Set up Windows Firewall and Windows Update


Download 3.44 Mb.
Sana10.01.2019
Hajmi3.44 Mb.



Set up Windows Firewall and Windows Update

  • Set up Windows Firewall and Windows Update

  • Protect your computer from viruses and other malicious software

  • Use Windows Defender to protect against spyware

  • Manage Windows Mail security



Manage Microsoft Internet Explorer security

  • Manage Microsoft Internet Explorer security

  • Set up user accounts

  • Control access to your computer

  • Secure and share folders



Improved features in Windows Vista keep your computer safe from threats such as viruses, worms, hackers, crackers, and spyware

  • Improved features in Windows Vista keep your computer safe from threats such as viruses, worms, hackers, crackers, and spyware

    • Security Center
    • Windows Defender
    • User Account Control
    • Back Up and Restore




Click the Start button, click Control Panel, click Security, and then click Windows Firewall

  • Click the Start button, click Control Panel, click Security, and then click Windows Firewall

  • In the left pane, click Allow a program through Windows Firewall, then click the Continue button, if necessary

  • In the Program or port list, click to select a program check box. If a program does not appear in this list, click the Add program button, click a program in the Add a Program dialog box, or click the Browse button to locate and select a program

  • Click the OK button



An update is a change to software that can prevent or repair problems, enhance the security of the computer, or improve the computer’s performance

  • An update is a change to software that can prevent or repair problems, enhance the security of the computer, or improve the computer’s performance

  • In the left pane of the Windows Security Center window, click Windows Update





In the Windows Security Center window, examine the settings in the Malware protection section

  • In the Windows Security Center window, examine the settings in the Malware protection section



Spyware is software that can install itself or run on your computer without your consent or control

  • Spyware is software that can install itself or run on your computer without your consent or control

    • Adware
    • Pop-up ads
  • To perform a scan with Windows Defender:

    • Click the Start button, click Control Panel, click Security, and then click Windows Defender
    • Click the Scan button arrow on the toolbar, and then click Quick Scan




In the Windows Defender window, click the Tools button on the toolbar to open the Tools and Settings page, and then click Options

  • In the Windows Defender window, click the Tools button on the toolbar to open the Tools and Settings page, and then click Options



An annoying and potentially dangerous type of privacy invasion is spam, or junk e-mail

  • An annoying and potentially dangerous type of privacy invasion is spam, or junk e-mail

  • Start Windows Mail

  • Click Tools on the menu bar, and then click Options

  • Click the Security tab





To block a sender in Windows Mail, right-click a message whose sender you want to add to the Blocked Senders list, point to Junk E-mail, and then click Add Sender to Blocked Senders List on the shortcut menu

  • To block a sender in Windows Mail, right-click a message whose sender you want to add to the Blocked Senders list, point to Junk E-mail, and then click Add Sender to Blocked Senders List on the shortcut menu

  • To always allow a sender, right-click a message whose sender you want to add to the Safe Senders list, point to Junk E-mail, and then click Add Sender to Safe Senders List on the shortcut menu

  • Click the OK button



Internet Explorer offers the following security and privacy features:

  • Internet Explorer offers the following security and privacy features:

    • Phishing filter
    • Protected mode
    • Digital signatures
    • Pop-up Blocker
    • Add-on Manager
    • Privacy settings and alerts
    • Secure connections


Click the Tools button on the toolbar, point to Phishing Filter, and then click Check This Website

  • Click the Tools button on the toolbar, point to Phishing Filter, and then click Check This Website



Click Tools on the Internet Explorer toolbar, point to Pop-up Blocker, and then click Pop-up Blocker Settings

  • Click Tools on the Internet Explorer toolbar, point to Pop-up Blocker, and then click Pop-up Blocker Settings

  • Click the current Filter level setting, and then click a setting ranging from High to Low

  • Click the Close button



A browser add-on is a program offered by any software vendor that provides enhancements such as a toolbar or improved search feature

  • A browser add-on is a program offered by any software vendor that provides enhancements such as a toolbar or improved search feature



Click Tools on the Internet Explorer toolbar, and then click Internet Options

  • Click Tools on the Internet Explorer toolbar, and then click Internet Options

  • Click the Privacy tab in the Internet Options dialog box

  • Drag the slider to select a privacy setting ranging from Block All Cookies to Accept All Cookies

  • Click the OK button





You can manage advanced Internet Explorer settings to enhance the security of your computer

  • You can manage advanced Internet Explorer settings to enhance the security of your computer

    • Enable third-party browser extensions
    • Do not save encrypted pages to disk
    • Empty Temporary Internet Files folder when browser is closed
    • Warn if changing between secure and not secure mode


Open the Control Panel in Category view, click User Accounts and Family Safety, and then click User Accounts

  • Open the Control Panel in Category view, click User Accounts and Family Safety, and then click User Accounts

  • Click Manage another account

  • Click Create a new account

  • Type the new account name, click the Standard user option button or the Administrator option button, and then click the Create Account button



Click Create a Password

  • Click Create a Password

  • Click in the New password text box, and then type your password

  • Click in the Confirm new password text box, and then type your password again

  • Click in the Type a password hint text box, and then type a hint to help you remember your password

  • Click the Create password button





One way to manage access to your computer is to take advantage of User Account Control (UAC)

  • One way to manage access to your computer is to take advantage of User Account Control (UAC)

  • Another way to protect your privacy and reduce power consumption is to let your computer go to sleep after a specified amount of idle time



If more than one person uses your computer, you can share files and folders with them in two ways:

  • If more than one person uses your computer, you can share files and folders with them in two ways:

    • Explicitly allowing another user to share a folder
    • Storing files in the Public folder
  • When you explicitly share files, you set sharing permissions that determine who can change your files and what kinds of changes they can make



To specify which users can access a folder you want to share, click the folder in a folder window, click Share on the toolbar, and then enter the account name of another user on the computer

  • To specify which users can access a folder you want to share, click the folder in a folder window, click Share on the toolbar, and then enter the account name of another user on the computer






Download 3.44 Mb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2020
ma'muriyatiga murojaat qiling