Intruders and Hackers - when you are using an Internet connection a firewall is a must. Without one you may not be the only person using your computer or connection. A firewall acts as a line of defense against invasion. Routers, modems and certain software act as firewalls. The best defense is a multiple area one.
Viruses and Worms - these not so friendly creatures may visit you masked as an e-mail from a friend or associate. That person may have unknowingly sent the virus or may be in the address book of someone who has an infected machine. Once started they take on a life of their own. A good rule is to not open any attachments you are not expecting. If you get a surprise e-mail with an attachment from a friend, ask them about it before opening. Always tell someone to expect an attachment if you are sending one. When possible, try sending your attachments as a PDF or RTF, these types of files are less often infected. Make sure to have up-to-date virus software on your computer. If you own a Mac, be happy. You should still follow the rules, but so far the OS X has been safe from such attacks.
Program Security Leaks - make sure that you update your operating system and software. Companies like Apple and Microsoft are always updating their programs for possible security leaks. Most computers that are attached to the Internet and are less than three years old have a program that allows them to do the checking for you. Make sure to set the computer to do this. It is your safest bet.
Fishing - you may receive an email from a company or bank with which you regularly do business. Never respond to the email with ANY personal information. In fact, do not respond at all. There are criminals out there fishing for your personal information and once they have it they will use it. If you want to verify that it really is your credit card company, pick up the phone and call the number on your card. If they want to reach you they will talk to you on the phone. If it wasn't them, they will investigate the fraud. This also holds true on the Web. There are many fake sites out there with names similar to real companies. You may be attempting to buy a book, but instead you may be giving someone access to your credit card. Verify that you are on the site you think you are on and never use a link in an email to get there. If a business you deal with sends you an e-mail with a link to purchase clothing, type in the main address on your own instead of following the link.
Helpful Software (Bulleted items are "must haves," the others are suggestions)
E-mail Client Publishing program Presentation software Hebrew Word Processor (or fonts) Database Spreadsheet Graphic Editor Photo Editor Mapping program
Internet Security Programs
Firewall Spam filter Spyware Checker
Multimedia browser plug-ins
Presentation software viewer
Downloading and Using Web Images 2 3
Macintosh - Use your mouse to click the graphic you want to download. Keep the mouse button depressed until a menu appears. Drag the mouse onto and down the menu until the line "save image as" is highlighted (selecting the option). A window will appear allowing you to save the file, with either the name it already had or a new one of your choice. You may also choose where the file is saved in the directory.
Windows PC - With the mouse, right-click on the graphic you want to download and hold the button until a menu appears. Drag down on the menu to select the "save image as" option. Another window will appear allowing you to rename and save the file to the directory of your choice.
To perform a more specific search for an item the ":" acts as the modifier. If you want to search for a Jewish WebQuest, you might type Jewish WebQuest. The search engine would then find every reference to WebQuest and every reference to Jewish. To simplify your search you might try "Jewish WebQuest." This would cause your search engine to look for those specific words in that specific order. This might limit your search too much. The option of doing a Boolean Search and using the modifiers and, or, nor...might also be helpful, but they act more to exclude or include words. The best way to do the search would be to type WebQuest: Jewish or Jewish: WebQuest. This tells the search engine to look at all references of Jewish and pull up only those that contain WebQuests or vice versa. You could continue to add more words to simplify the number of hits as well. For example, WebQuests: Jewish: Holidays: Sukkot. The search engine would then look for all WebQuests with a subset of the Jewish holiday of Sukkot.
It is important to verify the credibility of Web sites that you visit. Many sites are there specifically to espouse a view that is not accepted (e.g. the earth is flat or the Holocaust was a hoax). To check credibility ask these questions: Who is the site's author or the organization sponsoring the site? Are they credible? Do they provide contact information? When was the site last updated? Does the site provide references and links? Is the site free of spelling and grammatical errors? Is the site easy to follow? You may want to use a checklist to evaluate sites that you use.
Compiled by Renee B. Rittner 12/24/04
2 adapted from M.D. Roblyer's Ten First Steps on the Internet. NJ: Prentice Hall, 2001. 3 Many images found on the Web are copyrighted; please make sure to follow copyright laws.