.U.S. and U.K. are major targets

  • 8/6/2019 Internet Technology Assign.

    24/103

    Scam TargetsDating sites - exploitthe victims desire for a companionship

    Religious sites - seekdonations from their victims for worthy

    causeSocial websites -exploit personal info

  • 8/6/2019 Internet Technology Assign.

    25/103

    Scams

    US - $1-$2 billion

    UK 150 millionpoundsAustralia - $36

    million AUD

    Estimated annual losses

  • 8/6/2019 Internet Technology Assign.

    26/103

    TrojansP rograms thatmasquerade asgood programs

    Can spy, stealinformation, logkeystrokes,download other malwareOpen backdoors,over write data

  • 8/6/2019 Internet Technology Assign.

    27/103

    Trojans

    Cannotreproduce

    Must be spreadby user interactionMany differenttypes of trojans

  • 8/6/2019 Internet Technology Assign.

    28/103

    VirusCan create files,move files, erase filesCan consume

    memory and causecomputer problemsCan replicateCan attach to other

    programsCan travel acrossnetworks

  • 8/6/2019 Internet Technology Assign.

    29/103

    WormsA special type of virusCan replicate itself and usememory

    Reproduce so fast theyoverload and shut downentire systemsCannot attach itself to other

    programs.Spreads mostly by e-mail

  • 8/6/2019 Internet Technology Assign.

    30/103

    Backdoor

    Malware thatallows access to acomputer withoutknowledge of theusers passwordand user name.Allows attackerseasy remoteaccess

  • 8/6/2019 Internet Technology Assign.

    31/103

    Spyware

    P urpose is tocapture information

    Email, usernames,passwords, creditcard info, etc.Can transmit thisinformation

  • 8/6/2019 Internet Technology Assign.

    32/103

    Rootkit

    Help intruders gainaccess to systemsAvoid detectionSubversion &evasionMay avoid anti-virus or anti-spyware scan

  • 8/6/2019 Internet Technology Assign.

    33/103

    Bots or ZombiesA computer infectedwith malware,controlled remotely

    without the knowledgeof the user Combined into

    networks calledbotnetsRented or sold tocriminal interests

  • 8/6/2019 Internet Technology Assign.

    34/103

    Bots or Zombies

    Can be used to propagate malware or for cyber attacks

    Botnets may consist of thousands of machines worldwideUsed to send about 80% of all spamand to attack commercial websitesand other systems

  • 8/6/2019 Internet Technology Assign.

    35/103

    Bot Network

  • 8/6/2019 Internet Technology Assign.

    36/103

    IntermissionWhen we returnhow do we protect our computers and our data?

  • 8/6/2019 Internet Technology Assign.

    37/103

    P art 2 The P rotection

    Weve covered the threats, but how

    do we protect ourselves?

  • 8/6/2019 Internet Technology Assign.

    38/103

    UseBestP ractices

    Data

    Router w/hardware firewall

    ZoneAlarmsoftware firewall

    Spybot w/ teatimer

    Super AntiSpyware

    Anti virussoftware

    BackupData

  • 8/6/2019 Internet Technology Assign.

    39/103

    Best P racticesP hysical computer securityLegal agreements - read the fine print

    Use good passwordsKeep passwords safeUse a flash drive capable of read-only

    Update your operating system (OS)Update your applications

  • 8/6/2019 Internet Technology Assign.

    40/103

    Best P ractices

    Use a hardware firewallUse a software firewall

    Use and update security products ie: anti-spyware, anti-virus, etc.Clean the system regularly

    Backup system regularly (after cleaning)Suggest using FireFox w/ security plugins

  • 8/6/2019 Internet Technology Assign.

    41/103

    P hysical Computer Security

    Limit physicalaccess tocomputersespecially laptops

  • 8/6/2019 Internet Technology Assign.

    42/103

    P hysical Computer Security

    All users shouldbe required to login, even at homeA P C with no log-in password is likea car with the keysin the ignition.

  • 8/6/2019 Internet Technology Assign.

    43/103

    Legal AgreementsA software licenseagreement is a legalcontract between a

    producer and apurchaser of computer software.Called End User

    Licensing Agreements(EULA) or Terms of Use(TOU)P rivacy Agreements

  • 8/6/2019 Internet Technology Assign.

    44/103

    Read the Fine P rint

    Agreeing to theseelectronic documentsmeans you are signinga legal contract.Read them beforeagreeing

    Suggest you keep acopy (paper or digital)

  • 8/6/2019 Internet Technology Assign.

    45/103

    Use Good P asswords

    Great Internetsecurity meansnothing if thebad guys canguess your passwords

  • 8/6/2019 Internet Technology Assign.

    46/103

    Keep P asswords Safe

    Need a system of choosing and usinggood passwords orP asswordmanagementsoftwareExamples: Roboform,Kee P ass, others

    KeeP

    ass

    RoboForm

  • 8/6/2019 Internet Technology Assign.

    47/103

    P assword Management Software

    P assword generator Master password

    Encrypted database of passwordsDesktop, portable, Web-based

  • 8/6/2019 Internet Technology Assign.

    48/103

    USB MalwareFlash drivesbanned by USArmy in 2008 due

    to malware andsecurity concerns.An estimated 10%of malware waswritten to move ona flash drive.

  • 8/6/2019 Internet Technology Assign.

    49/103

    USB Flash Drive w/ Read-OnlyMay be difficult tofindHave a physical

    switch that preventswriting (andspreading malware)to the flash drive

    useful on unknown /unfamiliar computers

  • 8/6/2019 Internet Technology Assign.

    50/103

    Upgrade vs Update

    An upgrade from v2.5to v2.6 for example issimply a major updateUpgrading is takingyour vitamins; fixing ahack is open-heartsurgery. MattMullenweg, foundingdeveloper of Word P ress

  • 8/6/2019 Internet Technology Assign.

    51/103

    Update Your Operating System

    Install allsecuritypatchesGo toWindowsUpdatewebsite

  • 8/6/2019 Internet Technology Assign.

    52/103

    Update Your

    OperatingSystem

    Set autoupdates todownload

    but notinstallunless youapprove

  • 8/6/2019 Internet Technology Assign.

    53/103

    Update/ Upgrade Your Applications

    Hackers are finding waysto embed malware ineveryday programsIn July 2009 it happened to Adobe P DFfiles. Adobe issued a patch.Unless you install the patch, yourevulnerable when viewing P DFs

  • 8/6/2019 Internet Technology Assign.

    54/103

    Update Your Applications

    Average computer holds 80+ programsHow to keep them all updated?

    If offered, turn the auto-update onUpdate often-used programs manuallyHelper programs for the rest - Secunia

    Free, checks your programs, notifiesyou when updates are needed

  • 8/6/2019 Internet Technology Assign.

    55/103

    Update Your Applications

  • 8/6/2019 Internet Technology Assign.

    56/103

    Data

    Router w/hardware firewall

    ZoneAlarmsoftware firewall

    Spybot w/ teatimer

    Super AntiSpyware

    Anti virussoftwareUse

    BestP

    ractices

    BackupData

  • 8/6/2019 Internet Technology Assign.

    57/103

    Firewall Technology

    Hardware or software designed and implemented tocontrol the flow of network traffic.A firewall is simply a program or hardware devicethat filters the information coming through theInternet connection into your private network or computer system.If an incoming packet of information is flagged bythe filters, it is not allowed through.

  • 8/6/2019 Internet Technology Assign.

    58/103

    Firewall TechnologyA company will have hundreds of computers that allhave network cards connecting them together. Oneor more computer will have connections to theInternet. Without a firewall in place, all of thosehundreds of computers are directly accessible to

    anyone on the Internet.Out of the 500 computers inside this company, onlyone of them is permitted to receive public FT P traffic.Allow FT P connections only to that one computer

    and prevent them on all others.Company can control how employees connect toWeb sites, whether files are allowed to leave thecompany over the network

  • 8/6/2019 Internet Technology Assign.

    59/103

    Firewall TechnologyFirewalls use one or more of three methods to controltraffic flowing in and out of the network:

    P acket filteringP roxy serviceStateful inspection

  • 8/6/2019 Internet Technology Assign.

    60/103

    Hardware Router w/Firewall

    First line of defenseAvailable in wired or wireless versionsWired is more secureP rotects againstincoming attacks$100 - $150

  • 8/6/2019 Internet Technology Assign.

    61/103

  • 8/6/2019 Internet Technology Assign.

    62/103

    Software Firewall

    Use the pre-installed Windowsfirewall only if you have no other options.Turn it off before installing a better product.If you have the X P operating systemyou MUST obtain a software firewallDO NOT use X P s firewall.

  • 8/6/2019 Internet Technology Assign.

    63/103

    Install firewall first,then install other security software

    antivirus, antispyDo not install multiplesoftware firewallsZoneAlarm P ro isadequate - $40Does require systemresources

    Software Firewall

  • 8/6/2019 Internet Technology Assign.

    64/103

    Data

    Wireless Router w/hardware firewall

    ZoneAlarmsoftware firewall

    Spybot w/ teatimer

    Super AntiSpyware

    Anti virussoftwareUse

    BestP

    ractices

    BackupData

  • 8/6/2019 Internet Technology Assign.

    65/103

    Antivirus Software

    Many softwareoptionsMany are free,or free trial

  • 8/6/2019 Internet Technology Assign.

    66/103

    Antivirus SoftwareWorries for all computer users is the threat of viruses entering their systemsFight against all kinds of malicious attacks andprevent adware, spyware, Trojans and worms fromentering into the computer System for analyzing information and then, if it findsthat something is infected, it disinfects itAntivirus software acts basically in two ways

    - Scanning files- Heuristic Approach.

  • 8/6/2019 Internet Technology Assign.

    67/103

    Antivirus SoftwareScanning Files

    Employs a database of familiar virus code andapplies it to compare the files with the knownmalicious codeDatabase of the antivirus updated so that it canprevent the malicious attacks which are beingcrafted each and every day.After the match have been detected, Antivirus willtake action in three different forms:

    - Quarantine the file- Repair the infected files- Remove the file

  • 8/6/2019 Internet Technology Assign.

    68/103

    Antivirus SoftwareThe Heuristic Approach

    Keeps track of the type of the programs that areexecutable on a computer Doubtful behavior is identified then a prescheduledrange of responses are activatedThe response can start from asking the owner of theP C how execute the process of deleting themalicious code automaticallyP rotects against latest malware threats that are yetto be identified or registered in theantivirus database.

  • 8/6/2019 Internet Technology Assign.

    69/103

    Security P olicySecurity policies are rules that are electronicallyprogrammed and stored within security equipmentto control such areas as access privilegesThe policies that are implemented should controlwho has access to which areas of the network andhow unauthorized users are going to be preventedfrom entering restricted areasThe security policy management function should be

    assigned to people who are extremely trustworthyand have the technical competence required.

    In the future, some passwords may be replaced by biometrics, which is technology that identifies users based on physical characteristics, such as fin

  • 8/6/2019 Internet Technology Assign.

    70/103

    Security P olicyImplementation

    Identity methods and technologies must beemployed to help positively authenticate and verifyusers and their access privileges.Making sure that certain areas of the network arepassword protectedonly accessible by thosewith particular passwordsThe golden rules, or policies, for passwords are:

    - Change passwords regularly- Make passwords as meaningless as possible- Never divulge passwords to anyone until

    leaving the company

  • 8/6/2019 Internet Technology Assign.

    71/103

    Security P olicy

  • 8/6/2019 Internet Technology Assign.

    72/103

    Security policyDigital Certificate

    E-commerce has flourished because of the ability to performsecure transactions online using the proper tools. These toolsare public key encryption and digital certificates.P ublic key encryption uses SSL (Secure Sockets Layer) toencrypt all data between the customer's computer and the e-commerce websiteAnyone can create a website and key pair using a name thatdoesn't belong to them. This is where digital certificates comein.Digital certificates are trusted ID cards in electronic form thatbind a website's public encryption key to their identity for purposes of public trust

    S i li

  • 8/6/2019 Internet Technology Assign.

    73/103

    Security P olicyDigital Certificate

    Digital certificates are issued by an independent,recognized and mutually trusted third party thatguarantees that the website operating is who itclaims to be. This third party is known as aC ertification Authority ( C A) .Digital certificate contains an entity's name, address,serial number, public key, expiration date and digitalsignature, among other information.

    When a Web browser like Firefox, Netscape or Internet Explorer makes a secure connection, thedigital certificate is automatically turned over for review..

  • 8/6/2019 Internet Technology Assign.

    74/103

    Security P olicyDigital Certificate

    The browser checks it for anomalies or problems,and pops up an alert if any are found.When digital certificates are in order, the browser completes secure connections without interruptionDigital certificates play an integral role in keepingonline commerce safe. If your browser alerts you toa problem with a digital certificate, you are well-advised not to click through. Instead, call the

    business using a telephone number from your statements or phone book, and inquire as to theproblem.

  • 8/6/2019 Internet Technology Assign.

    75/103

    Security P olicyDigital Certificate

  • 8/6/2019 Internet Technology Assign.

    76/103

    Access ControlAccess control systems are electronic systems which aredesigned to control who has access to a networkDoor which can be locked, limiting people to one side of thedoor or the other.

    Access control servers validate the users identity anddetermine which areas or information the user can accessbased on stored user profilesAccess control systems which span over computer networksare typically administered in a central location, with each user being given a unique identity.An administrator grants access privileges to personnel on acase by case basis, using settings within the administrationsoftware.

  • 8/6/2019 Internet Technology Assign.

    77/103

    EncryptionEncryption technology ensures that messagescannot be intercepted or read by anyone other thanthe authorized recipientEncryption is usually deployed to protect data that istransported over a public network and usesadvanced mathematical algorithms to scramblemessages and their attachments.All VP N hardware and software devices support

    advanced encryption technology to provide theutmost protection for the data that they transport.

  • 8/6/2019 Internet Technology Assign.

    78/103

    Encryption

  • 8/6/2019 Internet Technology Assign.

    79/103

    Intrusion DetectionA network-based intrusion detection system (IDS)provides around-the-clock network surveillanceAn IDS analyzes packet data streams within anetwork, searching for unauthorized activity, such asattacks by hackers, and enabling users to respond tosecurity breaches before systems are compromisedWhen unauthorized activity is detected, the IDS cansend alarms to a management console with details

    of the activity and can often order other systems,such as routers, to cut off the unauthorizedsessions.

  • 8/6/2019 Internet Technology Assign.

    80/103

    Intrusion Detection

  • 8/6/2019 Internet Technology Assign.

    81/103

    Network ScanningNetwork scanners conduct detailed analyses of networked systems to compile an electronicinventory of the assets and detect vulnerabilities thatcould result in a security compromiseAllows network managers to identify and fix securityweaknesses before intruders can exploit them

  • 8/6/2019 Internet Technology Assign.

    82/103

    Spybot Search & Destroy

    Eliminatesadware,spyware,Trojans,keyloggers,dialers

    - Free- Real-time protection

  • 8/6/2019 Internet Technology Assign.

    83/103

    Spybot Search & Destroy

    Malware often changesthe registrySpybot warns of potential

    registry changes withTea-timerLegitimate softwareinstallations also changethe registry and maycause false alarms

  • 8/6/2019 Internet Technology Assign.

    84/103

    Spybot Search and Destroy

    Will immunizethe systemLike a Do NotCall list of websites for your browser

  • 8/6/2019 Internet Technology Assign.

    85/103

    Super AntiSpyware

    Removesspyware,Adware

    Trojans,Dialers,Worms,HiJackers,KeyLoggers,P arasites,Rootkits

    - Free

    - Real-time protection- Can be scheduled

  • 8/6/2019 Internet Technology Assign.

    86/103

    MalwareBytes

    Free versionFull version (onetime fee of $24.95)includes real-timeprotection.

  • 8/6/2019 Internet Technology Assign.

    87/103

    Data

    Wireless Router w/hardware firewall

    ZoneAlarmsoftware firewall

    Spybot w/ teatimer

    Super AntiSpyware

    Anti virussoftwareUse

    BestP ractices

    BackupData

    How to Use These

  • 8/6/2019 Internet Technology Assign.

    88/103

    How to Use TheseTools Effectively

    P ick one day of the week (Sunday AM?)Use the tools in this order: Spybot,SuperAntispyware, AntivirusStart one tool, go read the paper When one tool has finished, start thenext, go read the paper When all tools are done, do a completebackup and label it w/ date & clean

  • 8/6/2019 Internet Technology Assign.

    89/103

    Backup Your DataWhy backup?Data loss or corruption

    Human error, fire,flood, malwareBacking up is

    cheaper, easier thanre-creating the data

  • 8/6/2019 Internet Technology Assign.

    90/103

    Backup Your DataMany ways tobackupData only, wholesystem, online,localCompressed,

    uncompressed,automated

  • 8/6/2019 Internet Technology Assign.

    91/103

    Data-Only Backup

    Dozens of softwarechoices for everybudget & free

    Backs up selected filesTypically usesproprietarycompressionSyncToy Free MSprogram nocompression

    Back2Zipfree software

  • 8/6/2019 Internet Technology Assign.

    92/103

    Whole-System BackupTakes an image of the whole system noteach file individually

    Several choicesincluding Acronis,Norton Ghost, others

    Backup in 15-20 min,restore - 30 min to 1 hr

  • 8/6/2019 Internet Technology Assign.

    93/103

    Online Backup Service

    AdvantagesInexpensive

    Some operate inthe backgroundDisadvantagesMonthly feeDepends onInternet access

  • 8/6/2019 Internet Technology Assign.

    94/103

    Local External BackupAdvantagesLow one-time costMulti-purpose

    Easily accessibleDisadvantageRisks similar tooriginal dataNote keep unitunplugged unless in use

    ExternalHard Drive

  • 8/6/2019 Internet Technology Assign.

    95/103

    FireFox with Security P lugins

    A plugin is an additionalcomponent or featurethat can be added to alarger programNoScript to stop webscripts from running

    Better P rivacy tocontrol Flash cookies

  • 8/6/2019 Internet Technology Assign.

    96/103

    Virtual P C P roductsThese programs create a virtual P Cwithin your real P C.When programs run in the virtual P C,

    they cant make changes to the real P CRequires some technical knowledgeRequires extra processing power

    Extremely safe if the VirtualP

    C getsinfected, simply delete it and create anew one.

  • 8/6/2019 Internet Technology Assign.

    97/103

    Virtual P C Software

    Microsoft Windows Virtual P CVMware

    Connectix VirtualP

    CSun VirtualBox

  • 8/6/2019 Internet Technology Assign.

    98/103

    Creates a small virtual space insideyour computer called a sandbox.Can run a program or browser insidethe sandbox.Smaller learningcurve than aVirtual P C

    Less processing power neededthan a Virtual P C

    Sandboxie

    C i l Wh d h l

  • 8/6/2019 Internet Technology Assign.

    99/103

    You

    CommercialRepair

    Local P C

    Users Groups

    Friends & family

    CompUSA

    GeekSquad

    Localrepair shop

    Etc.

    When you need help

  • 8/6/2019 Internet Technology Assign.

    100/103

    When You Need Help

    You are a key componentBecome knowledgeable about basiccomputer problems whats serious,whats notUnderstand who your resources are,who can deal with which problemsAsk around about commercial repair options whos recommended?

  • 8/6/2019 Internet Technology Assign.

    101/103

    50+ organized groups around thestate. Dues avg $25-$35/yr FACUG Fla Assn of Computer User Groups is the umbrellaorganization - list is athttp://www.facug.org/Members help members w/

    problemsAttend meetings occasionally build relationships

    P C Users Groups

  • 8/6/2019 Internet Technology Assign.

    102/103

    DisclaimersInformation presented here is based oncurrently available information.This information changes frequently. Noguarantee of accuracy is possible.

    Hardware, software, companies and techniquesdiscussed are options, not recommendations. You alone are responsible for software and /or hardware choices and use of any techniques.

    P lease read all legal agreements, instructions,user agreements and privacy terms associatedwith any hardware, software or websites.

  • 8/6/2019 Internet Technology Assign.

    103/103

    Thanks You