The Monthly Folder Instruction Manual 2015 V1.2

Total Page:16

File Type:pdf, Size:1020Kb

The Monthly Folder Instruction Manual 2015 V1.2 The Monthly Folder Instruction Manual 2015 v1.2 The latest version of this document can be found here: http://www.adamj.org/monthly Table of Contents Process: Disk Cleanup ................................................................................................................................... 2 Program: CCleaner .................................................................................................................................... 2 Program: BleachBit ................................................................................................................................... 4 Process: Disk Defragmenting ........................................................................................................................ 5 Program: Defraggler (Not Free for Commercial Use) ............................................................................... 6 Program: MyDefrag................................................................................................................................... 7 Process: Microsoft Updates .......................................................................................................................... 9 Program: Windows Update/Microsoft Update ........................................................................................ 9 Process: Anti-Malware Scan ....................................................................................................................... 13 Program: MalwareBytes AntiMalware ................................................................................................... 14 Program: Any Antivirus Application – Spotlight: Microsoft Security Essentials ..................................... 16 Program: Any Antivirus Application – Spotlight: Avast! Free Antivirus .................................................. 17 Process: System Snapshot........................................................................................................................... 21 Program: System Protection (Windows 7/Windows 8) .......................................................................... 21 Program: System Restore (Windows XP/Vista) ...................................................................................... 23 ©2015, Adamj Consulting Page 1 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 Process: Disk Cleanup This process is done to take out the “trash” of your computer. If you want to reduce the number of unnecessary files on your hard disk to free up disk space and help your computer run faster, use a form of disk cleanup. When running an operating system as complex as Windows, you may not always know the significance of all the files on your computer. Sometimes Windows uses files for a specific purpose and then retains them in a folder designated for temporary files. Alternatively, you may have previously installed Windows components that you are no longer using. For a variety of reasons, including running out of space on your hard drive, you may want to reduce the number of files on your disk, or create more free space, if it can be done without harming any of your programs. Program: CCleaner CCleaner (originally known as Crap Cleaner) is a free for home use system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. Instructions: 1. Start CCleaner. 2. It will remember the last used settings, which have already been pre-configured for you. If you’d like, you can modify them to better suit your needs (for instance, to stop the cleaning of saved passwords in your browser). 3. The simple and easy way is to just hit the Run Cleaner button in the bottom right corner of the program. 4. Alternatively, you can hit Analyze and it will analyze your computer and display you a results page so you can see what it will be removing (in case you want to unselect something so that it doesn’t remove it). 5. Once you’ve removed the temporary files, click the Registry button on the left bar. 6. Click the “Scan for Issues” button and it will search your registry for inconsistent entries in the registry. 7. Once it’s found them, click on the “Fix selected issues” button. It will ask you if you’d like to save a backup of the registry. Answer yes, and save it to the C:\ drive, or where-ever you’d like keeping the file name the way it is. This is to make sure if anything goes wrong, we can double click this file and it will restore what it is removing from the registry. 8. Close CCleaner. ©2015, Adamj Consulting Page 2 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 ©2015, Adamj Consulting Page 3 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 Program: BleachBit BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Instructions: 1. Start BleachBit. 2. It will remember the last used settings, which have already been pre-configured for you. If you’d like, you can modify them to better suit your needs (for instance, to stop the cleaning of saved passwords in your browser). 3. The simple and easy way is to just hit the Clean button in the top left menu bar. 4. Alternatively, you can hit Preview and it will analyze your computer and display you a results page so you can see what it will be removing (in case you want to unselect something so that it doesn’t remove it). 5. Close BleachBit. ©2015, Adamj Consulting Page 4 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 Process: Disk Defragmenting Improve performance by defragmenting your hard disk. When you save your files to your computer, they don’t save in sequence; they save in fragments all over the hard drive. Fragmentation makes your hard disk do extra work by finding each piece of the file and pulling it from all places on the hard drive. This process can slow down your computer. A disk defragmenting process rearranges fragmented data so your hard disk can work more efficiently by rearranging the fragments of each file to be in succession (or as best as possible). On the same thought, the new Solid State Drives (SSDs) should not be defragmented at all. The method that SSDs use to make them so fast is by writing a bunch of data to fragments over multiple memory cells at the exact same time. This is where they get their speed as they can be written or read from simultaneous clusters across multiple memory cells. The only thing that is safe for SSDs, is something called the TRIM command. The TRIM command helps to maintain the performance of solid state drives (SSDs) at an optimal level over the lifetime of the drive. TRIM functions by actively deleting invalid data from the SSD’s memory cells to ensure that write operations perform at full speed. Since a memory block must be erased before it can be re-programmed, TRIM improves performance by pro-actively ©2015, Adamj Consulting Page 5 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 erasing pages containing invalid data, allowing the SSD to write new data without first having to perform a time-consuming erase command. The Windows default is to have TRIM Support for SSDs enabled for Windows 7+ so there is nothing for you to do if you have a solid state drive. Program: Defraggler (Not Free for Commercial Use) Defraggler optimizes your Windows PC by reducing the wear and tear on your hard drive and making you and Windows more efficient. Use Defraggler to defrag your entire hard drive, or individual files. For general usage we recommend defragging once per month using the default settings of Defraggler. Instructions: 1. Start Defraggler. 2. Click the Defrag button at the bottom. 3. Close Defraggler when it has completed. ©2015, Adamj Consulting Page 6 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 Program: MyDefrag MyDefrag is a disk defragmenter and optimizer (a maintenance utility to make your harddisk faster). It is freeware, no time limit, fully functional, and with no advertisements. It’s fast, low overhead, and comes with many optimization strategies, that can handle floppies, USB disks, memory sticks, and anything else that looks like a disk to Windows. MyDefrag is extremely solid because it is based on the standard defragmentation application programming interface (API) by Microsoft, a system library that is included in all versions of Windows. The API is part of the operating system and can safely move almost any file on the disk, without risk and while the computer is in full use. Instructions: 1. Start MyDefrag. ©2015, Adamj Consulting Page 7 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 2. It will remember the last used settings, which have already been pre-configured for you. If you’d like, you can modify them to better suit your needs. The best option is System Disk Monthly, and highlighted the C:\ drive. 3. Click on Run 4. Close MyDefrag when it has completed. ©2015, Adamj Consulting Page 8 http://www.adamj.org Last Modified: 2015.01.21 The Monthly Folder Instruction Manual 2015 v1.2 Process: Microsoft
Recommended publications
  • [email protected]
    PRIVACY TOOLKIT FOR LIBRARIANS [email protected] libraryfreedomproject.org/resources/privacy-toolkit-for-librarians/ THREAT MODELING ● assets ● adversaries ● capabilities ● consequences how much trouble are you willing to go through in order to try to prevent those? FREE SOFTWARE FOSS: the freedom to run, copy, distribute, study, change and improve the software (gnu.org) -vs. proprietary software -why does this matter for privacy? -most of these tools are free software SAFER BROWSING ● who owns your browser? ● what is a browser extension? ● Firefox and Tor ● Firefox privacy settings ● Firefox extensions menu ENCRYPTED WEBSITES ● what is encryption? 1. confidentiality 2. authenticity 3. integrity ● http vs https ● HTTPS Everywhere ● Let's Encrypt THIRD PARTY TRACKING ● cookies ● widgets ● analytics ● beacons ● behavioral advertising ● Privacy Badger This is a real image from an online marketing company. SEARCH TRACKING ● Google, Bing, and Yahoo collect and store your searches ● DuckDuckGo does not. They even have an extension! ● alerting patrons: “You might notice that your search engine looks different” ● embedded Google searchbars: Google Sharing TERMS OF SERVICE Image credit: xkcd.com E.U.L.A. = end user license agreement Terms of Service; Didn't Read WIFI SECURITY ● Open wifi access and plausible deniability ● Closed wifi encryption (authenticity – and integrity) ● Wired network snooping is possible but requires a physical connection FILE DELETION Clean system and protect privacy: trash, logs, recent places, cache, session data, etc CCLeaner – Windows and Mac OSX, not FOSS *Windows users, do not ever use the registry cleaner! Bleachbit – Windows and Linux, FOSS Deep Freeze/Clean Slate on patron PCs: very useful, easy to use, but not totally secure deletion.
    [Show full text]
  • Versatile Exploitation Techniques: Drone Hacking and Jamming with Raspberry-Pi and Wi-Fi Pineapple
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9, Issue-1, November 2019 Versatile Exploitation Techniques: Drone Hacking and Jamming with Raspberry-Pi and Wi-Fi Pineapple J Caroline El Fiorenza, Revanth Kumar Lokku, Kirthika Sivakumar, M Reene Stephanie Unmanned aerial (UAVs) vehicles, or drones, are an Abstract—The utilization of Internet-of-Things (IoT) unmanned aerial vehicle that has no pilot ready, and are innovation is developing exponentially as more shoppers and explored by either a remote control, or by ready PCs. Drones organizations recognize the benefits offered by the savvy and are normally partitioned into three unique sorts of classes: (a) shrewd gadgets. The major purpose of this paper arose due to the reason that since drone innovation is a quickly rising segment recreational, (b) business and (c) military drones. inside the IoT and the danger of hacking couldn't just purpose an The expansion of recreational drone usage has prompted information break, it could likewise represent a noteworthy discourses in regards to the security of the unregulated drone hazard to the open well-being. On account of their flexible usage, and how to maintain a strategic distance from specialist applications and access to ongoing data, commercial drones are abusing airspace rules. At a similar time as buyers utilized used across a wide variety of smart city applications. However, with many IoT devices, security is frequently an untimely idea, drones as specialists, organizations have progressively leaving numerous drones helpless against programmers. What is investigated utilizing rambles for business use. being done in this paper is that this paper examines the present In 2016 they uncovered that they were trying a conveyance condition of automation security and exhibits a lot of Wi-Fi administration where clients could get little bundles up to five empowered drone vulnerabilities.
    [Show full text]
  • Resources: Free Software
    Resources: Free Software Last Updated: 10/28/2011 Online version: http://depts.washington.edu/triolive/wordpress/ttt/freeware Note: These are resources from our TRIO Tech Talk Blog where you can find the latest tech news and interact with other members of the TRIO Community.. Reviews of Free Software The Best Free Software of 2011 http://www.pcmag.com/article2/0,2817,2381528,00.asp PCMAG.COM’s list of 208 of the best free programs for PCs in a wide variety of categories. Best Free Mac Software 2010 http://www.pcmag.com/article2/0,2817,2369639,00.asp PCMAG.COM’s list of 73 of the best free programs for Macs in a wide variety of categories. The Top 100 Free Apps For Your Phone http://www.pcmag.com/article2/0,2817,2356415,00.asp PCMAG.COM’s list of the best free apps for iPhones, Androids, Blackberries and Windows Mobile phones. Security & Utilities Ad-Aware Free Internet Security http://www.lavasoft.com/products/ad_aware_free.php PC Magazine’s Editors’ Choice for free antivirus software for Windows. Rated highly for both finding and removing malware and blocking new infections. CCleaner http://www.piriform.com/CCLEANER A free utility for PC and Mac for optimizing your system, removing clutter and maintaining privacy. Includes tools to clean your registry, manage start-up items and uninstall programs. Recuva http://www.piriform.com/recuva Lost a file because your computer crashed or you accidentally deleted it? Use this free tool for PCs to recover files from your hard drive, recycle bin or memory card.
    [Show full text]
  • Windows® Operating System Essentials
    MICROSOFT ® WINDOWS® OPERATING SYSTEM ESSENTIALS MICROSOFT ® WINDOWS® OPERATING SYSTEM ESSENTIALS Tom Carpenter Senior Acquisitions Editor: Jeff Kellum Development Editor: Jim Compton Technical Editor: Rodney Fournier Production Editor: Dassi Zeidel Copy Editor: Liz Welch Editorial Manager: Pete Gaughan Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Publisher: Neil Edde Book Designer: Happenstance Type-O-Rama Compositor: James D. Kramer, Happenstance Type-O-Rama Proofreader: Amy J. Schneider Indexer: Ted Laux Project Coordinator, Cover: Katherine Crocker Cover Designer: Ryan Sneed Cover Image: © Jonny McCullagh / iStockPhoto Copyright © 2012 by John Wiley & Sons, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-1-118-19552-9 ISBN: 978-1-118-22768-8 (ebk.) ISBN: 978-1-118-24059-5 (ebk.) ISBN: 978-1-118-26529-1 (ebk.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or autho- rization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose.
    [Show full text]
  • Download Ubuntu Torrent to Install on Virtualbox Top 7 Torrent Clients for Ubuntu & Other Linux Distributions
    download ubuntu torrent to install on virtualbox Top 7 Torrent Clients for Ubuntu & Other Linux Distributions. Looking for the best torrent client for Ubuntu ? Indeed, there are a number of torrent clients available for Linux. Even though I’ve primarily mentioned Ubuntu, you can get most of them working on any other Linux distribution out there. You can also check the best download managers for Ubuntu if you’re not just looking for torrent downloaders. In this article, among all the available torrent clients for Linux, I’m going to curate the best ones that you should try. Best torrent programs for Ubuntu and other Linux distributions. No matter what your preferences are, a torrent client needs to have the essential features needed along with an easy-to-use interface. Here, you’ll find the list of the best torrent clients for Linux. Note: This list is in no particular order of ranking. Some applications mentioned here are not open source. They are listed here because they are available on Linux and the article’s focus is on Linux. 1. qBittorent. qBittorrent is one of the most popular open-source torrent clients available across multiple platforms. The user interface (which is based on Qt) is quite simple and gets the job done. It supports magnet links as well. In addition to the basic functionalities, you also get a bunch of useful features like the web user interface, the ability to tweak the speeds, configuring the number of connections per torrent download, and more such options. You can take a look at their GitHub page to explore the source code.
    [Show full text]
  • Defraggler Windows 10 Download Free - Reviews and Testimonials
    defraggler windows 10 download free - Reviews and Testimonials. It's great to hear that so many people have found Defraggler to be the best defrag tool available. Here's what people are saying in the media: "Defraggler is easy to understand and performs its job well. if you want to improve computer performance, this is a great place to start." Read the full review. LifeHacker. "Freeware file defragmentation utility Defraggler analyzes your hard drive for fragmented files and can selectively defrag the ones you choose. The graphical interface is darn sweet." Read the full review. PC World. "Defraggler will show you all your fragmented files. You can click one to see where on the disk its various pieces lie, or defragment just that one. This can be useful when dealing with very large, performance critical files such as databases. Piriform Defraggler is free, fast, marginally more interesting to watch than the default, and has useful additional features. What's not to like?" Read the full review. - Features. Most defrag tools only allow you to defrag an entire drive. Defraggler lets you specify one or more files, folders, or the whole drive to defragment. Safe and Secure. When Defraggler reads or writes a file, it uses the exact same techniques that Windows uses. Using Defraggler is just as safe for your files as using Windows. Compact and portable. Defraggler's tough on your files – and light on your system. Interactive drive map. At a glance, you can see how fragmented your hard drive is. Defraggler's drive map shows you blocks that are empty, not fragmented, or needing defragmentation.
    [Show full text]
  • Ccleaner & Defraggler Performance Report
    CCleaner & Defraggler Performance Report (September 2017) Windows 7 & Windows 10 Performance Benchmark Document: CCleaner & Defraggler Performance Report Authors: M. Baquiran, D. Wren Company: PassMark Software Date: 27 September 2017 File: Piriform_CCleaner_Performance_Ed2.docx Edition 2 CCleaner & Defraggler Performance Report PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 SUMMARY ........................................................................................................................................................ 3 PRODUCTS AND VERSIONS ............................................................................................................................... 4 TEST RESULTS ................................................................................................................................................... 5 BENCHMARK 1 – DISK SPACE RECOVERED FROM INITIAL CLEANUP ..................................................................................... 5 BENCHMARK 2 – DISK SPACE RECOVERED PER WEEK ....................................................................................................... 5 BENCHMARK 4 – CHANGE IN FREE RAM ...................................................................................................................... 6 BENCHMARK 4 – MACHINE BOOT TIME .......................................................................................................................
    [Show full text]
  • Turhat Tiedostot Pois Bleachbitillä
    Turhat tiedostot pois BleachBitillä Peruskäyttäjälle.net Ohjeen versio 17.1.2021 Tämä teos on lisensoitu Creative Commons Nimeä-EiKaupallinen-EiMuutoksia 4.0 Kan- sainvälinen -lisenssillä. Tarkastele lisenssiä osoitteessa https://creativecommons.org/li- censes/by-nc-nd/4.0/deed.fi Voit jakaa tätä teosta, kunhan mainitset selkeästi sen alkuperäksi ja tekijäksi Peruskäyttä- jälle.net -sivuston. Peruskäyttäjälle.netin Creative Commons-esittely (https://peruskayttajalle.net/tie- toja.php#cc) Lisätietoa Creative Commonsista suomeksi (https://creativecommons.fi/) © Peruskäyttäjälle.net. Tämä ohje on lisensoitu Creative Commons Nimeä-EiKaupallinen- EiMuutoksia 4.0 Kansainvälinen -lisenssillä 1 Sisällysluettelo 1 Johdanto .............................................................................................................................................................. 3 2 BleachBitin asentaminen ............................................................................................................................ 3 3 BleachBitin asetukset ................................................................................................................................... 8 4 Tietojen poistaminen .................................................................................................................................. 11 © Peruskäyttäjälle.net. Tämä ohje on lisensoitu Creative Commons Nimeä-EiKaupallinen- EiMuutoksia 4.0 Kansainvälinen -lisenssillä 2 1 Johdanto BleachBit (https://www.bleachbit.org/) on turhien tiedostojen
    [Show full text]
  • Download the Full Digital Security Training Curriculum
    Digital Security Training Curriculum A holistic and contextualized training curriculum for Digital Security Trainers and Human Rights Defenders in Uganda. Acknowledgments The design of this Digital Security Training Curriculum to provide a comprehensive and holistic reference for Human Rights Defenders and other Digital Security trainers in Uganda was supported by a diverse network of individuals and organizations. These included the DHRLab Project. We thank each of them for their valuable contribution to the development process of this curriculum, as well as for their ongoing efforts to increasing digital security awareness in Uganda. The content was shaped and greatly enriched by the following people who contributed their knowledge, insights and first-hand experience throughout the consultative process. In particular, we would like to thank Andrew Gole, (Encrypt Uganda) Lindsey Kukunda, (Her Empire) Kelly Daniel Kigonya, (IFreedom) Brian Byaruhanga, (DPI), Joseph Kasozi (HRCU), Fred Drapari (DPI) Sandra Kwikiriza (Her Internet) Kettie Kahume (Her Internet) Innocent Adriko (DLI), Emma Magambo (HRNJ), Ruth Apolot, Sonia Karungi, Ruth Atim, Shane Senyonga (Cloud & Pillar), Ben Kerry Mawejje, David Idoru (NGO Forum), and Eddie Muhumuza (Her Internet). Credits All the content in this curriculum was sourced and customized to fit the context of human rights defenders in Uganda from the following Online sources under the Creative Commons Attribution-Share Alike Unported 3.0 license by multiple authors. Level up (http://level-up.cc) Safer Journo Digital Security resources for Media Trainers (Internews) Security in a box - https://securityinabox.org/en/ Cyber women – Institute for War and Peace Reporting - https://iwpr.net/ Surveillance Self Defence https://ssd.eff.org/en How to Use this Curriculum This Curriculum uses the Activity-Discussion-Inputs-Deepening- “Adults learn best when they Synthesis approach, also referred to as the ADIDS approach to learning.
    [Show full text]
  • Improving File System Performance of Mobile Storage Systems Using A
    Improving File System Performance of Mobile Storage Systems Using a Decoupled Defragmenter Sangwook Shane Hahn, Seoul National University; Sungjin Lee, Daegu Gyeongbuk Institute of Science and Technology; Cheng Ji, City University of Hong Kong; Li-Pin Chang, National Chiao-Tung University; Inhyuk Yee, Seoul National University; Liang Shi, Chongqing University; Chun Jason Xue, City University of Hong Kong; Jihong Kim, Seoul National University https://www.usenix.org/conference/atc17/technical-sessions/presentation/hahn This paper is included in the Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC ’17). July 12–14, 2017 • Santa Clara, CA, USA ISBN 978-1-931971-38-6 Open access to the Proceedings of the 2017 USENIX Annual Technical Conference is sponsored by USENIX. Improving File System Performance of Mobile Storage Systems Using a Decoupled Defragmenter Sangwook Shane Hahn, Sungjin Lee†, Cheng Ji∗, Li-Pin Chang‡, Inhyuk Yee, Liang Shi§, Chun Jason Xue∗, and Jihong Kim Seoul National University, †Daegu Gyeongbuk Institute of Science and Technology, ∗City University of Hong Kong, ‡National Chiao-Tung University, §Chongqing University Abstract Step 1: examine the need and effect of In this paper, we comprehensively investigate the file file defragmentation. (See Section 2.) fragmentation problem on mobile flash storage. From Step 2: extract the design requirements of our evaluation study with real Android smartphones, we a defragger for flash storage. (See Section 3.) observed two interesting points on file fragmentation on Step 3: design and implement a defragger flash storage. First, defragmentation on mobile flash that meets the requirements. (See Section 4.) storage is essential for high I/O performance on Android Fig.
    [Show full text]
  • Concepts in Information Assurance and Cyber Warfare
    Concepts in Information Assurance and Cyber WarfarE We define Information AssurancE as the practice of managing risks related to the storage, processing and transmission of our information and data. This could include designs for modern aircraft and weapons systems. CAP members are familiar with OpErational Risk ManagEmEnt (ORM) through CAP's online safety programs, flight academies and required staff training. numerous recent events have exposed significant penalties for not addressing obvious risks in cybersecurity. Models of Information AssurancE organize or group the risks so that we can be certain our checklists of action items will address all potential vulnerabilities and threats. ThE CIA-Triad and FivE Pillars of Information AssurancE The CIA Triad defines the attributes of information critical to its effective use. ConfidEntiality is the idea that certain information (troop movements, aircraft design, code keys) will be much more useful and valuable if they are kept secret from others. IntEgrity addresses the quality of the information, to include its completeness, its accuracy, and its relevance. If our information is adulterated with false rumors or red herrings, then it is less useful. Availability reveals a weakness for others to benefit if they can keep authorized users from accessing key information, even if they themselves cannot penetrate its confidentiality. The DoD adds two other attributes to the CIA Triad to include authentication and non-rEpudiation to form the FivE Pillars of Information AssurancE. These terms are defined in the glossary. If we take measures to ensure the confidentiality, integrity and availability of our military aircraft design data, then we would be able to effectively deploy new aircraft and weapons systems.
    [Show full text]
  • How-To-Secure-Your-Computer.Pdf
    © 2020– Institute For War And Peace Reporting https://iwpr.net/ This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license. https://creativecommons.org/licenses/by-sa/4.0/deed.en Contents 1 How to secure your computer 5 Leading the Session ........................... 6 Part 1 - Introduction ........................ 6 Part 2 – Physical Environments and Maintenance ....... 6 Part 3 – Software Safety ...................... 7 Part 4 – Data Protection and Backups .............. 9 Part 5 - Deleting Files and Recovering Them ........... 10 References ................................ 11 3 Contents 4 How to secure your computer • Objective(s): Identifying good practices to keep our computers safe. • Length: 50 minutes • Format: Session • Skill level: Basic • Required knowledge: – None required • Related sessions/exercises: – How does the internet work?1 – Safe browsing2 – Malware and viruses3 – Storage and encryption4 • Needed materials: – Slides (with key points included below) – Laptop/Computer and Projector setup – Printed copies of the Backup Format Template (see below) • Recommendations: It is strongly recommended that you do live demon- 1https://cyber-women.com/en/digital-security-basics-1/how-does-the-internet-work/ 2https://cyber-women.com/en/digital-security-basics-1/safe-browsing/ 3https://cyber-women.com/en/digital-security-basics-1/malware-and-viruses/ 4https://cyber-women.com/en/digital-security-basics-2/storage-and-encryption/ 5 How to secure your computer stration – using a projector connected to your laptop - of any tools you choose to cover in this session, so that participants can follow along and practice on their own computers using “dummy” files created for the purposes of the session (not actually important data or files!) Leading the Session Part 1 - Introduction 1.
    [Show full text]