Wednesday, 3 June 2015

Backing up

It's very important to backup your work for example I save all my work on my pen stick and a hard drive at home.
But you could also use things like the cloud and any other website like the cloud like dropbox or one drive.
I have personally used Dropbox as you get a free 2 GB space to save your files on which is a lot of space when you are only using it for documents etc.

Facebook Settings

These are my Facebook settings which i'm going to share in my blog
You can change these settings at anytime I use these personally as I think its secure and that no one can just search my stuff on Facebook.
Some people may decide to have their Facebook open so that anyone can see it at any given time.

internet explorer security settings

With internet explorer you are able to set settings, with each of the 4 modes displayed on the screen you will be able to set your own custom settings or select the few options they have with the bar
From Low to Medium to High.

Each settings are better for different types of users - people who are new to using the internet should use high settings until they get use to what they are doing then they can lower the settings to have more freedom on the web.

Wednesday, 6 May 2015

Legal Constraints, Guidelines & Procedures

Legal Constraints, Guidelines & Procedures


The Legal constraints system is there not to just keep the content safe but the people who use the internet safe to, Even though people do continue to give out content. People are found such as the founders of Pirate Bay, who went to court and received a jail sentence and a large fine.




Wednesday, 15 April 2015

Internet Safety Malware

Spyware - A spyware is a type  of malware which gathers info/data without the user knowing which is sent back to a spy/unauthorized user.

Ransomware- Which is also a type of Malware which takes control of the computer system it may lock or encrypt files so the user can no longer gain access to them

Malware- Short for malicious software a Malware is a wide range of programs such as some I have listed above designed to attack computers so users are not able to make use of the computer.

Wednesday, 25 March 2015


Spyware - A software which keeps track of what sites you visit programs you use these will report back to someome

Rogue dialler- Able to take over a modem which could lead to expensive bills.

Key logger - A type of spyware which logs every key you type in the keyboard

Malware - A malicious software which targets a large range of programs

Wednesday, 11 March 2015

My Anti Virus

The anti virus I use is called Avast
Avast
I really enjoy the tools and the interface it also has a feature which I really enjoy which is the silent/gaming mode.
I was recommended to use it and I have used it ever since my first download.

Wednesday, 4 March 2015

While reading the internet safety page I found out about some new things such as logic bombs, Macro viruses, stealth viruses and script viruses.

My experience with viruses are very little, I make sure all of my software is always up to date and I make sure I do a full system scan every 2 weeks.

The only viruses I have had a problem with myself is a worm.

Wednesday, 25 February 2015

One click from danger

We watched the panorama show about sexual predators grooming on the internet on social media websites. In the show two people had been caught and sent to jail the things they would say and send to the children are very disturbing.

You can report abuse here

Wednesday, 18 February 2015

Cyber bullying

Cyber bullying is a growing problem on the internet. It is very similar to normal bullying you would see at school or outside, the difference is that internet services anyone can access are being used to carry out the bullying.

Wednesday, 4 February 2015


The 5 easiest passwords.
1. Password
2.Date Of birth
3. Name
4. Pets name
5. Address