Comment on Fantastic Four Team Artifact 5 – Computer Protection by Elizabeth Lynch

Thanks Brooke-Lynn,
I n creating my artifacts I always try to remember a few things: How can I make this somewhat short and sweet with out losing information, still making it fun and user friendly. We are all busy and don’t have the time and most times attention to read lengthy an abstract info, so making my artifact overly complicated and not a little visually appealing makes it useless. Glad you liked it and thanks for the support.
aloha

Comment on Fantastic Four Team Artifact 5 – Computer Protection by Brooke-Lynn Navarro

Hi Fantastic Four team,

I like how you guys gone into depth and also, are straight forward with the information that you guys brought into your artifacts. Liz, I liked how you managed to put a dialogue as your intro, for your artifact and I also like the artifact that contained: Description and protect yourself. Although you guys are informative, you manage to be creative and incorprate graphics to your artifacts. I am looking forward to seeing your next artifacts.

“White hat”

Comment on Fantastic Four Team Artifact 5 – Computer Protection by Jeffrey Sanchez

Hey Greg,
The data in the table comes from a study conducted by PCWorld. They tested free antivirus software to their premium counterparts. For example, “avast! Free Antivirus” was compared to “Avast Pro Antivirus.” Also, I prefer Microsoft over free Avast because Microsoft never sends me messages telling me “my computer is at risk” and I should “upgrade.”

Comment on Fantastic Four Team Artifact 5 – Computer Protection by Elizabeth Lynch

Here are summarized some tips that are covered indirectly in the last two slides of my pp.
1. SECURE YOU PC – WITH SECURITY SOFTWARE THAT UPDATES AUTOMATICALLY
2. PROTECT YOUR PASSWORDS
BACKUP YOUR INFORMATION
3. MINIMIZING DOWNLOADING FILES FROM FRIENDS AND FAMILY OR ACCEPTING UNKNOWN EMAILS
AVOID THE FOLLOWING:
a) SUSPICIOUS WEBSITES AND DOWNLOADS BY CHECKING OUT COMPANIES TO FIND OUT WHO YOU’RE REALLY DEALING WITH
b) SENDING PERSONAL INFORMATION OVER THE INTERNET, TREAT IT LIKE CASH AND ONLY USED ENCRYPTED WEBSITES
c) PHISHING SCAMS OR SPAM
d) LEAVING YOUR WIRELESS NETWORK UNSECURED