PACKARD BELL EN BG35 User Manual
Page 32
32 - Quick Start & Troubleshooting Guide
Protect your computer with security software.
Several types of security software are necessary for basic online security. Security software essentials include firewall and
antivirus programs. A firewall is usually your computer's first line of defense-it controls who and what can communicate with
your computer online. You could think of a firewall as a sort of "policeman" that watches all the data attempting to flow in
and out of your computer on the Internet, allowing communications that it knows are safe and blocking "bad" traffic such as
attacks from ever reaching your computer.
The next line of defense many times is your antivirus software, which monitors all online activities such as email messages
and Web browsing and protects an individual from viruses, worms, Trojan horse and other types of malicious programs. Your
antivirus and antispyware software should be configured to update itself, and it should do so every time you connect to the
Internet.
Integrated security suites such as Norton Internet Security combine firewall, antivirus, antispyware with other features such
as antispam and parental controls have become popular as they offer all the security software needed for online protection in
a single package. Many people find using a security suite an attractive alternative to installing and configuring several
different types of security software as well as keeping them all up-to-date.
A complete version of Norton Internet Security™ is pre-installed on your Packard Bell system. It includes a free
trial subscription to protection updates. Make sure you Turn it On!
Choose strong passwords and keep them safe.
Passwords are a fact of life on the Internet today; we use them for everything from ordering flowers and online banking to
logging into our favorite airline Web site to see how many miles we have accumulated. The following tips can help make your
online experiences secure:
✓
Selecting a password that cannot be easily guessed is the first step toward keeping passwords secure and away from the
wrong hands. Strong passwords have eight characters or more and use a combination of letters, numbers and symbols
(e.g., # $ % ! ?). Avoid using any of the following as your password: your login name, anything based on your personal
information such as your last name, and words that can be found in the dictionary. Try to select especially strong, unique
passwords for protecting activities like online banking.
✓
Keep your passwords in a safe place and try not to use the same password for every service you use online.
✓
Change passwords on a regular basis, at least every 90 days. This can limit the damage caused by someone who has
already gained access to your account. If you notice something suspicious with one of your online accounts, one of the first
steps you can take is to change your password.
Protect your personal information.
Exercise caution when sharing personal information such as your name, home address, phone number, and email address
online. To take advantage of many online services, you will inevitably have to provide personal information in order to handle
billing and shipping of purchased goods. Since not divulging any personal information is rarely possible, the following list
contains some advice for how to share personal information safely online:
✓
Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor
grammar, odd phrasings, Web site addresses with strange extensions, Web site addresses that are entirely numbers where
there are normally words, and anything else out of the ordinary. Additionally, phishing messages will often tell you that
you have to act quickly to keep your account open, update your security, or urge you to provide information immediately
or else something bad will happen. Don't take the bait.
✓
Don't respond to email messages that ask for personal information. Legitimate companies will not use email
messages to ask for your personal information. When in doubt, contact the company by phone or by typing in the
company Web address into your Web browser. Don't click on the links in these messages as they make take you to
fraudulent, malicious Web sites.
✓
Steer clear of fraudulent Web sites used to steal personal information. When visiting a Web site, type the
address (URL) directly into the Web browser rather than following a link within an email or instant message. Fraudsters
often forge these links to make them look convincing. A shopping, banking or any other Web site where sensitive
information should have an "S" after the letters "http" (i.e. https://www.yourbank.com not http://www.yourbank.com).
The "s" stands for secure and should appear when you are in an area requesting you to login or provide other sensitive
- EN BG48 EN DT85 EN F EN LE11BZ EN LE69KB EN LJ61 EN LJ63 EN LJ65 EN LJ67 EN LJ71 EN LJ73 EN LJ75 EN LJ77 EN LK11BZ EN LK13BZ EN LM81 EN LM82 EN LM83 EN LM85 EN LM86 EN LM87 EN LM94 EN LM98 EN LS11HR EN LS11SB EN LS13HR EN LS13SB EN LS44HR EN LS44SB EN LV11HC EN LV44HC EN LX86 EN ME69BMP EN MH36 EN MH45 EN ML61 EN ML65 EN MT85 EN MX52 EN NE11HC EN NJ31 EN NJ32 EN NJ65 EN NJ66 EN NM85 EN NM86 EN NM87 EN NM98 EN NS11HR EN NS44HR EN NS45HR EN NX69HR EN NX86 EN RS65 EN RS66 EN SL35 EN SL45 EN SL51 EN SL65 EN SL81 EN ST85 EN ST86 EN TE11BZ EN TE11HC EN TE69BM EN TE69BMP EN TE69CX EN TE69CXP EN TE69HW EN TE69KB EN TF71BM EN TH36 EN TJ61 EN TJ62 EN TJ63 EN TJ64 EN TJ65 EN TJ66 EN TJ67 EN TJ68 EN TJ71 EN TJ72 EN TJ73 EN TJ74 EN TJ75 EN TJ76 EN TJ77 EN TJ78 EN TK11BZ EN TK13BZ EN TK36 EN TK37 EN TK81 EN TK83 EN TK85 EN TK87 EN TM01 EN TM05 EN TM80 EN TM81 EN TM82 EN TM83 EN TM85 EN TM86 EN TM87 EN TM89 EN TM93 EN TM94 EN TM97 EN TM98 EN TM99 EN TN36 EN TN65 EN TR81 EN TR82 EN TR83 EN TR85 EN TR86 EN TR87 EN TS11HR EN TS11SB EN TS13HR EN TS13SB EN TS44HR EN TS44SB EN TS45HR EN TS45SB EN TSX62HR EN TSX66HR EN TV11CM EN TV11HC EN TV43CM EN TV43HC EN TV44CM EN TV44HC EN TV44HR EN TX62HR EN TX69HR EN TX86 Butterfly S Butterfly S2 Butterfly T Butterfly Touch Butterfly XS Butterfly M IP GX DM IP GX DQ IP GX M IP GX Q IP GX T