u3a computing cmp class leader – brian moore week 7 of 10 weeks. mondays 2:30 to 4:30pm 10/11/14

17
U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 2:30 to 4:30pm 10/11/14

Upload: beatrice-tate

Post on 25-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

U3A Computing CMP Class

Leader – Brian MooreWeek 7 of 10 weeks.

Mondays 2:30 to 4:30pm10/11/14

New Members Social Event

• The committee would like to invite all new members, who have joined Crewe and Nantwich U3A since October 2013, to join us for our annual ‘Coffee and Cake’ event on

• Wednesday November19th at 2.30pm • at • Wistaston Memorial Hall.

Windows 8 Demo• Windows 8 starts in a completely different view

called Metro which is intended to allow use on Tablets. Icons have been replaced by chunky rectangular “Tiles” and NO Start menu.

• These “Apps” are different from normal programs. They are minimalistic and run full screen only.

• W8 uses mouse movements to the edge of the screen and the Windows button for control.These actions have to be remembered.

• There is still a simplified Desktop for programs.I have a program to give me back the Start Menu.

Control of Windows 8• Use of corner positions.• After switch on get a picture with date/time defined

by the last user logged in.• Top LHS & click gives a login list. Try U3A / u3a. • At Metro screen try Photos App, Top LHS RH click

gives Close & Snap- makes it like a Window. But next time shows a command bar at the bottom.

• The normal way to close an App is to drag from the top all the way down.

• RH click on a App gives commands, Unpin removes from Metro, use All apps to get back.

• Top RHS or Windows & C. Brings up the Charms bar,

a list Search, Share, Start, Devices, and Settings- includes shut down.

• Many standard Apps use the internet, slowing it down for your own use of the Internet Explorer App. Because IE layout is so minimal, its hard to see why its frozen. IE is available as a normal Program.

• New App’s can only be installed from Apps Store.• Bottom LH & click brings up a reduced desktop and

taskbar which shows all Programs and no App’s but no Startup. So Internet Explorer is the full version with all controls.

Web sites on Windows 8• http://www.bleepingcomputer.com/tutorials/how-t

o-use-windows-8-start-screen/

• http://en.wikipedia.org/wiki/Windows_8

Email Safety• If you have used Email for a while you will no

doubt encounter malicious emails in your inbox.• It is important to be able to recognise them.• They are steadily getting more and more

convincing all the time.• The main problems are Links to dubious web sites

and dubious Attachments.• Banks keep reminding users that they will never

send an Email asking for personal details or to log on to verify something.

An Example of a Malicious Email.

How to check a dubious email• First, if it’s like the previous slides, delete it.• If you are not sure, I often Google a part of it

which is unlikely to be customised for you.• Be sure to put “ “ around the phrase so Google

searches for the exact whole phrase. EG=• “Please submit the tax refund request and allow us

5-7 days in order to process it”• If it’s malicious, somebody else in the world will

have seen it and will warn about it.• Try it. Look at the results. Only open the first one

from http://www.justchat.co.uk.

Malicious Email exploiting interest in Ebola. The attachment contains the DarkKomet virus

Other Malicious Emails

Some of the newest printers have scan-to-email ability. Symantec has identified what looks like a printer generated email which tempts you to open what looks like a .doc file but in fact contains a virus.

http://mpa.com/blog/identify-malicious-email/ &http://www.makeuseof.com/tag/spot-dangerous-email-attachment/Contains helpful tips on identifying a Malicious Email.

Web sites can spread Viruses

• Web sites can be taken over by Malware hackers so that if you enter them your computer will be infected, unless-

• All Anti Virus programs now check for this. AVG has link scanner and for Google searches will show a green tick if OK.

• Even so they may be behind in finding a problem site so it’s best to avoid obvious dubious sites e.g. sites offering free music/software etc.

Internet Safety. E-mail Tips• MalwareBytes is a good program to remove

Malware. Run it in addition to a antivirus program.Download for free from http://www.majorgeeks.com/mg/getmirror/malwarebytes_anti_malware,1.html Then Save As mbam-setup-majorgeeks-2.0.3.1025.exe on your desktop then run it to install.

• http://www.emailsafety.net/tips.php A bit old.• I have made a Glossary of computer terms. It is

available for download on the CMP, Course material page of http://www.creweandnantwich-u3a.org.uk/

Practical on Hotmail• Browse to www.hotmail.com It will redirect to

Login.Live.com Outlook sign in screen. Login to [email protected] with password= u3a1234.Go to OneDrive (was SkyDrive), Documents.You should have the safe version of the malicious email mentioned earlier in your inbox. Double click on it will open a on line version of word.Its OK to click on “Proceed to refund” Then Sign Out.

• Note the large amount of space 15Gb that is available for on line storage.

Facebook

• Worlds No 1 social web site. • Browse to https://www.facebook.com/• Log in with your own account or email=

[email protected] password= u3a.Monday.

• Settings of Facebook. Think about who you want to communicate with, called Friends. Their friends can ask if you want to be friends of theirs. This can get tiresome. Even worse is requests from Everyone.

Facebook settings• Two good sites on Facebook settings=

http://www.welivesecurity.com/2014/07/08/facebook-account-settings/

• & http://thecybersafetylady.com.au/2014/06/4-important-security-settings-protect-facebook-profile/

• They are also on the Crewe & Nantwich web site, CMP, Course Material, Week 7 as Best Facebook Settings as a word document.

Twitter• For quick comments – called Tweets.• Browse to http://twitter.com/• Log in with your own account or email=

[email protected] password= u3a.Monday.

• Settings of Twitter see• http://www.fightcyberstalking.org/privacy-settings-

twitter/• This is also on the Crewe & Nantwich web site,

CMP, Course Material, Week 7 as Best Twitter Settings as a word document.