Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Virtual Highway Code
Transcript of Virtual Highway Code
Risks of downloading:
Whenever you download a file, there is always a small potential risk that the file itself could contain a virus or a program within it that can possibly damage your computer or your files.
However there are a few precautions that can be
taken in order to protect your computer
against any mishaps from occurring.
To A Virtual Highway Code
Hello and welcome to a friendly guide for the internet!
We want to teach you how to use the internet in a safe way that can protect yourself and your computer.
We hope you find this interactive presentation both interesting and useful. Enjoy!
Introduction To Social Networking
To keep it nice and simple we have made this super easy to use.
We have only one control, the right arrow key on your keyboard. Keep pressing this key to continue.
If you happen to be using a device without a keyboard, you can left click the mouse or tap the right hand side of the screen (on a touch screen device). Don't worry, you shouldn't have to use this.
Installing an anti-virus program would serve its primary purpose of detection, prevention and removal of malware on your computer. The anti-virus software does this by constantly scanning your computer files checking whether they are unsafe or infected. The user will then be notified if a virus is found and user will have the option to remove.
You could also prevent downloading an unsafe file by considering what web sites you use. For example a user could need to download a piece of software. A wise decision would be to make downloads from reputable company's website for example Download.com. This company is well known for their services and all the files available to download are scanned before the website publishes them. Normally trusted websites would also have feedback, ratings and reviews given by other users and professionals to judge if a website is safe.
Sometimes a file may have a digital signature. These are for demonstrating the authenticity of a digital file. This is a safety facility often used to filter out the bad files from the good by distinguishing whether it’s from a trusted source.
Although users will still need to make sure that the signature is valid and authentic because forgery does occur. To view the digital signature, click the publisher link in the security dialogue box that internet explorer displays when you download a file.
Make sure to be cautious of certain file types. You should be more careful when dealing with file extensions such as exe, src, bat. In some scenarios a dangerous file is disguised with two file name extensions. For example "Filename.txt.exe"
At first glance users would assume it’s a text file but they are unaware of the second extension ending .exe which is an executable file. These files can run and install many kinds of software including virus.
The dangers of downloading
• You wouldn't give a burglar the key to your house; make sure that you protect yourself from fraud and online identity theft!
• Never enter your password if you’ve arrived at a site by following a link in an email or chat that you don’t trust
• Don’t send your password via email and don’t share it with others!
• Pay close attention when asked to sign in online!
• Report suspicious emails and scams!
Everyone is vulnerable on the internet because no one knows who is on the other side of the screen. But you're more vulnerable if you're careless!
Even though the internet can be used for educational or social purposes, there are also possibilities of the users conducting illegal activities such as using illegal websites on the internet.
Illegal websites are created and co-exist with legal websites to permit illegal activities for those who go against the law or government restrictions in their area.
Not all websites are illegal, but even legal website that you think could be illegal it is really hard to differentiate legal and illegal website. Factors that make a website illegal are things such as
Copyright is a massive factor in creating illegal website. This could contain things such as books to read, movies and images that are taken from another website or other places all these can be subject to copyright laws. This means the owners/creators have the right to issue the copies and only the owners/creator can issue it. Any other users that don’t have permission and take it and uses it for their own website is breaking the copyright law which can cause the website to be shutdown.
File sharing website or bit torrent site are which allow the users to upload personal data or download other uses files are normally shutdown because most of the content of the website are copyright from the original owners. The difference between illegal website and legal website are the relation of the owner distributions rather than using the file connection of peer-to-peer sharing of file throughout the networks.
Passwords are used all over the internet!
Every website that requires you to sign in will use a password for your own security and to ensure no one else can access your account.
The password you create will depend on where you are going to use the password. For example you would use a much more secure password for your online banking than you would use for logging in to your favorite news website.
By Mohammed, Jordan, Sharon, Kevin, Sami and Olaitan
Sometimes you may like a little more information about a topic, feel free to use any of the links here in order to get some further information!
(Press The Right Arrow Key)
There are websites that are used to fraud or trick people into handing over their personal details such as credit card details. A lot of websites will offer to sell fake goods/products or even provide a fake service that impersonates a real website.
It is very hard to distinguish between real websites and fake websites as they might look nearly identical. The main goal for the fraudulent websites is to get customers personal details such as their name, address and bank card details. The victims’ details will be taken and used for other scams online such as ordering products or identity theft.
A good example of this would be the user receiving an email that looks legitimate asking the user to update their personal information with a current company they’re with. They would ask the user for their log in and password however it is not the real company asking you, but a hacker wanting to gain your details.
When using the Internet, it is important to make sure that you are aware of websites like these and try to avoid them. Use trusted and secure websites to make sure that your personal details are safe.
If a website looks unfamiliar, or is asking for personal details then you should be alert. You should also be hesitant to not leave any personal details on this website.
They could have hidden viruses and Trojans that aim to attack or damage your computer to gain access to your personal details.
Illegal websites can exist in forms such as graphical content, e.g.: child porn, illegally downloading music, illegally streaming pirated copies of movies.
Downloading Files - Torrents:
General access to and use of other Internet uses
It is important that people who use the internet know how to keep themselves safe and their information secure. With the use of technology increasing and living in a digital world, the use of the internet has increased whether it would be for the use of keeping and being in contact with friends and family with social networking sites or shopping from the comfort of your own home.
The internet has been useful for educational purposes with the use of virtual learning environment (VLE’s) being created to enable students and teachers to communicate with one another on a single website. However, just because teachers are professionals, it does not mean that they can’t and won’t abuse their power. You should always make sure you report any abuse or inappropriate comments with the website and your head teacher. With the increasing use of smartphones, mobile computing has changed the way we can browse on the go, not just with smartphones but other portable technological devices such as tablets and laptops. Emails provide a vast and free way of communicating with others around the world.
The best way to prevent hackers is to choose a good password!
When creating a password you should try to use a combination of
the following: uppercase and lowercase letters, symbols and
numbers. By using a mixture you create a password which is much harder for a person to guess, or a computer program to hack. Now for some extra tips.
1) The longer you make your password the more secure it is.
2) Never write your password down, on paper or on your computer.
3) Using the same password across multiple websites can be
dangerous. Try to use different passwords on different websites.
4) For very secure services such as online banking change your password on a regular basis to increase your security.
A great tip for high security situations is to use a password generator.
To the right is shown Norton’s online system that is free to use.
Found at – www.identitysafe.norton.com/password-generator#
You can choose attributes such as the passwords length and choose to add symbols.
It will present you with a random looking password such as