Upload
christopher-schneider
View
207
Download
0
Embed Size (px)
Citation preview
Christopher W. Schneider - Portfolio
Christopher W. Schneider - Portfolio
Christopher W. Schneider - Portfolio
Christopher W. Schneider - Portfolio
Already have an Apple ID/iTunes Account? Terrific! Go ahead and use it with these precautions: Do NOT plug your Ecolab devices into your PC or 1) Set up as new or 2) Restore an iTunes back-up. If you do, you will lose all Ecolab configurations on your iPhone or iPad. Sign in at Step 2, choose to allow your Ecolab devices to merge information, and allow iCloud to Use the Location of Your iPhone. You will need to open and confirm the verification email that will be sent to the email you used.
What’s an Apple ID and why do I need one?
The Apple ID is an account that you can use to access all of Apple's services. You can use it to buy music and apps from the iTunes Store. For work, you'll need it to download helpful or required apps found in the Pest App Store. You’ll also need an Apple ID in order to use iCloud which can help you find a lost device. To create a brand new Apple ID from your Ecolab iPhone, follow the steps below.
Method 2 instructions:
1. From the Home screen, tap
on the Settings icon.
3. Enter your Birthday.
2. Scroll to and tap iCloud
and Get a free Apple ID.
4. Enter your First Name and
Last Name.
5. Select Get a free iCloud
email address.
6. Create the Apple ID.
Christopher W. Schneider - Portfolio
1.
8. Enter a rescue email and
(optional) allow email updates.
7. Select 3 security questions
and provide answers.
9. Agree to terms and conditions.
11. Return to Home Screen
and tap on Pest App Store.
10. Allow iCloud to Use
Location finder for iPhone.
12. Scroll to the ADP app and tap install.
13. Tap Install to confirm.
14. Sign in with Apple ID.
15. Tap Install to finish.
Christopher W. Schneider - Portfolio
16. Return to Home Screen
and tap on the ADP app.
17. Allow ADP Mobile to Use
Current Location.
18. Sign in with User ID you
received from Ecolab HR.
Christopher W. Schneider - Portfolio
This is a sample of instructions I was asked to submit to a private business client to help his employees
understand that they have to own why their computers are having problems.
How Does My Windows Operating System Get Infected?
Your internet surfing behavior needs improvement Websites are becoming annoying mazes of ads and popups; it is best to exercise caution when going to any new site. Both the pop-culture internet sites and the social network sites are super-saturated with paths that can easily lead to infection and popup headaches. The people most commonly targeted are those who play the games offered on Facebook--especially the games that cost money. Avoid gaming on all these sites. When in doubt, don’t click it. You use the same password for everything This is a bad idea, but if you insist on doing so, a good password has to be at least 8 alphanumeric (letters and numbers) characters and contain at least one capital letter and one punctuation mark. Even if you follow these guidelines, it’s still a temptation to take the easy way out. For example, if your password was “fryingpan” and you change it to “Frying5pan!”, while it is an improvement, it still might not be secure. It is too common to capitalize the first letter and put a special character at the end. A number could be a substitute for a letter and should not always be in an obvious breaking point. Consider a phrase instead: “veryrus7yfryingP@n”. And finally, change all your passwords annually. You try to get something for nothing (which is called theft) via file sharing sites For example: 4shared, Megaupload, Mediafire, Filestube, Rapidshare, The Pirate Bay, Fileserve, Hotfile, Torrentz.eu, Depositfile, MiniNova, WhereToWatch.com, Bittorent.AM, etc. If you try to download movies, music, television shows, software, or pornography from a site that offers them to you free of charge, you are putting yourself in harm’s way. Avoid trying to get something for nothing; it is always best to purchase items from a reputable source. Ask yourself if your integrity and security worth is it. You often ignore Microsoft Updates On the second Tuesday of every month, Microsoft makes updates available that are designed to plug holes that develop in the Windows operating system. If you ignore these updates, you are in effect saying, “Thanks, Mr. Gates, for the amazing and comparatively inexpensive operating system that dominates the entire world computer market, but I can take it from here.” This is wrong. Do not do this. These updates are important and they are free. Install these updates when you are notified, then restart your computer once they’ve been installed. Don’t starve your operating system. You open infected links in emails or email attachments Opening any spam email or suspected spam email is high risk behavior, even if it comes from a close
friend or family member. Spam email typically has no text in the Subject field, and the only text in the
body of the email is the offending link. Don’t click on the link and don’t reply to the sender from this
email. Call or text the sender, and ask, "Did you mean to send this to me?" Odds are you’ll be doing
them a favor as well--they’re probably unaware that this is happening. Lastly, open the trash bin in your
email and delete it there as well.