STOP • THINK • CLICK 7 PRACTICES FOR SAFER COMPUTING

The Internet can give you access to information, entertainment, financial offers, and countless other services. At the same time, it can leave you vulnerable to online scammers or identity thieves. Learn experts’ top seven practices for safer computing, as well as some terms and remedies. PAGE 2 personal information.personal Internet , secure your computers, your andprotect providing tipsto helpyou practical guard against of thefederal government andthetechnology industry The FTC managesOnGuardOnline.gov, ajoint project abroad. lawcriminal enforcement agencies intheU.S. and and investigative tool usedby hundreds ofciviland Consumer Network, Sentinel a secure online database more. The FTC enters consumer complaints into the video, How to File aComplaint, at ftc.gov/video to learn (1-877-382-4357); TTY: 1-866-653-4261. Watch anew issues, visitftc.gov toll-free, orcall 1-877-FTC-HELP To filea complaint orgetfree information on consumer Work-At-Home Schemes... andMore Sweepstakes • Telemarketing Online Shopping •ScholarshipScams Identity •InvestmentTheft Schemes Credit • Debt Collection • Employment and Job Placement Claims •Buying, Leasing, andRenting Cars a widerange ofissues, including: Consumers theFTC contact can for free information on to helpconsumers spot, stop, andavoid them. practices in the and marketplace to provide information to prevent fraudulent, deceptive, andunfairbusiness agency.protection The FTC works for theconsumer The Federal Trade Commission isthenation’s consumer Keepthem inmindasyoutake advantageto offer has the Internet all of ­­ fraud, Internet against secure your computer, your andprotect personalinformation. preparedthis supplement. provideto helpyouThe articles tips practical beonguard The Federal Trade Commission (FTC),the nation’s consumer protection agency, unwittingly share personalinformation. likelyto download aspyware detector, andfar lesslikelyto disclose, expose, or mishap. Anaware computer user ismore likelyto recognize aphishinge-mail, more With awareness asyour safety net, you anInternet the chance canminimizeof computer fraud usersagainst anddeception online. The FTCof defense believesline consumerthat the first educationtruly is for information, finances, andmore. give onlinescammers, hackers,thieves andidentity to your access computer, personal The flip-side, however, affords theanonymity it –and theInternet that is –alsocan goes on. list new people...the a bookordownload musicandgames, communicate withfriendsandfamily, meet t.v. shows, news, catchthe latest intereststhat topic you, discuss a take classes, buy the Internet,Thanksto online, anything you about canbuyjust watch movies and – safely. PAGE 3 for personal information, don’t reply or click on reply don’t personal information, for company a if check To message. the in link the an or placed an account have you with whom them contact information, such need may order a like genuine, be to know you way a in directly any In assistance. directory from number phone via email information send personal don’t case, because email is not transmission a secure method. company’s a through information financial or check that you the site is secure. until website the on icon lock a like indicators for Look URL bar or a website status that browser’s “secure”). stands for “s” (the “https:” begins some foolproof; is indicator no Unfortunately, security icons. forged scammers have website the information personal what explain and is used, how the information collects, The whether it to parties. third is provided have you whether tell should also policy privacy website the information what see to right the and whatthehas about security measures you information. protectto takes your company you if or – policy privacy a see don’t you If business doing consider – it understand can’t elsewhere. • If you get an email or pop-up message asking asking message pop-up or email an get you If • personal provide don’t online, shopping When • should These policies. privacy website Read •

Protect your personal your Protect information. valuable. It’s To an identity thief, your personal information personal information your an identity thief, To personal your target would one no think you If control entirely can’t you Unfortunately, account phone number, email or home address, find – number Security Social or numbers, will it how and used be to going it’s how out In general, it. share you before be protected home last name, your idea its a good keep to and phone number yourself. to address, • If asked for personal information – your name, name, – your personal information for • If asked can provide instant access to your financial financial your to access instant provide can and other assets. credit record, your accounts, is thatThe reality think again. information, According theft. identity of victim a be can anyone are there survey, Commission Trade a Federal to often It’s year. every victims million 10 almost their obtained thieves how know to difficult While it definitely information. personal victims’ some cases start when online can happen offline, is stolen. data a victim of identity will become whether you Butthese following tips can help minimize theft. online: risk while you’re your 1

Test Your Knowledge: Check Out the Interactive Quizzes at OnGuardOnline.gov. at Quizzes Interactive the Knowledge:Your Check Out Test

7

seven practices. seven To be safer and more be safer To adopt these online, secure Computing Safer for Practices PAGE 4 “” involves –andit Internet similar message? It’s a scam called yourand verify information.” information. to update Pleaseclickhere of accounts, we couldn’t your verify your identity.” the linkbelowandconfirm please click that your account is not compromised, transaction onyour account. To ensure problems. they canbecontacted incaseyou have a working telephone number at which should give you aphysical address and legitimate businessorindividualseller the sellerbefore Check out you buy. A to know withwhomyou’re dealing. a legitimate business, so you need for online scammers to impersonate look in the eye. It’s remarkably simple trustworthiness with a gut-affirming online, you can’t judge an operator’s the Internet.world aswell ason But people in the bricks and mortar you’re getting into. There are dishonest 2 Have you received emailwitha “During our regular verification “We suspect an unauthorized orPrey? Bait PHISHING: dealing with. you’re Know who And know what And know what To dofile-sharing, your it computer thatto an software needsspecial connects informal network ofcomputers running the samesoftware. some dire consequence ifyou don’t account information. threaten might It need to “update” or “validate” youragency. The message usually says you payment service, oreven agovernment ProviderService (ISP), bank, online deal with–for example, anInternet business or organization that you might messages claiming to be from a victims. information) from unsuspecting passwords, or other sensitive information, SocialSecuritynumber, card(credit numbers, bankaccount messages to lure personal information fraudsters who send spam or pop-up “Phishers” send spam or pop-up True orFalse: and is still the oneyou and isstill to intendedvisit. the siteyou doesn’t change of visit URL address field, theactual watching that window and type the URL into the statements. Oropenanew browser informationcontact from your account calling the company directly, using verify that the site is legitimate by to updatewebsite your information, this way. If you are directed to a companies don’t ask for information ask for personalinformation. Legitimate click onlinksthat inemailorpop-ups takeDon’tthe bait: replyto or NEVER a legitimate organization’s, isn’t. but scam: avoid getting hooked by a phishing problems. whereto report their websites about on Most organizations have information impersonatedthe phishingemail. in the company, bank, or organization information to [email protected] and to • Area codes canmislead. Some delete random emailsthat ask you yourof card. credit Inany case, financial statements theback oron with, callthe number on your an organization you do business reflect their real location. To reach appearsto be from a legitimate that scammers sendanemail These additional tips may help you Forward isphishingfor that spam you to a website that looks just like to confirm ordivulge your financial the area code you calldoesnot Internet ProtocolInternet (VoIP)technology, Becausethey use Voice Over account oraccess a “refund.” business and ask youto call a phone numberto update your information. respond. The message directs downloads. totolerate the side effects of any free sure you understand and are willing End UserLicensing Agreementto be software, upcarefully. it set Read the breakingthe law. laws, which would mean you could be the copyright isprotected bythat else. Oryou may download material pornography labeledassomething you may unwittingly download personal documents. Inaddition, medical records, photos, or other like yourtax returns, emailmessages, other information onyour hard drive, files you intend toshare, to also but could permit access not justto the don’t checkthe proper settings, you easily accessible. time. Oftenthe software is free and throughthis softwareother one at of users could be connectedto each runningthe same software. Millions informal network of other computers that connects your computerto an You download specialsoftware and software. How does it work? information, includingmusic, games, sharing gives accessto a wealth of users share filesonline. File- Worth thehiddencosts? AND FILE-SHARING: FREE SOFTWARE • Be cautious about opening any • Review and bank If you decide to use file-sharing If youto usefile-sharing decide But file-sharing poses a risk. If you Every day, millions of computer computer’s security. software canweakenthat your files can contain viruses or other regardlessthem. whosent of These files from emails you receive, attachment ordownloading any balances. your billingaddress andaccount card company or bankto confirm a couple days, of callyour credit statement islate by morethan unauthorized charges. If your you receivethem to check for account statements assoon software comessoftware with spyware.” “Some ‘free’

Answer: True. Answer: PAGE 5 Answer: False

You can take steps to limit your your limit to steps take can You programs or saving files or saving programs spyware: to vulnerability performance when opening system operating your Update • and Web browser software. Your Your software. browser Web and operating system (like Windows Windows (like system operating • Sluggish or downright slow slow downright or Sluggish • or Linux) may offer free software software free offer or Linux) may “patches” to close holes in the the in holes close to “patches” system that spyware could exploit. exploit. could system that spyware your computer’s Internet home computer’s your page computer your of bottom the at tray screen that might not key work “Tab” the tryto when you the next move to form) Web field in a browser setto sure your Make security high enough detectto downloads. unauthorized can It trust. and know you sites be appealing free download to file-sharing games, like software or customized toolbars, programs, or change that may other programs customize the functioning of your that however, Be aware, computer. applications software free many including software, other bundle spyware. • Random error messages error • Random • A sudden or repeated change in in change repeated or sudden A • unexpected and • New toolbars system the on icons Unexpected • example, (for work that don’t • Keys from only software free Download •

barrage of pop-up barrage ads that a browser – that is, sites otherto you takes than type intothose you box the address Clues that spyware is is spyware that Clues without computer Installed on your • A browser hijacked A • information. include: on a computer route email through your email through route of thousands to often computer, to appears it that so recipients, If account. your from come have an receive may you happens, this number of complaints overwhelming email your and recipients, from your by down shut be could account (ISP). Internet Service Provider Spyware software spyware consent, your computer your controls or monitors you send to used be may It use. computer your redirect ads, pop-up Internet your monitor websites, to keystrokes, your record or surfing, lead to could in turn, which, personal your of theft the True or False: or True lets them

getting is to check the file name. check the is to getting install software that install software spammers may tryspammers may to protection and a firewall, and a firewall, protection up-to-date anti-virus anti-virus up-to-date emails. If you don't have have don't you If emails. send unwanted spam spam unwanted send and use anonymously and use anonymously to Some spammers search search spammers Some control can they computers the Internet for unprotected unprotected for Internet the Zombie Drones Zombie on the Internet. software programs are available available are programs software viruses If your operating system doesn’t system operating If your Some operating systems and and systems operating Some Don’t be put off by the word word the by off put be Don’t You can download anti-virus can download You • Removes or quarantines or quarantines • Removes automatically • Updates software. Several free firewall firewall free Several software. it needs to be set up properly and and properly up set be to needs it online your Check regularly. updated specific instructions. for feature “Help” get a separate include a firewall, that runs in the firewall software online, while you're background an – firewall hardware a install or firewall includes that device external personal information withoutpersonal information While anti-virus permission. your email scans incoming software a guard, is like a firewall and files, to attempts outside for watching blocking and system your access sources from and to communications permit. don’t you with a built- come devices hardware be shipped in that may in firewall turn you sure Make mode. “off” the to be effective, firewall your For it on. software that: software Firewalls need don’t You “firewall.” just it how know to works; why and does it what know help Firewalls need it. you using from hackers prevent your out send to computer your What to Look Look to What Where and For Getto It ofthe websites from software in it buy or companies software anti-virus for Look stores. retail When downloading from another computer, the only way to know what you’re really really know to you’re what way the only computer, another from downloading When software, software, a as well as Use anti- Use and virus anti-spyware To be effective, your anti-virus your be effective, To Anti-virus software protects protects software Anti-virus

Dealing with anti-virus and firewall firewall and anti-virus with Dealing 3 updates automatically when you are are you when automatically updates on the Internet. circulating through the Internet. through circulating software anti-virus commercial Most download to feature a includes software should update routinely routinely update should software “bugs” with antidotes to latestthe by scanning your computer and your your and computer your scanning by then and viruses, for email incoming deleting those viruses. can destroy your data, slow your your slow data, your destroy can a cause performance, computer’s send to spammers allow even or crash, works It account. your through email Anti-virus Software Anti-virus viruses that from computer your is dealing with the effects of a is dealing with the effects virus. computer preventable exciting as flossing your teeth, but your teeth, as flossing exciting intense just Having as important. it’s neither fun; is never dental treatment protection may sound about as may protection firewall, and update update and firewall, them all regularly. PAGE 6 that you:that have spyware onit, advise experts • Don’t clickonlinks inspam • Don’t clickonany links within • Don’t installany software without • Deleteany software programsthe to scanonaregular basis it • Set an anti-spyware• Get program from If youthink your computer might you don’t want onyour computer. anti-spyware program that detects possible. yourtime youcomputer, start if once aweek –andevery least – at a vendor youtrust. know and installsspyware.spam actually software. Somesoftware offered in to offer claim that anti-spyware title bar.iconthe in windowsthe by clickingon “X” computer. Instead, closepop-up may installspyware onyour pop-up windows. Ifyou do, you the software.installing twice about think to understand– to ishardfind–ordifficult EULA downloading any software.the If beforelicense agreement (EULA) to readthe end-user time the is.knowing exactly it what Take File-sharing programs willfindand remove spyware thatbeen has what you’rewhat attaching. including a text message explaining help others trust your attachments by it or know what it contains. You can or coworker –unlessyou are expecting – even if it appears to be from a friend link. computer if you open it or follow the promiseto cleanavirusoff your file name, like “Fwd: FUNNY”. Others or colleague; some have an appealing emails appear to come from a friend or click on a link. Some virus-laden the emailattachment youto open That's why hackers oftento get lie programmed yourto infect computer. a virus or follow a link to a site that is an email or attachment that includes For example, you would have to open yourcomputer without participation. Instant Messenger won’t damage your Legitimate orvirus-laden? AND LINKS: ATTACHMENTS EMAIL Don’t open an email or attachment Don’t openanemailorattachment Most viruses sent over email or

secretly installedonyour computer.

True orFalse: 4 update themregularly. properly,software and activatethe filter. types of spam. It may be up to you to giving you the ability to filter certain software may helpyou avoid virusesby attacks.the latest against Your email update your system with defenses website so you can visit often and this,the manufacturer’s bookmark patches. If your system does not do to automatically retrieve and install popular operating systems canbeset hackersthat holes could exploit. Many offer free software “patches” that close choices, useyour “Help” function. For help in understanding your built-in securityfeatures. menus for “Options” “Tools” or Check the security. your online increase system to operating browser or in your the settings by changing Lessen your risk arethat unsecured. Windows orLinux) system software (like Firefox) andoperating Internet Explorer or of browsersWeb (like Hackerstake advantage Your operating system also may Web browser system and operating set up your sureBe to 5 HmWc@wCc. a woodchuck chuck” would become For example, “How much wood could resembleintothat letters. numbers password, converting someletters use the first letter of each word as your is to think of a memorable phrase and computer. Totougher for makethem: it passwords to gain access to your for your password. Service Provider (ISP) should never ask email,the phone. oron Your Internet share passwords on the Internet, over • Don’t usepersonalinformation, • Avoid common words: some hackers • Usepasswords havethat least at One way to create a strong password Hackers to figure may out your try the keyboard aspasswords. your login name, or adjacent keys on wordthe dictionary. in use programs that can try every characters.than onewitheight A 12-character password is stronger password,to crack. is tougher it the numbers or symbols. The longer the eight characters and include

out of plainview. of out Don’t in asecure place, and passwords. Protect your Keep your passwords Answer: False Answer: PAGE 7 Web address iscorrect you know the in type and window browser Internet new a open Or genuine. be to know you number telephone a information, using organization the personal contact your for asking organization an from email Answer: c. you If getanunexpected should you do? should you . You get an email You that asks for your your asks for that information. What What information. File a report File with law the spam to the FTC at at the FTC the spam to it so that [email protected] law to can be available enforcement. personal and financial – like your information Social Security number or numbers. account personal and financial a. Do not respond. Send Do not respond. a. emailing avoid Always b. and b. a. c. support your written statement. support written statement. your debts fraudulent the and closed been has discharged. about the theft. conversations • Use the ID Theft Affidavit at ftc.gov/idtheft to ftc.gov/idtheft at Affidavit Theft ID the Use • that the disputed account verification • Ask for your of records and documents of copies Keep • File a police report. a police File with deal you help to officials enforcement of proof the crime. want who may creditors Commission. Trade Report the theft the Federal to visit ftc.gov/idtheft information, more For reports fightto phishing. Divulged Personal Personal If you have mistakenly have If you Information given out personal personal out given The alert tells alert tells The information, file a complaint file a information, If you get deceptive spam, including including spam, deceptive get you If If a scammer takes advantage of of advantage takes scammer a If at ftc.gov, and then visit the Federal at ftc.gov, nternet Fraud nternet enforcement agencies, uses these these uses agencies, enforcement Trade Commission’s Identity Theft Identity Commission’s Trade learn to ftc.gov/idtheft at website damage of risk your minimize to how personal your of theft potential a from information. other fraud-related complaints into into complaints fraud-related other online secure a Sentinel, Consumer of hundreds to available database enforcement civil and criminal law and abroad. in agencies U.S. the Spam Deceptive information, your email phishing for Be [email protected]. to it forward include to sure the full header of the information. with all routing email, email phishing report may also You [email protected] Working Anti-Phishing The org. security ISPs, of consortium a Group, law and institutions, financial vendors, I an Internet auction, through you in or online, shopping you’re when Federal the to it report way, other any FTC The ftc.gov. at Commission, Trade and theft, identity Internet, enters Close any accounts that have been been have that accounts any Close If your information is accidentally disclosed or is accidentally information If your quickly these steps minimize to take stolen, deliberately identity theft. damage from the potential company where an account was opened or was an account where company Follow okay. made without your were changes of supporting include copies up in writing; documents. • Call the security or fraud departments of each the security or fraud • Call Equifax: 1-800-525-6285 Equifax: 1-888-EXPERIAN (397-3742) Experian: 1-800-680-7289 TransUnion: accounts. Close with or established fraudulently. tampered Place a “Fraud Alert” on your credit reports, reports, credit on your Alert” “Fraud a Place the reports carefully. and review they before procedures certain follow to creditors changes make or name your in accounts new open nationwide three The accounts. existing your to numbers toll-free have companies reporting credit to call a alert; fraud 90-day initial an placing for is sufficient: one company on its system, you can help it can help you system, on its the in problems similar prevent future. Crime Internet FBI’s The To ic3.gov. at Center Complaint they criminals, computer fight you. need hear from to alerting the ISP to the problem problem the to ISP the alerting

• . Following these tips, these tips, Following entitytheft goes wrong wrong goes online. Learn whoLearn if contact to something Back up important files id address on its website. Include Include website. its on address on the incidentinformation By file. log firewall’s your from Your ISP and the hacker’s ISP ISP hacker’s the and ISP Your You is). it what tell can you (if email ISP’s an find can usually

• or other crimes. personal information without personal information fraud commit permission to your name, Social Security number, Social Security number, name, number or other card credit hackers is identity theft. ID theft hackers is identity theft. occurs when someone uses your The bottom line for online threats threats online for line bottom The and spyware, like phishing, update your firewall. firewall. your update Contact: authorities. entire computer with fully fully with computer entire and anti-virus updated and software, anti-spyware your machine from the the from machine your Then scan your Internet. If your computer gets hacked hacked gets computer your If • Alert the appropriate appropriate the Alert • • Immediately disconnect• Immediately

or infected by a virus: by or infected 7 Computer or Hacking Virus

is impenetrable. Copy your important your Copy is impenetrable. and remove, can you disc a onto files place. itstore in a safe 6 online, secure stay to likely more you’re hackers, from of interference free system no But spammers. and viruses, PAGE 8 important safety and privacy lessons safety andprivacy important You’ve probably alonglistof learned where your nosybrother can’t findit. talk to strangers; hideyour diary crossing the street; up; buckle don’t in your life: Look ways both before

SOCIALnetworking sites and Teens for Tweens Tips Safety If youIf accidentally putsomethingonyour pagethat’s orprivate, too personal

you delete can it. Butyou won’t ableto be “take itback” completely. email, messaging, orinstant and usingblogs, rooms, chat information yourself about equation. Byproviding the to friends” of “friends have addedanew factor whom could bedangerous. – andstrangers, someof your employer,the police your parents, yourteachers, than you intend, including could seeyour information exchange: many more people world’s information biggest know. the is The Internet to wantthe wholeworld youthat online don’t information yourself about the list:to Don’t post Social networking sites Add onemore lesson True orFalse: • Keep somecontrol overthe • Find how different out their computerhad hacked. their identity stolen,had or online,they met someone people whowere stalked by the storiesheard about friendly intentions. You’ve people whohave less-than- increase your exposureto circle friends, of they alsocan the sitescanincrease your world large. at while But community,the orwith either withinalimited you cancommunicate, • Keep your fullname, Social information you by post view postings. anyone andeveryoneto content; othersallow to access posted users of only adefined community to join. Somesitesallow sites work before deciding phone number, and Security number, address, page. to yourrestricting access

socialnetworkingsites OnGuardOnline.gov/ information, visit For more • Trust your ifyou gut have • Bewary ifanew friend withstrangers• Flirting • Consider postingyour not • Post onlyinformation that • Make sure your screen the police. continue,to them report youtrust.threatsadult If something online,tell an uncomfortable because of threatened by someoneor suspicions. Ifyou feel where you’re going. tell aresponsibleAnd adult day, withfriendsyoutrust. public place,the during them, meet ina meet person. Ifyouto decide wants youto meet in really are. they who people lieabout consequences. Some online could have serious behappy about.not inwaysbroadcast you may photo. canbealtered or It others seeingandknowing. you are comfortable with can befound. who you are andwhere you combine to figure clues out take doesn’tto agenius it makesit you anonymous, you.about Even ifyouthink name doesn’t saytoo much them. post to yourself.numbers Don’t cardbank orcredit account

Answer: True. Even if you delete information from your page, it may still be available in older versions of your page that exist on the computers of anyone who visited who page of anyone thatexiston of your computers the versions older in available be still it may page, your from information delete you if Even True. Answer: posted. was while the information PAGE 9 the 30-day rule:the 30-day Ifacompany doesn’t promisetime, ashipping andyou’re applyingforto pay credit for your purchase,the company has50 daysto shipafter receiving your order. company is unable to ship within the promised time, theyAnswer: must True.give youThe FTC anstates that a companyoption should ship your order within the notice,time stated in its advertisements. If no time is promised,giving the company should ship youyour order within the30 days after choicereceiving it. If the of agreeing to the delay or canceling your order and receiving a prompt refund. One exception to It should let Print and save records records save and Print

30 days after the order date if no specific date the order after 30 days is promised. date including transactions, online your of the price, and description product the email every of copies and receipt, online the seller. from send or receive you as you statements credit card your Read for lookout the on be and them receive charges. unauthorized the information personal what know you and why, collecting, are operators website going use to the information. how they’re if or – policy privacy a find can’t you If taking consider – it understand can’t you more that’s site another to business your consumer-friendly. OnGuardOnline.gov/shopping For more information, visit information, more For Look at ads in the newspaper. Do most at ads in Look the newspaper. in their addresses web have now companies them What might for be tothe reasons ads? their URL?display might How that help you as a consumer? about stories social networkingFind or other Internet stories chat rooms, sites, What issuesthe are people. young featuring or bad concerns there Are being addressed? because of how the Internetoutcomes what lessons be learned aboutto there used? Are whatthey? are Internet safety, Find articles about Internet . articlesFind about Internet frauds. Summarize the story identifying by the 5W’s & why where, when, what, and the H (who, commentaries Then read ofhow) the story. Using them as examples, in the newspaper. to suggesting ways write a brief commentary stop this type of perpetrators crime and how should be punished. about stories use of positive the InternetFind or other non-profits by the government, the Internet was used? How organizations. results? the positive What were Newspaper Activities Newspaper • Keep a paper a paper trail. • Keep policy. • Check the privacy Read Read When When Anyone Anyone under any any under If you pay pay you If Check out Do not send cash the most of your shopping experience: shopping of your the most by credit or charge card online, your your online, card creditby or charge Fair the by protected be will transaction you Under Credit Billing Act. this law, the right under dispute charges to have certainand circumstances temporarily creditor the while payment withhold of event the In them. investigating is charge or credit your of use unauthorized liable held be would generally you card, Some charges. in $50 first the for only an online shopping offer companies be not will you ensures that guarantee unauthorized any for held responsible may and some cards made online, charges and/ return, additional warranty, provide benefits. protection or purchase dates. policies and delivery refund you Can order? your receive will you you’re if refund full a for item the return who out find it, return you If satisfied? not fees. or restocking the shipping costs pays requires rule Commission Trade Federal A within or promised as items ship to sellers name. Confirm the online seller’s physical physical seller’s online the Confirm name. phone number in case and address you If problems. or questions have you while message pop-up or email an get financial for asks that browsing you’re link the on click or reply don’t information, companies Legitimate message. the in via email. this information ask for don’t of description the product the seller’s Words print. fine the especially closely, “close-out” or “vintage,” “refurbished,” like that indicate the productmay is in less- while name-brand than-mint condition, prices “too good be to true” items with be counterfeits. could and comparisons price offer that websites Factor apples.” to “apples then compare shipping and handling – along with your needs and budget – into the costtotal of the order. circumstances. can set under almost up shop online any If you’re buying items online, here are ways to make make to ways are here online, items buying If you’re • Pay by credit or charge card. credit by or charge • Pay like • Check out the ofterms the deal, • Know exactly what you’re buying. whatyou’re exactly • Know what• Know it cost. will • Know who you’re dealing with. dealing with. who you’re • Know True or False: or False: True

after your order is placed if no date is promised. if no date placed is order after your

Online sellers must ship items as promised or within 30 days or within 30 days as promised Online sellers must ship items shopping ONLINE your finds on the Internet is a little is finds on the Internet your checking from out items different the mall. at Shopping online offers lots of online offers Shopping find won’t you benefits that mail. or by shopping in a store open and is always Internet The With can be numerous. bargains can buy an you a click of a mouse, send book a hotel, airline ticket, your or buy to a friend, flowers But sizing up fashions. favorite PAGE 10 with adetailed pitch. invite you to awebsite your business, others spam messagesaskfor seem legitimate. Some how theirclaims to make cunning; they know are very Con artists spam intheirin-box. as offers that started lost money to bogus emailusershaveSome SPAM M C S S

a victim of ascam: of a victim Hereto helpyou aretips avoid somebasic being • Never pay for a “free” gift. Disregard any offer • Readthe smallprint. allpromises in Get • Take yourtime. Resist any urgeto now”“act • Know whoyou’re dealingwith. Don’t do your• Protect personalinformation. Share Free meansfree. free oragift, you shouldn’t haveto pay for it. asksthat youto pay for agift orprize. Ifit’s make apayment orsignacontract. writing andreviewthem carefully before you back. turn over your money, you may never it get the offerdespite terms.the and Once you telephone number. provide itsname, address, street and business withany company won’tthat trust.know and only whenyou’re buyingfrom acompany you cardcredit orotherpersonalinformation convenient for you. advantage working of from homewhenit’s ons: Fast cash. Minimalwork. Norisk.the And work, orotherjobs. The adsusesimilarcome- processing, envelope-stuffing, craft assembly income for minimallabor–inmedicalclaims The Bait: Work-at-Home Scams Here’s somecommonto spam scams: spot how enforcement authorities, delete.then hit and send unwantedthe appropriateto spamon in email. When you screen spamfor scams, time andmoney by avoiding frauds pitched some old-fashioned tips’‘filter canhelp you save their users’spam in emailin-boxes. Inaddition, businesses offer filteringsoftware the to limit promotions. containedthat bogusoffers andfraudulent the peoplewhohaveto moneyspam lost expensive:Still othersfindit They’re among time annoying and consuming.others findit FROM YOUR EMAIL FILTER TIPS: SCAMS TO SCREEN Many Internet Service ProvidersMany Service Internet and While someconsumers findspaminformative, Advertisements that promisethat Advertisements steady

PAGE 11 information. Check outftc.gov/workathome for more has gotten stuffingenvelopes rich at home. Answer: d. We don’t ofanyone know who An online ad An promises good promises FIGHTING BACK fee, you’ll find out find out you’ll fee, for your service. your for many hours without pay. many supplies. own your pay willing to customers home. For a “small” “small” a For home. stuffing envelopes. stuffing envelopes. money for working for money how to earn money to how a few hours a day at at hours a day a few The ad might not say: ad might The d. All of the above. All d. a. You might have to work work to have might You a. for pay to have may You b. be any NOT might There c. Newspaper activity: Newspaper in stories the newspaper Find or other federal, about the FTC agencies. or local consumer state helping these agencies are How deal with various consumers rules new Are issues of fraud? being enacted or laws help to think What do you consumers? should be done? Con artists are clever and cunning, and cunning, artists clever are Con constantly hatching new variations variations new hatching constantly skeptical Still, scams. on age-old can spotconsumers or questionable in email offers. promotions unsavory an email that you receive Should you forward be fraudulent, think may hit at [email protected], it to the FTC be doing your You’ll and smile. delete, part help putto a scam artist out of work.

Ask if the check is valid. you the check. the check. you check Forward overpayment overpayment person who gave person who gave Don’t accept Don’t a check When evaluating When evaluating scams spam@ to and trust, not the from and trust, If you deposit the check, deposit If you the check, uce.gov and your state state and your uce.gov Attorney General. You can You General. Attorney A response to your ad or your to A response find contact information for contactfind information Internet know site that you your state Attorney General at General Attorney state your naag.org. For more information, information, more For naag.org. visit OnGuardOnline.gov/spam. the entire amount, even if the check even amount, the entire had cleared. Net: Safety Your no selling price, than your more for how tempting matter the plea or Ask the buyer the story. convincing write to the purchase the check for sends If the incorrect the buyer price. send Don’t the check. return amount, As a seller who the merchandise. may you check, by payment accepts on a local bank, check drawn a ask for That or a bank with a local branch. can visit personally you make to way, not If that’s the check is valid. sure call the bank the check was possible, on using the phone number drawn directory or an assistance from before buying any “cure-all” that “cure-all” any buying before of claims to a wide range treat and quick cures offers or ailments solutions easy serious illnesses. to is cure cure-all speaking, Generally none. Check Overpayment Scams The Bait: to offering online auction posting, or personal, a cashier’s, with pay At the last minute, check. corporate the so-called (or the buyer’s buyer for up with a reason comes “agent”) than more writing the the check for wire to you and asks price, purchase deposit you after back the difference the check. The Catch: are the checks Typically, lose. you enough good but they’re counterfeit, unsuspecting bank fool to tellers; liable for are you when bounce, they must follow the FDA’s pre-market pre-market must FDA’s the follow required process and review testing drugs. new for Net: Safety Your skeptical. be claims, health-related professional a health care Consult like these like make claims claims make that want that want to Experts agree that agree Experts

diseases; companies companies diseases; with of the treatment There is no productThere These are gimmicks, gimmicks, are These Emails claiming that loss. These kinds of claims deal loss. The Catch: or dietary supplement available on good via email that can make cure its claims shrink to tumors, cure impotency, cure insomnia, memory severe and prevent cancer, Cure-All Products Cure-All The Bait: a cure,” “miracle a product is a “ancient an breakthrough,” “scientific – or a quick and effective remedy” or of ailments a wide variety for cure limited announce may They diseases. in payment require availability, “money- a no-risk and offer advance, or histories Case back guarantee.” or doctors consumers testimonials by not are claiming amazing results uncommon. energy. A reasonable goal is goal lose to A reasonable energy. most For about a week. a pound that about means cutting people, diet, your from calories a day 500 of nutritious foods, a variety eating Permanent regularly. and exercising weight loss happens with permanent health your to Talk changes. lifestyle aboutnutrition and a provider care suited your to program exercise metabolism. and lifestyle lots of weight at lightening speed. lots of at weight lightening The Catch: sense of hopefulness. on your playing advertised nothing through There’s or apply can wear your to email you skin that can cause permanent – or weight significant – loss. even Net: Safety Your is lose weight to the best to way your calories and increase eat fewer burn more activity so you physical loss; still others suggest still others lose you’ll loss; The FTC has yet yet has to The FTC The ads don’t say you may may you say don’t The ads Emails promising a Emails promising Some products claim Some products block to the or calories; carbs, absorption of fat, permanent weight others guarantee revolutionary pill, patch, cream, or cream, patch, pill, revolutionary other product that will result in weight loss without diet or exercise. Weight Loss Claims Loss Weight The Bait: a lawyer, an accountant, a financial an accountant, a lawyer, expert or another need if you advisor, it. from current workers? Be aware of Be aware workers? current from paid lie to – people who are “” for pay to reason every you and give from advice Get professional work. equipment and membership fees equipment fees and membership your will get– and what for you information verify you Can money. who will pay you, when you will get when you you, who will pay cost thetotal of first paycheck, your – including supplies, the program money, find outyou will find what tasks money, will be whether you perform, to have paid a salary on commission, or work at-home business promoters should business promoters at-home what’s – exactly – in writing tell you they’re in the program involved commit any you Before selling. find anyone who has gotten rich who has find anyone or assembling stuffing envelopes work- Legitimate magnets at home. to their “quality standards.” “quality to their Net: Safety Your own time and money, you’re likely likely you’re own time and money, refuseto pay who find promoters to up isn’t work claiming that your you, newspaper ads, make photocopies, or photocopies, make ads, newspaper or equipment software, buy supplies, put in your you Once do to the job. The Catch: without hours many work to have place to hidden costs or pay pay, PAGE 12 but youto watchbut need for out somepitfalls. are a great resource for shoppers and sellers, yourselling someof stuff? auctions Internet bidding inanonlineauction,Thinking of or buyers are thesubject. sellers, butinsomecases, the deals. complaints Most involve sites withseeminglybetter bidders from legitimate auction and fraudulent dealerswholure payment orescrow services; as advertised; online bogus that aren’t thesamequality or shipments ofproducts late shipments, noshipments, complaints generally dealwith near thetop ofthelist. The fraud consistentlyauction rank those dealingwithonline the FTC receives year, every consumer fraud complaints Among thethousandsof O internet auctions business. risky be can storefront from whichto market theirgoods. business Buttheonlineauction and usedmerchandise from around theworld; they give sellersaglobal sitesInternet give auction buyers a “virtual” fleamarket withnew auction websites. auction sellers stay safe on to helpbuyers and nGuard Onlinewants It’s ideato useacredit agood card whenpaying for items onanInternet auction. Here’s how: • Evaluate how soonyouto receive need • Watch for out fake checkscams. Ifa • Don’t replyto “phishing” • Know whoyou’re dealingwith. Avoid advertised. aren’tthat the samequalityas products shipments, noshipments, orshipments of fraud auction Internet involveabout late or even delivered. not Many complaints youtolerate can beingdelivered it late, the itemyou’re biddingon, andwhether certainly ascam. certainly “buyer” any money. It’s almost the check,cash the anddon’t send the itemyouship are selling, don’t than your agreed-upon price, don’t “buyer” sendsyou acheckfor more information. for your password orotherpersonal or paymentandask service website by anauction sent looklikethat they’ve been emails. Deletemessages problems. number incaseyou have questions or better deal. Confirm theseller’s telephone you offsitewithpromisesthe auction a of identify,to lure try those who especially doing businesswithsellersyou can’t receive siteor seller, fromthe auction too. Save copies allemailsyou of sendand the product, of the fineprint. especially True orFalse: bidding on. Read a andprint • Know exactly you’re what protections. rules, oroffer different charge fees, follow different time–sitesmay forthe first Terms Usebefore of usingit seller, read site’s eachauction • Whether you’re abuyer ora money wiringservice. send cash, anddon’t usea something goes wrong. Don’t recoursewhat you have if payment.method of Learn • Carefully consider your copythe seller’s of description OnGuardOnline.gov/auctions For more information, visit file a with: complaint buyer, orsiteoperator. doesn’tthat work, If the seller, directly with them out to work try If you have problemstransaction, duringa • The Federal Trade Commission. File a • The BetterBusinessBureau; and • Your county orstate consumer protection • The attorney general’s in office your state; complaint ftc.gov. onlineat government); phone bookundercounty orstate the the bluepages of agency (check

Answer: True. Credit cards allow buyers to seek a credit from the credit card issuer if the item isn’t delivered or isn’t what they ordered. Some online payment services also offer services online payment also offer Some what ordered. or isn’t they issuer if delivered seek a creditthe creditto from card the item isn’t buyers allow Credit cards True. Answer: no have a check – you’ll even or wiring services, money – like other kinds of payments With use it. you before terms of agreement each service’s read should but you protections, a problem. if there’s recourse PAGE 13 be forewarned –somehackers have “spoofed” MAC addresses,to secure enough yourthis stepaloneisnot wireless so network. Answer: True. Allmoderncomputers havetheir own uniqueMAC addresses, your soyouto set routerto allow onlycomputers shouldbeable youto useyour know network. But remember to configure the same same the configure to remember router wireless your into ID unique so canthey computer and your that’s password a Use communicate. the Again, long. characters 10 least at itthe harder is password, your longer break. to hackers for pre-set router’s your Change 5. to administration for password longer The know. you only something the ittougher is crack. to the password, to computers specific only Allow 6. Every network. wireless your access communicate to able is that computer own its assigned is network a with a (MAC) Control unique Media Access have usually routers Wireless address. with devices only allow to mechanism access to addresses particularthe MAC mimicked have hackers Some network. this on rely don’t so addresses; MAC step alone. when network wireless your off Turn 7. use it. won’t you know you “hot spots” assume Don’t that public 8. people other that Assume secure. are or see you information any access can network. a public wireless send over visit information, more For OnGuardOnline.gov/wireless security Some older routers use only WEP WEP only use routers older Some from the default. The identifier for your your for identifier The default. the from default be a standard, to is likely router ID allto assigned by the manufacturer your if Even model. that of hardware identifier its broadcasting not is router know the default hackers to the world, access to try to them use can and IDs identifierto your Change network. your and know, you only something encryption. WPA is stronger; use it if if it use stronger; is WPA encryption. you protect should It choice. a have you against most hackers. no than better is which encryption, your protect should It encryption. accidental against network wireless by attacks or neighbors by intrusions use If you hackers. less sophisticated set it to encryption, WEP the highest available. security level anti-spyware and anti-virus Use 2. a firewall. and software, have Most routers wireless 3. identifier called mechanism a so your it off Turn broadcasting. any to signal a send won’t computer its announcing vicinity the in device presence. routeryour on Change 4. the identifier True or False: or False: True Manufacturers often deliver wireless wireless deliver often Manufacturers are encryption of types main Two equipment must use the same routers with the encryption feature feature encryption the with The routers on. it turn must You off. turned wireless your with come that directions do to how explain should router router the check don’t, they If that. website. manufacturer’s (WPA) Access Protected Wi-Fi available: (WEP). Privacy Equivalent Wired and other and router, computer, Your you can protect your wireless network network wireless your protect can you it. on and the computers effective most The encryption. Use 1. network wireless your secure to way or is intruders encrypt, to from the over communications scramble, access Most routers, wireless network. built-in a have stations base and points, wireless If your encryption mechanism. an encryption have doesn’t router one getting that does. consider feature, even access the information on your your on information the access even unauthorized an if And computer. a commit to network your uses person be can activity the spam, send or crime how Here's account. your to back traced wireless wireless You can set your wireless router to only allow certain computers access to your network. your to access certain only allow computers to router wireless can set your You

wirelessly. Today, business travelers travelers business Today, wirelessly. ncreasingly, computer users computer ncreasingly, and in convenience interested accessing the Internetmobility are

The downside of a wireless wireless a of downside The Going wireless generally requires a a requires generally wireless Going “piggyback” on your network, or or network, your on “piggyback” wireless-ready computer can use your your use can computer wireless-ready neighbors, That means your network. could nearby, lurking hackers even or network is that, unless you take unless you is network that, a with anyone precautions, certain wireless client card can pull the signal signal the pull can card client wireless the to access gain and air the from Internet. through the air, sometimes as far as as far as sometimes air, the through computer Any feet. hundred several a with equipped that’s range within modem. To set up the wireless network, set network, up wireless the To modem. connect you pointthe access ato signal a broadcasts that router wireless broadband Internet connection into into connection Internet broadband point,” “access called an home, a your into runs that line DSL or cable a like within the network’s range. within the network’s network can connect computers in in computers connect can network parts home or school of your different enable and cords, of tangle a without anywhere laptop a on work to you snapshots to friends while still on on still while friends to snapshots from orders place shoppers and holiday; wireless A couches. their of comfort the I touch in stay to laptops wireless use beam vacationers office; home the with PAGE 14 with materialthe Internet. on to find,user view, hear, andinteract Browser: them. revisit websites, youthat so canreadily interestingof orfrequently used allowsthat youto save the addresses Bookmark: subjects. particular their personalobservations post on to whichoneormorewebsite people Blog: specified criteria. some websites orcontent basedon to andblockaccess the Internet programs filter that content from Blocking Software: business ventures. claims andare fraudulent actually extravagant andunfounded earnings opportunity;” someschemesinvolve Biz Opps: connection. anInternet of Bandwidth: throughsend email your account. crash, orevento allow spammers computer’s performance, causea can destroy your data, slow your your computer fromthat viruses Anti-Virus Software: based onyour use. anddisplaysvisited) targeted ads computer use(includingwebsites computer, whilesomemonitors your Some adware displays adsonyour often comes withfree downloads. Adware: Short for Short Web log. Ablogisa A type of softwaretype of A that Aprogram allowsthat a Shorthand for Shorthand “business A Web browser feature Ameasurethe of “speed” to know thelanguage.to know The Federal Trade Commission to help hasprepared thisglossary Computer Computer Protects Protects You don’t have to to goonline, acomputer be expert helps butitcertainly commercial organizations. government ones, and “.org” for non- for commercial sites, “.gov” for current domainsinclude “.com” informationtype of or includes; it space, the function denotedby Domain: computer-based, world. physical world fromthe digital, or Cyberspace: the site. allow othercapabilitieson to the siteor your on about activities hard information driveto collect website canplace onyour computer’s Cookies: who arethe in “chat room.” the screensinstantly onothers of arethat messages displayed almost wheretype service peoplecan place orpage inawebsite oronline Room:Chat provisions. as anadvertisement, amongother requiresto identify eachemail them lines,or deceptive subject and or misleadingheaderinformation commercial emailfrom usingfalse prohibits unsolicited sendersof CAN-SPAM Act: “cash.” browser, more quickly. Pronounced, you’ve recently typed into your information, such as Web addresses allowsthat youto access stored Cache: back. automatically, even ifyou change it your Web browser’s homepage spyware program changes that Browser Hijacker: A form of computer memory Aform computer of memory A small text file that a that file text Asmall A segment of Internet Internet of Asegment Used to distinguish the the to distinguish Used The name given to a The namegivento a you better understandtechno terms. A law that that Alaw A common Acommon

Learning theLanguage ONLINE-SPEAK speed usingstandard phonelines. high at the Internet accessingof DSL(Digital SubscriberLine): regularly. operating system and Web browser downloads, make sureto update your websites.certain To avoid drive-by your knowledge whenyou visit installs onyour computer without Drive-by Download: computerto another. Download: block certain kinds of content. kindsof block certain its content, to andallowsthe user informationthe Internet, on classifies Filter: Identifier (SSID). name. Set to aService Similar to aunique security by changing model.that of Userscanimprove the manufacturerto all hardware standard, default nameassignedby to arouter.assigns may It bea (ESSID): Identifier Extended Set Service authorization. is releasedto someonewithout Exposure: download software. to “click” beforeto accept you can the as “end user,” may berequired (EULA): End UserLicensing Agreement information. only by softwareto decodethe set into codecanberead asecret that Encryption: Software screens that Aprovider’sterms. legal You, The nameamanufacturer When sensitive data To copy filesfrom one The scrambling data of Software that A means Ameans each other. Wide Web to communicate use with the computersto connected World The standardthat language HTTP (Hypertext Transfer Protocol): show uponyour phonebill. expensive phone calls, whichlater can useyour computerto silently dial maythat unknowingly download Hidden Dialers: control how Web pages appear. and the Internet documents on A coding to create language used Markup Language (HTML):Hypertext speakers. likeother equipment printers and keyboard, andmouse, aswell as central processing unit, monitor, a computer system, the including Hardware: permission. to access computers Internet without Hacker: equaling1,024memory megabytes. Gigabyte: and from sources you don’t permit. system andblockcommunicationsto outside attemptsto access your permission. Firewalls watch for personal information your without your your computerto sendout helpskeepthat hackers from using Firewall: computer from anothercomputer. File Sharing: Someone who uses the the Someonewhouses Hardware orsoftware A measure of computer Ameasure computer of The mechanical parts of of The mechanicalparts

Accessing files on one Accessing filesonone Programs you that

PAGE 15 A The A A A method of An Internet A software program that program A software Home computers that Home computers have To copy or send files or data or send copy To Programs that, when that, Programs A program that reproduces A program A program that can sneak onto A program WPA encryption. WPA Network: Wireless otherto a computer connecting or to computers the Internet without cables. Web: Wide World which distributes graphical, system, a through information hyperlinked browser. Worm: and can use a network itself over and resources computer’s up your down. system possibly shut your Zombies: who spammers, by over been taken then use them send spam in a way to that hides the true origin. Spyware: computer on your be installed may consent monitorwithoutto your redirect ads, send pop-up use, your or certainto computer websites, your lead to which could keystrokes, record identity theft. Trojans: enable computer, installed on your people it access unauthorized to and it.sometimes send spam from to Upload: another. to one computer from Locator): URL Resource (Uniform such as www. a webpage, for address ftc.gov. Virus: an through often – computer your – and email attachment then make using up all quickly of itself, copies memory. available Internet Protocol): Over (Voice VoIP and software of hardware category use the Internetthat as lets you the telephone medium for transmission calls. (WPA): Access Protected Wi-Fi fixto developed security protocol sent Encrypts data to WEP. in flaws within a devices wireless and from network. (WEP): Privacy Equivalent Wired that encrypts datasecurity protocol devicessent wireless and from to Not as as strong within a network. A protocol Unsolicited Websites Websites Home computers A secret a alias used by Someone who sends A computer program program A computer Forging an e-mail header Forging A device A device that connects two Unsolicited commercial email, email, Unsolicited commercial Shorthand for “Random Access“Random Shorthand for Spoofing: it appear make to addresses Web or as if came or website the message or someone other somewhere from than the actual source. person. Software: with instructions that enable the System work. to hardware computer orWindows – such as software the machine itself, MacOS – operates as – such software and application processingspreadsheet or word specific – provides programs functionality. Spam: sent in bulk. often Spam Zombies: by over been taken that have spammers who then use them to that hides thesend spam in a way true origin. Spammer: often email, unsolicited commercial in bulk. on a short-term stores basis and work. while you information Router: finds the router A networks. or more information forwarding best for path the networks. across (SSL): Layer Socket Secure like data, used to sensitive transmit via securely information, credit card the Internet. Sites: Social Networking that users allow build onlineto including information, share profiles; photographs, personal information, and and music clips; blog entries, connect with other users. Sock Puppet: member of an Internet community, but not by acknowledged that Pop-up Messages or Ads: Messages Pop-up advertising that as its own appears window. browser RAM: inside the hardware it’s Memory,” memorythat retains computer your

Software Software

Information The main Tools that allow Tools An informal Compiling Similar in nature e-mailto Similar in nature A scam that involves A scam that involves When a user expressly When a user explicitly other sensitive information) from information) other sensitive unsuspecting victims. phishing, pharming seeks obtainto pharming seeks phishing, (usually financial personal or private domain through information related) spoofing. Phishing: spam who send Internet fraudsters personal or pop-up messages lure to numbers, (credit card information Social information, bank account or passwords, Security number, Patches/ Software Patches: Software Patches/ thatupdates fix a particular problem within a program. or vulnerability Information: Personal bank your like that you, can identify numbers; account and credit card Social Security your income; your and address, name, or your number; phone numbers. Pharming: “opting in.” “opting Peer-to-Peer: P2P, users network shareto that allows files or other software, games, music, with other users online. Controls: Parental from children their prevent to parents certainaccessing Internet content might find inappropriate. they Linux. Opt-in: or use, permits a website collect, to his or her information. share Opt-out: thatrequests his or her information shared. used and/or not be collected, failure Sometimes a user’s as is interpreted “opt-out” to information about consumers’ about consumers’ information by tracking and interests preferences actions and movements their online ads. targeted create to System: Operating that runs on a computer. program other allows system An operating run and prevents to software accessing users from unauthorized systems operating Major the system. and MacOS, Windows, include UNIX, Online Profiling: Online A A network Programs Programs Technology, Technology, The computer A device or A device The informal rulesThe informal A computer’s “address,” “address,” A computer’s A group of or A group two A unique number that A computer programming programming A computer : Shorthand for “Joint “Joint Shorthand for : communicate with one another. communicate Network: able thatto computers are more Netiquette: enforced of Internet courtesy, other Internet by users. exclusively or email messages he or she reads, he or she reads, or email messages without blocking access. Monitoring Software: Software: Monitoring to or caregiver that parent a allow monitor a child visitsthe websites computer or other device in a or other device computer network. Media Access Control (MAC) Control Media Access Address: assigns eachto the manufacturer generally located near each other, near each other, located generally such as in an office or school. LAN (Local Area Network): Area LAN (Local that computers areof connected program that records each keystroke each keystroke that records program typed on a particularcomputer. compression. Logger: Keystroke Photographic Experts Group,” a Group,” Experts Photographic formatreduces that file computer using by of graphics the size games. JPEG language that enables Web pages Web language that enables calculators, include animations, to and sound effects, text, scrolling the Internet. Java: ISP (Internet Service Provider): that sells direct company access to IP Address: it of a series of numbers consists periods. by separated programs to communicate over the over communicate to programs Internet. Internet Protocol (IP): Internet Protocol computer language that allows a user when a friend is online, a friend is online, a user when by “converse” allowing them to text messages. exchanging Instant (IM): Message notifies which similar a chatto room, Visit www.OnGuardOnline.gov/quiz to test your knowledge about safe computing.