Complete Internet SecurityManual 2dedition - EnGLISH - 2019
Complete Internet SecurityManual 2dedition - EnGLISH - 2019
10 Types of Security Risk 70 How Does Information Move Around the Internet?
12 Hackers and You 72 How Can Internet Data be Intercepted?
14 Social Engineering 74 10 Tips to Protect Yourself Against Interception
16 Ransomware: How it Works 76 How to Secure Your Devices
18 The Virus Top Ten 78 How to Secure Yourself on Facebook
20 Phishing, Vishing and Smishing 80 How to Secure Yourself on Twitter
22 Pharming 82 How to Secure Yourself on WhatsApp
24 Windows 10 Security 84 What to Avoid when Creating a Password
26 Digital Security FAQ 86 Password Generators and Tools
88 Top Ten Password Managers
90 Shopping Online and Security
Protecting Yourself
92 How to Remove a Virus or Malware from a Windows PC
30 Be Smart
32 Top Ten Antivirus and Security Packages
Advanced Security Tips
34 Bitdefender Tota l Security 2018 Review
36 Kaspersky Total Security 2018 Review 96 Wi ndows 10 Privacy Settings
38 McAfee Total Protection Review 98 How to Check which Apps are Sending Information
40 Setting Up Windows 10 Security 100 What is a firewall?
42 Why Updating is Important 102 Improving the Windows 10 Firewall
44 What to Keep Updated and How 104 Creating a Security Plan
46 How to Secure Your Web Browser 106 Windows Security Checklist
48 How to Secure Your Home Network 108 What is a Sandbox?
50 What are Wireless Security Standards? 110 Running Windows 10 as a Sandbox
52 How to Secure Your Wireless Network 112 Installing VirtualBox
54 What is Encryption? 114 Installing Windows 10 in VirtualBox
56 Encrypting Your Windows 10 Laptop 116 Creating Virtual Box Snapshots of Windows 10
58 Top Ten Encryption Tools for Windows 10 118 Create a Windows 10 Recovery Drive
60 What is a VPN? 120 How to Back Up Windows 10
62 How Can a VPN Improve Windows Security? 122 How to Create a Windows 10 System Image
64 Top Ten VPNs 124 Extreme Windows 10 Lockdown Tips
66 Using a VPN for Added Security and Privacy 126 Cyber and Windows Qu iz
128 What the Experts Say
Contents
132 Children On line: What are the Risks? 168 Staying Safe with Facebook for Teens
134 Social Media & Children 170 Staying Safe with Twitter for Teens
136 Search Engine Safety 172 Staying Safe with lnstagram for Teens
138 Online Grooming 174 Staying Safe with WhatsApp for Teens
140 How Safe are the Sites Your Child Can Access? 176 Staying Safe with Snapchat for Teens
142 Email and Child Safety 178 Creating a Child Account in Windows 10
144 Top Child Friend ly Email Programs and Services 180 Windows 10 Family Features
- 146 Cyberbullying 182 Problems with In-a pp Spending
148 How to Prevent and Deal with Cyberbullying 184 Tips on How to Stop ln-app Overspending
150 Helping Your Child Through the Internet 186 On line Child Safety at School
152 Your Child and Online Gaming, is it Safe? 188 Where to Find Help with
154 Staying Safe when Gaming On line- Advice for Your Child Online Child Safety
-Dog 1-Toch s..tes Printed & bound In Great Britain by: oii.Jnux M1nl, Deblan·based or other Unux distributions. lt remains the purchaser's sole responsibility
Wyndeham Press Group Limited to determine the suitability of this bool< and its content for whatever purpose. Images reproruced on the
2nd Edition - ISSN 20444060 fnont and bad< cover era solely for desigrt purposes and are not representative of content. We edvlse all
Pri nt services supplied by: Media Flrst ~niGmatJOl) Lt<l
Published by: ..Black Dog Media Urriled (BOM) f)Oiential buyer11 to check listing prior to purchase for confirmation of actual content. All editorial opinion
Newsstand distribution by: herein Is that of the reviewer as an individual and is not representative of the publisher or any of Its
Editor: ................................................... Jarnes Gale Seymour Distribution Limited, 2 East Po ultry Aven\le afftllates. Therefore the publisher holds no responsibility in regard to editorial opinion and content
Art Dlnoetor & Production:.......... Mari<Ayshbd Londo<l eC1A 9PT
International distribution by: Black Dog 1-Tech Series · 2nd Edition is an independent publication and as such does not
Production Mana90": ......................Kar1 linsteed
Pineapple Media limited YftiW.pjneaPPfc..medja.oom necessarily reflect the views or opinions of the producers contained within. This publication is not
Oeslgn:.................................................. Robin Of'e!N For all advortlslng and promotional opportunftles contact: endorsed or associated in any way with The Unux Foundation, Canonical Ltd. Oebian Project. Lenovo,
Editorial: .........................................Oavld Hayward [email protected] Dell, Hewlett·Packard. Apple and Samsung or any associate or affiliate company. All copyrights,
trademarks and registered trademarl<s for the respective companies are acknowledged. Relevant
Sub Edl1or: ............................................ Pall Beard Copyright C 2019 Btac:k Dog Media. AU rights reserved. graphic Imagery reproduced with courtesy of Lenovo, Hewlett- Packard, Dell, Samsung, Llnux Mint,
Canonical, CyborGhosl, BBC Nows, MINIX, Steam and Valve, lntei, AMD, Crucial, SanDisk, ASRock,
CIT, Cooler Master, Nvldia, BenQ and Apple. Windows is a lrademarl< of Microsoft Corporation,
registered In the United States and other countries. Windows ©2019 Microsoft Corporation.
Editorial and design are the copyright «:> Papercut Limited and is reproduced under licence to Black
Dog Media. No part of this publication may be reproduced in any form, stored in a retrieval system or Additional images contained within this publication are reproduced under liceoce from Sb ul e cs l~ .~ .
Integrated Into any other publication, database or oommerciat programs without the express written Prices, lntemaUonal availability, ratings, titles and content are subject to change. All information was
permission of the publisher. Under no circumstances should this publication and its contents be resold, correct at time of print. Some content may have been previously published in other volumes or BOM
loaned out or used In sny form by way of trade without the publisher s written permission. While we pride tiUes. We adviso potontial buyors to check IIlo suitability of contents prior to purchase.
ourselves on the quality of the Information we provide, Black Dog Media Limited reserves the right not to
be hold responsible for ony mistakes or inacaJracics found within the text of this publication. Due to tho (it:~ Black Dog Media Limited (BDM)
nature of the software Industry, the publisher cannot guarantee that all tutorials will work on every version ~ Registered in England & Wales No: 5311511
Digital Security In Numbers
I '{
_. .•
•
=• •
......
of a11 cyber cri me attacks originate from Russia, China
" ~ 80 % and North Korea
- ~
..
,. r
.,
.,.
' j ' ... '
•
...
•
.\ r ' •
•
- •
. -. L
f(__ ~ 75 •·
% ofthe health care industry has been infected with
mal ware.•
•
.• -
~ T- -~r
•
•
•• •• •
•
...
•
'
~.J
"'5' ,
·u · ,
• ••
• j • •
, '
Social Media Users .....'
•
•
,~·." -- '
..
I
•
•
you _
could be *****- *****- ~
I
i
I
I Haven't changed · Have never changed _
• • ! their password
·
' .
in the
lastyear ,_
their password .
'
1
Sources: Sym<>n;ecCorporation Threot Report CSO Cybersecurity Business epoR ~ UKNationl~berScu n t>j ~ l]{re Securi;y fntelligence • Hackmor:eddoo.com UKOffice'or Nlitior!'lStttfst.ics Bitdef€hae1l,il;:>; Report HerjavecGrovru
• figures based on 2017 halfyearty report.
"1 •
. ~ .
A member o~ Devices Hacked in · RANSOMWARE (
LESS·JHAN: ~ ~
1
•
(.
'{ V
.,., .. .... ~.,
. ........... .,""'(,rjot
.~
J
...
. .I
I •
!. . . t' ~-
-. ~ a:
• • · 1&1
e;
•
REPORTED INSTANCES OF FRAUD
1-'. . through cybercrime against u~ banks last year •
~r . t.
J • .
W' •
. , "
> ti',_ ~ ' Stati$fu,'fm o Q uda , co , ~u t -el<toni""7 Securil)lilffllfrs,com + 19.go-~ + Ma r ol~uftY.crn lnf05EC Institute + IBM '• ~ Unl!)( Foundatio>'l ~ rJicrosOltJ i'Y;odd.com Javel n 5trateg,o USGovemmem • NSA.gov + CIA.gav • wHftel!ouse,(iO'J
• •
MESSENGER
DATA SECURITY
Login Problem,
Wrong usemame or password
ilihe star.t oUiie digital age brought with it man ~ advances ilil ttile wa~ we
woliK and interact witlii eacli otneE lt's estimated tlilere's 1.2 ZettabY,tes
(1.3 trillion gigabY,tes) o~ data available to someone witli access to tliie
Internet a_!ild whi!s_t most of it m a~ 1:5e irrelevant, wlilat's imRortant to you
is somewhere withir.1 that mass o~ raw information.
Sadly, the cold lilard light o~ day reveals that with the growtlii ot tlilis
voluminous data comes tlie nefarious acts oUhose wlio wish to cause
maY,Iiem, pani<:, theft and other such negative eler.ne111ts. mherefore, as
a user Y.OU 111eed to maKe sure that you're 12rotected agai111st ttie ever;
increasing digital wor.ld ot tlireats, viruses and evew.!;hing else t liie
Internet lias to offer-.
iThis cha(2terinwill help Y,OU to recognise some o~ the threats, what tlieY, all
mean]land hownttiey wor.l<. We caril heiR Y,OU to ider.1t~ and kr.1ow what to
looK out foli wlien online1.
WJPaJ.,.,.,_,_.,....,....._,..•.., ..
........ yourti-.~a'COIW,_ ...........
I Recov-n My f iles1
.... ,. ....
b.nw ... " .... fw---....
,.....,.
poor dral a., Qlllllda., prv ill 6-.lla.
Modern Day Security
• •
( )
0
information in order to gain any sort offi nancial data. Foreign offers are fake
You're probably more fam iliar with social engineering that If you've received an email or a pop-up
you suspect, even if you're new to the term. Recall the emails on a website offering you some financial
from someone, usually based in Nigeria, who has come into a reward, then it's more than likely to be
fortune in the billions and for some inexplicable reason wants
to put the money in your bank account. Needless to say, the Seam, fake. Likewise, lottery funds from other
countries are fake too, as is money from
money was never there in the first place and should you go
through the process you will eventually be persuaded to hand seam, so called Uncle Charlie who Iives in
There aren't too many Nigerian seams these days, mostly you more
get a phone call from someone claiming to be from Microsoft
or some other well-known company, who insists t hat they
seam
are tracking a virus or other harmful malware that's currently
residing on your computer. They ask you to visit a webpage
and down load a piece of so ftv o~ ar e that will allow them remote
access to your computer. When in, they ru n a script that
displays a wealth of useless information on the screen whilst
in the background they run keylogging and hacking software
scammers have 0 Slow down
Many scammers want you to react quickly, as
a matter of urgency. Take a moment to figure
employed subtle
to obtain your online banking details. They can even ask you out what's going on and don't fall for any high-
to log into your bank while connected to make sure everything
ways and means in pressure tactics. Ask for half an hour to call a friend
is working. which to bait you. for advice.
Other common social engineering tactics include emails
from a friend, who has been hacked, with the scammer
masquerading as them. lt could be an email claiming to be
from your bank, an urgent request for help or someone asking
for a donation to a charitable organisation. Be wary, and
question everything.
Research everything
Locate your bank or credit card company's webpage and follow
any links to known social engineering seams. Read a11 the
information you can gather about the techniques and tricks
Don't engage used and arm yourself wi th that knowledge prior to any contact
from a scammer. The more you know, the less likely you are to
Whilst it's fun to lead a scammer on the other end of the
being hoodwinked.
telephone, telling them that the only computer you own is
a Commodore 64, it's really not worth it. They know they're
scamming, you know they're scamming, so just put the phone
down and ignore them.
•
•
•
You normally have a set time in which to pay the ransom, usually enough to be the
72-hou rs. If the victim doesn't pay in time, the attacker can target of such an
introduce a second phase into the ransomware code that w ill attack? Here are
either increase the amount demanded o r completely destroy the
some hints and
files that are being held at ransom.
tips for you.
Ransomware can be spread in a number of ways. The more
popular choice o f delivery is via an infected web page, some form
of Flash script that has been hijacked and now contains a link to
a remote server where the brOINser w ill unwittingly down load the
ransomware code. More recen tly there are instances of Drive-by
attacks, where the ransomware code locates any USB sticks a user
may have in their system and transfer itself in the knowledge that
the stick will be inserted into a work's computer.
The WannaCry ransomwa re attack earlier in the year was by far one
of the most prevalent in recent yea rs. it's estimated that more than
250,000 com puters across 200 countries were infected, rendering
the likes of big companies such as FedEx, Nissan Motor Co and
Telefonica SA under siege from its demands. The National Health
Service in the UK was hit too, resu lting in weeks of chaos and
disorder for the staff and patients alike.
~ Stuxne f3 f3
@Shamoon
Stuxnet was rumoured to have been a US Intelligence
created virus that was designed to infect lmnian nudear Shamoon was discovered in 2012 and
'-----'power plants, thus stopping them from potentially developed to infect the Windows kernel,
creating weapons grade materiaL Whether you believe that or not, it '-----' the core code of the opem ting system. lt
was one of the worst viruses to appear in modern limes. successfully managed to wipe the contents of millions
of hard drives and was rumoured to be used in cyber
espionage in the energy industry.
f3
Cryptol ocker is a ransomware infection
that first appeared in 2013. fos with most
...____ __, ransomware code it locks and encrypts
your entire hard drive and offers to unlock them if
the victim pays up to $300. Remarkably, the code
was able to delete itself vvhilst still keeping the files
encrypted and locked.
2014's Regin virus was spread via fake websites and infected tens of
millions of computers. Rumour has it that it was a joint US and UK
'-----' intelligence created virus for global digital surveillance but we'll leave
that for the conspiracy theorists to argue over. Nevertheless, it managed to send
information of the victim's computer back to an unknown location.
' virus to have sprung up in 2015. When infected, the virus will alter
'-----' and delete key boot files for Windows computers then force them to
reboot. With the boot files missing or altered the Windows PC will continually boot
Tiny Banker is an information and and reboot itself until you re-install the OS.
packet sniffer virus that will record
'-----'any online banking details the victim
enters in their computer. That information is then
sent back to several servers which the hackers
can then use to access your bank accounts. it's
estimated that hundreds of millions were stolen
in 2016 thanks to Tiny Banker.
• • • •
Vishing isvoice phishing, using a meantime, they're secretly ru nning a Smishing is an SMS form of phishing. One way or another, each of these
telephone call to commit some keylogger in the background. In these cases you receive a text from seams are designed to bait the
form of social engineering attack. a seemingly legitimate source, usually victim, hence the phishing element,
In some circumstances they can then
The victim will, as we've explained your bank or credit card company a homophone of the word fishing.
claim to have fixed the so called issue
previously, receive a call from a but also in the form of a competition The best defence is to ignore, delete
but ask you to log into your bank
legitimate sounding call centre with winner or something free, asking or hang up on anything that's even
to double-check all is well. With a
the person on the line claiming to be you to confirm your details. There's remotely suspicious. Microsoft
keylogger in place, they can then see
from a well-known computer related often a link for you to follow, which doesn't know if you have a virus, and
your usernam e and password on
company. Usually the caller will be leads to a faIse website that logs your nor wi11 it telephone you. Your bank
their screen; after which they log in
led to believe that there's a virus on keystrokes and records your data. won't email you for your account
and steal from your account.
their computer or that some form details and don't be tempted to
Some smishing attacks will ask you
of security vulnerability has been Alternatively an automated call can fill in any Facebook games with
to send a return SMS to approve
detected. The victim will then be ask you to enter your credit card personal information. In short, be
an action, such as a delivery of
guided to a website where the caller number into the phone's keypad, savvy about baiting techniques and
some goods. The return message
can make a remote connection to as it's been reported as being used remain vigilant. •
is designed to cost significantly
their computer. Once on the victim's elsewhere. Of course it hasn't but as
more than the usual SMS rate,
computer, the caller will then run soon as you enter the details they're
with the money going straight to
a script that wi 11 display reams of recorded and your card can be used
the seam mers.
da(a on the screen designed to by the scammers. •
confuse and baffle the victim. In the
.... _
•
•
- -
•
-- --
•
--
-
X http:// DNS x http:// Fake Naming x http:/I Hosts
DNS cache poisoning is the primary method Fake naming relies on the attacker seconding their One method that's more difficult to pull off,
of creating a fake website with the view pharming attempts with a phishing email. The email though if successful is remarkably effective,
to setup a pharming seam. This involves can look legitimate and contain relevant information • is to alter the victim's Hosts file on their
the criminal attacking the Internet naming about the person in general. There's often a link at the computer. The Hosts file is located in C:\
system, which is responsible for creating bottom that although is spelt correctly in the email, Windows\System32\drivers\ctc\hosts on
readable names forwebsites, such as wwN. is in actual fact a hyperlink to a pharming website Windows eomputers, /privatejetc/hosts on
ebay.com and so on, rather than a string
of numbers in the fonm of the lP address,
•
that's similar to the real thing but spelt somewhat
• differently. For example, the email could say 'your
macOS, and fete/hosts on Linux compu ters.
Its function is to map hostnames to lP
-
such as www.l84.232.124.65 or similar. overdraft is nearing its limit, please login to V•lww. addresses, translating the readable websites
The Internet naming system relies on DNS bank.com to transferfunds .. .'The www.bank.com • to IPaddresses on a local network. However,
servers to provide the conversion between part is correct, but the hyperlink and the resulting it can also be used to circumven t the Internet
lP addresses and readable web site names. website may be taking you to www.bnak.com, which lookup of a legitimate web site, redirecting
The attacker can mount an attack on the DNS although subtly misspelt is often difficult to miss • you to a fake one. it's not often that the Hosts
cache, thus changing the way in which traffic when you're concentrating on the website content. file can be altered, as it's a system file that
moves on the Internet. Effectively, instead of requires elevated permission in order to edit,
the user's request to go to W'xWi .ebay:.com, but a cleverly written virus can do the trick.
they're taken to the attacker's fake website
instead. Thankfully, these kind of attacks
• generally don't last for long, as the DNS cache
is monitored frequently by many different •
Q ~ (<I ~ ~ Pr:f'
--·
Vll\l$ 11 lhi'U'
... .Kb>'O_,..,
---
0.-.lc• ~lfon.t(
h...."
lk r-w.a~
jlotO~I'
w-...-~
• IW'lWOftt
.. --
-.,~"'
At~rJ a biOWMf COf'tttOI
_...... .........
WindowslO
Security
Improvements
• •
Understanding Security
Trying to understand the digital security world can be hard
work. There's so much to take in, that it's easy to become lost
in the quagmire of acronyms and homophones. Hopefully
we can help you out with these ten FAQs.
( /(
-
Do/need
- ----- Most of the security changes you
can adopt don't cost anything,
Does having extra
just you being more aware and
an antivirus Without a doubt, yes. \11/indows security cost?
program? 10 uses the built-in Windows -- knowledgeable about what's
- - Defender program to help protect /) going on. In terms of an antivirus
product, most of the better total
you online. it's more than ample
for most users but often better security suites will cost you an
security is required. annual subscription.
/
- Viruses and
- How often do I Windows 10 keeps a continual
update cycle in operation,
No, sorry. Even legitimate websites need to update
malwareare can be infected with a virus or everything? delivering the latest updates in the
background. However, it's always
only on dodgy some other form of malware.
best to do a daily check for any
sites, right? Remember too, a eomputer virus /
-- can enter your system in other
updates for both Windows and any
programs you regularly use.
/ ways, not just on line.
(/
That's a difficult question to answer.
'
- /sonline
banking safe?
Online banking is remarkably
safe and utilises the latest and
How do I know if
something being
offered is a seam?
More often than not, if it's too good
to be true then it's likely to be a
seam of some form or another.
continually evolving security There are times though when
encryption methodologies. There's genuine offers are made. it's best
// military grade security at every to research as much as possible
level of the on line process, and it's before committing to anything.
highly unlikely to be hacked.
/
/ If you think you've been scammed,
Are hackers
- Whilst it's true that most hackers
I think I've just
been scammed,
you need to quickly make some
changes: changeyourWindows
after me? aren't interested in Lhe average whatdoldo? password, inform your bank that your
- user, they're after bigger targets,
details may becompromised, email
/ there are instances where you /) friendsand relatives Lhat you've been
could be targeted for one reason
scammed, file a police report, scan
or another. Generally speaking, the
your computer for threats and check
average user wi 11only be targeted
your credit card reports.
en masse in a country-wide
ph ishi ng or simi la r attack.
//
I've opened a seam 1 here's a good chance you may
/ email attachment, have a virus on your computer.
Yes, there's nothing stopping you. what do I do now? Close all open programs, open
Canlkeepa A school of thought is that while Windows Defender and do a Full
phishing phone you keep them on the line, turning Scan of the system. If anything
it into a mock-prank call, you're
scammeron is detected Defender wi 11 tell you
saving someone else from being what to do. Then, consider a
the line? duped. However, it's best to simply third-party AV suite and scan the
tell them you know they' re trying
We've looked at some of the many varied ways in which you can be compromised by a digital
attacker and some of the ways in which you can help protect yourself. However, it's often more
beneficial to be able to recognise the signs of a digital security issue.
Weakest Links
In terms of digital security, you're only as strong as the weakest link in your security chain. You can tick all the security boxes but if you don't know what to
look for in the first place you're still vulnerable.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
A good sign of a breach in your digital BANK ACTIVITY If you check your bank activity regularly and you've
PASSWORD CHANGE
security is the sudden changing of a noticed some odd, small transactions that you fa il to
password.lt can be for a random site, webmail or just something small to begin identify, then your account could already be hacked. Sometimes hackers will
with. Sometimes a hacker with a keylogger in place will test the water before take small amounts or purchase inexpensive items to check the validity of an
accessing your bank, in which case you need to virus sea n your PC immediately. account before emptying the vault as it were. Contact your bank immediately.
O.c
( Jan f<b All transactions
2016
All Transactions
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
PERSONAL SPAM We all receive spa m emailsof some form or another. SLOW PC One of the many signs of your computer being infected by a
However, if you suddenly start getting emailsof a virus is the sudden slowing down of the overall system. Most
more personal nature, then you need to look at where that information could be operating systems, Windows in particular, slow down overtime but if you power
eoming from. The detailscould be your fu ll name, date of birth, knowledge of any up your computer one day and it's noticeably slower than usual we'd
children or even a recent accident you may have been involved with. recommend you run a virus scan.
SLOW BROWSER In relation to the previous tip, a browser slow RANSOMWARE WARNING In the case of a ransomware attack,
down can also indicate that something is you don't often get much warning
potentially going on. Brovvser hijacking can adversely affect the speed at which that something is about to happen. Generally speaking, a sudden and inexorable
pages load, as it's sending information to a remote source. Naturally it's not slowing down of your eomput er will be a key element, as the ra nsomware is
always a digital security issue but to make sure, check your system. fra ntically encrypting your files in the background.
n. 5ln(Jiio «<PV ol the "'~ law. \llllt1lc;h Vo4l . . , 'WCU to dei;JWI( , . ..,, lout9d
en ~ secret _...., ()1"1 V. lnt.,.t,; et. ..,....,. """" dtnrov the ~<.-, ¥t• ~ trnt
C*l"-d n tHJ \WICio'W, a.fte t"-. ~ •'Id JMM!r wll be able to ~ llts..
to ob t ~ln the prh'.tte ket b tNs WfCll.l(er, ..._., ~ il t ~ ~rvPt ~. YGU
need to oav 300 uso / 300 curt 1 ~ ~t n ¥10t'-r ~v .
POP-UPS Furthering the browser issue, if you suddenly notice a lot ROUTER LOGS lt's always recommended to check your router's
more advertising, pop-ups or similar, then it's usually a good logs frequently. Although hackers are generally
sign that you're infected with some form of adware or Trojan tracker. anonymous groups or individuals on the other side of the world, often a
hacker could simply be a neighbour leeching your broad band connection.
Check the logs for any unidentifiable computers attaching to the router.
BT Smart Hub Manager
Home ) My network
lhiuhows de'viN!s OOMKted to )'CU BT ~tNf Hub tithH now« prtv!Oudy. Olckon a devlc• to see tht ftJII details. Alono mt h
a useful SU'Timaty, you can Quic:kty see whether Mass Canto~ Of POft forwarding Ci
is enabled for e.ac:h device. m
You Qn see the volume of dit. that e~ device his seot iind I1!Ct'l\led next to the up iind down oWTOWS, Since your hub was !.iist
Ae~ · · ount Numbtr Nllme Staen ~·nt Dale PI) nlC'nt Out Dare
1234 567 8901 Suey Student 1/1512005 2/I.IJ2005
Credil Unt C1't'dit Available ~ew Ualttntt ~1htimu l'aymtn l Out
SISOO.OO 5500.00 SIOOO.OO SJO.OO
Rdtrt":R«" Sold Pos-ted Atlivil)' Sinl"t last Stattmt:nt Anlount
• •
en
•
ecur1
While the built-in Windows Defender is a great antivirus and security tool, it's nowhere near as
capable as one of the many third-party security suites. The likes of Bitdefender, McAfee and
Symantec have years of security specialism behind their products.
Better Protection
A third-party security suite offers much than virus scanning. With one of these, you're covered against most, if not all, digital threats. Here are ten security
suites worth considering ifyou're serious about your digital protection.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
BITDEFENDER BitdefenderTotal Security 2019 is the latest security SYMANTEC Norton Security Premium is Symantec's top choice for
suite from one of the world's leading security the home user. 1/1/ith it, you can protect up to ten PCs,
specialists. This version offers unrivalled levels of protection and perfonmance for Macs, smartphones, or tablets and it'll keep you safe when shopping on line,
Windows, macOS and Android platforms. There's even an advanced ransomware general surfing, or when conducting transactions.
protection element to help protect your folders.
z
0
~
z
Bitdefender Bitdefender
~ Nortn fl Norton· •
TOTAL TOTAL -..., by Symant bv Symantel ~
t
SECURITY SECURITY NORTON' SECURij NORTON- SECURITY ~
PREMIUM PREMIUM
... ".,'
!I
............
"" ....., ...... ...............
·····"·''
._ '"I
..............
·~"
.. i
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
MCAFEE McAfeeTotal Protection offers a 100% guarantee of virus WEBROOT Out of the three possible solutions available from Webroot,
removal, or you get your money back. There are three main Webroot Internet Security Complete is the one to consider
versions available: Antivirus Plus, Total Protection and Livesafe, each has its own for home users. With it, you're protected from virtually any threat, as well as
particular twist, but all offer excellent security features and benefi ts. offering 25GB of secure online cloud storage.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
KASPERSKY Kaspersky's Total Security 2019 is one of the best go-to ESET ESET lnternet/Cyber Security is a comprehensive protection
products available on the market. it's great value for package for everyday users. lt offers online banking protection,
money and offers superb protection for your PC and other devices. You get alerts for any malicious attempts to control yourwebcam and a fine-tuned
parental controls, secure password storage, encryption and identity protection balance betv;een security and privacy.
all under a single security suite.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
AVAST Avast has offered free antivirus software for many years, but its F-SECURE F-Secure has been in the security and protection business
other products: In tern et Securi ty and Premier, are aIso well worth for a lot of years and as such, its products are often
looking into. With both versions, you'll get online banking protection, identity considered one of the best available. F-Secure Total is the top choice for the
protection and email protection, all for a reasonable cost too. home user, as not only does it provide superb antivirus protection, it also offers
a Virtual Private Network (VPN) for added privacy when online.
•
• ••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• Trend Micro Maximum Security offers superlative
TREND MICRO
EMS ISOFT Emsisoft Internet Security is an award-winning security protection for up to five different devices along with
suite that offers plenty of great features and elements. it's extended protection for children, Internet passwords and privacy on social
quick, easy to use, cost effective and does an excellent job at protection you media sites. it's great value for money and performs excellently too.
and your devices from modern security threats.
~=-
EMSISOFTfZI EMSISOFT
•
e en ecur1
•
ev1ew
Bitdefender is regarded as one of the best antivirus and security companies in the world.lts products
have won numerous awards and have been proved time and time again to be efficient and effective
whilst offering cutting edge technology.
Total Security 2019 is Bitdefender's flagship product and offers comprehensive dashboard will inform you of your child's online activity, visited sites and social
security packages for Windows, macOS and Android users, all under a single media behaviour.
web portal. Pricing does alter slightly, depending on what special deal may be
Ransomware is handled by an independent module that requires activation,
available, but expect to pay somewhere in the region of £69.99 for a single year
once enabled it'll automatically protect files in your Documents folders, with the
license for up to five devices.
option to include other folders, too.Any attempt to edit one these protected files
What do you get for your money? Well, Bitdefender has upped the ante with results in a message appearing, allowing you to confirm the action. This makes
regards to its protection suite, not an easy task for a company with a long history it increasingly difficult for ransomware to start encrypting and messing around
of already providing the leading security suite on the market. Total Security 2019 with your valued data.
is quick, easy to install and understand, with the unboxing to installation and a
On top of all the superb features though, is the excellent scanning engine. The
complete system scan taking no more than half an hour.
Bitdefender scan is quick and doesn't slow your computer down while being
Most of the problem with modern security suites is the heavy interface that active in the background or while conducting a full system scan.
comes with the package. A modern suite must include a wealth of elements to
In short, if you're in the market fora complete and fully featured securitysuite, then
make it even slightly competitive in an already saturated and quite aggressive
Bitdefender Total Security 2019 is the one you shouId most definitelyconsider.
marketplace. Thisin turn creates an interface that's often too cluttered and alittle
overwhelming for the newcomer. Bitdefender though, has managed to package
together a clean and sleek setup, with the most prominent features available,
with just a click or a couple of clicks of the mouse.
2019 MULn
Naturally you can dig much deeper into the settings, selecting pre-defined mnn:•" DEVICE
1
profiles and modes, or tweaking the core to either lighten the security, l•
without compromising the overall defences, or tightening everything !
• Bitdefender.
~
up to an almost NSA-level ofsecurity clearance. < TOTAL
it's packed full of interesting and useful features, some of which
1 SECURITY
''
you never thought you'd appreciate until you actually had •'
them to hand. For example, the vulnerability scanner will ''
"Bitdefender Toto/ l
hunt down any rnissing Windows updates, issues with Wi-Fi Security 2019 is one of the
security and even weak passwords. Integration with your best AVand protection
browser is excellent, offering clearly defined green ticks next products available today"
to search results that are classed as safe to visit, including
integration with Facebook. You can also set up a secure vault
for files that you want to mark as ultra-private and keep away
from any prying eyes.
You'll command everything from the Bitdefender Central Activity
Dashboard, -.vhich will display the current subscription, to the status
of your Bitdefender installed devices, alerts, reports and so on. it's a
simple interface that keeps the stuff you want to see prominent, while
gently hiding the deeper information that only the more advanced user
may be interested in viewing. Of course, should anything untoward happen to
any of the Bitdefender installed devices, you'll receive the appropriate warning.
Interestingly, should you activate the parental features on any of the devices, the
!! Wi-Fi network
Re-solVed 0
Unr~sotvl;'d UC'ms 0
'---PA_us_
r ___,ll.__s_ro_P___,1 [ CANaL
"One ofits many splendid features is a "The scanning engine is quick and
vulnerability scanner that informs you efficient and doesn't unnecessarily
of any weaknesses in your system." slow your computer down."
You are
We're looking out
a s
your
d ~ ! for
andt.
OATIONS -endations
AUTOPILOT RECOM MEN . vfdes contelC!Ual recom.. •
'I ' ~or personal secvriry adVIsor. pro ~u ' l g et to benefit from
Aulop• o-s- vf sage and needs. TillS way, ,_
b~.ud on your de ce u
• ..,.l}'thin(J your product has to offer.
L
QVICKSCAN
PI!O!ECTION
START SCAN I 0 [
VPN
PP.IVMY
OPENVPN 1
0
"Once installed it
automatically updates
and keeps you safe from
a Toldl Security
1:.1 Unhmi:ec.f dttvtces ( 1
)
P~IVAC
S~fepay
0
AOO A QUICK ACTION
digital threats."
{ Open 1
•
ers ecur1
•
ev1ew
Kaspersky was one of the first security companies to offer the end-user a cross platform AV
protection suite, some years ago now. Since then, the company has improved its products
staggeringly and as such is now one of the leading security suites available.
Kaspersky's Total Security 2019 is the mega-product of the company's AV and In terms of speed of operation and the performance hit on the system,
protection utilities for home users. it's reasonably priced at around £39.99 for one Kaspersky Total Security 2019 is about on par with that of Bitdefender.
device plus a year's subscription, rising to a maximum of £109 for five devices and Admittedly, it's not as fast at completing a full system scan, but it's only a
a two-year subscription. Obviously prices can change, depending on what deals minute or so out. The performance hit on the system is negligible; in fact, you'll
are currently avai !able, so check the Kaspersky website for thelatest guide. be hard-pressed to notice any negative impact once the software is installed
and continually scanning.
Much like the Bitdefender entry, Kaspersky has gone to great lengths to provide
an easy to use and simpie to understand interface. While, again like Bitdefender, One last component worth mentioning is the Parental Control feature.With this,
you 're able to delve deeper into the innerworkings, theaverage user isn't instantly Kaspersky offers a method of keeping children safe while they use their devices.
bewildered by pages upon pages of technical jargon, icons and sub-menus. it's You can create usage scheduling, GPS safe zones and receive notificationsshou Id
handy too that everything starts from the Kaspersky online portal, where you'll anything suspicious attempt to access your child's device when they're using it.
download your purchased software, alongside installers for other modules that Beyond that, there are also filters to stop children accessing adult sites, or sites
eventually all fall under the same umbrella control centre. that can feature disturbing content.
The front-end categories that are available via the control centre are: Scan, Kaspersky Total Security 2019 is an impressive product and one that the
Database Update, Safe Money, Password Manager, Privacy Protection, Backup home user can certainly feel confident about. it's quick, easy to use, regularly
and Restore, Protection for all devices and Parental Control. Most are fairly self- updated and ticks all the right boxes from the point of view of a user, parent
explanatory, however, components such as Safe Money and Privacy Protection and someone who wants to make sure they're as secure as possible on the
deserve a little more detail. modern Internet.
Safe Money utilises Kaspersky's unique protection engine, whereby your online
transactions aresafely behind theproduct's security web.This feature takes ea re
of protecting your shopping, as well as online banking, so it's an impressive
weapon in the already ample Kaspersky arsenal.
Privacy covers a range of different features. The core component
protects you while surfing, guarding your online identity and
information, while also actively blocking malicious websites
and preventing any form of tracking or rnonitori ng. lt also
includes an element that blocks any attempts to access your
"Kospersky Total Security
computer's webcam, which is certainly a handy feature and
2019 is one of the leading
it'll block any attempts to access your stored data while you
AVand security products
browse the Internet.
for the home user"
Needless to say, the features avai table are certainly impressive.
Beyond the few we've mentioned above, there's also controls
to improve browser security, protection for any cloud access,
a vulnerability scanner and a trusted application mode that
will only allow white-listed programs to be executed. You can
create a Kaspersky Rescue Disk, which you're able to boot from
should something ever go wrong, allowing you to scan and clean your
computer without it needing to access Windows. The list goes on and
covers pretty much everything you would want from an all-encompassing
security suite.
, X ky Total Sec
urity ? X
" ' ICaspors
ection Connectio
n
~ Privacy Prot ~ S ~re
Acc e s s is a l ow ec~
--
We b c a m t r a n sf. . -
·- L ' - •--. J
Sa fe d a t a
' .. . . .. . .. ...
,......, .......
_
_
. ......_
- . . .....
'
. . . . . . .._
---.. .
. .
s.a... _ -
_ . ., .
I
Browsing i s l!nabii!C
-·-
Prive te
..
as Pr ivacy o ut K asp ersky's
s su ch
"Component elcomed and here's a lot to like ab a sy to use
"T quic k, e
Protection or
eW uct it's
l to th e e nd user:" flagship prod e right boxes."
fu h
remarkably u
se and ticks all t
r o t ection ·s ,.
l t r P
Y o l!ws
1
•ve now
3 P•eees or tl
8
.•
.
d Restore Parental Co
ntrol
Pn>toci~
,. . all
do\ic. .
in terfa ce is u n
entre
"The control c tered
clut
Backup an ollow
andeasy to f
n
Privac y Protectio
le nt y o fop tions
Mo r e l o o b
with p
OVailab/e."
•
ev1ew
The name McAfee has been synonymous with antivirus and security since the late '80s and is
considered as the granddaddy of the computer security world. Its latest complete protection
package, Total Protection, has a lot to offer the end user, as you'll soon see.
The name McAfee has seen some interesting press over the last decade, not just The Password Management feature is an interesting addition to the McAfee
from the security software itself, but also with regards to the company founder, suite of tools. In reality, it's lntel's True Key Security component that, although
John McAfee. The founder's colourful lifestyle aside, McAfee Total Protection is not the top of the league password management program, does boast a multi-
a singularly impressive suite of tools. The cost is a little higher than the previous factor authentication process. In addition, you ea n set individua I True Key
entries, priced at £89.99 for a year's subscription (though, regional and special passwords for all members of family- up to five users.
offers will reduce that amount considerably). However, one highlighted feature
Among the multitude of features, you'll find File Lock an interesting addition.
is the Virus Protection Pledge, whereby your money is refunded should McAfee
This is an impressive encryption mechanism that'll lock your files behind an
not be able to remove a virus that's already on your corn puter.
impenetrable, military grade encryption wall. it's not activated by default,
it's worth mentioning that the annual subscription includes installation on which is understandable as encryption does still carry with it a higher level
an unlimited number of devices; which is certainly worth considering if you're of user knowledge and it's not something the average user will immediately
one of the many modern households that owns countless lnternet-connected consider adopting when setting up their corn puter security.
devices, eomputers and everything in-between. it's without doubt, an excellent
As for performance, we've already mentioned that McAfee is somewhat slower
choice for the home user.
than that of Bitdefender or Kaspersky, but as with the other entries, you won't
Both installation and the initial full system scan were slower than that of notice any perceivable slowdown in the computer's operation with it installed.
Bitdefender and Kaspersky, but only by about five minutes. If you' re constantly McAfee Total Protection does an excellent job of keeping you rfiles and personaI
in a rush you may want to consider the other suites, however, most users will information safe when online and with its added features it's certainly worth
be satisfied with the result from McAfee - at any rate, it gives you time to make looking into at greater depth.
a cup of tea while you're waiting for the scan to finish.
As with the other products we've looked at, the interface is simple to
understand and navigate, with the core and most used functions within
easy reach of the mouse pointer, while the more advanced options are
neatly tucked away for those who are a little more knowledgeable
about such things. In short, it works well and keeps the wealth of
available options at bay until the user requests them. Needless
to say, the settings are extensive, allowing the advanced user a
higher degree of control over the way the suite of tools works
within the system on which it's installed.
"McAfee Total
McAfee's three-tiered approach to system protection is Protection, now a
worthy of mentioning. First, the scanning technology does part of lntel Security,
a thorough, fine-toothed comb inspection of the files on is certainly worth
the system. Heuristic analysis then takes over, monitoring: considering for the
behaviour of files, functions and even code inspection, to home user."
check for possible unknown viruses based on the way they
work. Lastly, anything that's even remotely suspicious is
automatically uploaded to the McAfee Globa I Threat Intelligence
Lab for analysis. Should the code prove to be a new form of virus,
the team behind the impressive sounding lab will create a fix and
push it out to the other tvvo hundred million plus McAfee users. it's not
nice getting a computer virus, but at least with McAfee you can be assured
that your misfortune is helping others.
-X
~ McAfee Updates
___.,__, ·-
CompkiOd
100%
Get nd of files 1
._._
--
-·-- Old you a,.,.. \twit s!OU you ha.... A.u'om.tl< Updates t\6Md on. HcAfH wtll ctwtk fOf and W'I$Ltll•d upd.atn
·-
wrthout you tvvtna to dO ~JUnC1
ALrtOmibC Upd.J.tto• dt>IIWrlttMII.att'lt ptot.-ct.on &aJ-InSl the-~ tl'wt•ts.. ptu' f•.lltur• rlhAt'\(fi~nJ.
241 kHp your sofr.rw•rt runnlfll smoothly .tltf'l• t rM. lNtn mor•
Protecting now
• ••••
ows
•
ecur1
Before we dig deeper into the many levels of Windows 10 security features, it's worth taking a
moment to check that the initial security features are in indeed up and running, and doing what
they're supposed to.
I f o.; I '-"
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 Thiswill open the Security and Maintenance section of the STEP4 UAC will warn you of any attempt to access a system critical file. If
Control Panel. There are tvvo main sections within this page, click any malware wants to alter a file, then you're asked if you want to
on the Security section to expand it. Ideally all the options within the Security proceed; obviously you don't, so you can say no and investigate the issue. There
sect ion should be displaying On, with the exception of Internet Security Settings are various settings to choose from but the second step down from the top is
which will display OK. the recommended.
l" r
0 X
... 0 - ... ~. ...........,
0
Choose when to be notified about changes to your computer
...
O...,.Soanyo• NoMcft""'"t_,_,odbv *-V• ....'-,__..
-
-~ lkotr Ac<.ount Control h-elps ~t poct:ntillly harmful prog,-,ms from m•long W ngts to your computtr.
$ C"""v u- ...._.... , _,., Sft.uuty Jc!! me D10fC jbout Usu Account Control Kttjogs
"-.-... - a..
l'9 """"-Oof- Aool-... ,._ , ~-.et Not ify m~ onty wben ~plic.atons try to I1Wike chango
to my comput<":r (def-'0
Vltr~-
t u.c' . . -1J'fl"~.,
& c- .. ,-
,_.,
. .- . ._,........ ~
(lfo
.. --- • Don't notify me when I make changes t o Windows
smings
·~
--
.,
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS Close down the Security and Maintenance window, then click the STEP8 If you click the Virus & Threat Protecti on Sett ings option, you
Windows Start Button and search for Defender. Click the resulting can further opt to improve the system protection. Make sure
Windows Defender Security Centre option. that all the sub-options are set to On and scroll down to define the program's
default Notifica tions.
[j Filt ers v 0
o Virus & threat protection settings
VICW .md upda~ the VIU~ & tt-at protectian !:-!!Ut"95 fOf W!ndom.
M~t Anlivirul
Best mat oh
Real-time protection
L[j W indows Defender Secu rity Centre .,.
LoQt~
CM\ rum off th~s
t)ll(l stop~ m¥w~
setto"9 for~
from omt.llli"9 or ru~
siiOtt t~me ~or. tt t""" b..OC on
on )'OUr deVIce YOY
W
i\JtOm~lUI)
11) On
STEP6 If you're not using a third-party security and AV suite, then you STEP9 Returning to the main Virus & Threat Protection page, you can
need to make sure that Windows Defender is activa ted and click the shield icon from the strip to the left or the screen; then
working. There are numerous options available in the nevv-look Creators Edition click on the Advanced Scan link, located under the Quick Scan button. Within are
Windows update of Defender. Each can be selected with a mouse click and options to run a Full System scan, a Custom scan (of a network location, for
viewed separately. example) or an Offline scan.
Advanced scans
Your device is being protected. liil Home Run .11 full, rustom ot Wmdows OdM:ler Otn l'iE! still\.
0
t.an~,Mcro: Sf.ioncl?
Uort th.>;~ c!~1 upc!J:« s '31/20 17 0 Virus & threat protecuon
0
YiiW & Uvt01
~
Oevicepetfornw,ncetlt riew,.tk'ICf~
<I ~ Ed
~ &: browser QOntrol
FJf
ramily opti~
0 AW & btOINSel COOirOI
Sc.an now
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• Lastly, click on the Firewall &Network Protection from the icon
STEP 10
STEP7 Click the Virus &Threat Protection option. This will open a new strip to the left. Again, if you're not using a dedicated, third-party
window allowing you to perform a Quick or Full Scan of the security suite, make sure that the Private and Public Firewalls are set to on, thus
system that details the number of threats found and the number of files scanned. protecting your system from unwanted intrusion.
.. .. J Orl
"
- 0 Virus & threat protection -
<•1>l Firewall & network protection
(,)
Vw.:w lfweat hi:OlOf)'. K4n fiol wusr:s ~nd othc:r thn:DU, spec1fy protocbOn
settlr.os. and oet peottcbon upcla~es. G:l Home View networl< connect1ons. spec1fy Windows F~reoNa 1settrnqs and
troubi~QO networfc and lnt PrnPI prohlem~
0
0 Virus & threat protection
~ Gl Scan history
No thlnts tour4 ;o> OE:'Iice perfQfmatXe & health 2a Private (discoverable) network
"'
0 0 42924 I o ,~ Firewatl & networi< protection
Firewall is on.
Networt is connected.
sanf'.fO
.... TllfNU fOUI'IO r,~
B App & browser control
Q\l l(k~n
1:<1 Public (no n-discoverable) network
'If f am•ty opt1ons
hrewallas on.
Ac:tvanct<t sc-an Nl"twort is not connected.
0
• Virus & threat protection settings Allow an app thtough the f•rtwall
You are us1ng the t~JO"S: ·recommended setnngs.. Netwtnk and Internet boubtcshoolet
h rcwatl nolllteabOn settings
Advtlr'ICtd setungs
~ Protection updates Restoce firewalls to default
Ptotrd1on dtf•IIOOns au: up todllte.
•
IS m
Continual updates, rebooting after an update has been installed, then the inevitable second reboot
straight after the first to apply the update: it's little wonder people stray from the regular update
checks. Whilst it can be a pain though, keeping things up to date is a top priority.
PATCH VULNERABILITIES Windows updates patch recognised BROWSER UPDATES Windows 10 comes with many different
security holes in the core system. Many programs to make it a more appealing
of the viruses around today exploit a vulnerability in the Windows code that environment. They include Internet Explorer and Edge browsers. As a part of
hasn't been fixed yet. So when an update comes along, that potential flaw will be Microsoft, these will need to be in tip-top working order to help prevent any
ironed out. modern lnternet-borneviruses from entering the system. Daily update checks
will keep things in shape.
- - • Cl- • ,.
0
Your device is being protected.
.,.
Q ~ (<I ~ Ed ~
Virus&: ttvt• t Otvict pcrlotm.vKe ee rft.V. . et ne1WOftc Apt:> et browstt <Ontrol f •mily options
"''"-
NoO<'.I\~
health
N!'OC".J~Il
llfQTecrion
Wlfldow: r<'«itll oon. ,.com~
'l'oll'!t U'.iii91N
wtu"91'-
Mll!agt h» )'Oill' lamilj
>AM lfiW~$1:
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
FIREWALL UPDATES To expand the last reason, the Windows GENUINE SOFTWARE Non-genuine copies of Windows have been
Firewall is one of the first layers of security on a thorn in Microsoft's side since illegal file
your system. With it, access to your computer from another source is monitored sharing on the Internet gained popularity. These days the act of down loading
and even blocked, stopping potential threats before they even hit the virus something illegal is rampant. Windows 10 updates ensure that you're using a
defence layer. Updates make sure that the Firewall is up to scratch for the job. genuine copy of the OS, which will ultimately secure you PC against threats
from pirated copies.
El
q Public (non-discoverable) network
f'.lrewJIIIS on.
Network. is not connea.ed.
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
it's not just the Windows core files that require • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
OFFICE PATCHING
regular updates, if you use Microsoft Office Lhat FUTURE UPDATING Microsoft has big plans for the future of
can be a part of the overall Windows 10 update schedule. There are Windows 10, it's often mentioned that this will
vulnerabilities in Office too, which when exploited can allow malicious code in be the last full version of the OS as they will be running Windows 10 as a service
the system. Tick the Give me updates for other Microsoft products box in as opposed to different versions over time. This means it will be a constant
Windows Update's Advanced Options. update cyclewith adding or removing of features. Updates ensure you're running
the latest versions.
® Advanced options
Pnvacv $tatement
Not e: Windows Update might update itself automatically first when checking for other updates.
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
·-
• PefOII'".-tt Mortill!'
Fil• Action Vil'W H•lp -" 0-'f ( ..!e<W~
Discussing updates is one thing but how do you go about making sure that you have the latest
updates and that all the necessary components are being updated correctly? Thanks to the
improved update process of Windows 10, this is surprisingly easy.
Keeping Up To Date
Whilst it's easy to update Windows 10, there are elements that can be missed. We've already mentioned that it's not only Windows that needs updating but
also software and drivers.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
The first port of call is undoubtedly Windows Update. Click on the STEP3 If you click on the Advanced Options link under the Update
STEP!
Windows Starl button followed by Settings, the cog icon jusl Settings section, you can then tick a box that enables Windows
above the power icon on the strip to the side. This will open the \Nindows to automatically check for updates for other Microsoft products, such as Office
Settings interface, locate the last entry, Update &Security and click it. and so on. it's recommended to make sure the box is ticked, for better security
and protection.
0 Advanced options
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 By default Windows Update will automatically check for, STEP4 Within the Advanced Options page click the link for Choose how
download and install updates for the core Windows 10 files. You updates are delivered. This page details the way Windows
can check for any on the spot by clicking the Check for updates button; and you updates can be pushed to other computers on your network, or even the
can see what's already been updated by clicking the Update history link under Internet. \Nhilst it's a grand idea, there are concerns over privacy from some
the update button. factors of the community. it's your choice but we prefer this option is Off.
'
Windows Update 0 Choose how updates are delivered
._I r._,.,_,"-'.;~PI Update status
@ 'Nw doMtc~up to<U:r.. L.lr.A ~ )'e'..t"'11rf,09-.lS
Updates from mofe thao one plau
WIIHI !tilt I~ rurnl'tl (11'1, )'l)llt pt' Mlly IIIV'I Vl'lo'l pMh M jii'I'WiiNf
Update settings ~a!H<I Wll'ldo'..s \IP(UtK ..a 't)!)S to PCs on fC'I' toa1
ncbtlort e r ~ on the IMemel cleDMd:ng on ...tlan !~elct'CI
\'It'll ~ downbxl ;m:! 1mtlll upd.l~ O'U'PI on meteKd cone'l~ briUIII'.
(wtlo-"' fNrtJ'!i ~ ~ In 11\M {1~ -
updi¥1-tiltqo.li'td to lM9 VMdoows l\lllnif19 ~ly
· •• ao.AnrNI '~ (lt"M~ nroty tho)ut
Don
(. ~"-Mur$ r...1upd"IM ftnm MimKnft. "nd 9"1 l~M. rmm and~
~tflW
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS Hardware drivers are usually automatically updated by Windows STEP8 Third-party programs and applications also require regu lar
Update but whilst signed by Microsoft the drivers themselves update checks. Again, this is usually done automatically; when
aren't always the latest versions. Therein lies a problem: even though signed, the you launch the program in question it often checks for the latest version. lf
MS drivers won't utilise the hardware as well as the driver developed by the not, look for links such as Check for Updates or similar, usually in the Help,
hardware manufacturer. About or even under the File menus of your favourite app.
9 Onck \'M Virtwl6o11: Mtn~g.er 0 X
file: MKhinc: Hdp
(j> Prttttti'KC:$- Ctii.-G
'A«f~: 1Z8Ko
/lcl:llilltr•'*"
_.,.,..,
s-:J tMnn
l&lJ a ,._.todOf! . . . . Oelbop S...;
........
10
OiNtfit4
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
NVI OIA Cont mE P.anell Creative Wo~dwle Support> Sound Blaster X-Fl Go! Pro
supp:lrtcreall\le.cooV ..JProdUC.IDetaiiS.asp;?. SOUnd+Bias.ler. ~ ... •
Tlus do'.-flblld c:c:mm tt. ddv• and appkata'l(s) b us• Vli!h )'QUI Soond Bta..eX.f.N Go! Pro
Focm~t d~3tls, rud the ttst dth•s wtt1 rtle~ note
b:it
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
graphics and check for the latest drivers. Usually this is done Filt Action VH:W¥ He:lp
automatically, and you are notified of any available drivers. However, If you want +•llf.1 1[;ill fJ rmi 'R I 1!. X •J
v d WindOW\
to check manually, click on the Drivers tab followed by Check for Updates. > Aud1o Inpu t ~ <~:ndJll outputs
• (ompl.ller
- Disk drivts
) . . Oi$pley .clepten
• fitrl'\w!~
NI HurNnlntc:rfec:e Oevius
) 'W IDEATA/ATAPiconttollen.
>- ICcyboiud~
I Mioce end other pointing dMc:ts
> '!t Modtms
>• Monlton
• Nttwork.•clapttrs
I Pott•ble Oevic:ts
i
Port$ (COM & LPT}
IF\: Pttrlt queues
[J Pfoctssors
, I Softwere d ~ts
V q: SoLnlf. VIdeo 4nd game COI'IItollet5
li)NVIOIA H19h Oefinllion Audio
~ NVIOIA Vilt~ Alllf10 ()eyic:e rH~ Exttnsiblt} (WOM)
.. Rul!ltt: High Oftil'lltion Aud1o
'4 Sound 814UerAlo: SBX P
~ Stor-• c:on t rotl~ - -:
" :;;;d;:;
" ;'.; ;:...._ _ ___, 1
"';;.;
""
r. Sy$ttm dc\lic:C$ Oiwbl~d(e
; U n ~ul Scrillllkls conb o Uni~l dconce
Pto~rib
ecure our
rowser
The web browser is possibly the weakest link in the entire security chain. lt's the software product
that's on the front line, the one that will inevitably bear the brunt of any Internet attacks and as such,
attackers focus a lot of effort on making the browser a portal into your system.
Safer Surfing
Securingyourweb browser isn'ttoo difficult. There are plenty of options available, including some third-party add-ons you can use to improve security. For
this tutorial, we're using Chrome.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Start by opening Chrome and clicking on the three vertica I dots in STEP3 With the Advanced Sync Settings box open, select the option for
STEPl
the top right of the browservvindow. This is the link to the Encrypt all synced data with your own sync passphrase. Enter a
available options; from the list choose Settings. secure passphrase you can remember in the boxes provided and this will
- 0 > enhance the security of all data synced between Chrome and the Internet.
-- .._
-- (- 0 0 • c.-.. __ .....__ •
-·---
,. . ,. ....,...
..•
·-
• '!IC!'I. • ...
•
( ~
-··
.. .......
- --
- ___ . . ----
. ____
......,.. -
- ------'- ___
.........
.-~ .. ...._
• .....____
• -
·!IIR -
~-
_
__ _______
....,.
,.._..._
..-, --· -
.,._
- - - - ,,..
,__.._ __
G
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 it's generally recommended that you sign into Chrome using a STEP4 Look to the bottom of the Settings page and click the link for
Google account, as this can greatly improve the overall security of Show Advanced Settings. The first new section to appear under
the browser. For example, when you sign in, under the Sign In section in Settings, the Advanced settings is Privacy. Start by clicking on the Content Settings button.
click on the Advanced Sync Settings button, the first option available.
Privacy
0 S•wngs X
Cont~ ~tings. ] Cl~ar broWSing data ...
~ C 0 6 Chrome I chrom.,//sen.ngs
Google Chrome may use v.eb services to tmprove your browsmg expenence. You may optio
Chrome Settings ~ rvi c~s . L~a m m o~
( DiKon~ct )'OU' Gog!~ Account Advanc:M sync semngt- ~ Use a prediction service to help complete searches and URLs typed in the address bar
.., Send a ' Do Not Track• request wtth your browSing traffic
STEPS Content Settings allows a greater degree of control over Cookies, STEPS Under th e Down loads section, it's an idea to tick the box Ask
JavaScript, Flash, Pop-ups, your computer's microphon e and where to save each file befo re downloading. Again this can be a
even the webcam. lt's an extensive list so we can't go into all the options within bit of a pain for the user; however it stops malicious background down loads
this limited space. For maximum security, disable JavaScript and Flash and from infecting your system, giving you more con trol and the ability to stop
make sure the mic and webcam are protected too. the process.
-- • Downloads
....... _
. __
./ Ask wher~ to save each fi l~ before downloado"9
·---
_____ ,_,
--·--.. ...-
-------. ._...,,_
~
•
___
..... _.. • ••••••••••••••••••••••••••••••••••••••••••••• • ••••••••••••••• • •
--- - ·-
STEP9 To the left of the Chrome Settings page you can see links for
.·--
--- -
.........
---
-·----· .... ..
Extensions, Settings and About; click the Extensions link. With the
Extensions page open, scroll down to the bottom and click the Get More
Extensions link.
ChrorM
I '- .....
o,.~>"- .
-!Wf(l- llfdol.... ~l\o
Privacy
STEP 10 With the Chrome Web Store launched, via the Extensions link,
.tl Use a web service to help resolve na1119abon errors
search for Adblock Plus. Within the results, click on the Add to
.t Use a prediction service to help complete searches and URls typed in the add re Chrome button on first option for Ad block Plus. This will install an advertising
.t Use a predicbon service to load pages more quickly
blocker within Chrome, securing you from any threats from Internet advertising.
Do the same for Blur (an anti-tracking add-on) and HITPS Everywhere.
j Automabcally report details of possible secumy tncidents to Google
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
-
........ ·- · -~
Blur f.ictboote
w.u·-
........-;
.,._
"~·Ofnc
STEP7 Just under the previous step's tick box, it's also recommended to
untick the two Passwords and Forms boxes that offerto enable
·-.............. ~
Goe.fc C.O..o
~ ,.~om •
..
~al' ~J.I\·1
L ' -
Autofill and Save your Passwords. Whilst it's a pain to constantly enter -' ' ' '' ~ 'n 0
passwords, thiswill stop any hijack Chrome attacks from gaining your usernames •••••
k**. ......
and passwords.
....••• . ...
.
~ .,
_,...,,,..-..-.,
. .....~ -
.... ....
L E.ncoble Autofill to fill out web forms on a single clic.k. Manage Autofill setbngs lllue 8!ur
BoueB lur
Offer to save your web passwords. Manage passwords
ecure our
ome
We've mentioned previously that an attack doesn't always come from the other side of the globe
but can indeed be a little too close to home at times. Home network hacking is possible with the
simplest of tools available on the Internet, often even just tapping into a cable.
Network Protection
Without being too paranoid, it's remarkably easy to get into a neighbour's home network. If you live in a block of flats or you use powerline adapters, you may
need to consider these ten steps for better network protection.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
The most common entry point to gain access DISABLE DHCP lt can be a pain but try disabling DHCP on your router
ROUTER PASSWORD
to your network is via the router. The rou ter and opting for static lP addresses. Every device that
from your ISP may well be offering the latest forms of encryption but it doesn't connects to a DHCP router will receive an lP address. By eliminating that you get to
take a genius to trawl the less reputable sections of the Internet to obtain a list of specify the address range available. it's not fool proof but it'sworth considering.
passwords. Therefore, change the defa ult username and password to access it. BT Smart Hub Manager
-->
Home ) Advanced settings My newXlft
s- I I '"''
flub ~ lP Mldn:u
CD lP adclleu: L 19Ll68.1.2S4 1
[ i),l~ .U I
.. I -·-
$ ,...,,.., 8 "'I
(!') AuUioritatMo OHCP: • ON )
MAC
'f,-112345678901 I 11:
MAC MAC
., , 1
1 12:
POWERLINE ENCRYPTION Powerline adapters are an excellent SHARE LESS Sharing resources and files from one computer to
resource for connecting wired another is perfectly fine but consider sharing less if you
network devices, without trailing lengths of cable around the home. However, live in close proximity to others. Once a hacker has gained access to your
depending on the adapter, it is possible to use another adapter to gain access to network, getting to any shared folders you have will be a doddle. In extreme
yours. Newer homes are common where you're able to pick up another network, cases don't share anything but generally tighten password control.
so use the encryption button if the adapter has one.
--
.....
- - •
.,_. ---· --
'_
~-
---
~ft
--
- - . . . 10) . ._
....
·-
·--· -- ---
•
• --
-
-- -
...~ "...
~-
·--..-
-·-..,...
___
.........._.
•
....... -·-
•
•
--·
........ - --
--
--
I ·-·-·, --
"
·-.___ ·-
,
---· ---
---..- -----
a-!1--
'
....- ••
·-··-- · ---
• •« ;
-.....
----· ----- ~- >
- ---
-~
-~
·-··-
·- ~-
--·---
-.. ··-------
• . ~-
--
--- -· ·--
.._ -
~-
.--
~ ....-"' · --
--P. -·-- ~-
~ - -
---- -----
~
•
-
~
·--
o4. c.. . ..... _
-----
---·- ..- -~
-
•
•
>
You can set lmls forthe use of Romde AsoiU1<:• on !lis c:al"l>lJier.
F!emcte cortrol
lnvi.alians
s.t the maximum llnOUnt d tim• ilvtationt can remain OPtn
IL6 _ __,vI Ho~n V
oOeat• ~
ilvbtions that can ... be ustd fnrn CCil1lU"' Mnlng
Wndows 'vista or later
OK Calcei
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
1., ·
Open-AudiT • • • • • • Wlwitl.. OD iiOIJr Nlworll 1
I• LOQOI.Jt
OS I Orvlre e
sutom·l Worhtrion lTZ . l ~. U .l 1/! Miernof:(R) "K i ~dow s(M.) XP Profon PoM I lTZ.16.tJ,O, All, Windows,)()'
' ' $t ~m · 01 UZ,l 6.0.10 p Oob.~n $orQe l 'n,l6.0.0, A!I, OoM!'I, LinUX
''J':I!..... ·:l
sYSti•m·3
frftt fl'l·<l
S, SWI'I·S
.1. .------------'-
Pfoflt4•
-
SU~tm
- ·~
6
-
w
~OI
-
o rlt
t rC
s ~ bOn 194.168:.06
t0.2SS.0.7
192. 168.0.8
~ ........... .
-.. M1:r'Of0ft(R) 'A'!nOOws(R.) )CP Prcl tUIOn.tl
192.168.0.0 , U , RouteN
i ~ 200G, ••n s w, ~ .ndOu
• •
are 1re ess ecur1
Wireless security has adhered to a number of standards since 1999, each improving over
the last due to the ability for a then-modern computer to hack the security levels behind
them. Tighter controls are needed as computers and the way they connect have become
increasingly more complex.
The technology behind delivering a wire less network has evolved over Lhe lasl These standards are always moving forward and like most elements of the
couple of decades and so has the ways and means in which to secure it all. it's not technology industry they come with a bewildering cocktail of acronyms and
just simply down to choosing a password that no one is likely to guess, you need meanings. Encryption and all things security can be a confusing topic, even for
to make sure that data and connection to a wireless netv,nrk is encrypted to the experts. Here are the current, and most important, terms you should be familiar
highest possible standard. with when talking about wireless security standards, wireless networking and the
hardware that lies between your wire less corn mu nications.
,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
IEEE
The Institute of Electrical
and Electronics Engineers is the
organisation responsible for setting
the entire wireless security industry, and
data communications standards. lt was
founded, surprisingly, back in 1963 and
isregarded as the largest association 802.1x
of technical professionals in You've no doubt come
theworld. across the numbers 802.11 when
looking at wireless-based and netvvorking
~a> 1111u11111
wireless and wired Ethernet-based networks. it's an
ideal application for providing authentication for
.-~ €) wireless networks, as it requires very little processing
$ 4 11/!!!\ power from the authenticator: the actual wireless
• w access point. The better the standard, ending
IEEE 802.11 G) with a, b, g, n, ac and so on, the higher
the speed of communications
between devices.
WPA2
WPP\2 is the upgraded
standard security technologyofWPA lt's
WEP
This is the original wireless
designed to offer the user an impressive 256-
encryption security standard, Wired
bit encrypti on key, which is virtually uncracka ble
Equivalent Privacy. Whilst the protocol
unless you're a secret research lab with a few billion
worked for the late nineties wireless networks•
dollars to spare on quantum computing and dedicated
it was soon overshadowed by the ever increasing
hardware decrypting processors. There are also different
power of the average computer. WEP uses a 40-bit
sub-standards within WPI'J., with AES (Advanced
standard encryption key, which is a key consisting of
Encryption Standard) and TKIP (Temporal Key Integrity
either 10 or 26 hexadecimal digits. That sounds like a
Protocol}, both of which are encryption methods,
lotofpossible keys to crc:ck but a modem. powerful
along with the lesser used CCMP (Counter
computer would be able to break 40-bit
Mode with Cipher Block Chaining Message
encrypti on in around 30 seconds; compare
Authentication Code Protocol).
this to months for a computer in the
late '90s.
--
-
Access
Point
l alking about access points, this
is the hardware that acts as a receiver
or uansmitter for the wireless signal and
network. lt can physically be a number of
WPA differen t components, such as a router, switch
Replacing the vVEP standard, or powerline adapter but essentially it's the
WPA (Wi-Fi Protected Access) provided hardware that converts a wired Elhernet
a much needed improvement for the ever network to a 2.4GHz or SGHz wireless
advancing march of security. lt became the signal and vice versa; it's also
standard in 2003 and offered the user either 64-bit or referred as theWAP, Wireless
the more adept 128-bit key levels of encryption. A 64-bit Access Point.
xey attack would take several lifetimes when it was first
introduced; these days it's estimated that it would take
several months, maybe less if the attacker used several
computers working as a cluster. Naturally 128-bit key
lengths are m:nd-numbingly more complex and even
by today's standards, the theoretical process of a
brute force attack would take more time than
the universe has estimated left to exist.
Which is a very, very long time.
ecure our
•
1re ess
lt may seem a little far-fetched but it's not unfeasible for a hacker to sit outside your house with a
tablet or laptop and gain access to your home network via the router's Wi-Fi signal. Understandably
it's quite rare but it's worth considering beefing up your protection.
"'-"'"'"' I I ""' I
"""' lttn)'OUcan *J"CCU' 8T SINn Hub
~ wi~
' ~tings.lf)'Qu
p.:IQC who:te 'fOVQf'l w:.1l:lmk:C "P6 $d•!,,.
tD~<Jny t hing, cikon~tvs toQOto U.
r,out_..,..,..,t"f_, ~CIf'e ""'*' rou..-e 10011"9 '101'. rY,N_._,I!Of'l .. tk"'ffhootlftCIOe. ...,.., .-.e ~ ~ · ln't ~-or
1*$i'CII!Os ams 4ttern . - .
Ci) WPS:
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ISP PASSWORD ISP supplied routers tend to have their own set of HIDE SSID it's also possible to select an option to hide your SSID from
usernames and passwords.Although these are more being broadcast. Whilst this doesn't stop it being hacked, it
secure than that of the default set, they are still obtainable from the more dubious does make it a little more difficult for someone who's casually looking around for
quarter of the Internet. A potential hacker will easily be able to get hold of sets of networks to access. You'll need to consult your router documentation to find
passwords, so where possible change the ISP default username and password. how to hide your SSID for make and model.
W11ele"Ss sen•nus
OK Can<:eJ
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
USEWPA2 Most modern routers will already come with the latest ROUTER RELOCATION Most users will have their router located
security standard en abled, WPA2; but there are instances of in the living room, near the master phone
some routers defaulting to a lesser security type for the sake of device socket This means tha t not only will the router broadcast through the house,
compatibility. it's essential that you ensure your router is using the latest and it's also broadcasting over much of the street in front. Consider placing the
best form of encryption for your protection. ro uter in a more central location of your house. This offers great coverage,
whilst limiting its signal reach beyond.
1 ,·"'
1·~
2 -4 GH:.1nd, C.H: >"~
Winoless:
WPA•Auto
Hone
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• The WPS button on a router and a device will allow
DISABLEWPS
ROUTER FIREWALL The firewall that comes with Windows 10 is easy pairing of the two without the need to enter the
good but the firewall from third -party AV encryption password. This is certainly convenient but someone who may gain
software is even better; and for extra protection, make sure tha t the router's physical access to your router will be able to pairtheirown device. Look to
firewall is enabled and doesn't have any potential leaks. turning off WPS in the router's settings.
BT . ."!\ BT Smart Hub Manager
BT Smart Hub Manager
>
Home Advil;nced settmgs ) Ftrewall
- - Home > Advanced settmgs ) Advanced w1reless
s... 11 Bod -
I
-I
R.,.tto recomm...Sod
Port forwardin(J 1s used by de'vlces, such as oames coosotes. and apoficatJOns. such as severs, to make sure that data commo
s... 11 -
from the lntttnec geu to the devfce tNt f'oiNds to use it.. \~/her Pat ForwMdlng is ~ )0.11 8J .Sman Hub Wilt send ~1
You an use this paoe tociJStOITise your wir!fess settinos.
inQ;lmii"'Q traffic for lhR ~ Of ~ to the dlown devioe.
lo """"llr !etwireless"'''"''!' or <lsollle one cl tile w1reless b.1nds cidt tile S.ll>"t' i>onds button fi"'-
To see i 1tst of the most common port forwmlino nles dick the button.
Uyou INirt •or chanoe on the - . -Jo click tile S.Vt but100.
2.4GHtUtdSGHt ~
btC'fn~l porta, fntt nul ports @Wi...,u: I OH)
Show fPaddress ] Stilt En6 Start End Protocol UPn.P
2.4Gilz• Sman (Olannel!l)
SGilz - Smon (Channel 36)
I """UDP., m~a. :l'- · - " - -' l l 43 o~. 11 43 01
' 11 43 01
' I~ ! """ I 0 0
• •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
[ ..,.,o>.. m . l68.t :I._•_,..,., ____JI I ~.o l o l l o l~ [ 10 0
JCP
Filtering MAC addresses was discussed previously
MAC FILTERING
but it's worth repeating with rega rds to wireless
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
netvo~r k security. By filtering those devices that are allowed to connect to your
DISABLE GUEST Some routers come equipped with the ability to router, and keeping an eye on what's connecting, you're able to con trol your
allow a guest network This enables users to security to a far higher degree than usuaL
connect to the router withou t requiring an encrypted password. Obviously this is
a potential huge gap in your home network security. If you have no need of a
guest network, then look to the documentation on how to disable it.
·- -~.'"0
-...-·-"'-'\Aeti-
S ' - -»G-...u
Permil only •
--
• Peflril only PCslsted to acte$S the wi"deM ne1wort
~-IOo
c;.w .-~ (MCJI ·
r- -.... ·"'
1!1 MAC Addn!ss F ter Ust • Goog e Clvon1e - 0
-"'·..
---
.......
e-
~
~ft!Oi·
"'
..... O.C irollltql,
'~
rl ui.linksys.com/ filesjWRT54Gl/4.30.0/WirelessMAC -LiSLhtm
. '
E) H•lp-C• ..mt ......- - - - - - - - - -
MA ~C ~.-, MAC
01 1 12345676901 11 :
MA ~ ~- MA C
•
IS ion?
We've mentioned encryption and its impact on your privacy and security, but what exactly is it?
The definition of encryption is 'the process of converting information or data into a code, to prevent
unauthorised access'.
Kryptos Communications
To better understand encryption it's worth taking a moment to learn about its origins, how it's been developed over the years and how it applies to our
modern communications.
The word encryption comes from the ancient Greek word Kryptos, which means be shared with everyone and is usually generated by software or provided by a
hidden or secret. lnterestingly, the use of hiding messages from others can be traced designated authority. The private key is something that's usually only known by the
back to early Egyptian scribes who inserted non-standard hieroglyphs within other individual user. Interestingly both types of keys can be applied, where one user has
communications in order to hide the message from casual viewers. According to a public key and another a private key, which can be combined to form a shared
historians the Spartans used strips of leather with messages engraved. When the encryption level.
strips were read they were meaningless but when wrapped around a staff of a
These keys are many characters in length, proving it nigh impossible for someone
certain diameter the characters would be decipherable.
to Brute Force hack them. The Brute Force method involves using a program on a
Of course, the modern forms of encryption are far more advanced but the overall computer to try every possible combination of a key unti Ithe correct one isfound. In
core concept has remained the sa me: to be able to send a message to others the case of the 256-bit encryption, it would take 2256 different combinations to break
without anyone else being able to decipher it. However, modern encryption now the key. If you were able to force one trillion keys per second, it would still take you
requires more than simply sending coded messages. Not only is confidentiality somewhere in the region of 1057 years in order to crack 256-bit encryption. However,
required, encryption must perform a level of authentication, so the origin of the a powerful computer can probably manage around two billion calculations per
communication can be verified; integrity of the communications, where both second, so in theory it would take 9.250 years for your standard desktop to crack it.
the sender and those who receive the communication can be ensured tha t the Take in mind that the universe has theoretically only been in existence for 1.410 years.
message hasn't been altered in between; and some form of non repudiation, where
Numbers as big as that are generally far too mind-boggling to comprehend. Suffice
the sender cannot deny having sent the communication in the first place.
to say that if you're able to use 256-bit encryption for your communications or to
During the early digital age the only users of encryption were the government and protect your data, then you're going to be protected for at least seven times the
military, and as such between them they created a set of algorithms and standards current age of the universe.
to protect the communication on the battlefield and from one government agency
to the next. These algorithms grew in complexity as technology advanced and it
wasn't long before the military-based forms of encryption were being used in
commercial modes of communications. Within a few short years, bank transfers,
cash withdrawals and data sent to and from modems began utilising these
new protocols to protect sensitive information.
Today we're regularly seeing and using devices that boast 'military
grade 256-bit AES' forms of encryption, a standard that is regarded
as nearly impossible to break without spending billions on
specialist hardware and software. In plain English, the modern
form of encryption takes data and passes it (hrough an algorithm
together with a key. This creates a garbled file of characters that Encryption is the act of
can only be d early read if the correct key is applied to decrypt
the data. Algorithms today are divided into two categories: protecting your data from
symmetric and asymmetric.
•
Symmetric key ciphers use the same key to both encrypt pry1ngeyes
and decrypt data. The rnost popular symmetric cipher is AES
(Advanced Encryption Standard), developed by the military and
government to protect communicationsand data.This is a fast form
of decryption that requires the sender to exchange the key used to
en crypt the data with the recipient before they're able to read it.
our
ows
Windows 10 Pro comes with Microsoft's Bitlocker program to en crypt the file system; however,
Windows 10 Home versions do not have this feature. Thankfully there are many encryption
programs available for down load, we're using DiskCryptor in this tutorial.
STEPl Encryption doesn't affect the core data, other than making it it's always best to ensure sa fe data before commencing with
STEP3
impossible to read without the decryption key but it's always anything like this. it's also always worth doing (as we are} a test of
worth making sure you have a backup of all your data prior to any system relaLed the sofuol/are first, on a disk that you don't mind messing up should you get the
changes. If you store your work or data in the Documents folder, (hen start by process wrong. Let's start by navigating to the DiskCryptor homepage, at VV'IVW.
opening it in Windows Explorer. diskcrxptowet!wiki/Main Page,
--
Main Page
llltti>Tt. ~., ~0 '"
ov.JII20161....
04 ~61.a
Oo\':llnll16 1.1:48
mcdohtd
4
l)'pt
flit tC!Ne!-
filt fetiD
fUo ,.....,
DiskCryptor
Open - • ~- ~l)'dicn ,,...,.
......
• 11•!
• ThkPC
Fundiolllf ~linRa Ool®21l-17 t.ua filo. fo':kr
04......201HU6 filtfolrie
·--
04 'CIInO'It 14.AII , .,.,...
M1120171HC filt.foNeJ
••
I Mt ~ WHh"--M
Hm'20171t18
N """""!\ IJ AI
filtf<*kf
1.,~p I~
-',7-,_ =--- ~.,
:=;,M:::.:-:,... ~- ......._,.. MI fltjiiiiOOtl!ltfll ... O...Cry::t P\rt f'Mil ... PC:P v.Ql. ......., . . C:U""" - tl lilt Ol.tl .. .. ~.!
.._.F.....,,..........,. • AeiMtd diMOH "'*' o1 dlllaoltd *"-*"'
... . .
O(.'fiii,Q!l16tA46 F"ololoWot Ufllte .., bH1 ptOdrid"' u ue~ . ~ .n ... 11.11.- «<IISider.ltfot c1o11 . . ._ ftwctld 1o 11t
........ ~ 0ro 1JI)014 00>4» ro~., ~J19 ~ ltumJI I'CO!ki dlhf~ lotb-.O!M* t (~t_.o-'nderl fte .-y o ~
•I
0
............
Mt0..""'
it.:ttflt 111 0.~ utihy -....ed ~ III'Otllems •nocolltetle fie sytt.e111s. •• uelt~ • o~l ....._ k• Mt. ~!Gomeft Pe
- ~ti)IU4l: Mfl$0,., O&IQIISOtl)lJ 1.!>41 rue loNief
Gl dlt 'Pt~SJ-.
J4~t'ZGIo:n fllctober
'"'*'
PC Id~
R-..16.ttTwo _...,,.
01~3"8
O(~liHB
o,t,fi&,10161.1A
61 ~l£16-
~ ...
r~oNcJ
f"tk foUer
filf. ·~
f'n:>Qntm Fcn.n,
• S.pport<Jf N:.5!t, lwollah!l. !l.,.,....!S tn(;l')pdo~
• t o;.,~Of-r<·lct! .....
l lt,_.~ . ...
...•••
Ri~ d the tod!R. i~ 041!2CI~H$
.18
rt~d:k!
• !lu~
."'lOt~·
in cbk ~es web - sec:tor w:t IJif'COIUI"' b IW ~ RA.OD ~l'r.iO)
""""''
Rot...., 6.-IN!I
/)I. '0&:20'161.t.
~ ":8121116 1-1 4$
file fddlet
.... ll:tifo'
• ...h IIO.tof._. "'""IN M 91~-'
• JSU'"" "'' ,_,,.,_ 1\C.Ii 0«. . . . .
I -enc~ .-,$&tm
:1
.''".
o ~WyMih . . . ,...,.loool.._..,• lllO• .Cia.IB4 , C)
them to the clipboard. Next, choose a suitable backup location o .&ICI'fCIIOII ol tyll- eM HelaYt ~- .... JIII..Mel te 0 ~oe.l
• o,.-... ,...... ""'' .......... 0011_......... _ . ... .,......,.,,........ J .... ""' ........
such as an external or network drive and when ready, press Ctrl+Vto paste the
...""'
0 tii(IOO!Itllfllty*"
copied data into the new location. Then, should something go wrong, you have a . ..••(lit•
~ ~'fl -" eo ...- 0'-0 ..a:w
*'•
recent backup of your most used data. o ~
0
• f1'l~
•
o,-••-<HJ0Pu)9
Ali~
for t~ol.-IF&
fi'II!Uillliflg old!lli:fU.tll!ll$ . , . _ _ ,.. ~
b llotb'tl _. ....-1 eOIMWI1dft (Clll.
OfCM
m-.
~
......
•i'l
• uu
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
•
-· • Otlt II'OIIolotcl
Q.A.U.?."'l' ,...,
o.v.ll """'"...
Row.~
,,pt
R. ......
..
... Using the menu to the top left, click on the Down loads link. Look
STEP4
for the latest version in the Download section and click the link
,• u. , . ••,
,;l.'lllr. !Io.~
.......
............
for the Installer. Thiswill open a confirmation box, click the Save File button to
••
JO-M\H'tiot (~H,f0t_ 0ow omi> IO ( ..... l011
download the DiskCryptor executable file.
L. ,. .,.,_,
n.._.. ,_.. IJ'A~ n •
.u "'""" .. [MtJI
··-
_
"""''""
.......... '_,loo,,
.-
......... ')jb ~ ................, ....... .., ...-
·- ~
',_,,. •....... - ..N1,.,.......
--a 0o -"t1u.-u:.II..-._1UOo-O•-o>t
,. ,.~-·h" ,.,.
lti
_ .. _... '""...
·- 'l,. lK!i Oilll ((it
-~ '*"fOil
_ t.W.WI0N tf4
-~ 1!
·-·--
·--·--
_...,_,..
,
~
·-..---· ·~
__ ..,....
• -·
· - ·- ·· - ·.......J _ _ ,..,...
..... -
... _ . ,. . _ _ , _
· -·~ ,._ _ _ _ _..._ . . .100_ _ _ _ _
---··--
T._
.....-......
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS The dcrypt_setup.exe file should now be in your Down loads STEPS You're now offered a selection of available algorithms to
folder. Double-click it and selectves to accept the Windows choose from. Click the drop-down box to view them all but we
confirmation. With the DiskCryptorsetup window open, click the Next button recommend staying with the defaultAES algorithm for the time being. Leave
and accept the license agreement on the following page. For the remainder of the Wipe Mode box as None and when you're ready, click the Next button.
the options choose the defaults, clicking Next. When done, click the Install
lfl D• <ryptor 1.1 846 1'
button and rebootthe computer. fde Volumes Toots Help Homep.age
~ Setup·(' L .• pto1 Disk Drives
5dtd DtstiMtJon I..OcatiOtl St21tus
lhhere should~ be mtllltdt
9 ST81
iil
Enc;rypllon settings
Noxt>
STEP6 After a reboot, click the Windows Start button and locate the STEP9 In the next section, choose a unique password for accessing th e
newly installed DiskCryptor program. You will need to click Yes to encrypted disk; you're notified how strong the password is. When
authorise its administrative access. With DiskCryptor open you can see the list of you're ready, enter it again in the Confirm box. Click the OK box to start the
currently installed hard drives in your system. You can click each in turn and encryption process.
view its information at the bolt om of the DiskCryptor window. iii: Di«: to 8<6 •• - X
Ill o;skCtyptor 1.1.846.118 - X F•le Volumes Tools Help Ho-mep.ege
IDisk Drives
File Volumes Tools Help Homep.age
I
IJount
I
_J lllbel ~ I Status
---:--,
Sire
Oi.ak Drives
.
li.no'YPt ~·-or
9 ST8000VN0002--1Z8ll2
J a s.m Volume Puaword
o;;J Q: 7.2718 l'lew Yoilne mrs
9 Samsung SSD 750 EVO 250GB
s;:
[;:<"P _j '"'
g
Password: I- • ·---- I :!howPa..-d
~tAl
I
y.une7
g yobne8
g
g 800 I'll AOMEI FAT32
21.4GB AOMEI Re<o\le .•• mrs
210GB mrs ays
Mount AI
- IB KI'lg
g Conf'nn: 1-
Status: jeon-oct
. ··-······- r
..
UseKeyfie Urrnro\rl All
!!ode I OK I !;.ancd
I
f o~ k Drives - tl r
J I !ize l lllbel l r~ l Status I
'
lllbd . Type I s"'tus I
I;; ST8000\IN0002-I 28112
g Q: 7.27T8 New Volun!o! HTFS
V
Q ., pt
J '" I
..a STSOOOVNOOII2·1Z8112 ftlaypt _j Q Samsuno SSD 750 EVO ZSOG8 J
g Q: 7.27T8 Hl!'w Voll.lnl! mrs g ~ : 210GB mrs •'Y•
bil Samsuno 550 750 EVO 250GB
IOil s;: 210GB mrs ays
c ' ' J 8
9
~ol-7
Y.oh .m~B
800 l'fl
21.4GB AOMEJ R«ove .. .
A(M] FAT32
mrs
f:!OUliAI _j
g yotune7 800 I'll AOMEI FAT32 ~mt.A I ~ olt.me3~
id 450 I'll Rocovorv mrs
tJ.I'Yfl3Lnt !I
___,
g y.unea 21.• GB AOMEJ Recove ... mrs 9 Kingston DataTr avelt!r 2 .0
B Ki'lgst«~
IMI Yobnel
Oat l rav~le 2.0
450 I'll Recovery mrs '"''"'.....''"" a e: 1.86GB KlNGSTOO FAT encrypt 00% boot
f• . ~1
8
Enctypl J KlNGSTOO FAT boot
Format dJ
'- -
•
en IOn oos
ows
There's no shortage of programs that can en crypt files, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good
a solution.
Encryption Galore
Here are ten different encryption tools for you to consider that work well with Windows 10, and some previous versions too. Some are free, others cost but
they're all good in their own right.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Available only for users of Windows 10 Pro, Windows8.1 7-ZIP Primarily a compression program, 7-Zip can also encrypt your data
BITLOCKER
Pro and Enterprise and Windows 7 Enterprise and with theAES 256-bit standard. it's simple to use, completely free
Ultimateversions. If you're running the Home versions, you'll need to upgrade via and comes in either 32-bit or64-bit versions depending on which type your core
the Microsoft site, or from the Windows Store. In short, Bitlocker orfers rull disk Windowssystem is.
encryption with 128-bit or 256-bit AESstandards.
Wlf'ldows 10 (Vmion l j 11) introduces ~ new cfrsk tnOYP ' ~ modt (XTS...AES). This mode providts
~ inttgfi:y suppon. btA ir. is not c ~wich older versions of Windows.
If' ttld ll • remoonblt: dfM tNII tou're go.ng to ws.e Of\ oldtr vtrsiOfl of Wll'ldowt,. you should choose
Cornp.cible mode.
ar m.s IS 1: rcted d"-'t or tf ttws dnvt w•ll onty bt: used on dMce:s runn.ng at lust Windows 10(Vemon 1511)
or lata. you stlould c~ the new enaypbon mode
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
VERACRYPT This is a free disk encryption program that's based on the AXCRYPT Another excellent free program, AxCrypt offers 256-bit
popular Tru eCrypt. lt offers enhanced security, lots of encryption, easy to use interface, cloud storage integration,
levels of encryption and support for UEFI drives. it's available for Windows password management, secured folders and is available in a multitude of
version 7 onwards as well as Mac OS X, Linux and even the Raspberry Pi. different languages. There's support for Windows Vista onward as well as support
for files sizes over 4GB.
AxCrypt
www.axcrypt.net
Vera Crypt
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
FOLDER LOCK An excellent and comprehensive folder locking GPG4WIN This entry is a little more advanced but once you master its
program, with support for 256-bit encryption and intricacies it's an extraordinarily powerful program, and free.
Windows versions from Vista onward. it costs in the region of £40 but you'll need it's designed for file and email encryption, offering incredible levels of security for
to check for the most recent pricing. For your money, you get secure backups, Windows 7 upwards and Microsoft Outlook 2003 and newer.
USB protection, password wa Ilets, a secure file shredder and much more.
-u n o
-..
------
o ... - - ... ~< · ~ ... -
.---·· • c
_..___.
----··-
__.... _ ----- ct:l
=.:.=.!.·
-·~
G
.....
l'l World , _
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
CRYPTOEXPERT 8 Costing around £60, CryptoExpert 8 offer support DEKART PRIVATE DISK This is a simple and easy to use program
for Windows versions from 7 onward, unlimited that supports AES 256-bit encryplion,
file size encryption, 256-bitAES encryption, unlimited secure file vaults and on compatibility with Windows Mobile, free unlimited support and updates; and
the fly encryption as you move and copy Ales around your system. it also includes its own firewall to help prevent hackers from gaining access to
your system.
1-
'
I
[- ./
de kart
MAKE IT SECURE
CERTAINSAFE This is an interesting product, as it provides DISKCRYPTOR We used DiskCryptor in the previous tutorial as it's a
cloud-based encryption for any files or folders you fairly straightforward program that can achieve high
upload into your on line storage. it offers AES 256-bit encryption and an easy levels of encryption with ease. There's a lot more you can do with it and you can
to use setup and integration into your cloud provider. it's Pay as you Go, so get further support from within the product's homepage.
you only pay for what you use.
X
File Volumes Tools Help Homepage
~ m ~ · ~ ~ - w· ~ · -~= SlaiUS j ~
.;::::::iil ST8000VNIXI02 1ZSI IZ
4
•
IS a
Your system may be secure to any on line threats but it doesn't always mean your privacy is assured.
This is where a VPN comes in, as it offers the user a heightened level of anonymity when on line and
even another level of security and protection.
Essentially, aVPN (Virtual Private Network) is a server or group of servers in a remote Thankfully it's not a lot, for the most part: you'll be expected to pay in the region of
location that you can connect to through a client. The VPN servers then hide your £5 to £15 per month. This grants you better coverage and the ability to use up to five
lnternet-bound lP address with their own, so if you connected to a VPN that's or more different devices, including tablets and phones.
located in Australia then your lP address would be as if you were actually sat at a
Over the coming pages we dig a little deeper into VPNs, as you can imagine, using
desktop down under.
one will significantly improve your protection when online. ln terms ofWindowslO
The benefits of this are many but mainly a VPN wi11 allow you to access region security, the use of a VPN is quickly becoming vital, so by the end of this chapter
restricted websites, protect you from tracking and shield your browsing activities you'll be knowledgeable and helpfully utilising one to your own advantage.
from those who want to find out where you are personally based. Obviously there
comes a negative side, in the form of being able to access content that your country f\ VPN isn'cjust used to get access to
has deemed illegal for some reason but on the positive, VPNs have allowed people foreign online services, it con be used by
remote workers to access head office as
in countrieswith extraordinarily tight restrictions to get access to the outside world; You
if chey were in the building"
often enabling them to report on what's going on in their own country to the world.
However, for most users having a VPN means they're able to gain access to TV
channels in the U.S., Canada, Europe and other parts of the world.lt's not always VPN Conn«tion
He~Ofhco
Gco·location lntc:met
about being able to moderately 'cheat the system' by forcing the Internet to
think you're somewhere else other than where you actually are though. Remote
S~CH
--------
--------
========
--------
--------
--------
workers and employees who live in other countries can connect to corn pany VPNs --------
--------
and be able to use the company's network resources as if they were physically sat
in the building.
The connection from your computer to the VPN server, via the client, is usually
secure to the tu ne of 256-bit encryption levels, depending on theVPN companywho
is hosting the service. All your Internet traffic will filter through the VPN server's
systems, offering multiple layers of protection from viruses, rnalware and
privacy. Beyond the other possible scenarios, using a VPN whilst you're
abroad, working in a hotel for example, will enable you to access your
home coun trys services and work resources. One more element
that's worth mentioning is that using Wi-Fi hotspots is one of the
biggest security risk for travellers; using a VPN can effectively
improve your security whilst using a cafe's free Wi-Fi.
Using a VPN will protectyour
Most operating systems come with the ability to connect to a
VPN through their network settings. If you have the network
access on line and filter all
and connection details of the VPN in question, then you're able
to connect to it using the built-in Windows 10, Linux or macOS your Internet traffic through its
options. However, the more common, and in some respects, •
easier method, is to use the client which most VPNs now offer as secure servtce.
standard. The client is often simply a connection window that will
ask you your login details, then provide a method of allowing you
to connect to any of provider's gee-location servers, listed by country.
Once the choice is made, you simply click the connect box and within
a few secondsyour lPaddress will be located within the chosen country.
There are plentyofVPN providers to choose from and we'll look at ten of the most
popular in a while. Some offer a free connection service that's handy for quick
browsing but isn't very fast. To gain access to faster servers, wi th better security
and protection features you need to pay a monthly or annual subscription fee.
rove
•
ows ecur1
We've emphasised the enhanced privacy that a VPN offers when you're connected to its services,
and the heightened levels of anonymity, but what security benefits does a VPN bring to a Windows
10 computer with an antivirus program already installed?
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ANTIMALWARE ManyVPN providers utilise a level of antimalware into HIGHEST ENCRYPTION The connection between you and the VPN
th eir security layers. This enhances your security by server is encrypted to the highest possible
fi ltering any downloads through the VPN first. Should there be a virus present, standards. This makes it near impossible for some external element to gain
then it can be removed or stopped at the VPN before it even reaches you. access to the data you're transmitting. Online banking and shopping are
extremely secure with a VPN.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • •••••••••••••••••••••
WI-FI PROTECTION Public and free Wi-Fi hotspots are notorious AD BLOCKING
when it comes to mobile security. Anyone with
a little knowledge and some free tools via the Internet can intercept public Most VPNs will aIso add an
Wi-Fi network and hijack your connection, revealing all your data. AVPN will extra layer of security
encrypt the data and protect you. whereby they actively block
any advertising from
r websites. Internet ads are a
necessary evil in some ways,
as they provide much
needed funds for your
favou ri te freely available
websites. However, some
contain malicious coment
and need to be blocked.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
SECURE TUNNEL If you're working abroad, or you' re a remote USEHTIPS Using HTTPSinstead of HTTP uses the secure side of the
worker, then a VPN connection to the company's Internet protocol. Sadly, it's not always implemented in
servers will ensure that all the sensi tive business data will remain secure. it's browsers or by users. Many VPNs will force all websites to use the secure
difficult for a company to ensure 100 percent security with mobile and off-site connection that a HTTPS site offers, enhancing your browsing security.
workers but a VPN will provide a secure tunnel straight to the company itself.
• • ••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
MULTI-PLATFORM ZERO LOGS In some countries data retention laws are quite archaic,
with governments and other bodies being able to access
The availability of iOS and Android your data log for as long as you've been able to access the Internet. A good 1/PN
VPN clients means that your ea 11 won't detail any logs of your browsing and in most cases won't even hand over
data and data stored on your device any personal information relating to you to other agencies.
is also secure. Mobile VPN apps will
use the same levels of protection
and security, so your data can't be
stolen vvhen you're not even aware
of it.
en
There's no shortage of programs that can encrypt files, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good
a solution.
Encryption Galore
Here are ten different encryption tools for you to consider that work well with Windows 10, and some previous versions too. Some are free, others cost but
t hey're all good in their own right.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
CYBERGHOST CyberGhost is our favouriteVPN. lt offers 256-bit AES NORDVPN NordVPN offers two levels of encryption, access to fast
military grade encryption, no logging, access to 27 servers, no logging, a kill switch in case the VPNconnection
countries and hundreds of servers, protected browsing, ad blocking, access to drops and you're still surfing and support for multiple devices and operating
fast servers, unlimited traffic and bandwidth and an anti-fingerprint system. All systems. it's well priced and is highly regarded among the press and media. Not
for around £5.83 per month for up to five devices. bad for a mere $5.75 per month 1:around £4.50).
NordVPN
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Despite its colourful name, Hide My Ass VPN is considered to be one PUREVPN With support for multiple devices, 256-bit AES encryption
of the best services available. Along with the usual secure 256-bit and access to 180 locations worldwide with 750 plus servers,
encryption connection you get blistering speeds, access to over 300 locations, PureVPN is a great choice for the home user. The cost varies depending on the
anonymous email use, a free web proxy access and free extensions for your package but expect to pay in the region of $5.90 (around £4.58) Just as with all
browser. Expect to pay around £5 per month. these VPNs, it's worth checking for the latest pricing.
urevpn
HIUE!:!! AS~I
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
VPN UNLIMITED VPN Unlimited offers a full firewall service with PRIVATE INTERNET ACCESS Private Internet Access VPN offers a
anti-malware, ad blocking and anti-tracking. There's wealth of features with its
256-bit AES encryption, over a thousand servers in 70-plusloca tions, support for impressive service. 256-bit levels of encryption, no traffic logging, ad blocking,
up to five devices, fast servers and app support for iOS, Android and Widows support forfive devices and access to over three thousand servers across twenty
Phone. Pricing varies but expect to pay around $8.99 (approx. £6.97) per month. five countries. lt's surprisingly cheap too, at just $6.95 (about £5.40) per month
depending on the package you opt for.
~,-4Jijr
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
IPVANISH IPVanish is another highly regarded and awarded VPN WPRVPN VyprVPN is an exceptionally good service that offer access to
service. For $6.49 (around £5) per month depending on the fast servers, multiple device support, unlimited bandwidth
package, you get access to fast servers, unlimited bandwidth, no logging, 256-bit and connection, 256-bit AESencryption and access to over seventy global
AES encryption and support for up to five different devices. locations and hundreds of servers. The Premium package costs just £5.83 per
month for a one year subscription, but check regularly for any changes.
• ••
•••
•
vyprvpn··
by golden frog
IPVANISH
VPN
TUNNELBEARVPN TunneiBearVPN offers an initial 500MB per FACELESS. ME Faceless Me is an interestingly named VPN service.
month free service, moving up to $9.99 (around Amongst its featu res expect to see elevated levels of
£7.75) per month for unlimited bandwidth. For th isyou get access to fast servers encryption, unrestricted access, an easy to use interface and unlimited traffic.
across twenty plus countries, 256-bitAESencryption and support for Windows, You get 2GB per month for free but for $6.65 (around £5.16) you can have
iOS, Android, macOS and browser add-ons. unlimited access and traffic.
•
s1n a
• •
ecur1 r1vac
We've covered how a VPN works, how it can improve your security and given you a top ten chart of
recommended providers but we've not looked at how you would set one up and what it's like when
up and running.
CyberGhost
We're going to use CyberGhost as the example VPN forth is tutorial. You'll need to purchase one of t he available packages to begin with, Premium is £3.74 per
month, while Premium Plus is £5.83.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
We won't use the free option in this instance, as the paid for STEP3 Go to the Down loads folder and double click the CyberGhost
STEP!
services offer a better set of features with which to display the executable followed by a click on Yes for the Windows
VPN in action. Start by navigating to wwl(v.cyberghostvpo.com and clicking on authentication process. Accept the agreement and follow the on-screen
the Pricing link in the upper portion of the main CyberGhost site for your regional instructions to set up CyberGhost on your PC; the default options are fine to use,
and latest pricing. unless you specifically require a different location for installation.
. _,,' .,._ D ~ ,_
g
1
>ctup Cro..Ghost •
license Agrttment
""'-·
~ase riMe~ lhe following ifi.1)Q'1ant nfonnation bem
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 Assuming you've purchased one of the options, click the yellow STEP4 Once the installation is complete you're presented with the main
Free Download button located in the top right of the main page. CyberGhost client window. However, before you make a
This will, after a few seconds, automatically initialise the down load of the latest connection, click on the Login link located at the top of the client window.
CyberGhost client software. Click Save File to download it to your
Down loads folder.
- - 5I
(}'hf>tt .hO'iT;:; nm\'nloadlng on ./
yuur e.urnpuu:t. Clilk. tu ~·"
DownI
Cyber
(i)C,tocoOoool U .1l7 L ~.
.....,_ .. "-7 Alr (7.G MS)
Mure lil"l -,..; ......... ~.,
··lho-dldn't... ddt"-
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS Enter your CyberGhost login and password tha t you set up STEPS Click back to the CyberGhost client and return to th e main
when you purchased the package and click the OK button. Once window. Click the Home icon along the top of the client window
the login is confirmed you're taken back to the main client window where the and then the Choose My Server button in the bottom right. This allows you to
available options for the account package you purchased will be displayed. choose your own server from the available countries that CyberGhost works with.
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP9 Look through the list and pick a server; we're going to use one of
the Vienna servers in this instance. The Ping value is how fast the
• • •• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
server is, the lower the ping the faster the connection. Either click to highlight the
STEP6 Before you use the service, it's best to check a couple of things. server followed by clicking the Connect button or double-click to launch the
First click on the Settings link along the top of the client window. server connection.
In here you can see multiple options for the control, connection and how
CyberGhost will work with your PC. Generally speaking, the defaults are fine
unless you have a specific reason to change them.
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP7 One more thing before connecting to the CyberGhost VPN: open
a browser and enterwww.ipcim.com(en/?p=where. This will
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
display detailed information based on your lP address, such as the ISP you're
STEP 10 The CyberGhost client will take a few seconds to connect. When
using, the country, city, even latitude and longitude, complete with a map and
it's ready you'll see a 'You are currently protected' message in
possible radius you fall into. This is the kind of information vvewant to secure
the client. Close your browser and relaunch it, then return to the www.ipcim.
from prying eyes.
com/enf7p=where page. You can see that the Internet now thinks you're located
where the chosen CyberGhost server is, protecting and securing your privacy and
IPCI M .COM personal detaiIs.
ll'lt! J11t ~on t, :cldN u ? 1\'11'1•,. Jm I? 1IP• • ct '••1 1g rowc•r 1n 11 M''IIYH vtllou1 •
-···----..-------
IPCIM COM
Cl.lfrt:lll ~('C.Onal llOUt'Y fvt<.a~ M lllllt nt~1 ol8 t.VU() 7~y b « • • tAirtno
Where am I?
-
Country
""""'""'"""
Clly.
1.41111vO•;
-----
------
SI
•• 52"' zr r
Longrtlldr.
c 1"41' 31'"
lm.4Mt S.r'llte• P'toVICI• r:
•
+
O r g~onlwt:
ove
roun
Before we get into on line protection and disaster recovery, it's worth taking a moment to look at
how information moves around the Internet, in particular your information. Just how is data sent
from your PC across the Internet, to potentially fall into the hands of someone else?
Information Superhighway
The Internet is a huge, complex network of computers and is widely credited as humanity's greatest achievement. it's estimated that t he Internet houses
something in the region of 1024 bytes of information, which is quite a lot.
That estimated 1024 bytes equates to an exabyte of potential information held by The protocols used throughout the Internet define what the data being
every single connected device that makes up the Internet, some of which is your communicated actually is. For example IMAP, Internet Message Access Protocol, is
information. it's an impossible number to visualise, since we're only usinggigabytes a mail protocol for accessing email on a remote server, such as accessing Gmail.
or terabytes of storage in most of our devices. More to the point though, how on These protocols help further the transmission of data to its intended location,
earth does all that connect together, and how does it work? making it more accurate and telling the computer on the other end what it is and
how to piece together the jigsaw puzzle of packets thm \.Vill be received.
To be able to transmit all that information, the data that travels around the Internet
is in packets. Each of these packets contains a header and a footer. The information Essentially this is how information is sent and received around the Internet.
stored in the header and looter contains the details regarding the data being sent. Obviously, there's a lot more going on in the background than we've mentioned
For example, if you send an email to someone, as soon as you click thesend button here.The complexity that you can go into when dealingwith data transfers is quite
the data will be wrapped up in headers and footers, split into numerous packets staggering and a little bewildering at times. Suffice to say, all those packets of data
and sent on its merry way. contain information about something or someone and somewhere out there are
packets of data that contain information about you, where you are, what you're
Whilst that sounds logical, much in the same way a telephone call takes place, the
doing, and other personal details such as bank accounts, passwords, names
reality is quite different. Those packets can take any route possible to get to the
and addresses.
destination, as defined by the header and looter. Those routes don't necessarily all
have to be the same either. Some packets may travel from one server to the next via
one data pathway, while others will rake another. The server at the other end will use
the information provided by the headers and looters to collate the message, reform
the data and present it to the email recipient the way in which you intended it to.
Remarkably, if the server at the other end detects missing packets it can
request the missing information from its available connections. Any
missing data can then be sent via an alternative route, updating the
information as it goes so other packets wi11 know that the previous
route isn't getting through. The headers and footers then tell the
server that the data packets are all present and what they should
look like; the email will arrive accordingly. The Internet is regarded as the
All this happens in milliseconds. This sounds incredibly complex
and on paper itmakesthe Internet appear to be aslow, lumbering
beast dealing with incomplete packets of data. In a way that's
greatest human achievement,
how it works but instead of being a lumbering beast, the Internet
or more accurately, the servers and computers attached to it, are
and it's not difficult to see why
fathoming data packets by the millions every second.
MITM
The first and most notable form of attack is called MITIVl or Man In The
Middle. This attack utilises a set of free cools that can essentially grab data
packets from the locally used network. This means that the data packets
leaving your computer must travel through the free Wi-Fi's network before
going off into the Internet to its destination.The MITM attacker ea n sniff out this
data, intercept the stuffthatlooks interesting,which can be done by reading the
headers and footers and determining what the message/information contains,
and decode it to view in plain text on their computer.
Think of this fonrn of attack as a postman opening a bank statement letter,
wriLing down all your bank details, then sealing the envelope before posting
it through your door. The data packets are easily intercepted on the free
Wi-Fi and unless you're using a HTIPS site, they take very little effort to
decode and read.
Shoulder Surfing
Whilst not a technical way of intercepting data,
hackers will still use the old tried and tested method of
stealing information simply by sitting close to you and
peering over your shoulder whilst you enter login details
or write an em aiL
lt doesn't take much skill, as we're usually so busy
concentrating on other things that we often fail to
notice someone looking over our shoulder. Hovvever,
it's a real and credible threat, so be wary.
Fake Wi-Fi
This is another element to a MITM attack, also known as an Evil Twin.
Essentially a hacker can sit at the sa me cafe as you and everyone else and
use a set of tools that can pretend to be the actual Wi -Fi router belonging to
the cafe.This enables them to do several things: first, they're able to beam out
the fake Wi-Fi signal to every device within range, which in turn (if the users have
their devices set to attach to any freely available Wi-Fi) will instantly connect to
the fake signal. Secondly, once they have a device connected, they're able to
use their laptop and the tools therein to intercept all the traffic that's being sent
to their fake Wi-Fi signal. Thirdly, the attacker can connect themselves to the
actual cafe Wi-Fi and act as a filter to the real connection to the Internet The
victim isn'teven aware that their connection is compromised.
Naturally, this means that every single scrap of data is being filtered
through the hacker'ssystem. lt's just up to them to collect it all, decode
it and use the information within for their own gains.
Fake Sites
We've mentioned fake websites previously. This way of data
interception is often working hand-in-hand with the scenario we're
using as an example. Combining the aforementioned Evil Twin and
packet sniffing methods, a hacker, who has taken the time to set up the
seam, can create several fake website front ends that mimic banking sites,
Outlook access, login pages and so on. They then host those sites on their
interception laptop, together with the Evil Twin fake Wi·Fi and should a user
connect and request the page of their bank they instead get the fake site that
the hacker set up.
The victim will then unwittingly enter their details, which vvill be stored by the
hacker before forwarding thevictim to the actual bank website.Thevictim will
then be required to re-entertheir bankingdetailsinto theactual bankwebsite.
For their part, they simply think they're mistyped a password and
gain access to their account as normal. Sadly, the hacker
now has plain text infonnation regarding all their
login detai Is and can begin to transfer
money from their account.
•
ourse
•
IOn
While it may seem like fearmongering, detailing the ways in which data can be intercepted, it's sadly
a real world fact. Public Wi-Fi, hotspots and free access points are the bane of the security industry.
Thankfully, there are ways in which you can protect yourself.
Public Safety
Despite the different and varied ways a hacker can gain access to your in bound and outbound data, there are means in which you can defend yourself. Here
are ten t ips to help you protect your data from being intercepted.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Not all public Wi-Fi access points are havens for nefarious hackers TIP3 Always double-check a website fo r spelling errors, older logos or
TIP 1
but that doesn't mean you should let your guard down. Every anything else that may raise an alarm.lf your banking website looks
security software and fi rewall in the world can't help you if you're not savvy when even remotely different from when you last used it, try and avoid logging into it
it comes to information security. If you're going to use public Wi -Fi, don't use it for until you get to a more secure Internet location.
banking or other highly personal detail transactions.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP2 lt may not always be possible to spot an Evil Twin fake Wi-Fi access TIP4 Ensure you use the latest antivirus and antimalware definitions for
point. it's often best to double-check with members of staff, if it's a your security client. If you're going to use public Wi-Fi, make sure
ca fe, airport, restaurant or similar, that the Wi-Fi you're connecting to is actually you're up to date prior to leaving, especially airportWi-Fi points, and that the
theirs and not one that's being spoofed. Avoid Wi-Fi names like 'Free Wi-Fi Here' client is in good working order.
or similar.
.,.c:.e
c.V.." b<;) •
..- o<>
\ *
1 "' )
{ "\
• t
I ,,
•
' ~
TIPS Always use HTIPS to access anywebsite. This means that the TIP8 Using a VPN when accessing a public \11/i-Fi point is a fantastic way
information and data packets will be sent and received in an of protecting your data packets. They can still be intercepted but
encrypted form and will make it exceedingly difficult for a hacker to decipher the VPN client encrypts all outgoing and incoming data with the highest possible
them. If possible, use an add-on such as HTIPS Everywhere for your browser levels, making it virtually impossible for a hacker to decode.
of choice.
https:/I
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP6 Turn off file sharing when you're using a public Wi-Fi access point. TIP9 To avoid shoulder surfers, make sure that the area behind you is
Whilst it's great to share your content on your home or work clear and enter passwords etc. via your keyboard in the same
network, once you start using another network, your computer could start way you'd protect your card details in an /ITM. Cover your keyboard as much
sharing tha t data with anyone who's also connected to the same network. as possible and make a point of looking around to make sure no one is
wa tching you over your shoulder.
ChMVJ'" <l\ilrinQ npinm fnr rliffl!fton1 ~ rwoffi.-.;
~ c,.lltt t Ml'fl ltt ~ ...VUt Ieo~ ~ 11\ot, 'I'W , .. t'-M: toteil\( Ol*;nt _,
...... ,.~
p
~ ' "_,.
-.........,
When ~-0'1 Cl"\.,.., corn&IVII!f ~ ~ IICIII!f ntw~;< ~!Mrl .:l «nttlfllll"
ohlbcW"'~
t'e lllll!.-ncbo1:11ttdi$«Htty
"'lum Cll tutomldc HNP d 1\UWe!t•CCI'II'l«<ild tiMea
0 TIIfll dl.otiKCM~Y
....... p.....H~
wt., . ~ ..., ................. 90\ ~ .,q "'"""'• fl... ""' ....................... . . , ........ ""
bt ~wefbr ...... ---'-
@} turn ort rio:-.lpo-.,, ohol'"'9
0'""' cfl,__.,cl P"'t".,.,""
..........c....,.,_ .
"~
___,........,.,..,.._.
n.-,el~\ftoIO'Ch
.....
'MoK,I-
., ( _~,.c-"
hQI •r•• '"''"""""loA tl ,_ "-llil4
...
a((Oiof!t ~ad .
TIP7 If you're not planning on using any public Wi-Fi points, then make TIP 10 If possible, always use a t.\.Yo-factor form of authentication. For
sure that the Wi-Fi is turned off on your lap top, phone, tablet and example, some banks will utilise both a login from theirwebsite as
oth er devices you have on you. There are instances when a device can well as a text sent with a unique code to a registered phone number. This way
automatically attach to any available network, unless otherwise told not to. you ensure that the banking site is legitima te and a hacker can't go any further
without the SMS pin sent by the bank.
Wi-Fi networks
BTHub6
Connected
Qo BTWifl-with-FON
~
ecure
•
our ev1ces
Mobile device hacking is on the rise. Most people now carry a phone or tablet around with them
all the time, containing their emails, browser data, photos and enough personal information for
someone to be interested.
iuwh"bgo7et4
-Jrfsl If<> pr
h256" AEs-..a ~ '
c ENCRYPTION j
mL o '\-ro~aJ.17
fhuu.a.ew ..... yvc
7yxs947hgd9y
g8rg48hufdfw
623939poijwh
rifg7w83vad3
4nse~ry8w
g88rgreanvru
~e23y4hsir75
• •
• ••••••••••••••••••••••••••• • ••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
REMOTE WIPE If possible set up some form of remote wipe. Should BACKUP DATA Make sure that the data you have on your device is
your phone or tablet be stolen or lost, you'll be able to regularly backed up. You may have umpteen security
use another Internet connected computer to send a delete signal to the lost elements in place but if the device is lost and you haven't made a backup, then
device. You may never see the phone again but at least the personal data within your data is lost too.
is now out of the hands of others.
Elf•
ltlln1
hol <.o~
I
I
1 I
I 11.
fll'
Of ••
tl
Back up my data
IYtr~· ~to r...-.wcnnvv Off
be \llrnp <I~ u .ut..tJ 1• '~· ed
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
BLOCK INSTALLATIONS Try to avoid installing third-party apps. FALSE TEXTS Be aware of social engineering phone seams, Vishing
iOS devices are covered in this regard and Smishing in particular. Criminals love sending false
thanks to.A.pple's walled garden approach to its app store. However, Android banking texts, links to fake websites and all manner of other seams designed to
users are particularlyvulnerable. Don't install anything from an unknown source gain access to your personal information.
and research plenty before installing anything.
• •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• Remember to turn off your Wi-Fi when you
POWER OFF WI-FI
NO ROOTING Avoid jailbreaking or rootingyourdevice. Whilst it's leave the home or office network. If you
regarded as a positive process, to remove the built-in desperately require Internet access and don't want the data charges, then
software from the manufacturer and give you con trol over the device, it often consider using a VPN if you're connecting to public Wi-Fi points.
also opens your device to backdoors that were previously sealed. Unless you
know how to properly secure a device, leave rooting alone.
• •
ROOT
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••
ecure ourse
on ace
Facebook has become one of the best sources for cyber criminals to gain personal information on
the Internet. Without realising it, a user is giving out reams of data and in most circumstances they're
making it public.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Set up two-factor authentication, alerts about unrecognised logins and Never post any contact information on your profile. We often
make sure that emails from Facebook are encrypted. These can all be automatically start filling in the phone number field on a site but take a
found in the Settings> Security and Login section. moment to consider what the ra rn ificalions could be should your nu rnber be
•" e.n~ 1 Seeurtty .nd looln made aware outside your circle of friends. That also includes house address too.
lA ,.,....., ..,...,
we-w re~ •h lh~t. L~ t ot~ae at10 ~ eceount oeee:!ilfellon oooon are now unoer
10 r~ • .-nell9Joolt Mobile Settings
O o-
CJ I M(IIUC)to
A Clloos• triends to eontsu lil yo1.11,. SO<.kecl out
Ho o !lu!ll ' h I .;~ , ~t<l81o-
..
, Activating allows Facebook Mobile to send text messages to your phone. You
Airea
can receive notifications for friend requests. messages. wall posts and status
... .
Iil-
i'ii'l WltiOowt ,.C · l.owtt.ton. UMM KltiQ<tCim
l:,:J fi • k'toM 110.
updates from your friends .
You can also update your status, search for phone numbers, or upload photos
o f'..-...rlb
and videos from your phone.
Qi
a•-
SUC\If'Oflll'll*
.....
' Cl!-.n~ e pauwoJ'IS + Add a phone
I • 11- 011k111ttt ,~l'fU IIIIIIIIJW_..,., tltt-..t
UStwO<~cor 1\lth•nucrtlon
' ""' 11 ~ ....... .~ ( Ul.. .... •
''"
A Cllool• 3t.O f trltMt CO COlt~' If you sr•IOCI(H CKI1
'" "" ' .ooeo.: >~Htflo _,...,. f ~. 100 Ill
-
Black Dog i-Tech Series [2nd Edition
How to Secure Yourself on Facebook
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Tempting as it may be, try to avoid posting your location. Whether you're Not all apps you install on your phone or tablet are good. Take a
at home alone, or you're on holiday, should that information be made moment to read what an app will try to access when it's installed. Often
available then a criminal will know that your house is empty or worse, that you're a rogue app will attempt to access your Facebook account to farm for your and
alone in it. your friend's information.
App Settings
•••••••••••••• On Faceoook, our name prcn e ptdur• cover pnoto genaer networxs username ana user
people ana apps Learn wily Apps also have access to )our Fnends ltsl and anf tnforMaUor
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Bitaetenaer Log in Bloons T05
Try and avoid sharing random thoughts of the day, inspirational quotes, i i
fake news or other such items that appear on yourTimeline from others.
Often these instances are created to farm for shares and likes and as such can Codecademy
--
Coupons
often be traced back to individuaIs who are sim ply looking for active a ~ ' i
Facebook accounts.
Oiggy's Adventure
a
~ Farm Away!
a
Public posts
L:f4
Random Thoughts ,, U~e Page
21. P4a, (:
Loving someone you don't see everyday Is not a bad thing it's just a proof • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
that love is not in sight but in the heart.
Whilst in the Settings> Privacy section, consider editing the default
options for the Who can look me up fields. These will prevent the
public, or even friends of friends, from being able to find you on Facebook,
which in turn adds a higher level of security to your account.
Who can look me up? Who can look you up using the ema.l address you Fnen
prOVIded?
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Try not to accept every friend request you get. Take a moment to
check the person out and if necessary message them to find out who
they are and how they know you. If their comment is something like 'we met
at the bar last month' then it's best to ignore the request, as they could be
fishing for information.
• •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Finally, ensure that the Do you want search engines outside of Facebook
to link to your profi le option is set to No. This will hide you from
someone who has entered your name into Google in the hope that they might
be able to find your Facebook account.
ecure ourse
on
Twitter's success has boomed in recent years. Where once it was simply one of the more popular
social media platforms, thanks to presidential candidates and scores of celebrities, it's fast become
the modern media phenomenon.
Security
Logln verification verify logln requests.
You need to add a phone number to yourTw11ter accounllo enable thiS
feature
. . , Within your accoun t settings, you'll see a menu to the left with a . . , Word Muting is an excellent feature within Twitter's account settings.
W Privacy and Safety option. Click this to enable Twitter privacy, W With it you're able to mute any wordsyou don't want to see in your
Discoverability, Direct Message notifications, the ability to hide sensitive Tweets notifications or timeline. There are often Tweets you'd like to avoid even seeing in
and the removal of blocked accounts. it's worth going through the list to fu rther your timeline, so muting them is an ideal solution to help keep your account
secure your account. clean and free from negative aspects.
P( lvacv and saroty
Pnvacy
>
0 0~ l/t~ IO Qg mi i\ I)N)Q)t Mute from
s •.
~. .o;~, ......
_Ciilkcb...,,._.,.....,.
E2l Notlllcatlons
0 From anyone
® From people you don~ follow
'
~ oa m c.~"-,
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
. . , Direct messaging in Twi tter is both advantageous and dangerous at the . . , lt's alvvays worth browsing through the Apps section in the Twitter
W same time. Whilst great for communicating directly with another user, W options. This is where you can allow or revoke access for any apps
it's also used by others to lure in victims or send links to malicious websites. it's you've used via the Twitter account; and you can also see what rights each
best to ignore most messages unless you know who they're from. app has to your Twi tter account.
Applications
These are the apps that can access your Twttter accounl Learn more
Wefollow by We!ollow ( )
Wefollow 1s a directory of prominent people organiZed by Revoke access
Interests
Penmsslons read and wnte
l>,pprG\Ied Wednesdar. January 12. 2011 at 6:38 05 PM
. . , if you use your Twitter account to login into any third-party apps or Approved Sunday, Odober 14,2012 al616 19 PLI
W games, then you may need to consider setting up a secondary Twitter ustan
( Revoke access )
account. Whilst convenient, some apps can be hijacked to collect account [(!! Tweet on your uStart org page
Perm4sstons read and wtrte
details, leaking them to hackers. ApprG\Ied Monday. July 23. 2012 at 9 03 33 AM
® 95 1\veet
ecure ourse
With over a billion users worldwide, WhatsApp is proving to be a force to be reckoned with in the
social media marketplace. This messaging app was released over eight years ago and developed by
the Facebook team; since then it's become the most popular messaging app.
Delete my account
For added security, enable two·step
verifrcation. which will require a PIN
when registering your phone number with
WhatsApp again .
• •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
tJil Beyond WhatsApp itself, make sure tha t your phone or tablet is securely
~ locked with an access PIN, pattern, facial or finger print recognition
system. This way, should you lose your phone, it will be locked against anyone
who tries to access it and WhatsApp.
Your messages d
With end-to·end !~c ca/~s are secured
WhatsApp and third rypt;on, which means
listen to them. parties can't read or
• • •••••••••••••••••••••••
Show security notifications
Turn on this setting to rec .
tJil Thankfully, WhatsApp
~
when a contact"s s . erve notifications
changed. Your mes:currty COde has
encrypted regardles agfeshand calls are
so t Js Setting.
• already encrypts and
secures messages sent from one
device to another. This means
that your data can't be
intercepted and read. However,
you can opt to view security
notifications if a contact's security
setting has been altered. This is in
the Settings> Account>
Securily menu.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
~ Generally you're not able to add users to your chat list if you don't ~ If you don't want WhatsApp contacts to see where you've been, you
~ already have them in your contacts list. However, clever phishing seams ~ need to disable the l ast Seen option within the Privacy settings. Thiswill
can have a victim add a contact, who can then message them using WhatsApp; prevent other users from 'seeing' your movements. Should a malicious contact
as with all social media platforms, be wary of phishing attacks. be added, they will never know where you are or have been.
Last seen
@ Everyone
hUr :\\Your.Bo_nl<...
Password? 0 My contacts
( )
0 Nobody
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
~ You can block users via the WhatsApp Web feature. log into WhatsApp CANCEL
~ Web, and click on the three horizontaI dots by your profile picture. Then
click Settings and from there the Blocked option. You can select contacts to
block from WhatsApp. • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
~ Be wary of seams where you're contacted through other social media
~ accounts informing you that your Wha tsApp account has been
compromised. These often request you to add a so-called legitimate contact,
who in rea lity isn't, or visit a webpage that's riddled with malware.
David Hayward
Hey there! I am ustng WhatsApp.
Notifications
Chat Wallpaper
.____0 Blocked
• • •••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
~ You can block all images ~ If you use WhatsApp Web it's always best to ensure that you've logged
~ from appeanng on your ~ out of it correctly before leaving your computer. The last thing you need
photostream within WhatsApp. iOS is for someone to come over to your computer and view any conversations
users can look to their Settings then between con tacts.
Privacy> Photos and deselect
WhatsApp from the list of allowed Properties ••
•
apps. Android users will need to
~ WhatsApp
crea te a file called .no media within New group
Starred
PermiSSIOn
Settings
Unmstall
log out
Cancel Lock App Open
a aswo~
Creating a strong password sounds easy on paper but when you're presented with the password box
it's easy to become stumped. Should you get past that part, there are also security rules to follow to
further protect that password.
PASSWORD1234
To help you create the perfect password, and secure it further, here are ten t ips for happier password management. There's always password pitfalls but stick
to these general tips and you should be okay.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Never use your date of birth, partner's date of birth, VISIBLE PASSWORD Never write your password down on a Post-it
OBVIOUS DATES
children's date of birth, pet's names, family names note or somewhere near your computer. it's
or even the town where you grew up in. This is all information that can easily be not too difficult for someone to visit your computer whilst you're on a coffee
collected from social media sites or even a clever Internet search. break and read the note.
BAD
PASSWORD
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
SAME PASSWORDS Never use the same password for multiple COMMON PASSWORDS Try and avoid using common words in
sites. it's tempting and easy to have a single your password. Most password attacks are
password for everything but should that password ever become compromised brute force, using dictionary words to gain access. Avoid using sequences of
you will lose access to every siteyou visit, including any banking sites. numbers, such as 1234. 1nstead, try inserting numbers, capital letters and symbols
into words, such as COm"o% instead of the word common, for example. However,
avoid common words altogether if possible.
I••
.!-•
..
I
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
CHANGE REGULARLY Regularly change your password. Most LENGTHY PASSWORDS Don't use short passwords. The longer
companies and good sites will require you to they are, generally, the harder and more
enter a new password that hasn't been used previously in the last few months complex it will be should anyone try to crack it. A longer password that also
every thirty days or so. If not, then you should actively keep changing your utilises upper and lower case, numbers and symbols can't easily be viewed by
password yourself. any shoulder surfers.
Change Password
Current Password"'
New Password"'
Confirm Password"'
( Update]
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••• • ••••••••••••••• ••••• •••••••••••
SECURITY QUESTIONS In addition to creating a password, some
UNTRUSTED DEVICES Never enter your password on a device or
sites also offer a rescue security
corn puter you don't trust. Entering your
question. Sadly most of these questions are a little too easy to get the
account details on a public computer, such as a kiosk or library, is dangerous as
answers for. Questions such as Mother's Maiden name, first pet, town where
you don't know what protection these machines have nor whet her they've
you grew up, etc. can again be obtained by the clever hacker.
-- .. ..
already been compromised.
Security Questions.
· .~
Select three security questions below. These questions will help us verify your
identity should you forget your password .
Answer
Answer
Answer
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Free
•
asswor
oos
We've looked at some tips on what not to include when coming up with a strong password.
However, it's not always as straight forward as that. Whilst some can come up with an elaborate and
incredibly strong password, others struggle. Thankfully, there's help on offer.
STRONG
O E H EAATOR
Password Generator
_.. .... ~-
11:1' lt.-
•
..
u..-•rooov,__.o-_ ...
-·-•you __
, .... - dilfto;aolllo
_~ ........ _ .
Q'.U ... -........ -'-"' . . , ....... tor '"'
CIIIP'1.,.. .,._ ._______ _
____
..
-·-,.._
0 o.~- ·--·--
·--
• ..__ ___ ..-
·-·-. ... -- - · - · 0
............... :.-~r .., ,
·-
·."' •
·---
·-----
-~
- ·-
·-·--.....
e
... ,. .
... ·--
··-·· -·---
··--· ..-·---
_..______
__ .. ....- _
lcJ----·
..,. ·- ___
_..,. ,._
_____
Oo ..,.. tl01'9 IN peu.....ordt gtiMrtiiM by thlt tll•1
,,.,___ .. f""t_.,._..._ ..._._.._,..
tfl..,_
...... ._~"'- __.. ~
..,yW,..._/1 ____
[bi• •O 7 •
_1~-
•
Cl C' Q.-
htps: L/ strongpawd~e.cm L.
Generate a Password
_
Use the onllneloi$CP;)S.S Pil:oSWOtd Ge n er.~to to lnstintly crfite • secure, random ~sword .
, .. _,._ .,..
...__
' .,........
,., ....,_..,......- S04k@4$1w•1R
·--·
·- -. ·----·-
_,...,._ ..........
---
·-,.,....._ ... __
.... _ __
,__
-....,.-
-.. ....... ._
t»>o-~·
-__...... , ·
--
a.-_ _ _ ..
--·
---
.,
-.
----.. O0oo Oo oo ..
--
-- ...-...--_, ___
.......,,_
....
~ -~ -
fl-Ma.-.._
o ~'"
eJ.Za ... e-;a,,,...
-~
'
-.-ow.co-
-·-
~
t
o -.....
-~
Password Generators and Tools
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
MSD SERVICES An interesting site this, one that will allow you to XKPASSWRD This site is powered by the XKPasswd.pm Pert module,
create multiple unique passwords, based on length, which offers a range of settings to help create a unique
upper and lower case, number and symbols as well as whether the end result will and very strong password. There are plenty of options to choose from and you
be pronounceable or completely random. it's at https:[Jmsdservices.com/ can save and load your preferred configuration for later. it's at:
apg/index.php for those after several passwords. bttps:l/xkpasswd..oett.sl if you want to check it out.
1+ . ·~
· ~·'S
........_..
•• !:.l"IW'II,.'S- •
l -
o _,.,.,_ • ..._.......,..._.._..,._, IDOaiOIIIIDIIIIIII
, lllllol(l-··"-.. . . . . . .
,,_
---
O....llllilb.
·-- -~ •
-- •
0 -ftt-911.
........,.
,~n. ~!s ( lifJI[ IO> ':sJ - 1sJ 1> foFI
" ~4'1 14 W - ~W, .......,.; I ... (M.<- J!:!{:.t.:)
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
SAFEPASSWD Another great site to have in your password arsenal.
LITILELITE PASSWORD GENERATOR Another simple but
SafePasswd has been around since 2006 and is regarded
easy to use and good
as one of the best online password generators. The options are many and wi th
on line password generator. Li ttlelite offers some options, including
them you can create something truly impossible to crack. You can find it at:
password length, number, upper and lower case, symbols and spaces. it's
https:l/www.safepasswd.comJ.
found at.bng;[Lw.w.w.little.lile..net/p wdge.nl and certainly worth
considering bookmarking.
A ~
~ SAFE PASWD Create New Password
Type
Length
Your J)Cf'"'...OOI)I and WCflc omoll $COI)I.JI\1$ 10 20 30 40 lots
Oon k t~g , tl'~ find sa~ orWte SoeMOit$ ~ ._
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
c::a-=--=-
... -~lo
,. . . . l. . ......., ..... _ _ ~-·'"
. . ._. "_
www.bd mpublicat jons.com Black Dog i-Tech Series
On line Protection and Disaster Recovery
en asswor
ana ers
Creating uncrackable passwords is one thing, remembering them for each of the services that require
one is something else entirely. The reason why most people opt for a single password for all their
accounts is simply due to not being able to remember them all. This is where password managers help.
LASTPASS LastPass, which also offer a free password generator, is STICKY PASSWORD Sticky Password is avai!able both as free or
regarded as one of the finest managers available. There's a Premium versions, costing jusl £24 and offers
free version that offers unlimited password storage, cross-pla tform access, two-factor authentication, autofill for websites, advanced biometrics; it's also
two-factor authentication and elevated levels of encryption. There's also a available on all major platforms. The Premium version goes further with cloud
Premium version that offers a lot more, including 1GB of encrypted file storage backup and syncing and with every license purchased a Manatee is saved.
and higher levels of encryption. Certainly worth considering.
••
..
••
Sticky Password
secur ing your personal data
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ZOHOVAULT Zoho Vault is another excellent password management DASH LANE With free, Premium and Business options available,
application. With a free version on offer, moving up to Dash lane covers a huge user base. Its features are many
Enterprise levels for just €7 per month, Zoho allows unlimited passwords, access and it offers the user a high degree of encryption and securi ty alongside all the
from all platforms, password tracking, offline access, auto-login for websites and usual auto-filling, two-factor authentication and the ability to export data.
much more.
a ne
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
KEEPER Keeper is a powerful and feature rich password manager that KEEPASS KeePass is a freely available, open source password manager
has Individual, Family and Business plans available for £20.99, that's regularly updated and comes wi th a long list of
£44.99, and £22 per year respectively. With unlimited password storage, unlimited interesting features. You can import and export password data, it's ful ly portable
device syncing, finger print login and secure cloud backup, amongst others, it's so there's no installation required and it adheres to 256-bitAES encryption.
certainly one to consider.
®keeper·
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
lPASSWORD ! Password offer an individual and Family plan for as little PASSWORD BOSS Password Boss offers both free and Premium
as£2.30and £4 per year. With it you can access password plans, with the Premium plan costing around
across all your devices and operating systems; there's offline access, automatic £24 per year. There are ample features to enjoy, including cross platform
synching, 1GB of secure storage available and a 365 day password history recovery. support, full military encryption, cloud synching and more.
PASSWORD
BOSS
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TRUE KEY True Key is an excellent password manager wi th a free LOGMEONCE LogMeOnce is an award-winning password manager
and Premium plan available; the Premium plan costing that incorpora tes many interesting featu res. it's ultimate
around £29.99 a year. it's unique in that it utilises facial recognition as well as selling point, however, is a passwordless operation, whereby you are able to log
finger print, and integration with Windows Hello. There are plenty of other in to any website or seNice just by using faciaI recognition. Prices do vary across
options available too, so it's worth looking into. the Premium, Professional and Ultimate editions but the personal version is free.
~\1/ ~
~t True Key Logme
Password Security with Convenience
lOOnline
Shopping
Security Tips
(
• • ••••••••••••••••••••••••••••••
focus on particular elements, here are
RUSH BUYING Don't be
ten on line shopping security tips to
fooled into
apply across the board. rush buying something that's at a
ridiculously low price. If a site is selling
an iPhone for £20, the'1 it's more than
likely to be a ruse to lure you in and
. ....................... . ..... . .. steal your morey.
• • ••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••••
Remember to load STRONG PASSWORDS
USEHTIPS
up the online shop
Use a strong and unique password for
using HTTP$ instead of HTTP. This will
all your shopping sites. Occasionally,
ensure that the transactions and data
although not often, websites can be
sent between you and it are encrypted to
hacked and the data base of users is
the highest possible levels. If possible,
leaked.lfyour password is strong
use a browser add on such as
enough, it will stand up to any
HTTPS Every>~h.
decryption methods.
• • ••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••••
SHOPPING APPS
AVOID PUBLIC Wi-Fi
If possible, always use an online
Tempting as it may be, don't use a public
shop's dedicated app rather than the
Wi-Fi access point to conduct anyonline
standard website. Websites can be
shopping. For one, you could be attached
compromised, however apps from
to an Evil 'winWi Fi point, where the
iTunes and t1e Windows Store, for
hacker is filtering all information through
example, can't be altered by a
their system and two, all your data can be
third-party.
intercepted and potentially read.
• • •••••••••••••••••••••••••••••••
•••••••••••••••••••••••••••••• ••
3Ro PARTY SECURITY Invest
PAYPAL If possible use PayPal
1none
or a Credit Card as
of the many third-party antivirus and
opposed Loa Debit Card. Credit cards
malware suites, such as Bitdefender.
have an extra layer of protection and
These programs also offer extra security
legal standing Lhan thal or a debit card;
when shopping on line and can help
PayPal features many protection
prevent any hacking or data interception
elements within its accounts too.
from happening whilst the transactions
are in progress. They can also check the
site you're buying from, too.
• • •••••••••••••••••••••••••••••••
BANK TRANSACTIONS
Always keep an eye on your bank
account and the transactions that go on
after you've conducted on line shopping.
This will help you get an idea of what's
go1ng on and shou Id something
suddenly crop up that looks suspicious,
then you're able to inform your bank
before too much damage is done.
..
...
•
emovea trus or
a ware rom a ows
So far we've looked at ways to prevent getting scammed or indeed getting malware on your system
but what if you're unlucky enough to already have some form of digital infection? Thankfully, there's
a way to remove malware and viruses from your computer.
Malware Busters
For this tutorial let's use a preconfigured rescue disk from Bitdefender. You need to transfer, or burn, the disk contents to a CD or a USB stick and boot into the
safe environment through one of those mediums.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Make sure you have a blank CD or a USB stick that's at least 1GB STEP3 Click the Next button and using the drop-down menu next to
STEP!
in size. The Bitdefender Rescue Disk is down loaded as an ISO Removeable Drive choose the drive letter of your USBstick. Click
(which is an image file containingall the disk information) and can be Next to start the transfer of the image. Once the image is transferred click the
downloaded rrom www.down load.bi tdefender.com/rescue_cd/latest/ Finish button and remove the USB stick and power off your computer.
bitdefender-rescue-cd.iso. Im sttc ,.,
Select ltle desi'ed destination removable mve fi'om the ist below.
You have chosen to open:
Before contln.i'>Q pie- enso.n that the aiterla isted below are met. Failure IX> do so may CliiJSe this utity
~ bitd efender-res<:ue-<:d.iro lead IX> boot fal.lres when using the restAted disk.
About
Dotru ~u to m a tica ly for files lilce t his f rom now on .
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 To transfer the ISO to USB download Stickifler, which is an STEP4 Ifyou're using a CD, start by inserting the CD into the drive. Locate
executable that doesn't require any installation. Insert your USB the downloaded Bitdefender Rescue ISO, right-click it and choose
stick and double-click Stickifier. Click the Select an Existing ISO Image option Burn Disc Image from the context menu. Tick theVerify disc after burning option
followed by the three full-stops and using Windows Explorer, locate the and click the Burn button to start the process. Once the ISO is burnt to the disc,
down loaded Bitdefender Rescue ISO Click the Open button to select the image you can power off your computer.
and continue with the process. Neme D.ete ,,,
rufu$_hles 27/0Y1J~l ._lie folder
MMwpplkationpKk - ~ '910527 1: ~Z - '~" ;:. ro:;ld« _, _ ___c
.., brtdefn.:s~·< llt06120170S:,. Dls.c lm.tgtF e: 68lOOIK6
----
I] stid:die. 23/0612017 GS!3l Apl . ut~o n 3.897 KB
• 1n I) ,~"n
1:: IPG FM
JPG FiW
2.£'9lltB
2.~ KB
-
X
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS You now need to allow your PC to boot up into the Bitdefender STEP8 You need to accept the license agreement notification first. Tick
Rescue CD environment. Power up your PC and open the Boot the I agree box, followed by clicking the Continue button. The
Option Menu. This could be accessed by pressing Fl2, depending on the make virus scanning software will then start to automatically update itself with the
and manufacturer of your PC motherboard. With the boot options available, latest virus definitions from the Bitdefender servers. The process won't take too
select either the CD or USB stick and press Enter. long, so let it run through the update.
I
network boot fro• AnD A•19C979A
+Hard Driue
•Re.ouable Deuices
network boot fro• AnD A•19C919A 12
<Enter Setup>
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP6 The PC will now boot into the Bitdefender Rescue Disc STEP9 Once the update is complete you're taken to the main
environment. This is a custom Linux opera ting system with all the Bitdefender Rescue CD antivirus interface. The three main
necessary Bitdefender security tools preinstalled. First, you need to choose options: Scan Now, Update Now and Settings are fairly self-explanatory; the
which language to load the environment. Use the arrow keys, and press Enter for Settings allows you to set a few more options regarding the scan, however the
your language choice. defaults will suffice.
STEP7 Ideally you should use a wired Internet connection but if you're STEP 10 To remove avirus on your PC, click on the Scan Now button.
on wireless, click on the network icon in the bottom right of the Select the drive you wish to scan and click the Open button to
desktop to establish a connection with your router. Once you're connected to commence scanning the system. Any viruses found wi11 be detailed along with
the Internet, double-click the red Bitdefender icon on the desktop, labelled options for removal. The process may take some time, so be prepared for a
Antivirus Scanner. lengthy wait.
-- .
www.bd mjl.Ublicatjons.com Black Dog i-Tech Series
Advanced Security Tips
• •
Windows lO's new updates and special edition updates have brought a more customisable degree of control over the
operating system's privacy configuration; something that Microsoft has always been criticised for in the past.
- ......- here are many advantages to this particular setup. A and typing privacy into the search box. Click on the Privacy
Windows 10 user will always be up to date with regards Settings option, with a padlock icon, and the core privacy
Windows 10 is said to security, options and support. Any new hardware options window will open. There are, at the time of writing,
to be the last true that's released will be added to the vast driver database nineteen different options available to browse through. Each
Windows desktop that Windows 10 already uses and it will operate at its maximum option, when clicked, will display a subset of available options
potential. Microsoft can gradually roll out features that would that can then be en abled or disabled and turned on or off,
release, with the
require a brand new operating system, thus maximising the depending on your preference.
Redmond company capabilities of the OS. Of course, the company can charge for
For example the first option, General, offers the user a choice
certain additional features that would ordinarily be a part ofthe
of opting for advertising via apps, allowing websites to provide
OS, such as a media centre for example.
locally relevant content based on the user's language list and
However, profit margins aside, its the rolling security and updates allowing Windows 10to track how an app is launched to improve
that the user will benefit greatly from.As Microsoft evolves Windows search results. Whilst that in itself doesn't sound too much like
Going 10, user and developer feedback can help improve the way the OS your privacy is being infiltrated, there are those who don'twant
Private protects its user base. A prime example is the new privacy settings
available post-Fall Creators Update, which was gradually rolled out
the installed apps and the OS having too much knowledge of
where they are and what to advertise. Like most privacy options,
to Windows 10 PCs around late October 2017. The privacy settings it's a personal preference as to wha t you're happy sharing with
and options that are now on offer are a radical improvement over the system and its connected technologies. Whilst opting to
the previous, rather bleak, features thal came with the original turn every privacy setting on will inevitably open your use of
\IVindows 10 setup. Now, the user has greater control over what the Windows 10 up to whoever or whatever is readily receiving the
now opting for OS can and cannot do to affect an individual's privacy. informa tion, likewise turning everything off will effectively hide
a rolling release you (to some degree); but at the cost of possible loss of available
Providing you've applied the Fall Creators Update, you can view
features. There's a fine balance needed to get the best from your
cycle, that will add the current privacy options by clicking the Windows Start button
privacy and sti11 enjoying Wi ndovvs 10's many features.
or remove features
There are some interesting additions to the
over time through
Fall Creators Update privacy settings, which
regular updates. are certainly worth looking over; if you wan t
a best of both worlds approach to privacy
and featu res.
.<.
/
Windows 10 Privacy Settings
Location - The Location option will allow Windows 10 and its apps to use your Radios - This option will define which apps can control hardware such as the
current location to specialise any content lt's innocent enough but for added computer's Bluetooth device, Wi-Fi or any other kind of wireless receiver. Obviously,
privacy it's worth considering turning it off. some apps will require access to share information or allow access £0 shared areas.
Camera -This is an excellent addition that will define \'Vhich installed apps have Background Apps - 'A~ndows lO's background £ask handling is far better than in
access to the computer's webcam. You can turn off app access to the camera previous versions of the operating system.Memory is released as apps drop into the
globally or browse through the apps to decide which has access, or not. background, as is processor allocation. However, you can further define which apps
will be allowed to run in the background with this option.
Microphone - The same applies for the compu ter's microphone; which apps can
access it or not, and whether you wan t to globally turn it off. raking time to go through each of the available options is something every
Windows 10 user should do. This way you become familiar with how the OS shares
Contacts - The Contacts sec liondelai ls which apps can have access to your cu rrenL
your account data and what exactly has access to your Windows 10 computer and
Windows account contacts. Disabling this globally may have a severe impact on
its hardware.
how some apps, such as Skype and emaiIwork.
are
Most Windows 10 apps and programs have some element of code that will attempt to communicate
with an external source. That communication could be to check for the latest version, or patches and
updates, or it could be malicious software sending personal data.
P task - see v-eb results ri] G.. Office (),00:01 0.8MB OMB OMB
Photos > • Mail and Cal~ndr (2) 0:00:28 0.6MB OMB OMB
Documents (I Sport 0:00:01 0.5MB OMB O.>MB
Store Ei] OneNote 0:00:01 0.1 MB OMS OMB
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 With Task Manager displayed, click the More Details arrow (if it's STEP4 Another excellent method is by using the Netstat command. Click
available). This will expand the Task Manager options. From here, on the WindovoJS Start button and enter cmd, then right-click the
click the App History tab and then the Network column so that there's a Command Prompt option and choose Run as Administrator from the menu.
downward pointing arrow above it. This indicates network use in a descending When the message to authenticate the action pops up, click on Yes.
order of amount of data sent.
~- >11 9 0 X lQ!j [j Filters v
nle OpttOM Vl~
Processes Performance: App history Start-up Users Oetatk Servtees Best match
STEPS With the command prompt open enter the following: netstat -e In the activity folder, enter the following: netstat -e -s -p tcp -b >
STEPS
-s -p tcp -b. The information populates the command prompt activityl.txt. This is the same command as before but this time
box quickly, so you need to scroll back up to the top to see it in its entirety. the output is being sent to a text file, named activityUxt, rather than outputting
to the command prompt window.
iii .Mdmmr«rator orn
STEP6 What you're looking at here is a list of programs, from the column Using Windows Explorer, locate the C:\activity folder you created
STEP9
to the far left, with the lP address of its source and the destination and within the activityl .txt file. Double-click the activityl.txt file
address in the middle column; with a third column detailing if the connection is and it opens in Notepad where you're able to view it without the often difficult to
established or not.lt can be confusing to view at first but after a moment or two it read command prompt window.
should begin to make sense. • .., . . .
t.ourr.... ~oc10rkt
...,...,....
...•
. -
.._- · ~ ~ • 0 X
.,...
.,~
_
...,_tvn
"~' ,_,
•••u ..,_,
_,,
~, ....
._
"'"""
•••
ms"
• -
·-................ -·
•o..·-
•
..-n .. -..
e
'" ........
'•UMI '-<t.W. '*(t_,
-·'~ --r-,··...
·-...
. M>
•••
· ~
·-
· ~·
·-, _
· nt'"
·-..--··
~s"o<i.,
.............
J -..· - ·
~· D'"'"""
t-··--·· '<"
"
~
, , . . _ 1'101........ ,
m
t 11 ·
' - · \to(>lt -
w.t~;»*
mu
*-•·n., WJIU~
re~ UJ,e..t,,,;n., W._l~
twr.~·-
~- ""'
IV UJ, t t . l •»-11
(~L.,otl
,,, 1'(.'
l'Cf
.....
W,t.t,IISWit
_)
U1 .e-t I+SS<IIJ
.nr-t:l$<1-1)
. , _ , »£1• "'""'"""
H " IU~
..,...,....
1"
~
....'•·-·
IV t t I>'S!<I1f -1-• SS<Ltl w........ ~- ·-- ::c•:::•::.•----------------"-'-
-
[fV.I_,,,...J
lt' m • • 1•»'11
__,.. *-'·•·'*'
,,•....,..._J
10'
r-*"--
tn.l!~
f(f ·~) ~
''"'"'"'·-)
19),"'·'·'· "lJI'
!'(' ...... lit~ ..~ n-1~
~· IV'
llfm4• .......- J
t)l ' " ...... · -' "* t.M IU 1J o "l~ nu-.J,._
• • •••••••••••• •• ••••• • •• •• ••••••••••••••••• • •••••••••••••••••••• • • ••• • • •• ••• • ••••••••••••••••••••••• •• • • •••••• •• • • ••••••••• • ••• •
STEP7 If you want to create a friendlier way of viewing Netstat active Ifyou vvantto simplify the information and the process, enter:
STEP 10
connection data, you can pipe the contents to a text file. For netstat -b 5 > activity2.txt into the command prompt within
example, in the command prompt enter cd\ to take you to the root of the C: the activity folder on the C: drive. Thiswill record the information and only write
drive. Then create a new folder to store the text fi le with md activity, and enter it the data once you've pressed Ctri+C, which stops the process. Use this for
with cd activity around LINO minutes to get a record of what's going on.
...utT rr nd Pro.,r' "f'tltt ltl':tl -~
"' llJ.•••. ttSWU
[-ut..-....t
'CJI u:r.t.e...t:nl66 _,,,.,
lllll'lOU- -~· )
llllf'lOI.I ~
r(f'
· -J
rr•
JV.t t . ltU..l
tn,t . ~onw
· -'"""
[-Hl't.•ut
__,e.t.htw.u
tU> trt.t .t .t tS'kfll
{,.....,..
{•-Uv-.1.-- )
re. tn.
~r ll'l.t. t.I:U•U\
l't..r.• _,
JCI'
IV.•• t . t!SSoiU
[fl,.,_._,
rCP tD.t.t. t:nH1
[U...-.o.-)
rCP tn,t. t.t:t)(lfl
(-...ut............
'(' IJol,Mt. f'IM »t• -~ 1 .,
'""-u.o
........"
,,_,,_,
(114 - """•• _ . , . ,
~ JN, 14$ l , ltft •"IK -._ "l tl'Ji. t ~UM l$.1-tsofO
•
IS a 7
1rewa •
The data packets that come and go between your PC and the outside world can be defined by a set
of rules. These rules state whether a packet has access to the system in the first place, then whether
or not it can gain access to its destination program. Collectively, these rules make up a Firewall.
Some form of digital protection against unwanted entry into a system has existed could miss out on regular updates, fixes, patches and so on. One of the key benefits
for many years but the more recent software side of a firewall, one that we're to an application-layer firewall is that it's excellent at blocking specific content,
reasonably familiar with, has only been around since the '80s. such as known malware and viruses or dangerous websites. it's also capable of
determining when a particular protocol is being misused by a rogue application.
Prior to the modern firewall, system administrators blocked unwanted access
through various stages of hardware layers. Long lists of allowed computer addresses Where the firewa ll proceeds from this point is unclear. However many experts agree
were painstakingly entered into mainframes and routers, where programmable that although we'll always need a firewall, the modern systems, networks and
chips filtered the white list and simply stopped all access to addresses that weren't devices have so many potential access points that it's fast becoming less efficient
on the list; think of a nightclub bouncer, if your name's not on the list you're not to run the standard firewall model. In effect, the modern firewall, regardless of how
getting in. complex and efficient it has become over theyears, is quick becoming a bottle-neck
for the operating system. What some experts are theorising is that at some point in
In its simplest guise, a firewall will look to a defined set of rules then apply those
the future, the need for a single, overall firewall will be outdated and that the next-
rules to any data packets that pass through it. For example, if you've created a
generation operating systems will require each program and applica tion that can
rule whereby all Telnet tra ff ic is blocked, any packet that's trying to reach port 23,
be installed to act as its own fi rewall. Whether this will come about is pure fantasy at
the port that Telnet applications listen on for data, will be blocked. While suitably
the moment but at the speed digital technologies grow and evolve there's a good
effective this low-level packet filtering does have its Achilles heel, in that il treats
chance of finding out soon enough.
each packet as an independent piece of data: not knowing whether it's a part of
an already established stream of data. This can be targeted by hackers who want
access to a system with a fi rewall in place. The clever hacker is able to spoof a
packet and thus tricking the fi rewall into letting it pass. lt takes some time, and it's
a bit hit and miss, but most hackers have plenty of patience when it comes to
getting into a net\>Vork. Therefore a much needed higher degree of firewall
monitoring is called for.
Stateful Inspection firewalls were introduced in the mid '90s and
enabled a firewall to log all the connection that passed through it
determining what was the start of a new packet stream, part of
an existing packet stream or something random. This allows a
Hardware firewal/s are an early
firewa11 to allow or drop any access based on a data packet's
history. In terms of effectiveness, this makes the firewall more
example of network security
efficient and faster at dealing with connection requests as it
doesn't need to continually analyse each packet as an individua I
but rather as a whole stream. For added layers of protection, if a
packet doesn't match any of theconnection histories, then it ea n
be evaluated and filtered through the various rules to determine
its legitimacy.
A further layer of protection was included into the basic firewall early
in the 2000s. Application-layer analysis enabled firewalls to inspect
packets that were targeting individual applications within the operating
system. Each program or application installed in the system wi 11 use a set of
protocols to communicate with the outside world. When an application is installed,
on aWindows lOsystem for example, the installation mechanism will automatically
add an instance of it to the Windows 10 fi rewall. This means that it is able to send
and receive information successfully through the Windows firewall without any of
it being blocked. By blocking an application's access to the outside world, the user
, .._,_ .........
,
...._,_,__ ......._.......,..
. - D X
.
........ .,..._r.-... ,~
Hdp prOIKl your PC with Windows Fir~l
lf.t~M
\~,._01'htlp
e. • Ntwcwt.
~-fuwn,. K UB t OJW'PC~tw
· -~.
•"" --
• ::c.·=·::··.... o ~-c.
e oc ........ o-......cr. - - ..
--.. , . .... lit' . . .
•
.,....
~w • e oc....._cw-...... ~
I 0 Priv a ~e ••
.,_ ., ....
V '-'t'"-
"'
.. -~ lf ...~ -
·-.. ••
notwot1cs Connected
....
..........
lP
$ f wnW~f Of\01
<! -
$ ._... -- ~._
. ..................
P.otoft: 01/Nib
tJ rw... fC hfr-N.• wcr.Ma~o
....... u ....
-..........
'•-
Dod : • connert.om to eppliuboru tNl art fiOt on o r...,.. ~.,_'* -
fi'OIbl~tny tht li« of llllowfllappliu!lo"''I tJ C<toof TloOIII ~ Y
0....._,..........
~ Net:wori: l O Oi*flltft._Y
0 ~ flollt Aolle Y
O l.n•U...I
.; .,..., -~'
,. , .,ca;
,_
· ~-
"The built-in Windows 10 firewa/1 is "When each program, application,
certainly good enough for most users' game and so on is installed, it is
needs. it's fast, effective and can be entered into the Windows 10 firewa/1
easily configured." sa it can communicate with the
outside world." "There are countless freely
available third-party firewa/1
clients. Some are very good,
others not so much."
Se Updale
Browser Virtualization
Stops *"i drwe~ •'feb llltacks from readwlg your c:on!P\Aer
Not !llclucleQ, '-" mote
Anti-spam
Blocks dangerous ~ ¥nO)'WI9 ~ e-maj., r.taotoft Ol.tlook ~ OLclook ~
Not !llCiJded, On !!!O!e.
Parental Controls
llelps safeou¥d your c:toldl erl from hemet p!edaOf'$
Not !OC!uded. !eM'li!IO!l!
Check Point
I \
•
rov1n
ows 1rewa
The built-in Windows 10 firewall is a surprisingly good security application. Whilst it may not be
as efficient as something offered by one of the third-party security suites, it's certainly more than
adequate for the average user.
Getting to KnowYourFirewall
Generally, there's little need to ever configure the Windows 10 firewall. However, getting to know how it works and improving it is part of being more security-
conscious. Here's some t ips on how to manage it better.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
You can open the main Windows 10 firewall console window by STEP3 Down the left-hand side are sorne links that will help you
STEPl
clicking on the Windows Start button and entering firewall into the configure and improve the firewall, as well as turning it on or off
search box. Click the returned link, Windows Firewall Control Panel, to launch it. (which isn't recommended under any circumstance other than the installation of
an improved third-party firewa ll). To begin with, start by clicking on the Advanced
f ihers V Settings link.
Best match •
Windows Firewall ..._lp pmt"c:t ynu r PC with Window!; fitiiJWall
Control panel
Wlrl:lo...c fitM'Iill u n. h,. P"W"'I Il.ttftm fll ~ scf!WIIr. ,,_ ~· IWC) •u - to your PC tlllcugfl tM
Al..... - ......... r........
·~ Of ·~
IO
~ lo ~Wontl _ fir_l
App$
~ ( ...,.,,._ "'41~ (.-io> fllllinqf fl'riViltc nctworts ConnKted
• Windows Firewall with Advanced Security ~ ,..... w.....tr..o..,....... "'....
Settings
""
f; , ............~a
Wi., F" tw. ~
$ Mancedim""'!'S'
ilc:~<O fl ~ lllod tll < or ~ to •ppliutionJ U ~ not 0r1
11 Check firewall status II'O!Alltdlc« my IWI-l .,_ lo$1 cl~- •pploclloOM
~ Nct\eo!t)
11 Allow an app through Windows Firewall
Photos
n-i
tu__: ---
---
-
Blott ... (-loOM to •pplk-..ioM thM , . IIOl Otl
lhe k t d ..~ •pplic.eions
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 The Windows 10 firewall console window starts by detailing the STEP4 TheAdvanced Settings link launches a new console window.This
basic status of the fi rewall. lt should be On by default, unless new console defines the inbound and outbound rules for the
you've installed a third -party security suite which contains its own firewall. There entire system and its installed programs and applications. You can set
are two kinds of network listed, Private and Public. Private is for home or work, authentication rules between computers, view and create new firewall rules, view
whereas Public is for ca fes and the like. the current fi rewall policies and even monitor what's being blocked in real time.
tl -:1< f,,
•
Help pfotect your PC with Windows Fifewall
..._
Wlr\dows fi•tw•n un l'lt lp jlttNtnt 1\Kl:trs 01 m•llc.•ovucftw.,t fro.r. g••IWI9 tcctss toyo..,. PC thrOIIgh tht
.. ''
Al epp 01 ft..tuu:
l ow~ l l'(tr ~ 01 • nttwortc.
through Wlfldtwrs firewell
$ Cbengc: noliiuti011 ~g s Conneaed
$ Tum Wlrldo<oWS fftvo•ll on Of
off
0
Do-.al• Ptofll•
._,~ .n •
V
$ .,~HIOef! I U. ...-.cJMI
$ ~O tf: defoMllu.
On
0 ~_. ................ ...... "'
$ ll '•
A6.-enc.«< 1rl1lngs p,;.,- Pf61i.... ~
81od; t1 conn«t10115 to l!pk.-t~ons t1~. ett: flol: on
fl ..... r-.. .....
TrcnAI~ot my nt'IWC!It the !m of d~ ephc~
NotJficlbOft sttte: Notify""'- wtlt tl W•l'detNS F 1 ~ b!ocb e MW •PP v-end - • "-u """•
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS Click on In bound Rules to the right-hand side of the main STEPS Sometimes, uninstall ing a program doesn't automatically remove
console window. This will list the current rules that allow traffic it from the Windows fi rewall. The exact reasons why are varied but
into your computer and to the applications that require it. For example, in this to help improve the efficiency of the Windows fi rewall, whenever you remove a
screenshot there are rules for various games that allow multiplayer interaction program from your system, it's worth checking the fi rewall to see if its entry has
and the ability to 'talk' to the game server as well as install updates. been deleted. To delete an entry, right-click then select Delete from the menu.
t# '.\~
I Rt Ad*' ViM'
fi~ I 'MIl~5«U!f1
H. .
l
...... _..., -
.. • '1 'T.'il -.! I H':iii
-....... ......
t1 w~
....
-.~
._,,
-
t) ........_, 0:\ !,1 ~"1
"~
__
,.,.
..... .., ... o ...........
.... - -
....k ...
"' ......... .......
.,... f) &ft:Serlf<lds.m Public Vt$
..."'
();\~lie!
,.,.......,..
Dt\Qtmm&ord9
.... ....
r.....,.
- --- .. ... ..
Vn
~·-
..... ...
~
...
.. .. -
;.. " "''', r. ,,,, ·r,.,·
O.-.....IIn '-"u!•!\lolat!
O c~> ..-1 Ot\ ':1 -'~"
"' .....
---
t.vt
.. ""
... O co~ l ~ o g~m· ~
--
... M.-~c ... "" 1)-\ !)-.\'it,~ "'
.......
-..... .... -.......
0 C.OII"'I'I I""'i.....,
:i:::-,- - - .1 O:\p4mb\"-"""'
·~
~fl\4c ........1Mt
~ ...... Dr\oJ-...W. _...,. 0 Colllrttl M
p,.._..,
V..
·~ ...... No D;\
Ot\,_... .... g -\St~
...... ........
..... "'
~01\lti-! o ocu.. Vco
"*"' .....
~
..... ..."'"'
---
~0WIl<t. .. 0 DC t.w. ,...'P p~, ~\Q-'M ""'
~·
0" _:.:::__ ___J ,....., "'
.o ............
0.\g_,...or«
Mt-·~ .,.,.."'-e res ~ gi!Td\4ort.
...
AII0'/11
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP6 These ru les are automatically entered into the fi rewall when you STEP9 You may not want to delete a rule as it could be used later or if
install the program, game or app. When you install a program you reinstall the program and it fails to recrea te the firewa ll entry.
you're required to accept and authenticate the process, clicking on Yes to start The recommended process then is to block the rule from communicating with
the installation. This level of administrative access also allows entry of th e th e outside world. To do this, double-click the rule and from the General tab click
program into the firewaiL Pick one of the entries and double-click it. the Block the connection button.
•Qo-·- . . X
.o.--
• • r • U
··-•.ro.-
-r_.~ ~C! .........~ . . ..~ ..~ -·----- ·-- ~ · ~ - ~ : ~= Prdoools lltld Ports Scope Advanced Loc~ Pmc!pals Remote Users
. .. - .
·- ·- ·--
A. c-..... ~.,
...-
-..... .
o-c-...-...
. ..... _
· --
-., "' - - ..... •·-......'- • -•-
- .. ..,.._.........._.. --
.,
"
"'"
"""
-
-
...
...
01'.....,.__ • _._
O'ofOOW.-- . ...........
G.neral Progromsands.me.. Remot~.,
--... .. --
1\C_,....,.. "' .....
• ._,_.._ · - - """ - ..
.._.. . . .
Ct'.,-:~J "f' - ......... Generol
.. ....
.._ ..... ~., Nomo·
~- " - - . . . . ...... ..."" ~-
- .... - ,.,.,..........._ .
~.,_
• '-'l.olo.
1-
•c.--
• '--
O t-.t.... - ~ """""' - ._...- _ -- ~-·~-
_ ,_ ar_.o--
- eo.- ~i=: '-'-
. ...... ,.~=:i
0 '-W.. o. · .-~
•c----..
- ~ ...........ce-.. -. . - ~-
cr.,....,,..,_
e oc-.~UM ~ ..__ ~- ·
Oik_o-<-_<- -
1 .·--··--
~·-
·-
.0 _.<~
0 ~
O t~.C"
• IIMIN(I"'
'"o
"-
-·-,··-
...,. t -•-
""-".<AW"'-
·-~~.,-
ar.,-.-
~,._
~·w. ....
Action
...; 0
••---f
~,. (~
N.aw the connedJcc1
---f
.,.._.,...,._,
CI -TWI-f o ...., ..._ "._., ~.-
__
0'1••••M•·-·-
'\ 1/ 0 N.aw the connedJcc1 Ills secue
0!'_,_,._
c.--·(1(-
e ~touO.I
. .
!!;'_,_
. . _
Ql_..r,. , _ _
·----
. , ...._J
"'~
r.-.-'-cac:w.o ~.,_ ...._
.,....
""'-""' ,.,_,,_
~,.-
Q'.--
.
... . . . .
.. No.-'\lly
....... 1\r
- - -- ll.'---
c. <-<! 0'_.._
~-
................................................................
j r • .,... n ~· """" """ •- ..
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• .
STEP7 The properties of each firewall entry allow a greater degree of STEP 10 Similarly, the Outbound Rules link will detail the various
control for that particular program. You can change the name of programs that are allowed to communicate from your compu ter
the entry, allow or block the connection, define the physical location of the to an external destination. it's good practise to familiarise yourself with the ru les of
program on your computer, allow access to the program from remote the firewall, as a rogue program will need to set a rule to communicate. You can
computers, set the protocol and port number it uses and even which network then block that rule and stop the threat from reporting back.
controller to use. (# -
J.k £et- .._ Het,
.... 1.-. m .- Ill .,.
- --
V
-
O •tMO...a.z....cv-ofto.l4l.U11.0)'£-t..- ~ ••..,ft.z-V'. .J.i- AI ~'
--- ,.,·~
..,..., ...,.,
Pot<p- t.<.. ,.. ..
--
G O!W-.1'--'II•,.......u.lr,lll 01-.t'~ M ....
.., ""'
.... ...
0 ~W'-lAO. .. ~W'"I01(4. M VU
·~
..,..,...._..,""
• fio..,t
·--..,
o .....,.r.oon« (ltP..a..(i ...,..,..... oema.. 'l't$
G .,letM~ ....,..AM... o.o-.. ""'
-- ...
Vu
.... ..."'"'·~
TCP V
o ~,_.lou ~P.$Mr o-- '-
..,.., ""
....., ,.,""...,..,
6: O ,...C*IIIK!Of ,._ceMK!Of M ves
o..,_.., ~- ...- ,. v..
0 '-ly(...,..w.o,• c....,r"... 'IMt~ .. ~
-
0 c-..(,,.._ S... S.,., (_,. C•IM $,,lit S. M "a
H. Pons o
0
f)
c.m~
Cdto0rn
{al i. ~C
n
c i1<~.,_(
-
....,~
..,.,.
"
,.~"-
.. C."IOt-icf~
Urstoae. c t~
M
,.,.-lk.
,.,.-.,. \'u
,....._. ,.. -
...... - ... ·-
... -""
"'•
te.
~ - llo
·~
·~
.__ ...
.,..._..,
-- ...... .....,..,...__..,. ..,
O to.n o~·-,n t 1 0.C ~
e.ao.ie: 80.443, 50(1}5010 ...,_ ..,..._..,
..
0 .I0MtC c~- (1.7 P· 1m. C.IOtvl~
,._ ·~
NPoltS V
0 C. 1 0~
oc- -•-"''~ C...IOO...OCc._,_..,.;
,..,_.. .... ·~ ..,
o c......... c...,,_,
,.
......
....
V.. ,.,
O c-~ 9 - 0NSt\IOP.U t c... N.........,
---- ·~
o,.."""''"'"C41"'--
9 -G-. OloiCyJ,WS. -
'-"~
c- N---.,
M
o..m.o.. v.. .... Vu
,._ ""'
·~
·~
,.....,.._ ""'
- ... - ...
W"""' Contrd Messao• Pottocol o c... "~-,. c~"
~ MP ) setr>o · G c.,~ c._. "-'cy(SCf' 0\lll c... tl~ ...._ ,.._ "'·~ ..,
0 , . ... ,~.
& Co.tl~·
· · -"""......... , .... "......, '"
- - " '0 ('.,Net~
ftmPSntP-o..ol)
1'11.41N Ou(l
'"'"""'""""""'
c... tl~ ,. ... "'"
•
a ecur1 an
Asecurity plan will help you form a better strategy when it comes to tackling your Windows and
home network security. Agood plan will help keep on top of backups, updates and possible areas of
weakness that malware or hackers can exploit.
An effective security plan should encompass the whole of your network, vvhich includes Windows computers, Android and iOS
devices, your router, any powerline adapters, Wi-Fi coverage, access passwords and even where the Ethernet cable runs through.
lt may sound a little extreme but like most checklist-type scenarios it can be as in-depth as you like.
However, it's worth at least considering some aspects of the home network and overall security
before starting a plan .
• • c:: ,...
Users Updates
More than likely the 'user' is the most Obviously a must-have section of a good security plan is to regularly
vulnerable point of access and the check for system and program updates. Thankfully, Windows 10 and
biggest security threat to any system most security suites INill run an automatic check whenever the system is
or network. Whilst you can have the greatest powered up and connected to the Internet. However, there's aIways some
AV suite and water-tight security system point where an update failed to initialise for some reason or another.
in the world, the user who carelessly visits Therefore, it's often best to manually check.
unbeliveableandobviouslyfakedeals.com is the
Consider too checking for updates for the most frequently used programs.
one that's going to cause you the most headaches.
"Users form Microsoft Office, GIMP, your browser and even games will inevitably have
In a home network that's often youngsters, those
the most an update available which can enhance, protect and improve the security
who don't quite understand the whole Internet
vulnerable of the program. After that, make sure that the other installed programs
security element.
point of access on the system are up-to-date too, as it's best to make sure there's few
for security on Whilst most youngsters are more tech-savvy weaknesses as possible.
any system. than us adults, there's an age range where they'll
Educate and happily click a link from a friend or something
make sure they've seen that looks cool. Therefore take Programs
they're safe." the time to educate and frequently check their ltcan be difficult to keep track of what programs are installed on a system
accounts or computers for anything suspicious. but it's not impossible. If you're serious about the security of your home
If possible enforce limits to their browsing network and its systems, then taking stock of what programs are installed
and regularly update the browsing rules to on each system is worth doing
make sure they're not going where they
shouldn't. Remember, it's not just viruses Running through a checklist of installed programs you may notice one
that a child can download, they could that shouldn't be there. A quick lookup of the program may reveal that
potentially see something that would affect it's a popular backdoor for hackers to get into a system and the attached
them emotionally. network. That being the case, it needs to be removed and any firewall
entries checked and disabled.
UPDATE
'Ci
·--·--6
Backup
Routers Backups
The family router is the first point of access for anything malicious on the network, We'll cover backups in a few pages time but for the meantime though making sure
since it's the gateway to the outside world. Make sure thal the router software is up-lo- Lhal each account and computer is regularly backed up can take much stress out
date and that it's using the best possible wire less security standards and encryption. of a security situation. If you're unlucky enough to catch a virus or other malware,
or are unfortunate enough to be hacked, you'll need to act quickly to prevent any
it's also beneficial to make sure that the router's admin password and access
loss of personal information. This usually meanswiping your computer corn pletely.
passwords are hidden from sight.ltdoesn'ttake much for someone to look through
thefront window and make a note of a router password that's carelessly on show for Having a good and reliable backup solution will help you recoveryourvaluabledata
all to see. Consider too, that not all visitors to your home are going to be chivalrous in no time, should you ever need to wipe everythingor all your data iscompromised
towards viewing your network password. through malware. it's also worth thin king of investing in a fireproof safe to storeyour
backups along with cloud options for off-site backup security.
it's also worth tracking the range of the wireless signal from the router. By installing
and using a good Wi-Fi scanner on a mobile device you can tell where the Wi-Fi
signal from your router lies beyond your home. Whilst it's good to have a powerful
signal, it won't take much for someone to sit nearby with a laptop (or a neighbour)
Cabling
and hack into your network. A Wi-Fi analyser will help you determine the best it's not always something you need to check but ensuring that the home's Ethernet
placement for security and more efficient use of the signa I. cabling is secure is an essential element to network security. For example, if you
live in shared accommodation, it's possible for a neighbour to be able to be able
to connect to your Ethemet cable and steal your bandwidth or gain access to your
Passwords network resources.
it's not common for a home user to frequently change their password to the same If you can implement all or just some of these elements into your plan, you will be
degree as would an office worker but it's certainly something worth implementing. well on the way to making sure that your home network is as secure as possible,
Using a combination of a good password manager and generator, you can set a 30- without becoming too paranoid over potential threats from outside sources. After
day password limit for all users and their access to the sites they visit. all, you lock your doors when you're not at home so why shouldn't you lock your
network too.
lt might sound like an awful lot of hard work on the part of everyone involved but
weak passwords and the same password being used across Facebook, banking
and gaming is a huge security vulnerability.
•
ows ecur1
Taking the time to write down an effective security plan for your home
network will pay dividends in the long run. With it you're able to spot
potential leaks in security, secure your home network, Wi-Fi and
powerline adapter technologies, and ensure digital peace of mind.
Rogue
D Installed
and Ap p
D Router p assw ord and Program ork for its list
our router's a d m in
m p u te r o n the netw
Make s ure th a t y
c ure, un viewable Check each c o
e's a n y th ing in there
a s e ms. If the r
ords are in they come p ro g ra ve it if
access passw th em w h en of insta lle d
t, research it a nd re m o
visito rs can't see s n 't lo o k rig h installed
plac e . S o that doe ote o f the p ro g ra m s
e. a k e a n mpare
into your hom necess a ry. M
n ote } a nd c o
c re e n sh o t o r physical
{as a s
curity nt check.
D
e
Wi-Fi Se them with e a ch fr e q u
e Wi-Fi is
router and ch e c k th a t th
rd Re s e t
Log
us
in
ing
in
W
s
to
PS
fo
y
2
r
o
.
a
u
T
n
h
y
r
en check
ano
th e
malies. If
c
y
u
o
r
u
re
u
n
s
tl
e
y attached
a n yother
ck it's still
D Passwo
re
y
g
,
u
pa
la
ss
r
w
,
o
u
rd
s
re
u
set. Each
ally 30-<la e t all their
device u b le c h e Set a able to r e s
r security, d o u s e r should be e sure
form o f route te s ca n re s e t routers. ind ivid u a l
ry site they visit a n d m a k
s upda fo r e ve g. Use
functioning a passwo rd s
s they're u sin g are s tro n
o rd
osition in g that th e p a s sw
ger and pa ssw o rd g e ne rator if
D
u
Security regularly
up
b
a
a
W
ck
in
e
d
d
ows 10 c o m p u te r late
th
r on. Back
e backup
tivirus ba ck k e ep
eck on any an
update ch o rta n t d o cuments an d
sing a
u n a s im ila r -party security up im p s id e r p urc h a
R
c lien ts o r other third
s om ew h e re safe; con
clients, VP N copy
tions.
programs an d ap p lica fireproof safe.
Ap p U p d ate
&
D Prog
Run
ra
a
m
ny u
frequently use
p d a te
d
checks on
r th a t, run as
s. Afte
gra m s an d a pplication o g ram s on all
pro e d p r
p da tes o n other install
many u
rs.
your compute
•
IS a ox?
Sand boxing is an important security technique that's used by companies and individuals the world
over. lt's not something the average user will normally come across but you can guarantee that every
piece of software you use has been sand boxed at some point in itsdevelopment.
Just as the name suggests, a sandbox is a place where you can do something different elements, both hardware and software, that work together to make up the
wi thout it affecting the surrounding area: visualise a sandbox in the middle of computer that you've customised and personalised. Adeveloper, security expert or
a garden. In digital security terms, this means a sandbox is a tightly controlled software tester can never hope to create something that works 100 percent with
environment that's isolated from the main operating system where a person can every Windows 10 desktop system that's out there.
test or analyse software and its impact on a virtual system.
it's generally accepted then that when testing in a sandbox it's advisable to use
The sandbox can be one of a number of implementations: web based, operating as common a hardware and software setup as possible. This way, the developer
system based, program based, network based or even emulating interaction with will likely create a program that works on as high percentage of the computers
the Internet. There are countless more examples, each depending on what exactly available. Those computers that differ from the norm, and that may require a little
is being tested and what functions are required to complete the test. more work for the product to install and work on, can then be dealt with through
minor patching and bug testing.
For security, a sandbox is usually an extremely isolated environment that doesn't
have access to anything on the company network, or any contact with a host So what's this got to do with you, we hear you say. Well, there are ways in which
machine. Here the security expert is able to conducts tests on untrusted pieces of you can create your own sandbox environment to test in. Consider how many
code, known malware and viruses and even website content. Should those tests times you've downloaded software from the Internet and executed it without
reveal something nasty within, the security expert is able to work their magic and even examining how it may affect your computer. How many times do you visit
develop a fix that can be further tested and finally deployed to the company's websites and happily click on whatever message may appear without even reading
servers, where it's downloaded as updated virus definitions by the security suites it properly. With your own sandbox environment, you can download and install a
and applied to a customer's compu ter. piece of softl.vare and see how it runs within a test setup without it ever impacting
your real machine. If you get into the habit of testing every bit of software in a
Imagine that from the point of view of a hacker, then. The hacker has developed
sandbox first, you'll certainly be glad should the day come you discover a hidden
a particularly nasty piece of code that could bring down government agencies
virus in the folds of an otherwise harmless looking program.
and cause widespread panic among the global digital community; they're hardly
going to test it on their own computer. They need to create a sandbox environment
whereby they can trigger the malware, ransomware or wha tever, and let it run
its course. In the meantime they can run through various procedures
to try and wipe the malware, as a security expert would, to find any
weaknesses. Once they've perfected the malware and wiped out
any perceivable vulnerabilities, they can then happily upload
it to the Internet and sit back as the world is infected with
their code.
it's not always the testing of malicious code tha t's Using a virtual machine as a
associated with sand boxes. For example, the words
you're reading now were written using Office 365.Miord sandbox is a great way to test
2016. Before the product was released by Microsoft, the
development team behind Word wi 11 have gone through
extensive testing, making sure that all the individual
programs for every version of
components within and that make up Word 2016 all
worked. To do so, they will have used a dedicated and Windows, notjust the latest
separate environment to the one they're using to program
on. This specialised environment will have mimicked a real
world setup as much as possible, so that when the developer
wanted to test something they could compile the code and
execute it in an environment that wouldn't affect their normal day-
to-day workplace.
The often severe lockdown of a sandbox system does make it difficult to emulate
what the average user rnay be using. The standard desktop computer has many
Empty Space
• Windows, Program Files
and Documents
• Hew Content
SandbOX
. t." <><>
Proortms C::J i/f
0
saooboXIe
"Virtual Box is considered to be one ofthe leading
and easiest to use virtual machines, where you can
create a sandbox environment to test in."
www.sandboxie.com
"Sandboxie is an environment
designed to allow you to test
programs without them being
installed on your computer."
Cl
~ ~
""""'
-
Windows
98 (C:) fj [J 0
........... "'-
_ -
,..,.,.
=---
.:J
...... -
0 CJ
l4flfl
-fl-
......l"'l II11l li1lJ NU#"rtl
4t:t f AI
H't U 11
4t'f
.~,!M
•
unn1n ows
as a
We've already talked about how a sandbox works and essentially what one is in terms of
computing and security. However there are many advantages to creating your own virtual sandbox
environment. lt's not always purely to test suspicious code, as you'll soon discover.
Control Panel
~ P01t.s Mouse
eJ ~
Oesl<top
a
l(eyboald
Q
Pll"iera:
~
"
llle
0 This will end your Windows seuion.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
HOST PROTECTION If you think that a download link oremail SOFTWARE TESTING If you're serious about your security and the
attachment may contain a virus, then opening safety of your home computer, then you
it in a safe, virtual environment is the safest bet. Of covrse, yov shouldn't open should be downloading and installing software in a test environment first before
any unknown email attachments but if you need to, do so in a sandbox. The applying it to your real computer. Avirtual environment is a great place to see how
virus will infect the sandbox and not the host (real) computer. software works and whether it's worth installing or not.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
VIRTUAL OS The beauty of a virtual environment, such as one created SAFE DEVELOPMENT If you're considering developing your own
byVirtuaiBox, is that you're able to run Windows, macOS software and apps, then using a virtual
and Linux operating systems on top of your host operating system, whatever environment is an ideal place to test the code as you create it Should a function
system that may be. You can install Windows 10 within a virtual environment you've written have an adverse effect on the OS, then you won't damage your
whilst using Linux or macOS, or vice versa. working system.
PTograa Check_ Oroup
uso cryst.log~p h ic sy~otr, only : Spaco G%oup Typo, sot spacogroup
use roUoc:tions utilities. only : Kkl ~sent - -
use Syamot ~y Tables, only : sp~
-
info7 Set spqr Info
-
••••••• t o•itted for s i~ l1 ci cy
cdl Set_ Spgr_ In£ot 1
d o 9roup: do i•il,i2
~ djuatl( lpgr info ( i ) , HH)
hal l=spgr info (i)\hall
U( hlll.s( l 7 t t /= ..P " .and . . not . cheek c ent ) eye-le do group ! SU p oe ntre.d gr-oup!l
call se.t_ spaC'egroup (hall , Spacegroup, rOree_Mall:"y .. ) -
do j = l , nhkl
if(goad( j ) ==
0 ) cycle ! Skip r a f l ections tha t a r e n ot good (overl ap ) f~ cha cltin;
absent=Rkl_Absant{htl ( :,j } , Spa cegroup)
i f (absent . a nd . i nt•nsity( j ) > threshold) cyol• do_group tGr oup no t a llowed
•nd do
I ••••inQ h•r• .... , t h&t •11 rf l c~ i o no ar • • l low.G in th• ~o - > Po o•ibl• vr o~ p J
-=--••1
nWI_group(• •=i
•nd do do _ gro~p
wrice(unit;;;• , tat;;• ) "=> LIST OF POSSIBJ.B S-PACE OROUPS, a Ultlll o ! "' ,m, '" Qr<IUPI are poso ible'"
write{un ~ , lat5• ) " ..........................,............................- ..... - ......,........,...............,............._ .... ..
write(unit=• , tat;;• ) " IWiber( IT) M eru.n·Ha~ i n syabol HAll Syarbol"
write(unit-•, r.t-• ) " ------ ------ · - - -"
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• do t • l ,m
j•nua group U J
hm•,.dju•tl(spgT into (j )%HH)
VIRTUAL BACKUP it is possible to create a virtual copy of a physical bel pgr_info ( j)~hal
numv-sp;r_info (J )\W
machine. This is an excellent way of making sure
that the entire machine, that isa snapshot of the OS as it was when copied, is safely ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
backed up and accessible regardless of what operating system you choose to use. FAMILY FRIENDLY Ifyou have a single-family computer, a virtual
environment is a great place for the kids to go
without fear of them potentially breaking the system. lt doesn't happen often,
/ kids are mostly more tech-sawy than adults but little Angers do have a habit of
clicking things they're not supposed to. Virtual environments can be backed up
and redeployed easily.
I
~~
I.. :--:
- "" I
:;>
•,
•
~ ~:g ....... . . .
-
• - -- - - - I I ................
.. .... .... ..
t I , f f
, ' . . , •• • • • . ,
• • • • •
I I
• • • •
. ,. I
' I ' lj I t '
Jff '
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ann
What Next? You c an Help!
Toe • !<>"OT. 1011 .-4 IObtowtt Tbe.:r a t 1111111)' ~ " ,-.ea bdp nub die T«
ICla'Jo!OU ~"' \'QU - - ntet. dl•p - Mtwoct r. - mol m~
,.... ~ ,,..ldftll:lv
blta to ftl!ll.llf
(I(
• auo • n. at~r,> Xodf •
U'<"J "'- ~
.
· ~YSem;
~.o- .
Thr Toor ProJ«I • • l'~ ~OI(C'B) M01'"'1it dedicn1cd rro 1hco rt!l(:trth. ~l'opmrt and
~"ation of oulint MOd\lMy •rtd pri\-&c\:. L~am mort abo\n Tht Tor Pro_M:cc
Oracle's VirtualBox is one of the easiest virtual machine platforms for the beginner to experiment on.
Within it you can install Windows, Linux and even macOS for sandbox testing, without ever having to
alter your main computer's setup.
Going Virtual
Using a Virtual Machine (VM} will take resources from your computer: memory, hard drive space, processor usage and so on. So make sure you have enough
of each before commencing.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPl The first task is getting hold ofVirtuaiBox. If you haven't already, STEP3 With the correct packages downloaded, and before you install
head over to wvvw.yjrtualbox.or:g and click on the large anything, you need to make sure that the computer you're using
'DownloadVirtuaiBoxS.l' box. Thiswill take you to the main download page. is capable of hosting aVM. To do this, reboot the computer and enter the BIOS.
Locate the correct host for your system, Windows or Mac, the Host is the current When the computer starts up, press the Del, F2, or whichever key is necessary to
installed, main operating system, and click to begin the down load. Enter Setup.
VirtualBox
Welcome to VlrtuaiBox.org!
·~ ;~ .....-fll .., .... oiiNOf4flll-- ~:. ......~- " .............., _.... odv -~ ril:h. ~ *" •W1wlh• .. ,._,.,,
--
- Ol'f¥ toeole•aet!olltoei!AoOII Nt• ...... ..,.,..... K CiHtl to...c• SO""'w. """" II W - ef IN c:-..c.-1111\A* I.IC- (Qol,}- L S.. 'AN
--
~ - v~., on~"._ ..-4 ~-' n ~' ;~otg.e 'oPOf:t 01 ~ -""""""...., ~ 11vt I'OC '-*
7, .....,.,....,. .. Ylrlolooot.IO). ~- l .o, ....._ ( J ... J .t., J.> -.t~ . o),. , . . . . . . . ~.-;, 0$,/1, Md.,.....
._,-~ k~
_,_. tltl(_f9W,,_..,.....
.......__,...,....,,...,.... ~' _ , h"l ,.._. "'~ ~ .,,,.._._$, "1'~4 ~., ~- "OIM..,...,.Itt
s1
~lf-· ..tq ~- .,~ -~tf ~,.
Download
VlrtuaiBox •
Hot pk:~
. ..... ~o;tw-l .....~at · OI~ledt ......,._
•.....,...._(lp.w_t WW IMrt·-~_. Mt!'ltol4" f~NiK' toM
~· · 4Jit,X . . . 1~
••<K- -..-t+ll ...,..,....,
•
"to<~.'*
OIQIOO:t-
roe..,.._. · lt ·t ~'" r- c. _.... ....:« ....~IQ[.,
BdJ1 !9
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP4 Each BIOS is laid out differently so it's very difficult to assess vvhere
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• to look in each personal example. However, as a general rule of
Next, whilst still at the VirtualBox down load page, locate the thumb, you're looking for lntel Virtualisation Technology or simply 1/irtualisation:
STEP2 usually within the Advanced section ofthe BIOS. When you've located it, Enable it,
VirtualBox Extension Pack link. The Extension Pack supports USB
devices, as well as numerous other extras that can help make the 1/M save the settings, exit the BIOS and reboot the computer.
environment a more accurate emulation of a 'real' computer.
9 ...e_VM_Virtwo1Box_Extension_P<><k-S.1.1S.114002.vbox-extpodt
which is:: VirtuaiBaxExtension Pack (18.7 MS)
from: http://download.virtualbox.org
Cancel
r ackages. The SHA256 checksums should be favored as the MDS a/gonthm must be treated c
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS With the compu ter back up and running, locate the STEPS When installing VirtualBox your network connection will be
down loaded main Virtual Box application and double-click to disabled for a very brief period. This is due to VirtualBox creating
begin the installation process. Click Next to continue, when you're ready. a linked, virtual network connection so that anyVM installed will be able to
1f} Oru l~ VM VirtuaiBox 5.1.10 Sftup
access the Internet, and your home network resources, via the computer's
X
already established network connection. Click Yes, then Install to begin
the installation.
Welcome to the Oracle VM
VirtuaiBox 5.1.10 Setup
Wizard
~ ~tup Wl:uord wt11nst!l Orac::lt. VM VirbJaiBox 5.1. 10 on
Warning:
your computer. C5ck Next to continue or Cancel to eJOt the
~tup W1221rd.
Network lnterfa•
Installing the Orade ~ / M VirtJ.JaiBo
f eature will reset your network o
disconnect you rra>m the· netvvork
STEP6 The default installation location ofVirtualBox should satisfy most STEP9 You may be asked by Windows to accept a security notification.
users but if you have any special location requirements click on Click Yes for this and you might encounter a dialogue box asking
the 'Browse' button and change the install folder. Then, make sure that all the you to trust the installation from Oracle; again, click yes and accept the
icons in the Virtual Box feature tree are selected and none of them has a red X installation of the VirtualBox application. When it's complete, click Finish to
next to them. Click Next to move on. start VirtualBox.
1f} Orad~ VM VirtuaiBox 5.1.10 Sftup X
Custom Setup Oracle VM VirtuaiBox 5.1.10
Selct~ way you want featr..1'6 to be nstalled. installation is complete.
Oick on the Icons n the tree below to change the way features wil be instaled. C5ck the firish button to exit the Setup Wizard.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP7 This section can be left alone to the defaults, should you wish. it STEP 10 With Virtual Box up and running you can now install the
simply makes life a little easier when dealing with VMs, especially VirtualBox Extension Pack. Locate the downloaded add-on and
when dealing with down loaded VMs, which you may encounter in the future. double-click. There may be a short pause whilst VirtuaIBox analyses the pack but
Again, clicking Next will move you on to the next stage. you eventually receive a message to install it; obviously click Install to begin th e
1f} On~cl VM VirtuaiBox 5.1.10 Setup X process, scroll down the next screen to accept the agreement and click I Agree.
0
Custom Setup
r '1 1nP 1-tdp
Select the way you want featr.xes to be installed.
7 X
0 create start menu enbies
I~ Yw•e lbQu{ 1011&tal' WQ.Iallox tmnsiOnpadt. ~
V' packs~ t lhe ~yo(Ytl.dxnca
0 create a shortcut on the desktop conl!in S'f5tem level :oftw«e tha.t could be pote'l~
to YrA.' mttm. Plu&e: tt'o'tW flit~
hennfU
bdow ¥Id ortr
l)'l)(Hdlf voutt.M, obtai'ltd 1ht t)(tefflWioact IT'Oflla
0 create a shortcut in the Qud< Launch Bar lru=~b:d sosce.
Name Ol'ad!VMW~J<EtsicPk
•
ows
•
Installing Windows 10 within a VM carries with it a clause: you need to make sure you have a valid
license. However, if you're testing something then you can use the Windows 10 Enterprise Evaluation
image, which will last for 90 days.
Window Installations
Naturally you might own a spare Windows 10 license to use for the VM butforthis tutorial we're going for the 90 day Windows 10 Enterprise Evaluation model.
To begin with, browse to https://microsoft.comjen-usjevalcenterjevaluate-windows-10-enterprise.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • ••••••••••••••••••••••••••••••••• ••••• •••••••••••••••••••••••••
STEP! You need to register with Microsoft prior to being able to STEP3 You need to set an amount of memory from your host computer
download the Windows 10 image; simply click the Register to use as virtual RAM for the Vlvl. Naturally, you don't want to take
button and fill in the required fields. When done, click Continue and choose the too much as your compu ter will suffer due to low memory when the V!vl is
ISO Enterprise option, then your language choice and 64-bit, followed by the running. Ideally, you need to allocate around 2GB of memory to the VM. Click
Continue button once more to begin the download. Next when ready.
,•' .
··-·· '··-1· .-
-·~ ·-~
I
\'
1 ~ '
,.-~r'<
, • •
-~
•, • I '
·-·\-.. ..
.
~ ·:. _ -.:·~ ·-~ . . }
Select the amount of memory (RAM) in megabytes to be alocated to the virtual machine.
0 _, .....
W u,.l( frh ~
--·--·
(j)
lht! r~ menory sill! is 2048 MB.
)
-·----·---
··----
·----
--- 4MB ' 8192 MB
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
- -·--
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 The ISO you're downloading is around 4GB in size, so it may take STEP4 The next section will enableyou to create avirtual hard disk, in
some time, depending on the speed of your connection.Open which the Windows l Ovirtual machine can be installed. The
VirtualBox and click on the New icon located in the top right of the main VirtuaiBox default option: 'Create avirtual hard disk now' is recommended, then click the
window. In the Name field enter Windows 10, thisshould automatically change Create button to proceed. The pop-up box will detail the type of virtual hard disk;
the Type and Version fields accordingly. Click Next when ready. stick to VDI and click Next.
0 "•
·-
•
X
I >
Tnxt; ! Maosft~5
Yen~o: [wl'lelowt ~Q 0 uonot«<llowWnar'CIM.
@ ONtc"'"-'II!NrdOst,_
0 ~ ~'otl"w>i ..
~ - •
o.... .[_ ColtiClll
STEPS The default Dynamically Allocated option will suffice for this STEPS The Windows ISO will now load, and begin the installation
instance, so click Next. VirtuaiBox recommends that you process. The first options you need to set are the language, time
allocate 32GB of physical hard drive space to creating the virtual hard disk. and keyboard. Set your preferences, although the default is English US to begin
Make sure your hard drive has enough spare capacity and click the with, and click on the Next button when you're ready to con tinue.
Create button.
0 "
••
" • >
'
File location and site
Hard disk
~ t'IDl' f i e - oi 111e new......., 111t11 cW: fte WD lhe bolt...,_ Of~
k rte m.
")lWliW'I vw c.~d
_ .....cl .... l'ielll ~-
•~
r.~
... to "" ~
....... h .. _.,~
...ct-nt. 'f'ou Wl eihr 0-eMe •
lht!"'=r <~n.
on k ll:lli:lerlr:on 10 tdecl• dl':fetenl td:!lr CD cr c:~1e
' ,...,,
---------'. a
• • ••••••••• • •••• • •••••••••••••••••• • ••••••••••••••••••••• • •• • ••• • • •• • •••••••• • •••••••• • •••••••••• • •••••••••••••••• • •••••• • ••••••
STEP6 The Windows 10 VM is now listed in the available VMs in STEP9 You now have an Install Now option available. Click it to begin the
VirtuaiBox. Before you begin to install it though, click on the installation, then tick the license agreement box followed by
Settings icon whilst the Windows 10 VM is highlighted. In the General tab, click Next. There are two possible options to install Windows 10, Upgrade and
Mvanced and enable Bidirectional for Shared Clipboard and Drag 'n' Drop. In Custom. Since this is a blank hard drive, the Custom option is the only viable
Display, enable 3D and 2DVideo Acceleration. Click OK to fin ish. mode. Click it to continue.
e "' .• . 1J s.ttong
' X
Gmonl [Display
Syst•m
~ StorJge OMS
Monitor COU1l: '
~ Audio
8
rlfJ Network Seal~ factor: '
1' 100
- 'llo
---,fD""
.
IOO'llo '
200'llo
~ s~na l Ports
Acceleration: 0 Enable X> Acceleraoon
r; USB 0 Enable: a:> Vld~o Accderation
Shared Folders
User Interface
01( Cancel
STEP7 With the Settings console window closed, and the V!vl highlighted, STEP 10 The drive available will be the 32GB virtual hard disk you
click on the Start button. Thiswill open a new window, asking for crea ted. Click on the New button, then Apply to create a new
the location of the Windows 10 ISO you downloaded from the Microsoft site in valid drive that Windows 10 can be installed on. You'll be asked what additional
the first few steps. Use the folder icon to locate the ISO and click Open, then the partitions will be created, click OK to accept. Choose the largest partition size and
Start button to commence the installation. click Next to install Windows 10.
? X
Where do you want to install Windows?
Select start-up disk
Please select a w-tual optical dsk life or a physical optical 500.0 MS &83.0MB Syrtm~
drive contalring a dl!lt to start yoor new Wtual machine
from.
ows
One day the testing process of a Windows 10 VM will inevitably leave the system in a broken or
malware riddled state. You can wipe it and start again but a far better solution is to create snapshots,
so you can easily revert to a previous build.
Take a Snapshot
Setting up Windows 10, installing the drivers, updates and programs takes a fair amount of time. Ifyou take a VirtuaiBox snapshot, you can return to where
you left off in an instant.
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP! To begin with open Virtual Box. If it's already open, shutdown the STEP3 You can see that the state of all the virtual systems is currently
Windows lOVirtuaiBox image you created. it's not necessary but Powered Off. To create a Snapshot of the Windows 10 VM, click to
it'soften easier, to ensure theVM is dosed prior to crea ting a snapshot. highlight the system's entry in Virtual Box, then click on the Snapshots button (it's
IF q - w a camera icon), located to the far-right of the VirtualBox console.
X
0 0 • . .. '
~
N:.ne:
oi "'S,.kal:
~10
~ 10~)
oe '*·
S.~r- »SIMS
Pt<w:eo•n : 2
8oot0 dert ~ . C»ta. I. Hran:I D* ~ r_j ~ '!. ' "' H iool HATf
AttltltralliOn! vr"(jNCJ"'I, ~ Pagin , ~ ·Y '-'lJ W ~No«
~.M'\1!:
!lJ ~,Uy
Vdfo foiMiclry! 128 MS
A~riOn: 20~. XI
R eno~: l) ~!fed
VdeoCepo.rt: D~bled
• • ••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
A Snapshot in ~ Ubuntu (SMpshot 2)
At present there aren't any Snapshotsof Windows 10 available. To
STEP2 la:] @ Power~ Off STEP4
VirtualBox is create one, click the camera icon just above the words Current
simply an image of what the ~ linux Mint Onnamon (Installed and Updated) State, the icon at the opposite end of the sheep icon. Thiswill launch the Take
la:] @ Power~ Off
virtual machine 'looked' like Snapshot of Virtual Machine console window.
at the time the Snapshot was ~ linux Mint MATE
taken. You can make multiple la:] @ Power~ Off
h ' h
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS If you want you can name the Snapshot: Installed and Updated STEP8 If you click the Details of the named virtual machine icon, the one
fo r example, along with a description to help identify it easier next to the sheep, represented with an orange circle, you can
from the other Snapshots you may eventually end up making. lt's not hugely view the VirtualBox settings of that particular Snapshot Thisway you can assess
important but if someone else wants to load up Windows 10, they know which any issues that may arise with other virtual machines; here you can see which
Snapshot to go for. When you're done, click the OK button. settings worked and which didn't
...
L
0 "
•
....... 6ii !Snaoshots (
'"''
ju.. ~ ~ (#
.,... I " I
" 'ti tftliUIH 1M U,UtM 13 lfl'linutn 190)
'ill !il ~ !n-;r «>• ,., •••
'" • "
--
Name: l ~n!td _J
bn l~ : 08:11
c.:t.Q;-
-·
!S , _..
OS TW-!
,_
,..,..
....
'M'd:l.. 10 (6401)
i
STEP6 The process happens almost instantly and you're left with an
entry in the Snapshots section detailing the named Snapshot,
how long ago it was taken and a Current State entry. The Current State is literally • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
its state when you boot it up. With it highlighted, you can take more Snapshots STEP9 You shutdown the guest system, as mentioned in Step 1, but
by using the camera icon again. Virtual Box guest doesn't need to be shutdown in order for a
l. Snapshot to be taken. For example, prior to installing an experimental program,
click the Machine entry in the VirtuaiBox top menu bar and choose Take
0 0 •• Snapshot The process works the same way as in Steps 4 onward.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP7 If you click the named Snapshot, you get more options available STEP 10 Each Snapshot taken can easily be reverted to, cloned, deleted
in the toolbar just above. Here you can Restore a selected and so on. However, Snapshots are stored by default in the
Snapshot, if you have multiple entries. You can Delete a Snapshot and view Usersjusernamej\ii rtua IBox VMs folder in Windows. If you've only a limited
detailed information regarding one; and ~ovith the sheep, you can Clone the amount of space on your C:\ drive, you may want to set the path to a bigger hard
current Snapshot as a new virtual machine. drive in the File> Preferences option in VirtualBox.
0 X X I
•
••
•
...
I
, ._
f.ll _
I bnnlio!IJ
ows
•
ecove r1ve
Since Windows 95, Microsoft has offered users the ability to create a recovery drive, which is used to
help troubleshoot a Windows PC that is failing to boot, by presenting various options. If you haven't
done so yet, you ideally should have created a Windows 10 recovery drive.
Time to Recover
You need an 8GB USB drive minimum, in order to successfully create a recovery drive. lt wipes the contents off the drive and you won't be able to use it for
anything else, so make sure it's labelled and stored in a safe place.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP! Insert the USB drive into your PC and close the Explorer window STEP3 There's a short wait as Windows analyses the available locations
that opens upon insertion. Click the Windows Start button and where it can install and create the recovery drive. Eventually,
type recovery, then click on the Recovery Control Panel. In here you can see providing you inserted the 8GB plus USBstick prior to starting the process, you're
several options available; you want the first, Create a recovery drive. asked to select the destination from those Windows has discovered.
ill you ' r~: ~ prnblnm with your PC, go to Setbngs .nd try re-.Kh"9lt
Available drive(s)
l... F:\ (no label)
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 Click the Create a recovery drive link and accept the UAC STEP4 In the example we have here, there's just one possible location, the
authentication message that pops up. First, there's the option to F:\ drive. If you have more than one possible destination available,
backup any important system files to the recovery drive, alongside the usual make sure that you 're selecting the correct USB drive for your recovery drive. When
recovery options. This is a good idea as it can replace these vital files in the event you' re ready, click on the Next button.
of a boot failure. Click Next to continue.
Even if your PC can't start. you can use a recovery drive to reset it or troubleshoot problems. tf
you back up system files to this drive. you'll also be able to use it to reinstall Windows.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS Before committing to creating the recovery drive, Windows wi11 STEPS Store the drive in a safe place, as it can restore vital system files
offer one final warning. Remember, everything that's currently should anything ever go wrong with your system and leave it
on the USB stick you chose as the recovery drive will be erased during the unable to boot. Should something go wrong, you see the Windows 10 safe mode
process of creating the drive. If you have any fi les stored on it, make sure they're boot options when you try and power up your computer.
backed up to another location.
+- Li Recove<y Drive
Everything on the drive will be deleted. If you hove any personal files on this drive, make
sure that you've back~d them up.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP6 When you're ready click on the Create button to start the process. STEP9 From the safe mode boot options, choose the Troubleshoot tile
lt maytakesome time, depending on the speed of the USB stick followed by Advanced Options. From there you can choose the
used, as Windows prepares, formats and copies the utilities and files over to the System Restore and System Image Recovery options along with your rescue
USB recovery drive. drive to help you recover Windows.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP7 When the process iscomplete, you receive a recovery drive is STEP 10 Alternatively, set the BIOS to boot to the newly created recovery
ready message. The only option available to you is to click the drive and follow the onscreen instructions to launch the
Finish button. This will close the recovery drive window and return you to the recovery method. Start by choosing your language, then select the Troubleshoot
Recovery console. option and then opt for one of several recovery options.
ows
Even with the greatest possible cyber protection in the world guarding your computer, there's still
a chance something could go wrong. lt might not even be malware-related; a broken hard drive or
other component can cause as much grief. Therefore, you need a good backup.
Backing Up
Computers are unpredictable beasts, so you need to make sure t hat all your files and important data are securely backed up and more importantly, you're
able to restore them easily. Thankfully, it's a straightforward process.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP! Windows has, since its early days, featured some form of backup STEP3 Ideally you need to insert a reasonably sized USB stick or use a
tool Windows 10 was launched with the File History backup wol, second hard drive in your computer.lfyou have a USB stick,
which is a simple to use tool to ensure stable and regular backups of important insert it now, or if you own a second hard drive power off the computer and
files are made. Start by clicking on the Windows Start button and selecting install it and boot back into Windows 10. Once done, click the Add a Drive icon.
Settings from the menu.
Backup
Back up using File History
Back up your files to another drive and restore them if the originals
are lost. damaged, or deleted.
Add a drive
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP4 Windows will search for any capable drives on to which it's able to
back up your files.When your drive or USB device is displayed,
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• •••
click the drive link. Notice that an 'Automatically back up my files' switch button
has appeared whereAdd a drive once was.
STEP2 Once in the Settings console, click on the Update & Security icon,
Settlr195
followed by the Backup option from the menu on the left.You can
see a number of possible options beforeyou: Add a Drive, More options, Go to ® Home Backup
Backup and Restore (Windows 7), along with help and feedback links.
J Find a setlmg PI Back up using File History
Back up your tiles to another drive and restore them if the orig1nals
are lost. damaged, or deleted.
Update & security
® Home Backup Aulomatlcally b3Cic up my fi!CS
f Backup
looking for an older backup? :D R.ecOVefY
If you created a backup using the Windows 7 Backup and Restore Have a question?
tool, it' ll stilt work in Windows 10.
<!' Troubleshoot 0 Actlvallon
Get help
Go to Bad:up and Restore (Windows 7)
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS From here, click on the More Options link that's under the switch STEPS When you're ready to start backing up, you can click the Back up
button, this wi11 open the Backup Options console. This section now button to the top of the Backup Option console window.
details the backup schedule, the location and which folderswill be included in .A.l ternatively, you can wait for an hour when the default schedule kicks in.
the backup; and for how long Windows will retain your backed up files. Obviously, depending on the size of the files within your backup folders this
........ C X could take some time.
0 )(
® Backup opt ions
® Backup options
Overview
Sitt ol btct>.lp: 0 ~"
Tot.tt $l*t on RtcoYCRV (t:l: 1),1 Ge Overview
V<M da~ is not ';'t'l backed UJl.
Sitt ol btdt:l.!Pt 8.76 100
Jowl $l*t on r4:covtRV Cl* 1).1GO
~up now
~ b.:lckUII: Ol/07/l(Jf1 ~
0""'
I ..,_ """'"'> - I
Back up these folders
r 1\dch toiOH
Back up these folders
+ AckJ • fOktet
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP6 If you scroll down through the Backup Options console, you can STEP9 The backed up files will be stored on the chosen backup drive,
see that the entirety of your user folder within Windows 10 has within a folder called FileHistory. Inside that folder will be the
been added by default. This includes the Music and Videos folders, as well as specific user folder, so if you use File History backups for more than one user,
Searches, Camera Roll, Contacts, Favourites and so on. their user names will be listed here too.
0 X
-.....
® Backup options
+ ......... ....V.:!
tt C),li(lt tt(IIM
~ · a. ~ ~ • Otib•• ,
~ C.\Uwrs~ • OW.nf:«<' ;
• tlm PC
Otslooo
• C:\~.bvid
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP7 At the bottom of the console window you have the options to STEP 10 Dri!ling deeper into the folder layers reveals more default
stop using the selected drive and to Exclude any folders from the folders, containing important XM L data that \JVindows uses to
default. If you don't want to back up folders for Music, Videos etc., click Add a store the chosen options. You can find the actual files that have been backed up
folder on the Exclude these folders icon, then pick the folder to exclude and click in the Data folder, laid out in the same folder structure as on your system, i.e. C>
the Choose this folder button. Users> Name> Documents etc.
® Backup options
•
VIdeos
C..'\lhii"$\Ua'M
$c""'fddco X .t ~l:,«
....,.,.,...,
®01/2017(1!loQ:)
rllcfclcla
Fw.foldel
Ilk told,.,
• •
.......
.. CII.ooclt ..
.........
u•
,
V Foldfn (6)
. Ool.l. .
:£ ..,tWra
J> -
' r....orltt$
"""
Ol"J7lllll7m:oJ
~'2!:l13C
rKfoldel
O•lcfcl:la
Exdude these folders
+ ...........
~ •
•
• Vidt"Ot
"""'"'•
Po(Curtt
OJ.'G1~7ot
owr!NI rOl03 "''"""
hliJfoltl"
~
....-
Actl .. ltlkii!"J
... ._..,,." • • o-o.;....-
, ....u
0\1(...-
- Tills PC ........
St\Otll Gtcna 0310711017 01:0)
03.'0112017 t'IMI)
0}-1)7; '21l'17 Ot.Q)
f*loldfl'!
fll. foi.S.
...· ....,..
~
Yi d~ r~etolk!
- MCOV~ (E:)
Rack up to a d1ftPrPnt dnVP.
Vtltt'll!-
.....
t hl ..1tljtU.;.tll) )'fil ii 0 11/ ..nl to...l
"new one. Thi' won't dell'ltr any N6 from
Stoo \I:Siino ~
-
- -~
~- ~
- lf(()'.'fi':VIf:l
•
_
Jl -
....
.._ •
.. -......
, ..,._ lt
fol..... ..._
Related setting$
5<-e tdv¥1Ctd )(lt~S
('hooft ..•I'*W
I ""'·
ows
Backing up your files is perfectly fine but in the event of having to wipe your hard drive and start
again, getting everything back in order can be time consuming. However, creating a system image
means you can almost instantly restore the entire system without needing to rebuild Windows.
System lmaging
A system image works in much the same way as the VirtuaiBox Snapshots. You're essentially taking a snapshot of your entire system, which can then be
restored quickly. Saving you having to reinstall Windows 10, all your programs and data.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP! To begin, click on the Windows Start button and once more STEP3 Windows will now scan your system for a drive that is able to
navigate to Settings> Update &Security> Backup. From within house the system image files. You may need to make some
the Backup console window, where you were in the previous tutorial, click on the changes to any drives according to what messages you get back from the scan. In
Go to Backup and Restore (Windows 7) link under the Looking for an older this example, the drive we're using needs to be formatted as NTFS before
backup section. Windows lO can use it.
- IJ X
.,. y. . c.... ,"', .."" • ~
... ........ ,
x '-•"r ~,.
~
-~
Backup l-l'otd- 8-.l.
Back up usJng File Hi~tory 0 t.cok • .,_,.'OMfe 1 ott YAI•t•do.o'r'N,_,• ul hiWY¥ I}..,I.J,.;i,..,t
S.XIt up yCNr l'lb to .llnoth« d ~ Mid ~ ~ them I the oriQinoh $ c...,. •~ - 0¥<0' dioc" 'Ko!
¥f tof;t. ~m.)Qfd , 0( <lelr.ed.
A tr~ao - U t lhc-~,._ ............ l t.on ob .C~ _.,
~- ....~ ........'""'"«o>IICII-....,_.YH'~I I< t.w~ ........ _..,_ _
Mtof._~ ..... C<It\l(_ ........lii M I I i t - -
••'
j . .......... - N..... -.-. ..- ....,.- - ··-(-.I_.I>NffS..
Lwki:n9 f01 cm old~t ba<k.up?
tf you created ab«k1JP using the Vr~Mews 7 8Kblp and RenOtf
1001. .-11 'it l wo rt~ ln WlndCM" ~ .
H..w a question1
"''"""
Make Windows better.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 This will launch a new window, the Backup and Restore ~1\/indows STEP4 Providing you've met the requirements, you're offered a choice of
7) console. Microsoft has kept this feature intact through 1/vindows where the system image can be written to. Ad rive is the quickest
8.1 and 10 purely due to compatibility support for backups done under older solution when it comes to restoring the image but you can opt for DVDs; it
versions of the OS. To the left there are two links, click on the Create a system depends on the size of the image as to how many DVDs you need. You can even
image link. select a network location.
• <bclB. tndloJI!' ~ 1'1 X
.,. ~ • (fl"~ P«!tl • S>,$tt11U nd SKulitf • b dtiii.URd R..slore IVfll'ld- n ••• &t Create a system image
Sock up or restore yoot fi~
~ Crutu sy?.cm wn.tgt
Where do you want to save the backup?
$ C...-t• • 'l'"'_, ••p.,;, .-..
A system image is a copy of the drives required for Windows to run. tt ca.n also inc-lude aditon~l
WW..OOW• <.,.,.,-f;no • "'"""' fo• ""' < o.,~« · drives. A system image: can be: used to re:stofe your computer if your hard drive: or computer ever
$ Sdcct ~ tud."' 10 IUtolc fks fiOfl'l. stops working; however, you can't choos-e individual items to rtSto1e.
_0 On a network location
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS For this example, let's use an internal second hard drive. Make STEP8 Once the process iscomplete, Windows will ask you to create a
sure that the correct drive (it could be a high capacity USB stick or System Repair Disc. This disc will allow you to boot into the
even portable USB hard drive) is selected, then click the Next button to continue. environment where you are able to launch the system image restore
Where do you want to save the backup? ,~ Do you want to create a system repair disc?
A system image is a copy of the driVes required for Windows to run. ft can als.o 1ndude additional w~recommend that you create a system repair disc at this time if
driv6. A syrtem image can be used to restore your <omputer if your hard drive or computer rver you don't have a Windows installation disc. The system repair disc
stops working; however, you can't <hoose individual items to restore. can be used to re- image your computer and access other system
recoveJY options.
l
On one or more DVOs
Clos~
0 On a netwotk location
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP6 The next window will display the drives that are included in the STEP9 Ifyou click Yes to creating the System Repair Disc you need to
system imaging process. In this example, the C:\ drive, the system make sure you have a blank DVD to hand. Follow the on-screen
drive and the System Reserved partition are to be backed up. When it comes to instructions and click on the Create Disc button to bum the repairfiles to the disc.
restoring the system you '11 need both partitions for Windows lO to be able to
boot up correctly. Create a system repair disc X
X
Select a COJOVO drive and Insert a blank disc into the dnve
f- &. ~ Create a system image
A system repair duc can be used to boot your computer. lt also contains
Windows system recovery tools that can help you recover Windows from a
Confirm your backup settings serious error or restort yow computtr from a systtm imagt.
Backup location:
STEP 10 Should you need to restore Windows l Ofrom the system image,
you can boot into the System Repair Disc and select the System
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Image Recovery option from within the Advanced Options of the Trouble Shoot
STEP7 When you're ready to continue, click the Start Backup button. menu. Follow the instructions and within minutes Windows 10 will be back as it
This will begin the imaging process, which can take some time was when the system image was taken.
depending on the amount of space used on the C:\ drive and the speed of the
drive you're writing to. Allocate ample time if you're writing to DVD.
Backing up (C:)•..
Stop backup
ows
•
own I
There are numerous ways and means to greatly improve Windows lO's security and privacy.
Precisely how secure and private you want to get is purely down to you. You can opt for better than
average or through these tips below, absolute extreme security.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP2 Click the Windows Start button and type privacy into the search box. TIP4 If you step away from your computer on regular intervals, you need to
Open the Privacy Settings link and turn off every option within the make sure that no one will be able to get on to it. From the Windows
eighteen available Privacy sub-categories to the left of the console window. Start button type lock and click the Lock Screen Settings link. In here sec a lock so
that only you ea n get back to your desktop once you've entered a password.
..E-·....., _ _ location
............__ ........
Looetion
• -.. lock screen
--wcr.. .
~
~- ..... _,JOa--14--WIU_II_
~:.-< -------'-'-I Prt¥1,..;
---
<.::(
8 ""'"'
.,_ ---
' .......1...
·-
"' ' - • IIWit(llo>n MNO;•tti\W'II!!IIOe!i ---H!•(IIJQII\IW
)'CM ~Xtbo!l W J ' ) l - sot"'"' CIII"Klli,.IOI 5Pid"<*11t. 9 "'""'
I ....,_
.. ,.....
o -
......
Q ·-
-
1 -~
o.-.. _ .. _ _ ......,.
'A~I(oM-Ql
.. "- ... Qfl.\lltlttl'
.,~-01'
........ lil
"' ·-
.,_,..,
f~lti.)W*'_Qr,
,.anu'"IW~
l .,tfl
., .... _
..... . . . . . . - - u lblrQI
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIPS Depending on the age of your computer, it's possible to create a TIP8 Encrypting your installed hard drives and any external devices you
boot password from the BIOS. You need to consult your use is an excellent way of securing your data and locking down
motherboard manual as to how to accomplish this but you can set a password Windows 10. Whilst it can be inconvenient, you can be safe in the knowledge that
for being able to boot into your computer (before Windows even starts) and any lost data is virtually unhackable by all but the military supercomputers.
getting into the BIOS itself.
....,..___.. ,..... r-.. _. r......... r..... "'"""........:1 ......... .., f''"'•'"":fJ._ "•- '"'•Stl........
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Removable data drives • Sitl.octer loGo
TIP6 Consider installing several add-ons to your browser to improve its u.actup (l:) Bitl.O&er off
security and prevent any unwanted data miners or rogue scripts
from being executed. Ad block Plus, Blur, No Script and other examples will ~. Cl
$
secure your browsing session. For an extreme route, use the Tor browser. ~ o;.,.,
ltiMAdnwl,_, ....,..
M.,'""'........
"'-Y~ ·
01 X
--- ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Normally you'd use a valid email account to log into Windows 10, via
TIP9
an activated Microsoft account. However, consider setting up an
alternative account that isn't linked to you. That way any data sent via Windows
10 to other sources won 't contain any personal data.
K E .COM oe Generator OHelp O Newdomaln ""' Language
e Accounts. : ) C) Wallet
Fake Email Generator with your domain
Select search J write
•
NOT insralled
I Complete I
•
OFF
Turn On c
All emails are diSplayod on th1s page automatJcally and 1ns.tantty
Address .s valid
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
<>B-LUR Semngs Help Go Premium
TIP 10 Use a Virtual Machine within Windows 10 to conduct your day to
day browsing and online work. The VM could be Windows 10 too
or even adopt a more secure environment such as one of the higher-end security
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• versions of Linux. Either way, a VM will be far more secure than Windows 10 on
Flash and Java are superb entry points for maliciouscode to infect its own.
TIP7
your computer and for snooping of various personal settings and
data. Disabling both Java and Flash will prevent any such backdoors but limit
your browsing experience on some sites.
. ·- •
4 () ~ - ---
....... -~· ~-
·--
.. --
""
,~ ..
-
OOW.Hd .S Tturnp pOS~
- '--'
p 19"( ---"""""
., ~
<Jtoo-·-
e- ,,.. _!!: ea..o._ _ _ .. _
w _.
---·
w ~
"""' of""'
"wff'Stllt!Q CNN
--- -
·-
ar..,
-
., -
.....
---· ...
••
0~
" ...---
"'" o1o0< ......
"'
M(lltn ~re-¥
ttduced t(l PIKti 1fttt
hotstl
~ I "-~
"""
TNJ
0d
~pit
bus off
"'
t:BI)' ll"'d
...... __...,...._,1
t I
""'
St\.RIIng
I
ptMr.t 1$1all(il
:f01o1 Ciln rtnt from U)1
o-..-...
---
OW'·-
-·I-- -
---
·- ............
,_,,.,
a ~-
Question: 01
Who is it okay
to share your
Strange as it may sound, being able to answer
passwords with?
questions on cyber security helps expand
your understanding of the subject. Plus
it's a good way to test you r knowledge
and see how much you've taken in so
farfrom this book.
''Question: 02
True or False:
when on public
Wi-Fi is it safe to
send confidential
or personal
information data?
Question: 03
What does the
'S' stand for in
HTTPS?
Answer Then,
These Questions Ten Question: 04
Ten questions on cyber security and Windows security. What is two-factor
They're not too difficult but enough to make you think and (or two-step)
consider the whole aspect of digital security and privacy. authentication?
..,. Creating a fake website that looks ..,. Private browser mode p;opUOJS
identical to a real one, in order to trick ..,. VPN LIO!JdlJJU3 p0JU011pi;l 6
users into logging in.
..,. Tor 'SC!!J!/fqOJC!LIJrlll DJ p a(qns
..,. Sending someone a text message that Sf Jnq a;mas Na,1 Sf 101 Nd/1 8
contains a malicious link, disguised as
something else. 'SWJOM 'saSJOH UO[Dll
'aJOMP'tf 'SrlJI!i '<iUOtltiWOSUO(f L
..,. All ofthe above.
PJOM NDUOIJJfP
o J,USf puo asoJ JaN\Of
'sdoJ 's;aJJDJOI.p atdmnw
SU/DJUOJ J/ 'iX/t,OOT%1\41 9
[JUf4Sfl.fd jO
Question: 09 SWJOj aJO lW·a11oqo a4J JO /IV s
What does AES
·a6ossaw
Question: 06 stand for?
P<aJ o Dill !tuonsn ·uofJDWJOJUf
Which of the following OJJXa SO 1/al ~ SO 'pJOMSSDd puo
awow asn 8uumba1 pOtfJaw
passwords is the most UOI)OJI)Ual.{)rlOda)S-1}/rlW V
secure?
..,. Password123 ·a;nJaSJWOIOJd
JajSUOJl JXal JadtfH paJdNJUa
..,. ThVO ~ lO*Vx! S.l! 6wuoaw 'a;mas
..,. LetM31N
'' Question: 10
I :J - !A~
JIJqnd
... 123456 5UJSrl Ua4M DJOp JO!JUapfJUOJ
10 JOUOSJad puas ;aMN ·aSJO::f
• '
11! ..
• •
, •
•
w
•
• • •
' • •
• •
• •
• •
• • •
' •
•
•
Every parent or guardian knows that being on line represents
an entirely new frontier of potential dangers for young children
and teens. These dangers come in many forms, with each being
capable of greatly affecting the lives of all involved.
• •
The impact of social media on children has been the subject of numerous reports over the
last few yea rs.With more and more children and young people gaining access to Face book,
Twitter, WhatsApp, lnstagram and so on, there's a growing concern as to how it's affecting
on line safety.
ny site or portal where some form of social Cyber bullying is de on social media. From threats made to
interaction occurs can be classed as social media, young people, to digs at their appearance and body shaming.
~-\ so even if you don't allow your children access it's a platform that has qu'ckly devolved into a pit of despair Using social media
to Facebook et al, there's still a chance they're in and depression for some unfortunate youngsters. This can is amongst the most
contact via gaming or an app of some description: YouTube, lead, ·n extreme cases, to fatal consequences but generally the common online
blogs and so on. collective term for the negativty plied upon the youth of today activities of the
is 'Facebook Depression: modern day young
Reports from the American Academy of Paediatrics has found
that usingsocial media does provide benefits for young people. In recent months, the Royal Society for Public Health together person. The likes of
According to findings, regular use of social media platforms with the Young Health Movement released a survey that Facebook, Twitter,
enhances communication, social connections and technical revealed lnstagram to have the negative impact on a young lnstagram and many
skills. Not only that, it allows young people to connect with person's mental wellbeing. accusing the media platform of
extended family members and friends they won't see for deepening young people's feelings of inadequacy and anxiety.
perhaps years at a time, as they live in places they're not likely it's a disturbing fact that on top of the pressures of school or
to visit. Depending on the content, social media can help a college life.young people arc having to put themselves through
young person develop better perspectives on various issues in the mill whilst simply sitting in front of a screen.
the media and when talked about with anadult, they can begin Mental health is a major concern amongst young people
Safe
lo rorm Lheir own opinions, an impressive slage in a young
person's life.
but social media also presents its darker side through online
grooming. potential radicalisation and the spread of malware.
Social
In some wcrys social media can help a young person express Each of these will greatly affect a young person and can lead
to higher levels of anxiety, depression and withdrawaL For
Media
their inner feelings and encourages freedom of thought and
engagement with similar age people. There's potential for a example, the spread of malware may not sound too negative
young person to learn nev.r things, whether that's simple life on the wellbeing of a young person but put yourself in the
hacks or discovering someone's job role. All in all, ;t adds up, place of the child who has unw:ttingly executed some form of
on paper at least, to a positive experience that can greatly malware on the family computer or the school network. The
help a young person grow and help them form a more mature negative emotional effects from this happening can be huge more all contribute
understandingof the world around them; something 'Ne didn't to someone whose immaturity can't deal with the aftereffects. to the billions of
have before the Internet. The safety side of social media and children comes in many hours collectively
Sadly, with every positive aspect there are several negatives. fonns then. Mental health concerns, access to inappropriate spent via computers
content, Internet borne digital threats, bullying. grooming. and mobile devices,
Whilst the effects of social media on a child can be for good,
loneliness and body image. Where it's easy to point out the
they are mostlyovershadowed by the popular negative aspects with on line gaming
risks of Internet stranger danger, it's not always easy to cover
that ultimately rise to the surface. The sheer vastness of social
what happens should someone post edited and manipulated
quickly following
media is one of the main causes for such negativity. Due to its on the heels of the
images of ayoung person to social media.
freedom and limitless potential, theres no definable control on
more popular social
Lhe scope or inrormation. Yes, Lhe social media platform can Therefore, the pressure on parents and guardians is just as
apply rules, filters and restrictions but these seem to be far too immense, when helping our young people navigate the digital
media portals.
easily bypassed, and to some degree worthless in the end. wild west frontier that issocial media.
•
ea re
The search engine is the portal into the wider Internet and through it we can view everything from
man's first steps on the moon, to extremist group propaganda videos. lt's therefore paramount that
children are aware of the dangers of the search engine.
t doesn't take much imagination to whatever search engine you use, any filters
While the Google search portal isn't consider how a particular scenario may are currently set to On or Strict and it's
dangerous in itself, it's what potentially be played out. A child is left in front of a recommended that you don't leave a child
lies behind the search entered that search engine, they enter something to alone in front of a search engine for any
makes it such a dangerous place for do with a school project on World War 2 length of time.
young people to venture into. Many and start to follow the links. Although part
of history, some of the images that may be If you consider Google Lo be too risky, there
displayed could be deemed inappropriate are thelikes of DuckDuckGo, asearch engine
to a primary school child, or those as that not only protects your data by not
young. To expand, what if the child then logging any searches but also features an
fo11ows links to modern day warfare extensive filter engine. Likewise StartPage,
SAFE SEARCH KIDS AUK-based search engine that utilises Google's KIDSCLICK KidsCiick is a search engine designed and created by
SafeSearch technology and provides a friendly librarians for children who are searching for school related
front end. it's a good starting point and one that doesn't display picture icons research. Each result returned features a description and reading level, along
along with search results; thus eliminating any inappropriate images that may with suggestions and homework helpers.
.,.
unintentionally slip through.
. -d·- . .. • ••
............
• · - - · ... l e _ ·-t+'
·~
n =«
......................
All{ D.L.[ Qtll.t.AJ. fJ 11 0.~ I f l U WU
................... AftOUT SAFf S.I'AQOt
"''-""''Vtl'• 'io* ~' Kl!K ~or-Hb ~ •<»tr.oer flllrftO-.-n rMa111t
...,... """"""<;.wrfV
l(.uile hlf ..,tll., -----....:::
""=
- -
.. ~ -
-
<a.t~v ..1.
::....
... =
SUMMER VA.CAnON! TO POST OR NOT TO POST
!('~-·
Cr'-U..I...._
~ ... t~.W
~
...__. _... ... ...................
ito-1-...,_111_--.,.,.....
_.....
..,._MI/J ~
! :" ""''""'J .. ~ ---
"""'__-•d<v"--·-·-
L,._..,....
_,
_ , _ . . -............ltw _ _...
c;,....
"'-" •IK>dol
__._.....,.,
,_.~
_........__
_, .......... _.,.,
........
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
FACT MONSTER Fact Monster is an excellent site that's dedicated to KIDZSEARCH Here's another customised search engine utilising
helping children research school topics. it's a free Google's SafeSearch strict results filter. Additionally, it
online almanac, dictionary, encyclopaedia and thesaurus and is aimed at also features a banned keyvvord search system that will not return any results
children between the ages of eight and fourteen. from the black list of banned words.
FACT M ONSTfR
- - u.t · - - -
-C!i:l
- - · - - -- - - . c;.._ . ......... ~ . ''5" p:5*
·- .. -
EXPLORE
_
<ll ......-..
""''""
>
' ;;:.:., CEJ ,..,_KK!ZTUO$
-. ~ ......
__
V -1 ,,..ono •
....__ .._....
I
~ .........
TwSrl.,.,
~. <
r
•t . C' .oaiF~
O..tr"'l' llrgl
--='--
• • ••••••••••••••••••••••••• • ••••••••••••••••••••••••• • •• • ••••••• • • •••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••• • ••
KIDREX A simple site that's designed for much younger users. KidRex is KIDDLE Agreat and friendly search engine for children and young
powered by Google's own search engine but as you'd expect, people. Kiddle provides strict filtering along with child-friendly
fi lters out any inappropriate content. Further more, as a parent, you're also able results that are grouped by those deemed sa fe and handpicked by the Kiddle
to customise the fi lters to ensure safer or less restrictive search results. editors. Here are trusted sites that aren't specifically written for children but
provide understandable content and sa fe famous sites, that are harder to
understand but still relevant.
K dRex
SEA itCH
-- -
Ki die
----·- ...., __
Q
m---_..__
Of all the many despicable acts and th reats that arise on the
Internet toward young people, online grooming is
undoubtedly one of the worst examples. it's a
tricky act to confirm at ti mes too, as those
who groom often cleverly hide their
tracks but it is possible to spot signs
of it happening.
our
ccess?
Mobile operator 02, YouGov and the NSPCC have teamed up with Net Aware to create a site that
reviews popular sites and apps that children and young people use. This guide allows parents and
guardians to view the information to help them understand their child's online world.
Net Aware
Net Aware is an excellent site, and can be found at bttps:jjoet-aware.org,ukL. Within you can find an A to Z of Most Popular sites and bow safe they actually are
according to face icons. Here are ten of the popular choices with t heir safety information.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • ••••••••••••••••••••••••••••••••• •••••• ••••••••••••••••••••••••
FACEBOOKAND MESSENGER Facebook has gone to great SNAPCHAT According to Net Aware, 32o/o of children and young
lengths in recent years to ensure people who reviewed Snapchat thought that it can be
a higher degree of safety.There's a lot of ground left to cover but from the point risky. There aren't any 'happy face' icons among the sections, so be wary of
of view of Net Aware, it's about average in terms of safety. Signing up and Safety & how it works.
Support need looking into however.
Snapchat
Facebook and
Messenger D
-
...._._..,., .
""-""'!- ·- - ...!.... •.. ...... - . ,....-
8
· ~
-1o-.
f~til_.W)'OU-IJga! V.t~nl:
kllncll, wn• Mf*ll*'• ~ tNn. flhQfM ft*'-h'.:I"'*''IIool Wl- F~
,._oor
M•••rin;
~owt'IOUi , . , . . - . "O'OIDCfillls • ~;.- . . . .. .. . . . . ~-
wn.~·,"
Mlpcllll?
e .,_~ ..... ~.,
,..._,..,.,, Ho·"'-ltwf-'
--·-·-----,
~
._....._
. ,.
__.,_w..-____ ._..
...... ....,
lf -l)h: ......._. __ _f~-., ............. Chldtw~._Y
SignlnQ up
.......
®
0
0
0
........
----
@
@
0
0
JI"PPI'IInt
...... ..,_ ®
®
0
0
@ 0 ~&· ® 0
........ ......,.,n. @ 0
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• TWITIER Some of the major concerns regardingTwitter are:
lnstagram only manages to gain an upvote (smiley face) in uncontrolled Tweets, fake and seam tvveets and abusive
INSTAGRAM
the Privacy Settings section, with more rigid controls being behaviour. it doesn't rate too highly, on a par with Snapchat, so it's worth reading
asked for from parents and carers with regards to Signing Up, Safety & Support through the available content prior to signing up or allowing a young person to
and Reporting. s1gn up.
1IMtter )&; <1 me&W~giO MNb lt\;ll lets you PQ(i1 PJOIIC ~ Oiled IWMI$, The$e Cif\
Nei!Jif'll • • ~ tncl YICieo *'"I'WIG ..,.,
Uwt cen POit c:onr.nt •M " " Nl&n!JIG• eo be ~ ID 140 cNract61'1 M well astweeea, you tltl Mflll ptlyMe ~ mo and 1)081
share eXI)elienoes, lhOugtlle Of INIM!IM "'Uh an OtMe corM'tJfl~ . Ycu CM tallOw '/O'JI
pi;CuresMdool. Stllnds. conponies and oolebilies cana'-o hllvo Twillll!f occounls.
rrl&ndt., lllmly, celebd!IM .-d wen CIC:Itl\l*lles Of'l lnstagfiln'l. IMUiy!'atn abd IIYII
stre.n~
- . . . .. ._. • . _ ..............._?
_CIN..,...IIIM Y'Nw _ ..... u.oiii'M . . . ,.,....,
.,.,. . . - -a.t~
'tlflw WdM to r>:MdS IOtftl 011 oohllt llW IIloM Co.£1wGW YW\01 ti50 aed~!M
P'O"'"'*hrld.lln')...... ..,. • •
lrld )Oo.IIO
I*'Oit"""'...,.........,.....,..,""
Wrfw,~·-IOi'GU.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
WHATSAPP Another not too highly rated site, WhatsApp raises several PINTEREST The main concern with Pinterest is that young people and
concerns over ability to be contacted by strangers, children can't always control what th ey see, which means
random people being able to view your profile picture and the potential for there are times when inappropriate content can be viewed by minors. Again, Net
rece1v1ngscam messages. Aware ra te it the same as YouTube, Snapchat and Twitter.
Pl'lwlfeel is an onllne inletaCIW6 p.n boefd. You can ceate CCIIec:bone oi !WI boatcts u~ng
Wh~ it .., .,tl~ FT'IK$il~ .,p wtkh lol5 )W 50f1d mo~ . inago. n vlcklof yo~wn images and you can also r&-pin "*'Q5trom otner ~.
tc> lrittnd$ You ~n hi!IYIJ qnt 10 ~· twld 9'0UJ.I c:onwr111t.iun1.
W1W1 llo ,.,_. W " ' - Wl~ f ""*'* Wt\11• 1"'""• a_,bout ~
We~ti)Pfl'!U bho;jWf'\::11 he)'IW!kout~ We\loM~ dl~r; ~
YNW ~ID Pill**
ID llld 0\11 W..II"YihnllilfDIM W'lb~ W.W lliio nQcl "*''" Wld ~ ..'filthy N1k Hcllle'1 ~ rwy wb_
YI*G~ ..... hyllri ~ ~-. .... 1'-iey_,
Ctlll<hn'• vltwS 0
Cf'll'*-n's .,.._ 0
@
.
StgnttiQ up @ 0 S9!lng up 0
.....,,., @ 0
._.., @ 0
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ASKFM This is a social networking site where you can ask other people ROBLOX This is an on line game where you're able to play games
questions, anonymously if you want to. The anonymity raises created by others, or create games yourself. Whilst fun, it does
concerns, along with instances of bullying and trolling, as well as possible have issueswherebyuserscan add you to their friends list and communicate
exposure to inappropri ate content. However, it does have the highest 'face' rating with you and it features in-app purchasing, which can be difficult to manage for
off a11 the apps so far. parents and guardians.
ASKfm ROBLOX
ASKh!! •
~bkh<PO".otl
1 IIIOdill nlb.'Oiti!IOI ... -.!11:111 :tUU W1•11 oltM ~ ~lior. Yuu 1¥1
play~
•
R08t.O)r. il• ~'96J*Ied gllflW'9 P&IIOr!ft v.t>ere you e~n 0'11111 ycv o-n glln'IN or
11'111 011'1« IMII'I fll\9.,...... T'hltto 11 11110 11\ot option to ch.lt 10 othet ~,.- .
-~·ASOCr.l
-~ - ......... --
1'.\1\0t .,._lcr-<ft:!IIO'.ctOoii_...,_OilliU\_ """""" _...,,...,___.,......
....
1Pmtl ......... ~ow-.:n
......... _., ._IO~oa
MOM,.... tl'.,tw .......,....,_ .......
o......,.. .......
~tl .... ._IICiaOII ~M.-o,
_,
Clll....... 'i'-"" 0 0
.......... ® 0 ..........® 0
@ 0 ._.., ®
-<)'-
0
......,._ @ 0 ® 0
.....I)'.MIPO" @ 0 ...... _. ® 0
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
YOUTUBE YouTube's infamous use by extremist groups when posting FACETIME Apple's FaceTime is one of the most used video chat clients
inappropriate videos is by far one of the most negative available. However, it has been noted that people you don't
aspects of its use among young people. Examples of abusive comments and know can FaceTime you and it's possible to record or take screen shots of a
possibly inappropriate adverts are concerns too. Net Aware rates it on a par with FaceTirne conversation without you knowing.
Snapchat and Twitter.
FaceTime
a
You Tube
F~ r roe ~lo'Nt you to r~kM vtdi!IIO .,d f'00io ~lis from you• ~ tit'noM ~.JSng 0'14!1
VouTubct -.... you to waktl, cnta~o ~nd cotl'ln'*lt on wtoc... You can CtN!o )'OIA' w.n 1111cmot
'fouTI.Ibt ~ . c;rHt•• ~ ~Lnd ,...n c;rNI• )'QI.It own ~ntl. v.Nc;h m...,.
)'CM.I v.i11 1\1'19 allW!Ic proile. YouT!M alloWS I~ .-Nti'WIII.
WMI:do 11\HdiOlnow .ccut FIC.tlme?
Wlfi'W Sjdllfllt) par«U 10 lnd OUI .....I t!lla'j lllr..k ~ r-nn. W.'W li'io IISbd d!ldiMOIICI yo-A~Q
-IW.io~, , ._'fi&IT ~ . • • h)' ltwll ...,.. vm.ttq ....
Wtlw 1fOIMn. ,.,_.. N 01A . . . !"'11N!!tte«oo ~TI6e wn. .._1$10111 CMfi'U li!Jd )'CUII(I
otooa.""' ~ ~ ....... ""* n.,,.
Cl'!ilcl11n's y!.,..-s 0
- 0
ClllldNti'& " ' - -
Signing up @ 0
·-
......
....,....ey stlti"D'
@
@
@
0
0
0
·-
l"f"'tq' St'ttinQS
@
@
0
0
Saf'tl)' & -.ppon @ 0
""">•- @ 0
We're often so concerned over social media,on line gaming and chat sites that we tend to ignore Em ail at first doesn't appear
one of the most common threats to on line safetyforyoungpeople and children, email. While it's to be too much of a concern
a more manageable element, it does carry plenty of dangerous potential. for the parent or guardian,
after all we can view what
n reality it doesn't take too much of a technica l the email client or website, then there's some privacy for the
emails are coming in to our
gen ius to enter into a search engine, "fake young person too. accounts. However, it's not
email accounts" or something similar. The too difficult for a tech-savvy
Naturally the best form of em ail attack and threat prevention
returned results, such as Fake Email Generator, youngster to create an
is through education. Both the NSPCC and Childline
Mailinator, ThrowAwayMail and Fakelnbox are
recommend that you talk to your child and come up with
all designed to help you create a fake account
that can either be single use or used regularly. a set of workable rules and conditions that are fair but
This of course means that a person is able to protective. Educate them on the dangers of COMmunicating
create a false persona and sign up for Facebook with a stranger and inform them that online grooming takes
and the like using a browser's private function, place and how it works, also include how viruses work and
other forms of malware, and how phishing and other fonms
Email
and have access to accounts without someone
else knowing. of threats work too. Risks
This works both ways, from the point of view of the young There are some tips that we as parents or guardians can use
person gaining access to a site they shouldn't and for to help children and young people:
someone who's creating accounts ready for grooming, or
.,. Treat all people on the Internet as strangers, even
something similar. With access to a fake email, ayoung person
those who could be friends. alternative email account,
has the potential get into a variety of potential dangerous
situations. They could be contacted by someone who is .,. Never give out any personal information via email to usually one that's web-
tl)!ing to groom or send radicalised content, they could also an unknown source or site. based, that they can use to
become the subject of a hack and unwitt ingly execute code .,. Be wary when choosing an em ail name, access games and sites you
that ea n deploy a virus, ransomware or other malware, along don't use anything to identify your gender or wouldn't normally allow
with possible backdoor hacks to gain access to the system the anything provocative.
them to.
young person is using. .,. Never open an email attachment Check with a parent
Its not just fakeemail sites that pose a danger when it comes or guardian first.
to young people and children; although fake email sites .,. Never reply to an unknown em ail and never send any
usually don't have the better protection and anti-malv..are images of yourself.
restrictions that more legitimate sites employ. Google Mail, .,. Always tell a parent, guardian or
Yahoo and so on can represent a weak link in the chain teacher ifyou've been contacted by
of d'gital protection for children and young people. The someone you don't know.
dangers are mostly the same but thankfully these online mail
providers have better levels of malware protection. .,. Never respond to a threating em ail or
someone attempting to bait you into
So how would you, as a parent or guardian, combat pmential contact.
email threats for children and young people? You may not be
.,. Don't always believe everything you
able to police their mobile accounts all the time but you can
read in an email. Phishing attempts
insist thallhey allow you access to the account on a regular
come as virus hoaxes.
basis to check that they're not in conversation with someone
unknown, or that they're not receiving and responding to .,. Don't believe you've won £1,000,000 or
reams of spam and malware ridden emails. However, that react to limited time ridiculous offers on
doesseemsomethingof an Orwellian approach to managing technology or fashion. it's nearly always
a young person's email account. fake em ails tl)!ing to get you to visit a site.
Another possibility is to set up a family email account, Another possibility is to use one of the many
separate from the parents or guardians' accounts, where the child friendly email programs and online seNices.
entire family has access and can utilise to sign up for games, There are ample available to tl}l out and over the next
safe sites and the like. it's a more open approach, whilst still couple of pages we take a look at ten of the more highly
preseNing privacy for the adults and if you use folders within recommended seNices.
•
_mal
•
rams an erv1ces
An em ail account for a child or young person is a great way for them to communicate with friends
and family; however, as we've seen, it can be a dangerous tool. Therefore it's best to ensure they're
using a safe, child friendly em ail account.
Zillallog Zitlaman
ow- .. .,...,..._.,..,..,. _... . ........ ......,., •.
----
,_,.. .... ~lpou"'1d _ _..,.__
,_•·----"*"""-
____.,__
.-~
..._._,..._
~_.,-
·--
..
..,.,o..-f--
Games..
__
,_
--
__
___ .,,.......,..,. --·--·
-.-··-·--
.._,...,.
rv---·--•
--·- .
-_
... _
·0'1.·----- __.. _-
- ·-·.........____
---·· --
_
---·
.............."""_' _..._.
-·..
,..... __.
______
·-- ___... __- ·-·-
·-- ·--
~ ,...._..
.-.o . . . . _ . . -
,_
,____ ___
_,...
....
, -. -- ·-OWl-··-·-··-·
...
--·
,...
........ ,.....
,...
~=·-MIW'l
.........
- - - - · - - · - · pi)lr
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
KIDSEMAIL KidsEmail is a paid for service, offering a 30 day free trial KID MAIL KidMail is a low cost subscription email service that caters for
period. For your money you get mail monitoring for all both young children and older young people. Parents and
incoming and outgoing em ails from the child's account, time restrictions, blocked guardians have full control over the email account and the messages that come
senders, no adverts, spam filtering and an easy way to add friends and family and go from the child's account, along with many other benefits and featu res.
contact detai Is.
,...... ...... ~ . ..
, ~ . ..... "'""' .......... .. ...... " ,
-·-
__-............____.•_
--
EMAIL FOR KIDS ~"'. _.,... ...1 ..(01(11
.,....,...._.,uWIIO_,V
l ...... ltilfllll.11f f01111Wt -·~ -
_ .,_..,...,.......,
~-"
........ Mdlt_, .._
, ftt-..
,-~
.-.
, ...~
,.~-
•...w
.............,,.,.. EAsy"'
· ·ft>M-IIoo/WWW""'" -·
~:=.!1- ,
::.:=-::.:-_; 8
TE==f •
KIDS EMAIL PROTECTS KIDS WHILE GIVING THEM THEIR FREEDOM
.,
..~ ............
_ ______
_ _ ... ___ f_.. tl ...,.
......, ... ,.......
,.... ..... ..........,._..,____ ... · ~ "
__.. _-
' '
0 0 0
Black Dog i-Tech Series [2nd Edition
Top Child Friendly Email Programs and Services
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TOCOMAIL Another well presented service, Tocomail offers the child, SAFENSOUNDMAIL SAFEnSOUNDmail has plenty of features
parent and guardian a wealth of fu n and useful features. lt avai!able to thosewho purchase the
brings a lot more than just email to the table, for example children get access to subscription; however, there's a free 30-day trial to begin with. There's support for
a drawing board app, to create their own attachments, whilst parents get Apple, Android, Windows, Mac and Chromebook devices, up to five child accounts
notifications via an app when the child has received an em ail. available, customisable controls and settings and elevated levels of encryption.
ll C I!i
GM AIL Providing your child is thirteen years or older, they ea n get access FAMILY LINK Part of the services offered by Google, Family Link can
to a Gmail account. Gmail isn't the first email service that springs help you set up a Gmail-like account for children under
to mind when considering a young person friendlyemail account but with the age of thirteen. You need to be located in the US for the moment but the
careful use of its falters, you can set up a good and reasonably safe email service offers improved controls for Android devices and apps and there are
environment for them. considerations for moving the service outside of the USin time.
.. - • ee • • <~' •
f~U. - -
•
TM
Family Link •
t
byGoogle
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• •••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
MAILV This is a child-friendly email app for iOS and Android devices. it's SCHOOL EMAIL Here's an interesting suggestion, why not use the
fun to use, secure and offers the parent or guardian ample control child's school em ail?Providing the school iswilling
and restrictions for the child's account. With it children can stay in contact with to participate, a child can log into their account from home and using the
specified contact lists, whilst still remaining safe online. elevated security, send and receive emails in total safety. Naturally, you'd need to
confirm with the school prior to using the email for personal contact.
,
•••
o.
it's a sad case too, that a lot of young people are al ready in a heightened
emoti onal state due to t heir body image, t hanks to the media and un realisti c
Pho toshopping o f celebrit ies. Where young people, especially young teens,
are very conscious of their image, a slight rema rk to someone can impact the
young person in an incredibly negative way.
cyberbullies are able to shout threats and taunt other garners, rallying
Social Media ot hers aro und t hem unt il th e victim s feel overwh elmed by bullies.
Probably one o f the main platforms for cyberbu !lying, social media is
an idea l hunting ground for the cyberbully. The effects of social media There are numerous ga ta~ ,e adopted a more sport-friendly
bullying have been devastating on some families. Teen suicides, self approach, introd uci n i> rP~)v instances of bulling ca n be
harm and elevated cases of depression amongst young people are report ed and t he bu Ives have their gaming accou nts
popular in the media and brin g to light j ust how powerfuI and dangerous suspended. Often onli bu!lying is just someone shouting
social media is as a communications tool. 'noob' at another, dPor'" m as a newcomer, or someone wh o
isn' t as good as them. 0 m"'"' the bully will say things like 'I hope
Facebook, Twitter, lnstagram and o ther examples have all become the you die' or 'I'm coming you', or somet hing simila r. In short, any
haunt o f those who prey upon and harass others. From the point o f view abusive behaviour, includ destroying your online game crea tions or
o f a chi ld, whose emotional state is quite vulnerable, even a simple 'like' belongings, is a form of bu
o f a comment can embarrass or hu rt.
Another aspect of cyberbullying via text message is sexting. Setting up filters to block certain senders does work but only
This is when someone takes an explicit image or video of to a small oegree. There are plenty of email services available
themselves and sends it to someone else. Sometrmes, a that will h1de a sender or fake email providers to hide behmd.
person can bully someone into sending them images or lt's not always abusive cont ent either, as cyberbullies have
videos of the v•ctim, then send those been known to send viruses and other malware via email to
_, images on w others or upload them their victi rns.
to popular sites and inform an entire
Cyberbullying covers many different forms and platforms. lt
group o f their location.
can be a single, throw-away comment, a like on a Face book
comment or j ust someone calling someone else a 'noob'.
Em ail ll can also be very serious indeed, including death threats,
Sending abusive emails is a large area o f concern threats of violence or the sending or pos ti ng o f explicit
for th ose involved in pro tec ting young people fro m i rna ges or vi deos. There's a wealth of informa l ion available
cyberbullying. We've seen , the double-edged blade from the likes of th e NSPCC and Childline wi th rega rd s to
o f anonymity can cut both ways: it can protect your cyberbullying, which is certainly worth read ing through if you
identity online bu t it also hide an individual who is suspec t any instances of bullying or you just want to know
bullying someone. Anonymous emails sent fro m a bully more abou t how it works on li ne.
can be just as harmfu l as socia l media, online gaming and
text ing. it's a more personal form of bullying, much like having
an abusive letter addressed and posted directly to you.
www.bdmpublical.ioos.com
)
On line Child Protection
•
our
rou
The Internet is a vast resource that's full of amazing details and an equal amount of villainy and
inappropriate content. lt's difficult for a child to navigate it by themselves and extremely dangerous;
so, as a parent or guardian, we need to make sure they're safe.
PHOTOGRAPHS Consider ea refu ll y before posting any pictures of INAPPROPRIATE CONTENT If you see or hear something online
yourself online. Once an image is available on the tha t upsets you or makes you feel
Internet, it's extremely difficult to get rid of any trace of it; and should uncomfortable, you must tell a parent, guardian or teacher as soon as you can.lf
someone have already downloaded it on to their computer, it's impossible to possible, show them the content that's upset you and tell them why it's upsetting.
loca te and trace. Talking to a parent or teacher will help you gain a better understanding of the
world around you.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
COMMENTS Always think before you enter any comments online. IGNORE BULLYING Try not to reply to anyone who's appearing to
Remember, they can be hu rtfu I to someone else or be bully you online. They are most likely trying to
inappropriate without you even rea lising it. The comments could also lead goad you into responding and will keep pushing until you finally crack and
someone to taking an interest in you, if you enter your age for example. respond. Most of all, never respond out of anger. If it's getting too much, leave the
site or game and come back later.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
ACCOMPANIED VIEWING Parents, always make sure that young SOCIAL SAFETY Whether you're on a social media site, in a chat
children are accompanied when room or playing a game, become fami liar with the
navigating the Internet. Ensure that the privacy and security settings are as high safety settings: how to turn off chat and how to block or report another userfor
as possible and that they don't have access to sites beyond what you specify, any abusive content they may post. Take screenshots if possible, so you have
shou Id you need to leave their side for a moment. evidence to back up your claim.
SECURE PASSWORD Never give out your password online, even if NEVER MEET Never arrange to meet up with anyone you've met
the email or message is claiming to be from online, even if you're an older teenager. it's very easy to
the bank or someone you know. Never let anyone remotely attach to your pretend to be someone, post a fake picture or take the identity of someone else.
computer either. it's very rare for a company to attach to a home computer to fix If you do arrange a meeting, make sure you're with other friends, in a public place
something. At least be suspicious of anyone asking to connect remotely. and let others know where you are going.
• •
f course, there's nothing wrong with gaming involve some scenes of an inappropriate nature,
or online gaming. Despite the many years perhaps sexually explicit or extremely violent, or use
of people bemoaning that gaming is taking inappropriate language.
away something from a childhood, recent
In terms of onli ne bullying, it's not j ust rage tha t causes
studies have actually shown that online gaming
problems. Griefing is a tac tic used by some gamers to
can increase social skills, help develop hand-to -eye
bully o thers into making the wrong move or decision
coordination and, depending on the game, have
in the game. Th is way, t he 'griefer' wins by simply
educational benefits and help young people learn.
causing as much aggrava tion as possible, and in turn
The problem is that not everyone always plays fa ir; enrages those aro und t hem. it's also not unheard of
some take grea t offence when they've been bea ten for en tire teams of griefers to band together to bully
by another player, resulting in the person beaten the oppositi on into defeat.
shouting or enteri ng abusive com ments. Other players
In-game spending is a modern cause for concern
use chea ts to gain an advantage, making it nea r
among parents too For the young person who en joys
impossible for ot her players to even have a chance of
playing th e game to have any significan t advantage
winning or succeed ing. Sometimes, when a player is
at all, they may need to purchase be tter items from
better than others around them, they
the in-game store. Often these items
can be accused of cheating, even On line is playing a game
will inevitably lead to more items
when they're not.
needing pu rchasing and the cost in real time with other
All o f the above can be soon mounts up. Other games players from around the
disheartening to a make it near impossible world. The game can
young person to finish withou t
be virtually anything,
having to pay fo r
something, such
a shooter, role playing,
adventure or something
- as a key to unlock
the next level
or by having
open world, such as
aew
our
We've looked at the safety concerns of online gaming but what can we as parents and guardians do
to help keep our young garners safe? Thankfully, it's nothing too drastic, just a little common sense
and a few tips to help out.
Game On
Here are ten tips to help the young gamer getthe best from their game of choice, whilst still remaining safe; also how to avoid any conflicts that may arise
from the gaming community.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
INVOLVED PARENTS Parents, take an interest in the online games IN-GAME SPENDING However tempting it is to buy an on-game item
that your child plays. See what type of game it or DLC, it's not always the best idea. Items like
is and especially see what the on line community is like. View the in-game chat, this can be a lure for you to buy another and another, until the cost mounts up and
....
and read the game's foru m if it has one to gauge the type of gamerswho play it.
Cntugotu)$ Action
l4:ot
·-
you've racked up a game bill in the hundreds. If you desperately need an item,
discuss it with a parent or guardian.
fJ -
.._.. .......
~
.........,.
...
........ ..
......_, ,_.
·-- .... ....
Sooo<e o..,n 2·
,
....
llltw•,...... l ..... ot Spet •Mnw ~I O M
••o....... · ~ ~·
·-·
91ie ~ n w..
""
NiQIIC «
o.....
SQr.l
.~
' ~
'~ :.,~ ~
. -·
..,.,
~ . -hJ, .\
.
*
h .....
'
. -.
XENOWER
- c.
•1
~
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Not everyone in Lhe game is going to be Lhe
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• CAREFUL CHATIING
same age as you. There are some people who
AGE APPROPRIATE Make sure that game you're playing is age are much older and who like to pretend they're ayoung person. Don't be fooled
appropriate. Whilst it's fun being nine and into becoming a friend with someone who's playing with you. Enjoy the game, and
playing an 18-rated game, there's bound to be content within that may upset or playing with others, but don't arrange any out of game communications.
offend you. There'sa reason certain types of game have an age restriction.
111 111
L
.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
NOTHING PERSONAL Never give out any personal details into an AVOID HACKING Don't attempt to download or sign up for a site that
in-game chat window, via your headset or claims to give you an in-game advantage or cheat.
in a game's forum. These places are ideal hunting grounds for those who want Some downloads and sites con tain malware payloads or are trying to seam you in
to use that information to their advantage. Make sure your username isn't some way. Whilst it's tempting to have the advantage, it's nearly always some form
linked to you in real life too. of phishing seam.
'ljiu PIX
Username Generator
ONLINE GENERATOR
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
NO GRIEVING Try not to get angry or be fooled by someone who's ALTERNATIVE SERVERS If you find yourself on a seNer with
being nasty in the game. They could be baiting you, cheats, the subject of griefing or other
griefing you into making a mistake or simply just a cyberbully who's looking for forms of bullying, then leave the seNer and see if there's another one available
someone new to infl ict misery on. Don't react to anyone calling you a noob, loser without these people present. it might also just be a bad time of day, so try again
or any such wording. later on.
• •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
•
'
The temptation and lure of the lntemet is often a little too much for some people, especially young
people who are repeatedly told not to look or go somewhere on it. Tell a young person not to open a
box and most will lift the lid when you're not around.
he tech-savvyyoungsters of today will already have
a better idea of how to circumvent technological Webmail
restrictions that we've put in place. We're not it's easy enough for someone to create a webmail account,
saying they're hacking or do anything particularly such as Yahoo or Gmail and use it without anyone knowing
bad, it's just that sometimes we need to see what all the of its existence. Combine a webma il account wi th private
fuss is about ourselves, rather than take someone else's browsing, fo r example, and a young person
word for it . Here then, are some of the tricks that the cou ld have an en tirely anonymous email
modern, digitally capable young person can do to hide account without there being any trace
what they look at on the Internet. of it on your system, as not hing will be
stored locally.
enough device to hide from a pa ren t or guardian. Of course, we're not saying you should police your Human nature finds
Naturally there's a limit to wha t a young person can children like a prison warden. There will come a point
most of us sneaking a
get away with but it's something worth keeping in where you simply have to have faith that you've taugh t
mind. Another of th e many elements to look out fo r them righ t from wrong and let them go and discover
peek at something we
with a young person who's being groomed, is a burner the world by themselves, however painful tha t shouldn't and children
phone the groom er may give to them. This way, they're may be. There's a fine line between protection and and young people are
able to con tact the young person wi th a higher degree controlling and its borders are ever shifting thanks certainly no different.
of anonymity. to the technology available and the ever-growing Young children will
curiosity of young people.
Secret Social Media However, we can make sure tha t a young person is
When used with an unknown webmail address, and educated and lnternet-wise enough to be able to
private browsing, it's an easy task to crea te a secret make decisions for themselves; and, as you would
social media account. Try it yourself and see how far expect, we also need to ensure t hat they're not t he
you can get using Twi tter and Facebook and the like. victim of any digital attack. An open relationshi p Eyes
Despite the fact that creating a fake social media
account is against the social media platform 's rules,
is credited as being the key here, as often stated by
professional bodies. in the
it's not something they're able to police with any Back
great efficiency. Just like a secret email, it's extremely
difficult to see if a young person has set up a secret of Your
social media account.
Head
OS on a stick
it's possible to have an entire operating system on a
USB stick and be able to boot into the OS outside the
system that's insta lied on the computer. This makes most likely avoid those
for an impressively anonymous and secure platform
to browse from , as everything is done via the USB stick
areas on the Internet the
and the temporary session held in memory. parent or guardian has
told them to never go to;
Naturally, the young person will need to reboot t he
computer and boot into the OS on the USB drive but
however, older children
that takes mere seconds these days. The end resu lt is and teens may find it a
something you'll never likely be aware of. little too tempting.
• •
on- ec n1ca ua11 ..,.lans
There's a vast difference between monitoring a child's on line activity and actively spying
on everything they do. In monitoring, you're making sure that they aren't being scammed,
downloading anything illegal and generally behaving themselves on line.
• •••••••••••••••••••••••••••••••••••••••••••••••••••• • ••••••••••
FAMILY ACCOUNTS Consider using the Microsoft FamilyAccount as
your child's login to Windows 10. We'll go into
more detail as how to set it up and use it a bit later on. For now though, navigate
to .b.Ug,s,;il.s.YRPOrt.microsoft.com/en-us/JWpj12441/microsoft-acco.uot-
monitor<hild-device-activity and see what you can do with a child account in
WindowslO.
• •••••• •• • • • • •••• • •• • ••••• •• •••••••• •• • • •••• • • • •• • • • •••• • ••••• • •
The: ttno)!l JUI'I'IfiWY O"''tS )'OIJ •toe of ol'llo ~ )'OUf child's oct'lltots Of'lltltor d~cts. To Stt tw11 rn()(t <kta•l. ~ to ctwlnot the':tt I)Uft'ltSStOnsltld
t'JI~ ~ QO IO ~it lt~ ectMty PI!Qe in tho! f"mily llrY t:~ f tflr. Mot!$0fl .te:~ -.tBi~ H"e'_
, tw;-.
Web browsing
This waiotl o l lhe ktlw\ty ~ snows all ,our cbld's fl<Uflt WiltehH. .ne~ the St~ 'fOI.K ct.ld VISited or Mtd to YtN. 810c:kt<l Mts ere l•sttd htR al'd
ltw.n tib'' tfvlr ~· dUJd '1'11N'6od"Uit)' Yi'lil.fd 'k.iu f"M o11!1,. at l*loi:k IIA)' of ttll' 'litM di~)' fmm lfw. ~ "dMry upon by ~1) Allow at llock
rw, ·r to tht Ultl. To 40JJ...,.1 )I'QoJI ( 1 1(\~Wiwl,.ton w1oK1 Sl'ltll'9"
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
GOING OFFLINE If your child wants to play a game, one that doesn't 3RD PARTY SECURITY it's worth investing in a third-party
involve any online communications, or do some anti-malware security suite, such as
work, consider unplugging the computer or device from the home router. Either Bitdefender. With Bitdefender, and other security suites, you get some form of
pull the cable out of the network port or power down the Wi-Fi. That way they family protection allowing you to keep track of Internet use, block unknown
can't get online. communications and even extend the protection to mobile devices.
Am.l ruu cllw llt"'IWklfllillliclllly llUt!rll.'d wfn:n they (rile~ o le$liW..icd ~tc.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
BROWSER HISTORY After your child has been on line, consider FREE MONITORING If you don't want to pay for a full suite, consider
taking a look at the browser history. You can using a free monitoring and protection tool
find the history among the browser's usual settings, click on the three horizontal such as Norton Family Free Edition. With it you can supervise web access, protect
bars in the top right of Firefox, for example, followed by History to view the personal information and set up social network supervision.
recently visited web pages.
.:. NOfton ramify
0 X
Product Features and Supported Platforms p
l ltof\'1'1 H~! Yf
-·-
.Qf~ • :.. ~\f.¥1'S • 0: twlport 11'16 S«k\lp • p
~ := -I N' ,.
G Google:
Tags
hnp'#
l0<..101'1
l -.go~u'4
• •
VHtttd.y 5I! Utp C.dl~t Connection LlptopStoc:k Pho... htp s:/-. hutmod.clieg~pf ol ... • •
l asf 7 d~ ys ij!! Unplu9 Ethctne'l Stoc:lt lm.t;es, ltoya~· - hltp s:/{-. hutosd. com/ se~?uotc: h.
• •
....
lhismorttll
......
ij!! F•tkef U~o ng Compul~
~
Son h rwty 8.KL
i! I.Mng R.ocMComputtt Stodc lm.tg!S, R...
lspltltt n'lft Service ProwJtrW'hitr T~
hltpld/ -.shut
l'lltpS;//-.shutttlito<t.comfsordlfsu•c"-
htp s:/-.hou t~od:.c
ltem od.c:mli~pft
--
,.,
•
Aflril iJ lsp S.ock lnwges,.ltoy.-y·kf'tf«<•9t5 ... l'lltps:l/-.s1Wttersto<t..<omf5Qt<h?surci\.-
Mo<h G is, · GooptSt¥ch lmps:/ / -.got<:e>~lc/surh?q& .. • •
fl:bru.-y G i"jX • Googlt St:.uch tmpc / w.vgo~uk/ lrc h?q:NIH&J. ..
Downloecb lj St•mp Wotd Dos Oot~u Grunge Styk Stet... tmp s:/-.,; huterod:.cnv'i~ Of ... ~- • •
Tags
Al8otm ~tkS
IJ Dos Oonts Sto<:kPho!:o 57099014.8 · Shut...
G do IV\d don'U • Google Sur~h
:i do~ 6nd ckln b prog • <ioog!e St4n:h
hltps://-.shutterstocUonv'im.age--pfloto(...
https://-.googlt..co.uk/$urch?qa rules&J..•
https://-.googt.e.co.uk/n6rch7wh•;otf&-
___
....,., "'
•
•
•
• •
• •
safesearch
SafeSearch • Wikipedia
httpsJ/en Wlklpedla: orglwlkiiSafeSearch ..
SafeSeotch IS a feature of Coogle Seardl lfla! .cts as an aU!omated liltet" of pomO!J'Sptly and
potertbally oiJen S~o"! c<~nterw . A 2003 repon by Harvanf Law •
• • •
s or n1ca ua~
• •
lVI
For those parents and guardians who are more technically minded, there's a wealth of software
and features available that enable you to monitor your child's Internet activities. Some are simple
solutions, others require a little more work, it depends what you're looking for.
Outgoing log
LAN lP address Destination URL or lP address Servrce or port n
192 168.5 108 58.11 186 216 6063
I 92 168.5 109 23.41.66 25 www
192 168.5.108 23 58154 227 www
192 168.5.1OB 23 4166 25 www
50<1 by: DeviCe name @ Filter: ( 5howall
J
192 168.5 108
192168.5 108
173194 38 187
202 77 136 18
www
www
EJB•mer ~ - 2
!P address:. l92.168. 1.82 (Statld
MAC address.-: 00:27:0E:11:9A:78
192 168.5 108 213 I 99 179 154 40025
192168.5.108 157 55 235 156 40033 192.168.1.75 lP ldots~ 192.16a.1.7S (lt>toc)
RESOLVE ADDRESSES If when consulting router logs you have daptnp lP address: 192.168.1.253 (DHCPI
....
IHII----
- ..
T ntE SUPERTOOU
_,_...,...........,......."'_....
~ ~._ -................_
_ .. _"""' ,..._ _ _...o,._,._ _ ..,.,_ ...,..• - -•• -•
•
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
DISPLAYDNS For those who like to get their hands dirty in the BROWSER CONTROL If you need a speci fic monitoring and parental
command line, open up CMD from the Windows Start control tool, then consider using FoxFilter for
button and enter the command ipconfig /displaydns. This will list the sites Firefox. This is an add-on that can block customised websites, such as anything
visited by the user during their session. If you want, record the sites to a text file con taining inappropriate content and report its use in a handy web interface.
for viewing later with, for example: ipconfig /displaydns > c:\monitoring\
s ites.txt.
---·
.,._
__
-·----....... ______
__...·____________
__________
,.. ._,...... _
___...__ ___,_ ..__ _....., _______..
,....._ ........
,._.
_..,,
.......
,.
...,.._.
...,.,
--- _......_
----
••
--·----· -- .....
------
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
NETSTAT COMMAND Using the Netsta t command that we looked CHROME CONTROL Users of Chrome can try MetaCert's Parental
at on page 98, you can enter into a command Controls &Web Filtering add-or1 With it you
prompt: netstat -abf 5 > c:\monitoring\activity.txt. This will record the entire can block certain sites, set profiles and monitor the web activity of your child as
activity of a session to a Ale, which you can then browse. The recording will stop they use the browser. There are plenty of features, so it's worth looking over if you
once the child has logged out of their Windows account. regularly use Chrome.
.. ..
~
•••• - .&$1- -
........
•
f'NitO Loul Md!"fU: F-11!'1 Mcll'fU sun
- c.. - .,...,..,....__,._
TU' t.t.t.t:US Wlf~=· lSTt~
.........,......,.,.,_...__
-·-
~iD<.t!>_,;
..(-·
~( S)
.._........
•
_.........______
l '"chon. e:ootJ
o.e.e.e:us
-""'.....
· --
TU
CMI not obu.ltl -.MM!> Saf-tiM
.... ..., """
..,_ ....
rr.t
(...,.... t . . . .
tt.e.e.e:'ou
,..J
.,....,... .. ll\fiNTNCi
•
......
..... .... ...,_
(~
T(.t t .t.t , t :U U WJ~·t
110\ WUJII -ltl't!Up Vof.o-U.Of\
..,..... I
tt.P t.t. t.t!Sl\7 W:lii - H I Ll.Sltllllilt e • • I
c:~
( t 'l "Ot
l(J'
not obU.lll -eMIUP 1.ttf.ot'..:lti0ft
f,l.$8i:UI2~ Ni"OOWf:t
ob<tein _.t,.lhio S,..f-tior
••• 1
•••
·-- ., !'I T liolo"'
... . .. _
0 "''""'....,..
TCP o.o.e.o:•!IGG4 Wi~tdow:s :e us f(NIJ«i •• ,..---...........
(...,. ...,, otruot/'> .,....,.,.,."lp t,.(-t iO"
T(P &.t.t.e:•M61 Whllbn.tl
.. ·-
-.... - .
tv•lltLOS J;o ..... - ""'" *'
('vcllon . ._) ..... ~
Tc.P t.t.t.t:4Nii W!"*"'' :t
(SVCIO$t.~)
Stllc4dc
(,eltdl!llflltil...
.•. m tSnfr
••.• "" o ......
.•... ,.......,..
_ "'*' Ill
let' 0.8:&~7 USHitii'IG
....
·-
l'900h•·••J .... •• ..... *<t•.
,_
TGP
-· ....._._
o.e·~"
-~· .~ ....
llSTOflNG
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Wl NDOWS LOGS Don't forget to check your Windows Event Logs, SUPERVISED USER While still on Chrome users, if you visit http://
especially the Windows Firewall Event Log for any chrome.com/manage, you're able to set up a
activity that may have triggered the Firewall. You can then build up a picture of supervised user for the other Chrome accounts. This way you can set restrictions
where the child is visiting that's causing the Firewall to react and educate them in and monitor the sites that a user has visited during their Chrome use.
the dangers of malware and such.
• .,. eo •-·--·---
Got_ . _ o( .. - · _ . . .. .
•
- ----
e chrome
·-·-·- -....,....._
~
!=--·-
...._
___
-·-
·
... - - - - -
...... r-
""''""''r-
..T_..r_
~
, --
-~
---
---
-------
-·--
------
~-
.... ~
- - - - - - -
·-
---
---
.,._.__
- --
~-u
- ...
______ _
_____
-·---- .. . _.,. .....
Clll
-- •
•
., _f~
_,.,
··w-·--
-·- ...........
_ " __________.. .. ..
,
::--· . ---- ___ -··--·-...----·
- F-- .. ...... .,.....,...... ,
·-
·------
-- --
:::;...-..... -·,__,_ ___ -
-- -
-~,
· ~
-
-.a·>I"~!,;N
--- ·--
-A
"-
-~
--
--
-
-·- . - ......
-·---- ---
u- w,_.__...__
n-,j:::::
~- _..,..... .,._,_
........- - c..•Aiiflo < I~ · •-
·-
·-
·- -
-·----- -- --
,.,_
------
..-·---- ..--
...............
--
--. ---·-··--
~- .~-
·--·. • ----·-
.
Monitoring tools usually come within a complete Parental Control package. These tools can be
dedicated programs, or come as a part of a security suite. Either way, they're excellent ways to help
keep children and young people safe on the Internet.
Parental Controls
We've collated ten of the better parental control and monitoring tools and software, in no particular order. Some offer their software for free, others you need
to pay for.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••• •• •••••••••••••••••••••••••••••
QUSTODIO We've mentioned Qustodio in the previous page, so it's a KID LOGGER KidLogger is an interesting product that offers a basic,
good example to kick of this top ten toolssection with. single device with nine days of history for free, moving up
Qustodio is a complete package that monitors, blocks, filters and controls times, to five devices, then ten devices for increasing costs. You can monitor browser
games and apps across many different platforms. Pricing for up to five devices activities across Windows, Mac and Android; block apps, take screenshots and
starts at £32.95 per year. limit time, amongst other features.
m oustodio
-.. . .
,_
~-·'J_
........,. , _.
....... ...
• • •••••••••••••••••••••• • •• • ••••••••••••••••••••••••• • •• • •••••••
OPENDNS OpenDNSfrom Cisco offers both free and paid-for services to
help block inappropriatecontent across virtually any Internet
connected device.You need to set up DNS entries in your router to take advantage • • ••••• • •••••••••••••••••••••••••••• • •••••••••••• • • • ••••••• • • • ••
of it butfull instructions are given via a helpful setup guide. Without a doubt, one of the most respected parental
·-"""' .. NET NANNY
control solutions available is Net Nanny.lt's been around
since 1996 and offers unparalleled levels of filtering, protection, monitoring and
parental con trols. it's cross-platform and prices vary depending on what you want,
so it's best to check out the latest offers available.
BUY NOW
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
BITDEFENDER Bitdefender's Total Security suite offers an excellent NORTON FAMILY Norton Family is a previously mentioned mol that
parental control and monitoring tool within it's offers both free and paid for services to help protect
already impressive list of features. lt's cross-platform, can shield children and children and young people online. it's cross-platform, provides protection for
young people from inappropriate content and extends its use to mobile social media accounts, time supervision, activity monitoring and much more.
devices too Pricing starts at just £34 99 Check the site for the latest features and pricing.
~ -df,. ....~·-
~
. . ,_..
, ·i'U_,....__
~ .,...'*----......
..... _____ leoof_• _ _
.,....,..,........... _...,.._,.....,........,... _.......,.
9el_~-itfIN)'·
.
...
Srrllt!IOg In 10 yru'MO Ba!li!'erdec'C8'rtr.i liiCOOU'II from flf'
~tepuo wtn )OUf k:$' 10CiliXln IX OC1:rlltle5. Ftti'I"'I:We ~
· ~ ~
1
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
UKNOWKIDS uKnowKids provides a wealth of features for parents, KASPERSKY Kaspersky Total Security 2017/8, very much like
including call logging on devices (with Facetime call Bitdefender, offers a parental con trol feature within its
logs), image reviews that children post, social media monitoring and web security suite. With it the parent or guardian can set time restrictions, block
browsing history access and con trols to block inappropriate content. Pricing access to inappropriate content, monitor Internet activities and monitor
varies, so it's best to visit the uKnowKids site to see the latest offers available. communications on mobile devices. Prices start at just £31.99 per year for a
single device.
uknowkids
KASPERSKY!
·-
·-- ·-·- W"tn )'O(W t¥~il y'1 onl.-..:, YQtl Q n
!iliO.W..•-
""""
'"" ...
........
-
--
./
M$Ure !My're 1'\01 Jute eonl'leaM
UlC'(n~ IJU t.:~
- ---
0 $~ -
lll'fOOoJ<,. ~-Oft
IJiflone rr ._,
PC. IJ¥. N'l(lt(Md
"'"
-
•••
..,
....
~«t )OUt·~- tlf"MXY. ~ &
0••..- ...
!l •P N-
OGft
• - ~ ,,..,....
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• K9 Web Protection (nothing to do wi th
K9 WEB PROTECTION
MOBICIP Mobicip is a cross-platform tool tha t offers app monitoring, protecting dogs from accessing the Internet)
web browsing monitori ng, time limits and custom filters. The is a free, cloud-based Internet filter that blocks inappropriate content, sets time
basic package is free but has some good features on offer, whilst the premium restrictions, forces safe search on all search engines and works on both Windows
package costs $39.99 per year. and Mac computers.
Downto.ct tor:
•
s1n ows
The Hosts file is used by the operating system to map hostnames to IP addresses. lt's a historical
file that's used by Windows to signpost internal and external websites, and other such networking
services. You can use it to your advantage though.
Search suggestions
Run as adlminist rator •• 192. 54 . 94 .97
38. 25. 63 .19
f"hino. acae . cc.
X. &GMt. COII
# source server
t x client host
STEP2 Within Notepad click File> Open and navigate to c:\Windows\ STEP4 it's this fooling Windows that makes this such an effective solution
System32\ drivers\etc. Click the drop-down menu saying Text to blocking sites, as you're not fiddling with your router or other
Documents and change it to All Files.Thiswill list the files within the etc folder. networking devices. Let's say, for example, you want to block BDMPublications.
Click on the Hosts file, then click the Open button. Open a browser and go to the BDMPublications website,
https:Libdmpublications.com.
r X
- 0 X
"' 1" « Windows • Systtm3Z , drivt.rs • «c
!li' • Cl
"0 o 1-
,. ,.,,, . .
1< - L IB
...
TYP<
* Quid: .tecess
0 horn llltll/201721:01 Fik
BUM Pubhcaltons- Innovate. tducate. lnsptre...
• Otsktop "
0 lmhosts.wn 18103/2017 21:01 SAM FPt
..... Oownload$ t1
0 networb 1&103/lOHZI:OI Re
~ Docum~nh 11 0 protocot 1&103/2017 .!1:01 Ak
.v. . .
Pictures. -1 [j scrvkn 18/031201721:01 file
Jt Music
& OntOrivt
_ Backup (E:)
r/1 Ntctwol't y ( )
Folename. v ~
L- - ~ ~ - ; n - ~ 7[ ~ - ~ - v ~
Recommended Publication
-
Categories
STEPS Either close or minimise the browser window and get back to the STEPS What we've done here is fool Windows' networking services into
Hosts fi le in Notepad. Press Enter a couple of times to start a new thinking that the website bdmpublications,com, is being hosted
line under the last hash and type in: 127.0.0.1 b.dmpub.licatio.ns•.com. Don't on the computer itself and not out there on the Internet. If we wanted to remove
add the HTIPS or the w~1 part, just as it appears in the address bar. the block, we can simply delete the line or put a hash at the start of the line and
~ hosts· NottpJd
save the file.
i
file
Copyrigh~
[drt f.onnat
(c) 1993-2999
Vi_. Help
Hicrosf~ Corp.
~ ..............
• Thi$ is a $a•ple HOSTS f t l e used Mi<rosoft TCP/IP for Windows.
# by
File (dit f omv~
• This contains the .appings of IP •• This. i.s .a UIPl~ t()STS file ustd by Microsoft TCP/lP for Wln<Jows.
~ fil~ to host na..s. E•ch adr~se
# en~ ry should be kept on an individual line. The IP address should
# be placed in the first colu•n fo llowed by the corresponding host na.e.
•• f his file cont<ains th• ~pings of lP ~dros tO host n~-.s . f~(h
• ent ry s hould be kept on ~n indlvu~ line. The lP ~dr s should
# The lP address and t he host name should be separated by a~ least one
• be pl•ced in l~ fir)t c ol~ mn folJ~d by t~ Cor@~p nd in e ho$t n~ n@.
I space .
• rh• lP ~drs and th• host namo shOuld bo S~P4 by at least ono
• • space .
r atod
i Aditonal
~
y ~ ca.en~s (such as these) .ay be inserted on individual
lines or f ollowing the •achine naae denoted by a ' f ' sy~ol. •• Addltlon•lly. <~ts (such as these) .ay ~ i nserted on lndlvldual
•
i For exa11ple :
• llnes or fol lowtne th• .acht ne na.- d•noted by a ·•· syMbO l.
•• 1=-oro exa.,.,le:
•
i 192.54.94.97 rhino . ac11e. COli # source server
•
i 38.2S.63.19 x.acw.ca. t x cli ent hon
• 38 . 25.63.19 1 92 .~ 94 . 97 rh!no. acrne.co.. • source server
# 127.0.8. 1 localhost • local hOst natne resolution is handled within OUS itself.
it ::1 localhon • 127.9.8 .1 local hOst
11 : :1 localhost
127.8.9.1 ~mpublicatons.-
11 ~27 .9 8 .1 bd~tpuUcaJons.
• ••••••••••••• •• •••••••• •••••• ••••••• •••• •••••••••••• ••••• •••••• ••••••• ••• •••••••••••••••••••• •• •••• ••• •••••••••••••••••••• •••• •
STEP6 In Notepad, click File> Save, to obviously save the newly edited STEP9 Over time you can add more sites to the Hosts file list, pointing
Hosts file. Now get back to your browser and either refresh the each one back to the 127.0 0.1 address of the local computer to
page or close and reload the browser. When back up, in the address bar enter the block it from ever being reached; even if you use a different browser or other
site: https://bdmpublications.com. You can now see that the page won't load. Internet accessible program.
D >< 'J HOSTS · fc ~d
0 File Edit Format Vi~ Help
# Copyright (c) 193 · ~&9 Micro5oft Corp .
w
STEP7 You can try searching for it via Google or Bing but it still won't STEP 10 Ifyou want a complete list that's already been created, then
load as you've successfully blocked access to the website's WinHelp2002 provides a downloadable compressed Hosts file
hostname from the Hosts file. You can also see that any sub-domains after the that you can replace your own with. You can find it at http://winhetp2002.
main bdmpublications,com address are also blocked, which is certainly handy mvps.org/hosts2.htm;just read the instructions to replace the new Hosts file.
for some sites.
, ,• • _6_ .. u ·.o.o.t.
m bclmpl.tlhcabOI'Is.com
- ~ ,. , ~
e. 1 • • o.o •
."
o£1 El or t I'Nd'l rl'K 'f)i9e X + V
11 ••. 6
- hlGI.>. ; >JIII
.~
•• •v.\1.•
~ ~ 0 ""'"""m ~
'' &PC MEl l
• 1. • • • •
;:• 0 ~
UlO~SIAT
All lm~ -.
,.,. .
'""""' M...
..._. -·
t.~wv
--·
lldmpublicatians c11m ..
blaek dog ml!dia _, tht ~Wl9 el~ 1...,. !ol!lCI tr>o Oco;-.~ ~:. «Jwrlo<~d ~bol\. f:ron tr>o "$<1vo l.l' ~ ~. ~ thCI Oe~ 1001'\ on hlelt -.:t.
BOM Publ~etdon - lnoome, Edtlal&.IMI)Ira Re<:otTI'IMit\de Pl.lblkalioll Beglnnen
Guide loAndfllid VeA 24 Choosing your new Anltoid phon. 111 only lh1tnd ""'*'ill black dog media limited (;'<l. lo~· thil wa UYe ~O.J
r rc.Yfi'.IOe:*top ~
10 YO ur'~
<kfl:(hl»b.Z>P) ~ )de<t:
About Sign In bdm tn"911tinn
t4ev• ono lo lolow n.-an Blac k Dog Sign in EnuD T)'pe you1 llfNII ~drn!l. bdm ouidebooll ..riM Cl<* Hnt.. 6ck Ht.:t.. _ . , "~ :
Me<lilltd saw the booll.ilzlne ItS fir P~ Type your pagsword. bdm ltl!finillw g11idc! M~rklt •sa.- Olr-.:L.41110$•, dkt Fil!..to
NOte: lrcl l:xtv ~ ullk!M M«~ lee• m~ dirt«- ·-
bch m~l &erle6
Register Colour to Create Vol. 9 blec:k dog m&die · ~»:lie
Tio• .,.,._ o,.. ........ u utood t ....u. r~dw .., yuuo .,_._top.
Sign 11p Enul Typo your c~rnil ~ Colour to CfNio Vd. 9 Tho pc;aa:ftl ;~nd
0~ dlcfl en tilt lflCl.<W4 ,....,..,_.IMC lit, ltw Will NIWNI tM Ulttlf!O f KI ~ nit to ttOSTS.MVP. then il d «17t the IIICldt<S i.Cid•ttd I ~ IN to IN c
PasSWOftll '/pe VOVI pa9$-"0I'd calnWig W'f 10 g;Wl toC\19 lw~ "" I"•• _,,.__._Yft\7 ' "' ' ' "~' ' ' '5o._, ...., I • A0<1 A' AllnOr...lrAtoll
See resub ooly from bG'rti)VbllcadoB9.com
htlpr.:Jiw
BDM Publications - Home J Facebook
.~ . com/BOM Pub l icodfl ~ 1 ~ 1 6 1 3 .. j
•
a ew1
ace eens
If your child is thirteen they're now, according to the rules of the company, allowed to have a
Facebook account. Facebook's popularity has waned in recent years with teens but it's still heavily
used. Therefore, we need to make sure that our teens are safe when on it.
~a
........
-
on.- ....'-"
--- 'Ne'\oe ~tlwri'I!U l -f tonlkls Mid !be o11tCOUIIIONdV.tion01:1110
O ul:ltC..tw
Wooo0.....
Two-fac:t.or aulhenticafion is oil
J•J
r aCt"nu Le-am more
1 11 r o 1 o•OOI tom lo
Selup
c· ........
~ ·~ _.., ~ TM messaoe (SMS) · Add otlone numr>t•
Pl'l li~P ocn rPf(lp!t
& C:ll9ou '""'"'• lo c -Wd i' you ,,_ loc:I<M out
L okHt ·ll.<t oil) •t • " -~ ........ l'tn,.. QC' I"' "rt t:ill'rll
·-.....
Ill .........
o •...-
·> a. c:.~-
~
1!!1
~
..,
-.ooon I'C
'""
MdroiG • ~-1\.
_,.
-- ._ , ,~
.,
"""''0"'11900"1
UMtei'UI!QciOIII
~ Se<urllr ka,S . -
J
'I
'1.. V2F stamtr 1.:1 1og 1 ..._.use r
_
1\ltdi'Oitll • t..ow...on. """".. ~ d
.. ..... • !l •
rou r-dl"! t~-=e -....:>a ~ a\Or our F.xe~o .tPr tu r~-
............. , u Ofd n collet Set~ a lit~ar a pp
" Cll••
r ~·-ont
.,.,.... ·u-- .. ~>M. -~< •••11•• .. ::= Reoowrr codes Get codes
YOU t;U :Is
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Whilst in the Security and login page, click the 'Get alerts about Click on the next section heading on the left-hand pane, Privacy. Take a
unrecognised logins' section's Edit box, this enables you to view if your moment to run through each ofthe options in this page, to ensure that
account is logged in from an unrecognised device.This particular function is your account is as private as possible, whilst still being available for true friends
handy to keep track of when and where your Facebook account is being used. and family to add you to their friends lists.
o0 Gtntral
• Sect.my and tog1n
Privacy Settings and Tools
]
lP Privacy
Senlno up exlrll securil'f
0 nmeJine and tagg,oo
O BIO<I<Ino
1:!3 Language
... Get alerts about unrecogni.s ed logins l ntlltif au<ktfc~IO posi.S ~OIJ\t "hi!IIIO Mm
Well lel you knowrtanyone lOllS In from a OEMce or browser ,ou donJ usuau use \ ) Notiicalions tnenos at !Mnds or f'u:!lic?
,_
!) Uoblfe
Log tn us1no a t::ode from your phone as wen as a password Who can klok me up? wno can loot rov 1.10 08~ Ii'l• ,m;~d ijcJ<Jtess !j ftltll'll'"
11!1 Aoos
[jJ A~'f rts
·-"'
~ cnoose 3 to 5 friends to contact If you are locked out y, 1'10 C3f'IIOO't rou uo ~ 1r.e rrnont nymoe-r yov rnMCit
t:il P#'JMtniS
Your trusted contacts can send a code and URL from Faceboot: to help you log back in
~ -
J;l VidtO$
..... Do \'OU w3fll s.e.vch engrnes outs.ae- o1 F·.;;ceooow: Ho
11> link IO rour PI'out?
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
We're sure you don't need telling this, but never typeyour password into Try to avoid being drawn into mass phishingposts, where the response
your Timeline. lt may sound like a very basic tip but there have been asking is along the lines of 'List five things about yourself, then pass it on:
instances of users being fooled, or simply not thinking of what they're doing or or even posts that ask for likes. These are generated to ca tch active user
where they're typing, into entering their password into the Facebook Timeline. accounts, which can then be used for phishing attempts.
0
~
•••••••••• • ••
Photo/Video Feeling/Activity
f; Slicker
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Never accept a friend request from a random stranger. Sometimes they Don't be fooled into thinking that posts asking for people to help locate
accompany their request with a message, something along the lines of a missing child, pet or object are real. Not only are most of these
'hey, remember me'We met in town.. .',or something similar. The hope is that phishing attempts but often they can be attempts of someone trying to find a
you'll accept the request blindly and once in your friend list, they can get all person; there could be a reason that the person in question has left, an abusive
manner of details from you. relationship perhaps.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Although it's nice to put forward information about yourself in your Always think before you enter a post or reply to one. Just as you would
Facebook account, be a little cautious and consider not entering too in life, sometimes it's best not to say anything at all rather than offend or
manydetails. lt's very easy for someone to then retrieve information regarding anger someone who's is blatantly baiting others. Think also about what images
your date of birth, where you live, where you went to school, where you work and you post. Could your address or other details be discovered from the image?
soon.
.L About
:+ M CI a UIWQfSJly
•
a ew1
eens
Twitter has been seen as both a force for good, allowing users from other parts of the world
to communicate with what's going on in their country and as a platform for the nastier side of
humanity. For teens, there's a lot to consider with staying safe on Twitter.
Twitter Twits
The age for setting up a Twitter account is thirteen but even adults can find t hemselves in a pickle from an errantTweetor a Twitter-based phishing seam.
Here are ten t ips to help keep you safe on Twitter.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
In Twitter, click on your profile picture and choose Settings and Privacy Just under the Direct Messages options, look to the Safety section. Here
from the menu. To the left-side of the Twitter interface, click on the you can opt whether to hide Tweets that may contain sensitive content,
Privacy and sa fety Iink. Consider enabling Tweet Privacy and disabling remove blocked or muted accounts or display media that may also contain
Discoverability for improved safety. sensitive content.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
1_11111 Further down the Privacy and safety section, make sure that the Direct 1_11111 To the left-hand options pane, click on the Muted Words section. With this
W Messages option, Receive Direct Messages From Anyone is unticked. This W option you're able to hide certain words, phrases, usernames or hash
way you won't get messages from anyone on Twitter, just those who you follow. tags. This is a great option to mass block any conten t you never want to see, or
that contains inappropriate content.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
. . , Ifyou see a Tweet from a user you don't like the look of, or isoffensive in . . , Try not to reply to any Direct Messages sent to you on Twitter Whilst
W some way or form, you have several options available to you. Click the W some messages and accounts are real, perhaps a job offerforexample,
down-arrow next to the user's name and you ea n Mute, Block, Report or simply many are simply Twitter bots phishing for active accounts and details.
opt for I Don't Like This Tweet.
Awesome a.nd Cool @AWESOMECOOLUK 111
Today, we begJn ihe countdOwnll
COpy 11nK 10 TWeet
Embedl-
Mule @AWESOMECOOLUK
Sumethlr~g ~
BlOCK @AWESOMECOOLUK
Report Tweet
MESSAGES
' .. ' ............................................................
. . , As a Twitter user who hasn'tenabled privacy, you're open to anyone
W find ing and following you. You get an update as soon as someone does
follow you and you then have the option to Mute, Block, Report or remove the
user. Don't be afraid to remove a user if you don't know or trust them.
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Never click on any links that appear in a Tweet or as part of a Direct
Message. Unless you specifically know the user and can trust their
Taban · Nick Viney fltobin Long Tweets or messages; the link may lead you to a site that's riddled with malware
@Taoan nteet 10 @taban @mck_'flncy filiKT"' • ..u @longr79 folw~ r-U\1
Aui!W)r T Soo:nd a Dlccl r.~ VP tOI'ISI.MI'IH, ilfnelblle & small ti!JSir'leU Fatnef 1o tf'be or .4, ~ 1o a long
or fu rther seams.
MUSiCian. ac @t~Ne PaS:SiOtl ror lllset:l#lf'Y and SUI'Jeff"g •ife Md E~ ~ In
Jcnnat.r AdO Otrtnme nom ~rJs ttecl'l Big rugDy supporter and family
llldll.
""""""
Harry Monmouth Sprocket Man Mike Mee Share a link with your followers
@~ryf.tonmu!h f... • "' ~pmtlo»7 ~ ""
You have dlscowred the twee.4 Jeed 01 Just a small cog 1n lhe mac:IWie '1/Ky Short, chtlnky, bearded Ukes Hello world https://example.comlloo //demo via @twitlerdev
HarryiAOnmOUih •10XP proud lather and husband,. NcwcasiJe lecttnoklgy (relro&moocm). real ale,
Eagtes fOOd. Orlnk, •nat tnore tan mere lu'lllnO sme!llf19 P~S a~ . VBA coong
be? andp~h y
83
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
. . , Just as with Facebook posts, don't be fooled into commenting on posts . . , Always think before you reply to any Tweets, post your own or upload
W that are phishing attempts. These are created to fa rm for active accounts W any images. it's very easy to offend and become involved in a heated
and gather information about users' tweets, and any personal details. war over something you don't want to be a part of. Don't become the victim
of anyone baiting you into an argument. If you are, then sign off and leave
the group.
Password:
•
a ew1
eens
Much oftoday's Internet youth has moved from Face book and now inhabits lnstagram. This social
media platform is used by celebrities, politicians and a user base of over 700 million. Needless to say,
it's population is varied and contains those who you wouldn't want contacting you.
lnsta-scam
In compliance with the Children's Online Privacy Protection Act, lnstagram requires that its users' minimum age to sign up is 13 but even as a young teen,
there's still plenty to do to help improve your safety.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • ••••••••••••••••••••••••••••••••
a lnstagram is a simple photo and sharing app but there's plenty of a Staying in the Account section,
g •
X Edit Profole
~ .tl 66'- U 11:02
v
B material and content out there that shouldn't be viewed by minors. That ~ tap on Edit Profile. This iswhere
being the case, tap the person (profile) icon in the bottom right, then the three you can create a profile picture and
vertical dots in the top right. Thisopens the lnstagram Options window. From include other information about yourself.
there, scroll down and enable Private Accoun t. it's up to you how much info you want to
G3 • f. .ol 86"' U 10:58 add but it's often best to take a secure-
Davld Hayward
minded approach and not giveaway
f- Opt ions
too much. davidhaywardl 19
Two-Factor Authentication
Blocked Users
C Try lnstagram Business Tool.s
Switch to Business Profile
PRIVATE INFORMATION
Private Account
[email protected]
I. \
0.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
a
B
Uploading an image provides multiple options, from choosing a filter,
image style and so on, to tagging other people, sharing with other social
a
B
The lnstagram Help Centre is whereyou can report a user for
inappropriate conten t, abuse, spam, hacked accounts or exposure of
media platforms and adding a location.lt may seem harmless enough but private information. it's available from any browser, as well as from the app itself.
consider not sharingyour location, as it's instantly available on lnstagram. lt Be familiar with it, as you may need it someday.
doesn't take a genius to loca te where you are. lnstagra.m Help Centre
a TagPeople
)
SHARE
11 Faoebook W Twittef
t Tumblr
Advanoe<l Settings
El """" 1l'P.!; or """""'
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
aS Be wary of what you see on lnstagram. This applies to other social
media platforms too but lnstagram users appear to revel in posting fake
a
~
Ifyou find yourself involved with someone or a group of people who are
obviously trying to create some form of hate messaging, bullying or
or photoshopped images of themselves or others, or even events. it's a huge similar, make sure you take any screenshots as proof {in case someone reports the
source of image-aware and body-conscious behaviour, that's influential to incident) and walk away from the conversation. Block accounts if necessary, to
younger minds. In short, don't always believe wh at you see on lnstagram. stop further instances happening.
<;> •.t aa" U 11:36
Explore
• ••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
a Parents: before you allow your young teen access to lnstagram, it's best
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ~ you have a read through the company's Tips for Parents section. This
a If you've approved a user, whilst in privacy mode, and they start to send
can be found atb.ttJU;[Jhelp.instagram.com/154475974694511/?helpref=hc
B you inappropriate images, video or comments, then make sure that you
fnav and includes everything you need to know about what it is and how
it works.
show a parent or guardian. Don't respond to the sender and don't unfollow or block
them until you've shown someone or taken a screenshot of the content. lnstagram Help Centr@
v What Is lnst6gr&ml
TtoobleshOollng and l ogln Help > v Does lnstapram allow post.rnastKtomy photos?
•
a ew1
eens
WhatsApp is a free messenger app that can make Internet voice and video calls, send messages,
images and other content. lt's a little safer than some social media platforms, as you need a user's
phone number before being able to add them; but there's always room for further security.
WhatApp?
There's plenty you can do to improve your privacy and security and remain safe when using WhatsApp. Here are ten tips for teens and parents when using
this popular app.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••
m According to WhatsApp's terms, the minimum age needed is thirteen m WhatsApp has a high-degree
~ years old before a young person is allowed to use the service. Thankfully ~ of encryption and security
young teens are only able to contact those who they have added to their already built-in; however, by tapping
WhatsApp account but it's best to occasionally check their contact list in case of the Security option within the Account
someone unknown being added. option, you're able to display any
security notifications that may crop
up from time to time.
Last seen
Everyone For added security, enable two-step
verification, which will require a PIN
when registering your phone number with
Profile photo WhatsApp again.
Everyone
About
Everyone
Status
My contacts ENABLE
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
tJill Ifyou're using the web version ofWhatsApp, click on the three vertical tJill If someone becomes aggressive or starts to bully you in WhatsApp, take
~ dots, followed by Settings. Although not as comprehensive as the app's ~ a screenshot and record the evidence, then approach a parent and
settings, you can set up your notifications and block any users if necessary. guardian and show them what's going on. Don't respond to the person and don't
block them immediately. Always talk to a parent or guardian before
doing anything.
. --
.
0 ......
""'
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
tJill Back to the Privacy settings in the app's Account option, don't forget to tJill Any contacts that send you a message can be blocked, muted and the
~ limit the Last Seen setting. The three options available are: Everyone, My ~ chat content cleared or emailed if needed. Just open the message, tap
Contacts and Nobody. This wi11 prevent contacts from seeing where you were the three vertical dots and select the appropriate option from the menu.
when you posted any content.
View contact
Last seen
Media
@ Everyone
11 Messages to this cl Search
0 M y contacts with end-to-end enc
Mute
0 Nobody 1 UNRE
Hi 12 38 Wallpaper
CANCEL
More
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
• •••••••••••••••••••••••••••
tJill WhatsApp also utilises the device's built-in Location feature. This tJill Once you have a message
~ enables geo-tagging of conten t as it's uploaded. lf you want to upload ~ open, long tap the contact
something but want to make sure that nobody knows where you are, quickly tap and you can see the con tact's
the Location function on your device to disable it before uploading. information. From there you're able
to block them, report them as a
spam user, mute them or even
verify that the messages sent are
fully encrypted.
Mute
Custom notifications
•
a ew1
eens
Popular amongst young teens, Snapchat has continually raised its appeal by offering alluring
features at the cost of security and privacy. The most recent update (at the time of writing) is Snap
Maps, a feature that tells everyone where you currently are.
Safety Snaps
Snapchat has some useful features but also some slightly scary security issues. it's best then to make sure t hat you're as safe as possible when using it.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
U Parents: Take the time to look through your child's Snapchac contacts. U You can create your own Snapchat Stories, by tapping the three dots in a
Together you can limit who can see what and who can con tact your ...-.,,., triangle in the bottom right of the Snapchat interface. Make sure that you
child through Snapchat's various functions. also tap the cog icon in the top right within Stories, in here you'll be able to limit
who sees your stories. Try and avoid choosing Everyone, if possible.
- f •
Photos
< My Story
Tap a photo with a Snapcode to add Who can view your Story?
that Snapchatter!
Everyone
My Friends
Custom
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••
U Tapping the magnifying glass icon will open the global Snapchat Top U Snap Maps is the newest
Stories. From there a user can search for something specific or view feature to Snapchat, one that
any Snapchats via the various headings. Be careful here, there's a lot of enables other Snapchat users to see
inappropriate content out there, along with dubious individuals who would like where you are in the world. To open it,
your information. pinch your fingers like you're zooming
out from the camera screen. When
asked, you're able to set who can see
your location. Always ensure you
know your friends, or enable Ghost
mode for better privacy.
My f.roonds
Select Fr ends
Next
• • ••••••••••••••••••••••••••••• , • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
My Contacts
Add or invite friends from your contacts
Snapcode
Scan a friend's Snapcode
Nearby
Add friends when you're near them
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
CONTINUE
< Share Username
Send yourfriends your username
Friend Emojis
Edit Name =>)
( Remove Friend )
Permissions
( Block )
Advert Preferences
• • ••••••••••••••••••••••••••
U Under theAdditional
Services heading, the Who
< Settings
( Report )
CANCEL
Can... heading enables you to WHO CAN •..
specify who can contact you or see • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
your Stories. it's best to limit your Contact Me
My Friends
U Just as with all social media platforms, if you're uncomfortable with
account so only friends are able to the content or messages that someone is sending you, tell a parent,
see you or any posts you make, as View My Story guardian, teacher or other responsible adult. Don't respond, don't send
opposed to the Everyone option. My Friends anything to them and always think before posting any images of yourself and
your location.
See Me in Ouick Add
ADVANCED
Notification Settings
MORE INFORMATION
Support
a ccoun
•
ows
If you're sharing a Windows 10 computer with your children, or they have one for themselves, then
setting them up with their own account will work better for you both in the long run. A Windows 10
child's account gives them freedom, and you can set up certain restrictions.
STEPl Start off by clicking the Windows Start button and typing STEP3 You need to sign in with a Microsoft account for this to work. If
'account'. The first result that should appear is Manage your you've not already set up a main Microsoft login account for
account, if anything else appears, maybeyou have some work labelled 'account; Windows, you'll need to click the Sign in with a Microsoft account option. Once
then scroll down until you find the Manage your account option. done, you're presented with the current family members who already have
MS accounts.
- c
Filters v
Family & other people
:::O<tt::::•no,___ _ _--'-J
1t - '::::'"":.:' P( Your f~ mil y
Best match
YOI.t (ill\ ilf.OW IJII'IIIy tnen'lbei'S to SoJQI\ In tO tt'IIS 1'(. Mull$ c.lA
,...,.,. li1mdy .srttlngt onlnc! ord ~ r«cnt octN"q> to tdp kids
stty sofe.
p,::; Manage your account
System settings
Search suggestions
Apps
Store
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 You now find yourself at the Windows 10Settings page, in the STEP4 Next click on the Add a Family Member link, next to the plus sign
Accounts section portal. Notice there are links down the left-hand under the Your Family section. This will launch a new pop-up
side, look for the Family &Other People Iink and click it to continuewith the process. window to create a new Microsoft account You need to make sure that yourchild
I~ I
-
,, '
Your info
• 0 X has an emaiI address and that you or they currently have access to it to
authenticate the process.
X
coonts
Add a child o r an adult?
Your •nlo
Enttot lht t!mai ac:ktress or tht person you want to add. If thry tM WinciOY.os. Office.
Email &appa Ol.ttiooii:..COtn, OfleOrive, Sk)'pe, or XbOX. tntet tht ematl ad<ftess mey use to s.gn in.
DAVID HAYWARD
Q Add " child
BiUnv .nfo. family ~tngs. ' u ~e" scw ri ~ Sle':li119So and 0 Mdanadult
"""'
~., ...,l'otv~
I E.ntCJ tbcif cmait addt('SS
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS Click the Add a Child option in the new account window and STEP8 The child's account is now ready to be activated. The message
enter their emai I in the text box section below. When you're ready, box informs you that you need to respond to the email Microsoft
click on the Next button. has sent before they're able to login in to the Windows lO computer. Click the
I Microsoft account X
Close button when you're ready.
Microsoft accou-nt X
Kids are safer online when they have their own account
Let them know they'll need to be connected to the intemet the first time they log into
0 Add an adult the device.
I [email protected] xl • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
The person I want to add doesn't have an email address STEP9 Microsoft will send some emails to the child's account. One will be
a Verification em ail, and you, or your child, will need to click the
link to activate the account; they need to login to Microsoft online to complete the
process. The otheremail will be an invitation to join the family account, which you
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• also need to Accept.
STEP6 You now get the message that it's not a Microsoft account, click
the link to Crea te a Microsoft Account. This will bri ng you to a new
!iilOilcom f.!. ~"'
r!i '•
rl!l
C>-:o• ,.,..
ril
• • St<•ooo ~'-·
*
window with the email address you've entered already filled in. Complete the '\ Vertty ~ur f!m;\ll <ldrf' _ <~;c
0
relevant details and click the Next button to continue. r ...... ~._, o
•
,._
-.........
Microsoft account X
Verify your email address
a ,.~
After you sign up. we'll send you a message With a link
to venly this user name.
I [email protected] • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Get a new email address Using the child account to join the family will send emails to
STEP 10
I ••••••••• you confirming the accepted invitation. Back at the Windows 10
Family & Other People window, you can now click the child's account and allow it
I Unoted Kingdom v J
to login, or manage it via the Microsoft Family portal online, which we'll look at in
I January v ll._6_ _v_.l l2000 v J
the nexttutorial.
X f v
Microsoft account X
•
Slodt
11 Enhance their online experiences by letting Microsoft Advertising use their account l lclp Wllh saeen ltrfle titnlb
information. {They can change this setting at any time.)
Help wnh actJ'rlty reporting
...__l!ll Serul tblml DOJJono.lional otters ([om MicrpsoJtlittey cao UJJsubscribe at anYJim.eJ
ows
•
am1
Microsoft's Family portal is a continually updating service that allows you to monitor, control and
share features across Windows machines and Xbox consoles. lt's designed to help share calendars,
set screen times for games and set up safe browsing.
Happy Families
The Microsoft Family portal is where you're able to set the variousfeat ures. First, you need to browse to https:/ jaccount.microsoftcom to login with your MS account.
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPl When you've logged in to the Microsoft account online, click on STEP3 Being a parent or guardian, you can set Activity Reporting for any
the Family link found along the top set of menu options. This will of your Jv1 icrosoft eh ild accounts. Click on the Activity reporting
display the current members of your Microsoft account, adults and any children slider to the On position; this will instantly block lnPrivate browsing within
you've added, as per the previous tutorial. Microsoft Edge and start to collect data on their online activity.
• [email protected]
Your family
rlecent activity
Web browsinq
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEP2 Under the child account you can see four options: Check recen t STEP4 Under the Activity reporting, you can see sections for Web
activity, Web browsing, Screen time and More options. All the browsing,Apps &games and Screen time. To the right of each title
options can be accessed by clicking on any of the links, so to begin with, click the are links to set up web access blocking, game and app blocking and so on. Click
Check recent activity option. on the Turn on blocking link next to Web browsing to begin with.
Web browsing
8 anon.ch>[email protected]
When your child browses websites, they'll appear her ~
Rc«-nt 4Ct1Yity
Apps & games
Web browsmg
Apps, ~ & media When your child uses apps or games, they'll appear here.
~Vet"l n.e
Purchases & spending
htllf )'C.IUt Cluir1
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
STEPS Providing the child uses Microsoft Edge, you can set Windows 10 STEPS Purchases& spending is an interesting option and something which
to automatically block any inappropriate web sites by clicking the we'll be looking at in the nextcoupleof pages. In here, you can
slider in the Turn on blocking link to the On position. By default, Microsoft will specify a spending limit on the child's account as well as view their purchase history.
block all inappropriate sites but you can also specif; an allow and block list of
sites yourself.
.....
~n:b<S M Sf.il'l:a eflfjltltS ..a lmtfOAI~ ~ .wel
__ .. .... ,
STEP9 The Find your child setting works only with Windows 10 Mobile
[ttw I!W Wo1 • ~!JtOIwl'o ""' '"'" ... ~ ol t ~ l ie )1011..-ciiCI t!Co«
STEP6 Click on the back button in your browser to return to the previous
[email protected]
page. Now click the Apps &games section and the Changing
settings link. In here you can set age-specific restrictions on apps and games, as
well as block certain programs from running, such as another browser, forcing
them to use MS Edge instead. Recent activity
Show the luwliun uf )'UUl Ulitf~ llc!vio..e
Web b- r ow~ i ng
Xbox priv•cy setTings To use find your dlild, tht:y need a Window$
With this Mlcrosort account
1!1 """''"'
• • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Blocked apps & gomes
If you own an Xbox One or Xbox 360, you're also able to set up
Sow~tiOrls.
.....-.. -- STEP 10
any Xbox Privacy settings from within the Microsoft Family
portal. You can specify video chat, viewing of profiles, sharing and other forms of
...... communications from the console.
"""
,.,.......
-- n~e g.n~
Privacy & online safety
Pt boc''low li~VW Utc gcq~l.: in >'VU• xtm l•nti'y. To U~tFI,Jc
"'*<hlf'IQC:S. mtfl Ptt:SS SIYe.
wr~e'l pm.~ •nd uu!in( wkty
-
c.Nrnv• pmworo
"'""'""" Chef'lC( C6t!'ltl'l6Q
M"ttincp. M'l«t thtir QllmtfPk. tt'ltn
sttllf19S 101' i1 N CI'IJclfftl 11'1 1~ IOI!'njl)', ~
AIY( t<fl.l!t in th( f•rnity QA m.-.oot fh(
cWchfl c..\A Orly stf (an<f tiOt stQ U'lell' O'M'I JetttngS. ~rtnu 11
MO S,lt ' " " ' - (unldd pter"!~ )IOU upd..~ )'OUI Cl'Ms st~ tl'ltywttl I'IHCI totog out ...:t 10911'1 tor trlfm w tat:t ~ft«.
fOI'\Im$ Jl(fttttncts
Xbo11 360 pteMt-
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• C«>l«1>00
PI 'VN'f lt Mlll'lf' ~ft"')
STEP7 Screen time, found on the link to the left under the child's Mlo'ofott liNM)'
COMttlt bC«':tS
< >
account name, will allow you to set time restrictions for the child. "-Ymenc a billing
These restrictions will work for Windows 10 computers and devices, as well as ~prle)n
Mlr\a9f: dfotl(ft
Xbox consoles. Xbox~mdws 100nL.
Oedh can:
~other ~ ~·, Xbox Lfl~ l)fofiles (XboiC l60: E¥CI')'body friends
Vfcl ileV~ )
s----"'
C)
-------.
'---- ----
M
. . ----------
....
Ot'o<l•to • llow « biOCIC SH:Itlg Oltlft peopif·s g~mt
flln.nry Nllf altlfi'VHIW!nr< tmtn an Xhl'rll OnP
A proli!( inducles jtlbm.-tion ~t
hlst«y and Oldltcvtt'I'IC1lts. tt c.at~
member's pam(
also COI'It>)tf'l a golo'l'ds
0 0 0
--
lnill:'lJ)IClp!'llltl'
--
-
"
----
--
---
--- -- ----· ~
•
~
==
mm
Uw video tot com~'
CommuniGition)
()(bolt )60: VkSoo Ewrybody .......
-·
-- ----
---- - - ------ -
Otcide to .tllow or blocle ()OI'I'II'II,IIic;btlng U$11\Q Vl(feo
on XboK t.rve:. ViOOo coml'l'll.lntUtion on XbQl( One
lrtQidfs USing Sllypf. On XboX J&0. ~ts Uttii'IQ I!KII.ICfS
0 0 0
- ---
vtcs.o KftWt Mid l~mf! VIOM.
- Sharl! fluff people: milD: ()(bOil ll6lk M~bf CDt!tMI;) E""rybOCIV fl11!nc:U .....
~
Further Protection for Young Adults
• •
...,j
The Internet is awash with horror stories from parents who have discovered that their child has spent an
impressive sum on agame without their consent or knowledge; but, just how much of a problem is this
in-a pp spending issue?
n-app spending is a modern scourge for parents, guardians and even the Of course, that doesn't help the parent or guardian who is now looking at
children and young people themselves. From the point of view of the their vastly diminished bank accoun t. What th ere must be is some form o f
parent or guardian, we have a child who enjoys playing a game, regardless middle ground, where the developers still get paid and the company can
of whether it's a mobile game, console game or triple-A rated PC game keep producing exciting and great games. Here the players get to reach
and we're more than happy to allow them to play the game without any the levels they want and continue playing t he game and parents and
restrictions, after all it's just a game, right? However, when those parents gua rdians can sa fely leave their children to play the game and
then receive the bill from their credit card company, or a call purchase an upgrade or two, without breaking t he bank.
from the bank, that their account is now several hundred or
even thousands of pounds lighter, that game has suddenly
become the bane of their existence.
In light of events that hit the headlines, children store, after all why would most people continually
spending thousands of pounds on purchasing virtual requ ·re password access to their own in-store account;
pets, virtual food, more lives etc., the main providers or when the child knows the password and can easily
of mobile purchases, such as Apple, Google, Microsoft access the store.
and so on, started to roll out levels of restrictions to
The child, left alone, could then go ahead and accept
help prevent overspending. These restrictions vary
the message from the game that asked 'to continue,
and have improved greatly in recent years; but initially
buy more apples' (or whatever), which in turn led
they we're more centred around simple tips and
advice for parents rather than the kind of spending them directly to the store to place the order in the
restrictions we see today. basket without any kind of con firmation or message
stating to check with an adu lt first.
Of course, some of t he problems also ari se when t he
game in question is clearly a pay-to -win model. lt's Most of the time, when these sorts of scenarios
hardly fa ir fo r the young person to enj oy the game occurred, the likes of Apple, Google and so on
re funded th e parents in question. r rom there, it
when they're continually beaten by those players who There are two main
can afford to spend the money on extra lives. energy became more difficu lt for a young person to go on an
schools of thought on the
and so on. The pay to play model, on the ot her hand, in-game spending spree with their parent's account.
Internet regarding the
requ ires the purchase of the app before it can even be There's a more controlled in-game and in-app
played. Some experts argue that this is a better model
overspending in an app
spending focus these days but it's still not unheard of
but that's up for debate. or game by a child. One
for a child to get a little carried away and purchase
several hundred on some form of v•rtual extras for
view is that it's the fault
One of the main causes for excessive in-app spending
is a child or young person being left alone with the the game. Thankfully, we can combat a sizeable of parents or guardians,
device and game whilst the parent was logged into percentage of these cases with a little education and letting their child on the
their own account. The account itself doesn't have any some much-needed tips, which we'll cover on the next game with unrestricted
restrictions or password access to get into the on line couple of pages. access to their mobile
spending platform.
Pay to
Win
•
son
n-a vers
In-a pp overspending, as we've seen, is a concern for parents and guardians whenever their children
use a phone, tablet, console or computer. However, there is a happy middle ground, where the kids
can still enjoy their game and the parents needn't worry about in-a pp purchases.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP2 Set up their own account: using a chi Id's account will dramatically cut TIP4 For Googledevices, it's best to either never enter your banking details
down on any in-app overspending. Generally speaking, most children into Google Play or swipe in from the left whilst in the Play Store,
won't have access to a bank card to enter into the in-game shop or have access to choose Settings and tap the Require Authentication for Purchases option.
the family bank details.
GM
Require authentication
Control, protect and secure your account, all in one place
My A«tcuul Of"'" you o:Jidt 80:ftiS to w.t;~o tlld oe~s ..,Ill you wl~ row c~ao., llll*:tlOl-l 01tt«y lfld c!tdck>tlow 'JOJf lnlonnutlclft ce n!IM ~
@ For all purchases through
~-" bel!illf tor J'OII-
Google Play on this device
6 Sogn-in & security > :, Personal into & pcivacy > 0 AcCQUnt preferences >
0 Every 30 minutes
-·.............
~
M•IIIOt 'I'OWI-llfll¥ Wllt'\01',. 1111 <kllf ..,. IIM
10 .,..... .ft p0Vr tllllf'\ti'IC..
Gtc ltntuto-. KC..ellilhJ: ef'ltCilll« Mlll:'l9' 1&11
NipJW IIM G;ofil
·--·""""
.......,.,, .... 0 Never
~ .... _,__
O............,nt&_k...,.
...... ~
(l(ftlNITQ
CANCEL
- And your phOne
?
-
........... . . .....
~you l'oiOOt -'tOll k'lll:$
- . . .... ~.,lit&f
.,~
"'"...... IIOIOWVA1.1NifV
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIPS For Microsoft accounts, use the steps from our previous pages to TIP8 EnablingAirplane mode whilst the child is playing on the device
create a ehild's account on your Windows 10 device; then use the stops any access to on line services and thus the in-app or in-game
Microsoft Family portal to restrict access to apps and spending. stores it's not ideal, and it can easily be deactivated, but for younger children it's
X a valid option.
x]
Airplane Mode
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP6 There's nothing wrong with spending money on a game, so why not TIP9 Talking to your children and taking the time to explain how in-app
consider setting up a limited amount of money on a Microsoft purchases work, and how bad it can be if they overspend, is a highly
account The child then has to then manage their own budget on in-app spendin g. recommended option. Child experts state that the best policy to prevent
overspending in apps and games is a little education.
• anon child [email protected]
!ftt!Mt tM.trvrty
Web browsing
•
Ap!». Q.JmCS & rooecW £0.00
"• - .lo'Wootolf-
Pwd1ase history
I .w~trI:UfO'* 3
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP7 Similarly, consider using a gift card for iTunes or Google Play to allow TIP 10 Before your child downloads and installs a game or app, take a
any in-app spending. This way it's a more controlled purchasing few moments to look through the app's information to see what, if
environment and since the child is happy with the bonus app-extras, you're any, in-a pp products are on offer. This section wi11usually inform you of how
happy with the spending and the developer still gets paid. Everyone is happy much money the in-app extras cost and you can then judge whether to allow the
with the outcome. insta11 or not.
WHAT'S NEW
Gtt rtady for a brand ni!N Mnt Goblin 11Wa.s.on1
The! goblins are rnvadtng the! realm and e~thr ad the good allrance tn flght1ng them back or tM M
a!liance in $UppOf'tlllQ their .actvanc:e
AO IT ONALIF~ MATION
Offered By o..etoper
!Congregate VIS11 Vt'Ebsne
fmad suport~l'f9<1me et
i'I'N8Cy Policy
ASIL~
Whilst you're doingeverythingyou can at home to ensure your child is safe when on line, what happenswhen they're out of
the protection of your home network?Schools are up against as much, if not more, onlinesafety issues as parents.
How does your Most of those questions are dependent Beyond the classroom talks and conversations, schools employ an
on the school i tsel f and what policies assortment of advanced monitoring tools and filters. The school's expert
child's school provide
it's created in collaborat ion with the IT staff will already use a range of network level security fea tu res found
on line safety? What council, local government, parents, only in the server versions of Windows, o r Linux. These features wi ll restrict
tools and procedures teachers and governing body. In the students' activi ties, whilst still offering t hem access to much needed
do they use? What the UK, the UKCCIS (UK Council for resources both internally and externally on the Internet. If your child is new
government backed Chi ld Internet Safety) has d rawn up to the school, take a moment to ask if you can speak to the head of the
and developed a gu ide for school school's IT or IT manager and ask them what they use and do to set limits
schemes are
governors to follow, to help governing and restrictions on local and Internet resources. Most of the techniques
available for them? boards support their school leaders used are quite fascinating, even from a non-technica l point of view,
in keepin g children safe online. IL's an and often can be applied to a lesser, but j ust as effective, degree on the
interesting six-page document and home network.
furthe r read ing can be found with the
accompanying Sexting in Schools and In addition to protection on th e network level, the IT team w ill also
Colleges 50-page guidance document. implement a range of site-level Net Nanny-like programs. They may only
You can find both at https;jj www.gov. use a single progra m, installed on a server to manage each workstation
uk/government/groupsjuk-council-for- or they may use several progra ms to manage each student's account;
child-lnternet-safety-ukccis. monitoring sites visited and provid ing blocks fo r sites that are deemed
inappropriate. Another element to consider with a schools' IT is the use
From 22 December 2015, the of its available bandwidth. With hundreds, ofte n thousands, of devices
Department for Educa tion put in and computers attached to the schoo l network it can at times become a
place strengthened measures to help litt le slow, as th ere's limited bandwidth. A school's IT team therefore must
What's their policy on protect children from harm online, also decide whether or not to block access to sites that will cause a strain
cyber bullying and which included cyber bu Ilying, access on th e bandwidth, such as on line game sites or media streaming. Whilst
what's the process to pornography and the risks involved the studen ts may be blocked fro m such sites, the teachers are usually
should anything with radicalisation. These measures unrestricted, for teaching purposes.
inappropriate ever enforced schools to improve or
implement better fi lters and monitoring These filters, blocked sites and bandwidth monitoring techniques
make its way into the
systems, guides on socia l media and all ad d up to make an effective protection net around th e school's IT
school's network? good practise an d the teaching of on Iine infrastructu re. it's important to understand, from a parent's point of
th reats and the issues surrounding it. view, the amoun t of work needed to achieve such a high degree of on line
sa fety and that it can become q uite expensive once you factor in licensed
This safeguarding of students through education is one of the best fo rms software. Where you might have purchased a child filtering product,
of introducing a heightened level of Internet safety amongst young people. and employed some of the security techniques we've used in this book,
Paren ts and guardians can rant and rave about Internet safety until they a school IT system needs to do all that times a thou san d-plus fo r each
are blue in the face but vvhen it co mes as part of a lesson in the school, the student, computer and device.
message is considered to be delivered w ith a more meaningful impact. In
classes, students are taught what Internet use is acceptable, and what isn't Nevertheless, a school's online sa fety requ iremen ts are exception ally
and given clear objectives for Internet use. The school is also capable and more advanced than you have at home. With this in mind, you r child is
often required to consult with outside child protection agencies, bringing less likely to experience any online risks when at school t han at home.
in experts to help fu rther the student's understanding of the dangers and However, it's always best to take the time to make an appointment with
risks of the Internet, social media and all forms of d igital behaviour. the school to ask what they're doing to ensure o nline safety.
The tips and features throughout this book will help you build a better understanding of security and
on line safety, with special reference to on line child safety. If you want to know more though, or you
have some pressing questions that need answering, here are some places to check out.
Help is at Hand
For more information, expert advice from child care professionals and more tips on how to protect your child when online, here are ten sites to bookmark
and consider.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP 1 If you'd rather contact a professional child care expert, person to TIP3 Regardless of where you are in the world, the UK's NSPCC website
person, then consider contacting your loca I doctor'ssurgery and contains invaluable information regarding child safety, especially
asking for a list of contact details of the child counsellors in the area. Most on line child safety.You can find the main site at htt;ps://www.nspcc.org.uk/,
surgeries will have all the relevant informacion to hand for you. with access to services and resources.
NSPCC
-
Bullying and cyberbullying
At a glance
urgery ......_.........,..._
"~lu_.,
-~.,
· ~-fil.,_
w.uu_,---
.101001 · - - - h
........ ,..,_.._ tlileOI*'IIdiiii--CM.IU<It
fMI bOCII ....,._... ~ ...,.....,
.........11.,...............-
""*"- •-~
-·(.111·-......._...,.....,...._01_
llfWOb ........
·-
~ Acr.6:1CMIMI ......'IfW)_.,.
• ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP2 Your child's teachers and school welfare officers wi11 have an excellent TIP4 In addition to the NSPCC, the UK's Childline is also an exceptional
understanding of how to help keep your child safe when online. They resource that contains a wealth of information and support for
can answer your questions or at least help point you in the right direction. families, parents, guardians and children. There's a superb online safety section
too. You can find Childline at https://www.childline,org.uk/.
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIPS Childnet International is a site dedicated to young people, children, TIP8 The American SPCC (Society for the Positive Care of Children) is yet
teachers and professionals, parents and carers. There's a ton of another superb site that details advice on cyber bullying amongst
resources and support available through the site and plenty of advice about other child protection issues. There's also a list of recommended books for you to
online child safety. Find it at http:/fwww.childnet.com/. look up. You can find the ASPCC at http:/famedcanspcc.org/.
fisP'cc
-- --
--·---
...
..-
---
4 I
...
+
......._,...,_ 1104__ _____ _.... __
_......,..-. ... _ .
;: "9
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP6 Internet Matters features articles, advice, support, guidelines and tips TIP9 There are some excellent resources available on the Get Safe Online
on how to protect your children better when online. There are plenty website. Here you can find tips, advice and tutorials covering nearly
of resources to hand for children at preschool, all the way up to teenagers at all aspects of online child safety, including emphasis on mobile devices; there's
college. it's at https:l/www.lntemetmatters.orgj . plenty to get through. You can find it all at https:/fwww.getsafeonline.org/.
•
1nturn•t ... .. 000 ..... •
mattoB.orq
••• """""" Get Safe Online
Free expert odvlce
Helping parents keep their children safe onllne
8ud n.st.
_...,.""' -
-......
yllfl ,_/"'..,.,.... .
_...,anpt'DI«f
, 1111 "*""....,..
~
ftrtd !!p! '
-- _...,._
Virm.tl rHIWf pmln& - WM I
piUI Uill i...:IIAI IutuW
Alfjj!!JA
Al"'u,.. ..
l lllnllht•
A!i!li!!l!A
l"'lmtnt .1ppa ndl:)' or
rill'lit)' dll.l!l IU wltl
C:hiJ'I
p&mltiUu~r
~> I'A I I'" r,. ., m~r. f.JIIf1,. rM
• • •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• • • ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
TIP7 To expand on the first entry in our list, local support groups are an TIP 10 Finally, consider checking out the website of, or visiting, the local
ideal source of information and tips. Other parents and guardians police station for more information on on line safety. The police
going through the same considerations as yourself may well be more than happy have information on area profe&sionals and child safety experts as well as further
to share any tips they have. information on what to do if your child is the victim of an online threat.
ossa erms
The bewildering world of technological terms is often difficult even for experts to navigate without
becoming slightly confused and we could easily dedicate an entire book just to the glossary.
However, here are some of the more important terms from the world of digital security and safety.
A
Access Control: A term used to
are used to flood a network or send
spa m message to the rest of
the Internet.
an external network, usually the
Internet. DMZ's help to enable the
layered security model in that they
provide subnetwork segmentation
ensure that resources are only Brute Force: A hacking technique that based on security requirements or
granted to users who are entitled uses all possible password
policy. DMZ's provide either a transit
to them. combinations one at a t ime in order
mechanism from a secure source to
to gain access to a user account
Active Content: Code that's an insecure destination or from an
or system.
embedded in a web site. When the insecure source to a more
site is accessed the code is secure destination.
automatically down loaded
and executed.
Advanced Encryption Standard
c
Cipher: A cryptographic algorithm
Denial of Service (DoS): Prevention
of authorised access to a system
or network.
(AES): An encryption standard used in the encryption and Disaster Recovery Plan (DRP): A
designed to specify an unclassified, decryption process. plan of action used to restore
publicly disclosed, symmetric systems in the event of a d isaster.
encryption algorithm. Cookie: A file used to store information
about a website that can be read Distributed Denial of Service
Asymmetric Cryptography: Public should the user ever visit the (DDoS): A type of DoS attack using
key cryptography, where algorithms site again. multiple attacking systems to
use a pair of keys, one public and amplify the amount of network
one private, to unlock the content Cyber Attack: An attack on a system
traffic, thereby flooding and
protected by the encryption. using malware to compromise its
security. Usually in order to gain swamping the target systems
Authentication: Used by systems to access to steal information or or networks.
confirm the ident ity of a user. demand a ransom. Domain Name System (DNS): The
Cyber Bullying: When an individua l, domain name system (DNS) is the
B or group of ind ivid uals, threaten or way that Internet domain names are
post negative and derogatory located and translated into Internet
messages or doctored images of Protocol addresses. A doma in name
someone online. is a meaningful and easy to
Backdoor: A tool used by hackers or
remember ' handle' for an
system security experts to access a
Internet address.
D
computer system or network,
bypassing the system's usual
security mechanisms.
Bandwidth: The limited amount of
communications data that any
Data Encryption Standard
(DES): A popular method of data
E
Encryption: The process of securing
channel is capable of send ing or encryption using a private (secret)
key. There are data by transforming it into
receiving in a speci fic time.
72,000,000,000,000,000 (72 something unreadable using
Biometrics: A security measure that quadrillion) or more possible cryptograph ic means.
uses physical characteristics to encryption keys that can be used.
authenticate a user's access to
Ethernet: Communication architecture
Decryption: The process of for wired local area networks.
a system.
transforming an encrypted message
Boot Sector Virus: A virus t hat can into its original text form.
affect a computer as it boots, before
the operating system has
even loaded.
Demilitarised Zone (DMZ): A
demilitarised zon e (DMZ) or
perimeter network is a network area
F
Fingerprinting: Used by hackers and
Botnet: A large number of Internet (a subnetwork) that sits between an security experts to send packets to a
M
stream of data.
Two-Factor Authentication:
G
Gateway: A network point that acts as
Malicious Code: Software that's
designed to circumvent security
measures and ga in unauthorised
Authorisation of access to a system
or resource through a username/
password combination as well as
another form of authorisation, such
the door into another network. access to a system.
as a PIN code.
Malware: A generic term to describe
H
different types of malicious code.
V
Hacker: Someone who v iolates or
circumvents a computer security
measure. Can be used for malicious
N
Network: A group of linked computers
Virus: A type of malware designed for
mu ltiple purposes to spread and
purposes or legitimately to test a infect as many computer systems as
or devices that can share resources
system's vulnerabilities. and communicate with each other. possible. Usually destructive but can
be used to grind a system to a halt by
HTTP: Hypertext Transfer Protocol, t he
protocol used by the World Wide
Web (Internet) that defines how
messages are sent , received and
p using up all of its available resources.
w
secure version of HTTP. criminals to obtain information from
a user by baiting them with fake
emails or messages.
I
Internet Protocol Address {lP): A
PIN: Personal Identification Number,
used as a form of authentication
access to a system, resource or
Wi-Fi: A wireless network standard
between connected systems.
standard used by servers user account. Worm: A type of malware that can
and machines to connect to each replicate itself and spread through
other systems consuming resources
R
other and form an individual identity
for each connected device. and contents destructively.
K
Key Logger: A type of malware that
s
Zombie(s): A computer that's infected
with malware and connected to a
network or the Internet and used to
spread its infection to other
Sandbox: A system architecture
can record key presses as a text fil e computers. Used also to describe an
designed to test code in a secure
and send that f ile to a remot e attack on other systems by hoards of
and safe environment without it
source. Once obtained, the hacker zombie computers.
affecting the host system .
can t hen see what keys
you've pressed.