PACKARD BELL EN BG35 User Manual
Page 33

Helpdesk - 33
data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the
right-hand corner).
✓
Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization
might collect and use your personal information before you share it with them.
✓
Guard your email address. Spammers and phishers sometimes send millions of messages to email addresses that may
or may not exist in hopes of finding a potential victim. Responding to these messages or even downloading images
ensures you will be added to their lists for more of the same messages in the future. Also be careful when posting your
email address online in newsgroups, blogs or online communities.
Online offers that look too good to be true usually are.
The old saying "there's no such thing as a free lunch" still rings true today. Supposedly "free" software such as screen savers
or smileys, secret investment tricks sure to make you untold fortunes, and contests that you've surprisingly won without
entering are the enticing hooks used by companies to grab your attention.
While you may not directly pay for the software or service with money, the free software or service you asked for may have
been bundled with advertising software ("adware") that tracks your behavior and displays unwanted advertisements. You
may have to divulge personal information or purchase something else in order to claim your supposed content winnings. If an
offer looks so good it's hard to believe, ask for someone else's opinion, read the fine print, or even better, simply ignore it.
Review bank and credit card statements regularly.
The impact of identity theft and online crimes can be greatly reduced if you can catch it shortly after your data is stolen or
when the first use of your information is attempted. One of the easiest ways to get the tip-off that something has gone wrong
is by reviewing the monthly statements provided by your bank and credit card companies for anything out of the ordinary.
Additionally, many banks and services use fraud prevention systems that call out unusual purchasing behavior (i.e. if you live
in Texas and all of the sudden start buying refrigerators in Budapest). In order to confirm these out of the ordinary purchases,
they might call you and ask you to confirm them. Don't take these calls lightly; this is your hint that something bad may have
happened and you should take necessary action.
Protect your computer with Windows security tools.
Windows provides a variety of protection applications.
Windows Action Center
Windows provides a central area from where you can control the security settings of your computer, helping you to protect it
from Internet attacks and ensuring that the latest security updates have been downloaded and installed on your computer.
To open the Action Center, click on Start
>
Control Panel > System and Security > Action Center.
Alternatively, if a security alert has been reported (in the
Notification Area, next to the clock) then you can click on the
notification balloon or double-click on the small Security Alert
icon.
The Action Center indicates the status and settings used for
important applications that protect your computer. In addition
Windows Firewall, Windows Defender and Windows Automatic
Updates are provided by Microsoft as part of a comprehesive
system to defend your computer. The antivirus application varies
according to the program installed on your computer.
Windows Firewall
Windows has a firewall that protects your computer when connected to the Internet. It stops programs from accessing the
Internet without your permission.
- EN BG48 EN DT85 EN F EN LE11BZ EN LE69KB EN LJ61 EN LJ63 EN LJ65 EN LJ67 EN LJ71 EN LJ73 EN LJ75 EN LJ77 EN LK11BZ EN LK13BZ EN LM81 EN LM82 EN LM83 EN LM85 EN LM86 EN LM87 EN LM94 EN LM98 EN LS11HR EN LS11SB EN LS13HR EN LS13SB EN LS44HR EN LS44SB EN LV11HC EN LV44HC EN LX86 EN ME69BMP EN MH36 EN MH45 EN ML61 EN ML65 EN MT85 EN MX52 EN NE11HC EN NJ31 EN NJ32 EN NJ65 EN NJ66 EN NM85 EN NM86 EN NM87 EN NM98 EN NS11HR EN NS44HR EN NS45HR EN NX69HR EN NX86 EN RS65 EN RS66 EN SL35 EN SL45 EN SL51 EN SL65 EN SL81 EN ST85 EN ST86 EN TE11BZ EN TE11HC EN TE69BM EN TE69BMP EN TE69CX EN TE69CXP EN TE69HW EN TE69KB EN TF71BM EN TH36 EN TJ61 EN TJ62 EN TJ63 EN TJ64 EN TJ65 EN TJ66 EN TJ67 EN TJ68 EN TJ71 EN TJ72 EN TJ73 EN TJ74 EN TJ75 EN TJ76 EN TJ77 EN TJ78 EN TK11BZ EN TK13BZ EN TK36 EN TK37 EN TK81 EN TK83 EN TK85 EN TK87 EN TM01 EN TM05 EN TM80 EN TM81 EN TM82 EN TM83 EN TM85 EN TM86 EN TM87 EN TM89 EN TM93 EN TM94 EN TM97 EN TM98 EN TM99 EN TN36 EN TN65 EN TR81 EN TR82 EN TR83 EN TR85 EN TR86 EN TR87 EN TS11HR EN TS11SB EN TS13HR EN TS13SB EN TS44HR EN TS44SB EN TS45HR EN TS45SB EN TSX62HR EN TSX66HR EN TV11CM EN TV11HC EN TV43CM EN TV43HC EN TV44CM EN TV44HC EN TV44HR EN TX62HR EN TX69HR EN TX86 Butterfly S Butterfly S2 Butterfly T Butterfly Touch Butterfly XS Butterfly M IP GX DM IP GX DQ IP GX M IP GX Q IP GX T