From the course: Security Tips
Unlock this course with a free trial
Join today to access over 22,600 courses taught by industry experts.
Donate a computer safely
- If you have a computer you're not using, donating it to a charity, or passing it along to someone who can use it, is a very nice thing to do. Better that someone use it than have it collect dust, and take up space in your closet or garage. The first thing to do in preparing your computer to donate, is to make sure it works well and correctly. If the computer is older than eight years or so, it's probably not going to be that useful to anyone. While some old hardware will run alright, even browsing the web on a computer that's nearly a decade old, can be an exercise in frustration. It's not very helpful to donate or hand down a broken system either. So if your computer is a little bit dodgy, if it freezes up, or shuts off on its own, or if the keyboard doesn't work, or if the screen is broken, harvest any parts from it that you might use, like a hard drive, and dispose of it according to your local regulations. Many places here in the US have e-waste facilities that will dispose of a…
Contents
-
-
-
Use a password manager3m 3s
-
(Locked)
Choose good passwords3m 18s
-
(Locked)
Use two-factor authentication5m 22s
-
(Locked)
Security questions3m 39s
-
(Locked)
Smart home devices3m 24s
-
(Locked)
Secure your home Wi-Fi5m 40s
-
(Locked)
Laptop security5m 36s
-
(Locked)
Browse the web safely3m 52s
-
(Locked)
Block ads and trackers4m 57s
-
Recognize phishing emails5m 6s
-
(Locked)
Recognize phone scams6m 42s
-
(Locked)
Donate a computer safely3m 45s
-
(Locked)
Back up data securely2m 37s
-
(Locked)
Encrypt sensitive files9m 4s
-
(Locked)
Use a VPN service5m 5s
-
Browse the web with Tor4m 45s
-
(Locked)
Social media security options6m 20s
-
(Locked)
Mobile device security5m 14s
-
(Locked)
Stay secure on shared computers6m 9s
-
(Locked)
Scan for viruses and malware5m 45s
-
(Locked)
Stay secure when traveling6m 56s
-
(Locked)
Keep work and home information separate5m 21s
-
(Locked)
Use the cloud securely2m 8s
-
(Locked)
Cache and cookies5m 54s
-
(Locked)
Spear phishing and catfishing4m 55s
-
(Locked)
Understanding and preventing ransomware2m 29s
-
(Locked)
Keeping an eye on your own security4m 8s
-
(Locked)
What's a URL?6m 28s
-
(Locked)
Turning on and using full-disk encryption2m 13s
-
(Locked)
What to do if your information is compromised5m 34s
-
(Locked)
How to tell if a link is legitimate4m 3s
-
(Locked)
Understanding biometric security3m 26s
-
(Locked)
What is public key encryption?3m 3s
-
(Locked)
Build a portable apps USB6m 41s
-
(Locked)
Handling information securely3m 54s
-
(Locked)
Understanding common attacks5m 17s
-
(Locked)
Paying securely online5m 45s
-
(Locked)
Wireless security for mobile phones4m 3s
-
(Locked)
Chatting securely4m
-
(Locked)
Configuring 2FA with Authy3m 45s
-
(Locked)
Configuring 2FA with 1Password3m 28s
-
(Locked)
Securing your email account2m 38s
-
(Locked)
Encrypted email2m 29s
-
(Locked)
Steganography2m 24s
-
(Locked)
Exploring app permissions2m 36s
-
(Locked)
Using kiosk mode in Windows 104m 5s
-
(Locked)
Using a separate network for your IoT devices4m 26s
-
(Locked)
Adding a guest account to your computer4m 52s
-
(Locked)
Safely donating mobile devices3m 38s
-
(Locked)
Learn more about security with LinkedIn Learning2m 22s
-