Chapter 11
In This Chapter
Dealing with permission warnings
Staying safe on the Internet
Avoiding phishing scams
Setting for children controls
Like driving a car, working with Windows is reasonably safe as long as you avoid bad neighborhoods, obey traffic signals, and don’t steer with your feet while looking out the sunroof.
But in the world of Windows and the Internet, there’s no easy way to recognize a bad neighborhood, find a traffic signal, or know what’s really official. Something that appears to be fun, innocent, or important — a friend’s e-mail, a downloaded program, or a message from a bank — may be a virus that infects your computer.
This chapter helps you recognize the bad streets in virtual neighborhoods and explains the steps you can take to protect yourself from harm and minimize any damage.
After more than 20 years of development, Windows is still pretty naive. Sometimes when you run a program or try to change a setting on your PC, Windows can’t tell whether you’re doing the work or a virus is trying to move in behind your back.
The Windows solution? When Windows notices anybody (or anything) trying to change something that can potentially harm Windows or your PC, it darkens the screen and flashes a security message asking for permission, like the one shown in Figure 11-1.
If one of these security messages appears out of the blue, Windows may be warning you about a bit of nastiness trying to sneak in. So click No or Don’t Install to deny it permission. But if you’re trying to install a trusted program onto your PC and Windows puts up its boxing gloves, click Yes or Install instead. Windows drops its guard and lets you in.
If you don’t hold an Administrator account, however, you can’t simply approve the deed. You must track down an Administrator account holder and ask her to type her password.
Yes, a rather dimwitted security robot guards the front door to Windows, but it’s also an extra challenge for the people who write the viruses.
When it comes to viruses, everything is suspect. Viruses travel not only through e-mail messages, programs, files, networks, and flash drives, but also in screen savers, themes, toolbars, and other Windows add-ons.
To combat the problem, Windows 10 includes Windows Defender, a free security and antivirus program.
Windows Defender scans everything that enters your computer, whether through downloads, e-mail, networks, messaging programs, flash drives, or discs. Unless you tell it not to, Windows Defender casts a watchful eye on your OneDrive files, as well.
When Windows Defender notices something evil trying to enter your computer, it lets you know with a message, as shown in Figure 11-2. Then Windows Defender quickly quarantines the virus before it has a chance to infect your computer.
Windows Defender automatically updates itself to recognize new viruses, and it constantly scans your PC for threats in the background. But if your PC acts strangely, tell Windows Defender to scan your PC immediately by following these steps:
Click the taskbar’s Windows Defender icon (shown in the margin) near the clock.
Windows Defender appears.
Click the program’s Scan Now button.
Windows Defender immediately performs a quick scan of your PC.
Even with Windows Defender watching your back, follow these rules to reduce your risk of infection:
Open only attachments that you’re expecting. If you receive something unexpected from a friend, don’t open it. Instead, e-mail or phone that person to ask whether he or she really sent you something.
If you prefer running a third-party antivirus programs, you’re welcome to do so. It will turn off Windows Defender automatically as part of its install process. But don’t install two third-party antivirus programs, because they often quarrel.
Eventually you’ll receive an e-mail from your bank, eBay, PayPal, or a similar website announcing a problem with your account. Invariably, the e-mail offers a handy link to click, saying that you must enter your username and password to set things in order.
How do you tell the real e-mails from the fake ones? It’s easy, actually, because all these e-mails are fake. Finance-related sites may send you legitimate history statements, receipts, or confirmation notices, but they will never, ever e-mail you a link for you to click and enter your password.
Both Internet Explorer and the new Microsoft Edge browser use Microsoft’s SmartScreen Filter technology that compares a website’s address with a list of known phishing sites. If it finds a match, the SmartScreen filter keeps you from entering, as shown in Figure 11-3. Should you ever spot that screen, close the web page by clicking the words Close This Tab listed on the warning message.
So, why can’t the authorities simply arrest those people responsible? Because Internet thieves are notoriously difficult to track down and prosecute. The reach of the Internet lets them work from any place in the world, hidden beneath a mass of networks.
A feature much-welcomed by parents and much-booed by their children, Microsoft’s Family controls (formerly called Family Safety), offer several ways to monitor how children can access the computer as well as the Internet.
Microsoft Family controls only work if you and your children have Microsoft accounts.
To set up Microsoft Family, follow these steps:
Add your children and any adults who want to monitor the children as Family Members when creating their user accounts.
I describe how to add family members when creating user accounts in Chapter 14. If your other family members have their own computers, you should still add their Microsoft accounts as family members on your own computer. That links everyone as a family, allowing children to be monitored by any adults in your family.
When you add family members to your PC’s list of user accounts, each member receives an e-mail inviting them to join your family network; when they accept, their accounts automatically appear on your computer.
Visit the Microsoft Family website, and click the name of the child you’d like to monitor.
Open any browser and visit the website at https://familysafety.microsoft.com
. The site opens to show your list of family members who have accepted their invitations. Click the name of a family member, and the website, shown in Figure 11-4, lets you set limits on that child’s computer behavior, as well as monitor his activity.
Turn on the categories you’d like to enforce, and set the limits.
The Microsoft Family area contains a variety of categories that let you monitor or control different areas of behavior. Visit any of the categories described below, and each opens a new page with a toggle control at the top. Turn the toggle to either On and Off, then fine-tune the offered settings. (You can also turn categories Off to temporarily suspend monitoring in those areas.)
The Microsoft Family website offers these categories, which apply whenever your child accesses a Windows 10 computer, phone, or small tablet:
When you’re through, close the Microsoft Family window.
Your changes take place immediately. When you’re through, just close your web browser.
Although the Microsoft Family controls work well, few things in the computer world are foolproof. If you’re worried about your children’s computer use, cast an occasional eye their way. Also, these controls only monitor your child when he logs in with his Microsoft account. If you spot an unfamiliar account created on the PC, it’s time to ask some questions.