email tips watch your words maybe it's the fact that you can't see his face crumple in...

Post on 23-Dec-2015

216 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Email Tips

Watch your words

Maybe it's the fact that you can't see his face crumple in misery

as he reads your cruel words.

Whatever the reason, it's incredibly common.

It's frighteningly easy to forget that yourcorrespondent is a person with feelings more or less like your own.

One subject per messageOne subject only once except in reply

a pertinent (UNIQUE)subject title for the message, that way the user can locate the message quickly.

UseOur trip to New YorkMike’s absenceCongrat your new job2ndversion your paper

Don’t useYour mailUpdateQuestionCongratulations

Attachments

No Large filesNo .exe files

Acknowledgement

Attaching return receipts to a message may be considered an invasion of privacy.

But you should acknowledge

Watch Recipients

the easiest way to include the list address is often to perform a Reply To All action,

which replies to both the original sender and the list.

Tocc

bcc

Don’t make it public

Respect Other People's News –

You may wish to ask them in private email to check on their plans, but it can range from rude to distressing

to break important news for someone else.

Acronyms

Acronyms can be used to abbreviate when possible, however messages that are filled with acronyms can be confusing and annoying to the reader.

Examples: FYI = for your informationBTW = by the wayFlame = antagonistic criticismIMHO= in my humble/honest opinion

Security

Safety & Privacy & Copyright

Email Privacy

Never assume your email messages are private nor that they can be read by only yourself or the recipient.

Never send something that you would mind seeing on the evening news.

Power Abuse

Some people in cyberspace have more power than others. There are wizards and experts in every office,

and system administrators in every system.

Faster? Better?

• http://www.bandwidthplace.com/speedtest /

Cheating & Download

How many illegal downloads?

How much Cheating?

In real life, most people are fairly law-abiding, either by disposition or because we're afraid of getting caught.

In cyberspace, the chances of getting caughtsometimes seem slim.

-In the decade since peer-to-peer (p2p) file-sharing site Napster emerged in 1999, music sales in the U.S. have dropped 47 percent, from $14.6 billion to $7.7 billion. -From 2004 through 2009 alone, approximately 30 billion songs were illegally downloaded on file-sharing networks. -NPD reports that only 37 percent of music acquired by U.S. consumers in 2009 was paid for.-According to the Information Technology & Innovation Foundation, the digital theft of music, movies and copyrighted content takes up huge amounts of Internet bandwidth – 24 percent globally, and 17.5 percent in the U.S.

ID & Password

Never give your user ID or password to another person.

What if?

Online shopping

Read independent reviews Ask around

Some offers are so appealing How do you know

You can trust or not?

Priceline

every time you use your credit card, corporations can find everything

about you. 

Financial records, spending habits,..etc.

Shopping Cards

Not my problem

Does it matter if you or you are not involved in criminal activity?

You might be framedor jut being in the wrong place at the wrong time.

There is a black market for work histories.

Pharmaceuticals, Insurance companies, and some employers, are really interested in

your work history.

Black Market

Do you smoke?NO,Data base = 25 times cigarette purchase

SICKO http://movieclips.com/fBjo-sicko-movie-pre-existing-conditions

Your History

Cookies

A small text file of information that certain Web sites attach to a user's hard drive while the user is browsing the Web site. A Cookie can contain information such as user ID,

user preferences, archive shopping cart information, etc. Cookies can contain Personally Identifiable Information

 

Cookies

Spyware

Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else

Spayware detector remover

• Windows defender

• http://www.safer-networking.org/

• Anti-Spyware for Mac

• http://www.spywaredetector.us

Safe Browsing

• TOR

• Hide and Search

• Chrome (incognito)

• Yahoo (don’t follow)

firewall

• “hide” your computer from the internet.

• If the worms and crackers can’t see your computer, they [hopefully] won’t attack you.

• How do you hide your computer? Use a firewall.

How it Works

It only allows connections that you originate.– All other connections are automatically blocked at the

firewall.

Creation of the cashless society will eliminate most of the rewards

for robbers and muggers.computer-controlled smart houses and cars

will thwart burglars and auto thieve.

 

Cashless society

Implanted Chips

• Credit card – Cell phone

• https://www.youtube.com/watch?v=BWgUTrvRlA4

Remote body function control

bodily function monitors and chemical drips

(such as “sober-up” drugs and synthesized hormones) will keep most of sexually and physically

violent offenders under control.

Remote body function control

Internet Content

Hunt real live animals over the Internet

http://www.live-shot.com

See it

• http://www.cbsnews.com/video/watch/?id=680428n

Internet Content

30% of youth are exposed to unwanted sexual material

online each year

Approximately 6,000,000 children are exposed to

sexual material when they are not looking for it

With software such asSurfControl and Netmanning ,

you can set standards and limit access to material for your kids or your employees.

Filters

1- Lock your laptops and other small electronic devices .

2- Password- Protect It

3- Don’t set it on automatic log-in

4- Manage Your Passwords (how?)

5- In your Facebook only your friends should see your posts

6- Use Free AVG Anti-Virus FREE 2013 and Ad-Aware Free Antivirus+ 10.5

Security Tips

7- Watch out for phishing messages pretending to come from your bank, or even from your university.

8- A VPN (Virtual Private Network) utility will both protect your connection and let you surf anonymously.

9- Use anti-theft software which uses GPS even if the thief formats or swaps out the hard drive.

10- Secure Your Phone- Take cheap cellphone with you to animal parties.

11- Before selling or recycling your old computer, wipe the system with a file scrubber

top related