Netiquette

The rules of good behavior online. Everyone could use a little Netiquette. School rules and communication tools.

Golden Rule - The First Rule of Civilization

Antivirus Netiquette Rules Techniques for Virus Protection

Antivirus Netiquette Rules

Published: JUne 18, 2016

Time: 00:02:05 Minutes : Seconds

Category: Science and Technology

Description: This animation is set in the jungle of the internet. A band of trolls mount a virus attack in the cloud. Good netiquette saves the day.

Cast

Saranyu Social Media

Thomas Troll

Antivirus Netiquette Rules

Antivirus Netiquette Rules

Antivirus Netiquette Rules

Antivirus Netiquette Rules are common practices of using software for data protection. This is the social code of using software to protect us from viruses and other malware or data theft.

There common practices that keep our data safe with software. This category of software is conventional. It protects our information by performing a variety of functions.

Using it is a social constraint. Computers function without it. There are practices that work well in conjunction with it.


Rules

1. Confirm Attachments

It is good internet etiquette to confirm the contents of attachments prior to opening them. More »

2. Automatic Backup

Back up data because protection is not full proof. More »

3. Internet Account

Create an alternate computer sign on user name account for high risk online activities. More »

4. Research Software

Research software before installation because many companies include multiple programs in software packages. More »

5. Multiple Programs

Use multiple protection software programs for various tasks to prevent infection. More »

6. Scan Everything

Scan everything to remove viruses. More »

7. Disable Previews

Disable the email preview pane because the preview pane opens emails from unknown senders. More »

8. Open In Plain Text

Open emails in plain text to prevent viruses. More »

9. Schedule Scans

Scan regularly to prevent viruses because they can attack at any time. Follow or set a schedule. More »


Guidelines

The customs of software used to protect our information from attack are popular. There are many high profile cases of compromise and data theft. Following these guidelines reduces risk. The threat is real. Customs of protection are conventional.


Golden Rule

00:01:04

Mistress and student discuss the principle of society. Mistress teaches the do unto others quote.

Takako Tweet

Saranyu Social Media


Core Rules

00:01:27

A meeting to discuss etiquette. Essential online safety tips and guidelines are shared.

Vivian Video

Nancy Netiquette

David Chiles


Social Media

00:01:51

From the newsroom, User Generated Content communication skills.

David Chiles


Mobile

00:01:30

A news broadcast of conventions for easily movable devices and wireless connections.

David Chiles

Nancy Netiquette


Education

00:01:32

Techniques for engagement during the acquisition of knowledge.

Wendy Wireless

Nathan Newbie


Cybersafety

00:01:28

Digital Citizens discuss freedom from harm and risk online.

Nathan Newbie

Yusef YouTube


Business

00:01:36

A lesson in business etiquette for electronics at the office.

Wendy Wireless


Email

00:01:32

Email etiquette incuding the inverted pyramid style of writing.

David Chiles


Video

00:00:55

From the news station, digital motion picure tips for capturing and viewing.

Victor Video

News