![]() |
The services offered will support you to be safer on the Internet, improve your privacy or allow easier access certain functions.
Besides specific trainings, various workshops are arranged to implement appropriate changes. |
Consulting services +| No. | Description | est. Time | Select/Deselect |
|---|---|---|---|
| 0.1 | Depending on how you utilize the Internet, appropriate possibilities are explained how you can surf the Internet more safely and improve your privacy. | 50 | |
| 0.2 | Recommendations on how you can support your child to be safer online. With practical tips and what kind of technical possibilities are available. Additionally implementation of appropriate actions. | 50 |
Safer browsing -| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 1.1 | Recommended improvements for those who do not surf the Internet very much, like switch to safer DNS and securer searching. Test DNS protection. Make use of a more secure browser or add extensions to certain browsers for a better security. |
![]() |
45 | *Remotely | |
| 1.2 | Setting up a more secure web browser with improved privacy. Making adjustments to support your needs. |
![]() |
30 | *Remotely | |
| 1.3 | In case you browse a lot and work with emails, execute the web browser in an isolated area (sandbox) of your computer. Includes certain actions of 1.1 or 1.2. |
![]() |
60 | *Remotely | |
| 1.4 | Safer online shopping What to consider for a more secure online shopping experience when buying from an unknown shop. Besides the review of certain indicators, check who is the holder of the website and when it was registered. Find available reviews of the online shop and run an automated check. |
![]() |
40 | *Remotely | |
Estimated total time: 00:00
More specific services -
| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 10.1 | Set a more secure DNS in the router at your home. This is possible in the most popular routers. Please inform us about your router model. Check the Router DNS to see if it has potentially been hijacked by criminals. Test DNS protection. |
30 | *Remotely | ||
| 10.2 | Change to a safer DNS. Depending on the operating system, the DNS is set directly in the system or with the help of an app. Test DNS protection. |
![]() |
15 | *Remotely | |
| 10.3 | Include specific extensions to Firefox, Chrome, Opera or Edge browser for safer browsing and searching. |
![]() |
20 | *Remotely | |
| 10.4 | Adding a program for securer browsing in a so-called 'sandbox'. |
![]() |
30 | *Remotely | |
Estimated total time: 00:00
Safer Internet for children +| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 2.1 | Set up a safer Domain Name Service (DNS) that will block many dangerous websites and sites with inappropriate content on the children’s computers and smartphones. |
![]() |
15 | *Remotely | |
| 2.2 | Block programs from running on Windows computers. Restrict the usage of Android smartphones and tablets or access to dedicated apps. |
![]() |
35 | *Remotely | |
Estimated total time: 00:00
Improve your privacy +| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 3.1 | Adding extensions to Firefox, Chrome, Opera or Edge browser to reduce tracking of your activities on websites. |
![]() |
15 | *Remotely | |
| 3.2 | Setting a more private search engine in safer and popular browsers. Set this as the default for the search function in the browser. |
![]() |
15 | *Remotely | |
| 3.3 | Adding special software to hide your real IP address and pretend to be at another location. Pointing out possible disadvantages. |
![]() |
20 | *Remotely | |
| 3.4 | Check your email address to see if it appears on the Internet and Darknet in connection with leaked data. Includes hints for possible actions. Recommended when you have received strange emails from unknown senders. |
![]() |
30 | *Remotely | |
| 3.5 | Protect your sensitive data using encryption. |
![]() |
30 | *Remotely | |
Estimated total time: 00:00
More specific services +
Safer online banking +| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 4.1 | Parallel installation of a Linux system on your Windows computer – if there is at least 25 GB of free space on the hard disk drive. Configuring the Linux system. | →
![]() |
60 | ||
| 4.2 | Installation of a Linux system on a USB stick and configure it. Changing your Windows computer so that it also allows starting from a USB stick. | →
![]() |
50 | ||
Estimated total time: 00:00
Secure Windows and Android systems +| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 5.1 | Update the software on your Windows computer, - including the installed programs and the system driver software - ensuring the Windows system software is up to date |
![]() |
40 | *Remotely | |
| 5.2 | Creating a user account with restricted privileges for your daily work. Copying old files – if needed. | ![]() |
25 | *Remotely | |
| 5.3 | Setting up a known Antivirus program and introducing the key functions. (Free for private use on Windows.) |
![]() |
20 | *Remotely | |
| 5.4 | Take a active protection against Ransomware, malware that makes your private files unreadable, into use. This is only valuable if you don't use any Antivirus program or it is not included there. (Free for private use.) | ![]() |
15 | *Remotely | |
| 5.5 | Check and fix Windows security problems utilizing a specific tool from the Windows vendor. | ![]() |
15 | *Remotely | |
Estimated total time: 00:00
More specific services +
Back up your data +| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 6.1 | Backup or synchronize your own data. This can be any type of files or complete directories. |
![]() |
45 | *Remotely | |
| 6.2 | Backup important data of your Android smartphone. | ![]() |
35 | ||
| 6.3 | Explaining and demonstrating how to recover deleted files on Windows computers and photos on Android phones or tablets. |
![]() |
30 | ||
Estimated total time: 00:00
Helpful improvements +| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 7.1 | Get direct access to one or several of your favourite websites in the browser. (Time estimation is for adding one website.) |
![]() |
3 | *Remotely | |
| 7.2 | Modify the specific page with your favourites to access many websites directly. Adding your specific sites or removing unwanted ones. (Time estimation is for adding or removing one website.) |
![]() |
3 | *Remotely | |
| 7.3 | Customize your web browser for easier use, like - Increase the size of the displayed content on websites - Change the browser language - Switch the default search engine used in the address bar |
![]() |
15 | *Remotely | |
| 7.4 | Conveniently make Windows easier to use: - Direct access to an own button for shutting down or restarting the computer - Automatic start of constantly used programs at login. (Time estimation includes two programs.) - Easier access to useful Windows features. (Time estimation includes 5 features.) - Make only the Windows text bigger or increase the text and app size. |
![]() |
40 | *Remotely | |
| 7.5 | Have fast access to your private files from the desktop and the start menu. | ![]() |
10 | *Remotely | |
| 7.6 | Get a separate button for accessing the Windows Settings or to a list of all Settings. | ![]() |
10 | *Remotely | |
| 7.7 | Start frequently used programs automatically when you log on to your computer. On Windows and Mac computers, the start of programs can be delayed. (The time estimation is for 3 programs.) |
![]() |
20 | *Remotely | |
| 7.8 | Make the Windows snipping tool for taking screen shots directly accessible. Creating a shortcut on the desktop or use the print screen key (PrtSc). | ![]() |
10 | *Remotely | |
Estimated total time: 00:00
More specific services +
Extra services +| No. | Description | Operating system | est. Time | No. of devices | Select/Deselect |
|---|---|---|---|---|---|
| 7.10 | Copying your photos and videos from an Android phone, tablet, or iPhone to a computer. |
![]() |
45 | ||
| 7.11 | Transfer your call related data from one Android phone to another. | ![]() |
40 | ||
| 7.12 | Enabling you to stay in touch with your family and friends by making video calls over the Internet. Introduction of a suitable program. |
![]() |
30 | ||
| 7.13 | Presentation and installation of free, more easier to use Linux systems. Customize the system, introducing the installation of additional programs and how to update Linux and applications. | ![]() |
120 | ||
| 7.14 | Find, install and adapt a suitable lightweight Linux system, that brings your older computer to life again. | ![]() |
150 | ||
Estimated total time: 00:00
or 
Workshops in Espoo -| No. | Description | Operating system | Max. duration | Workshop dates | No. of persons | Select/ Deselect |
|---|---|---|---|---|---|---|
| 8.1 | Safer browsing and online shopping with improved privacy and secure data transferring over the Internet |
![]() |
2.5h | |||
| 8.2 | Improve the security of your Windows computer, browse safer and get a better privacy | ![]() |
2.5h | |||
| 8.3 | Make your Android phone or tablet more secure, browse safer and transfer specific data to other devices | ![]() |
2h | |||
| 8.4 | Backup or synchronize your data | ![]() |
2.5h | |||
| 8.5 | Get familiar with the Windows system | ![]() |
2.5h | |||
| 8.6 | Adapt Windows for easier usage | ![]() |
2.5h | |||
| 8.7 | Do more by using free or open source software | ![]() |
2.5h | |||
or 
Training courses in Espoo +| No. | Description | Duration | Course dates (Finnish time, EET) | No. of persons | Select/Deselect |
|---|---|---|---|---|---|
| 9.1 | Potential dangers on the Internet Including description of potential threats and possible preventions. |
1.5h | |||
| 9.2 | Special Internet topics of children and teenagers Main topics are: Social media, Online-gaming, Cyberbullying, Sexting and how to make the Internet a safer place for children. |
1.5h | |||
Online Training courses +| No. | Description | Duration | Course dates (Finnish time, EET) | No. of persons | Select/Deselect |
|---|---|---|---|---|---|
| 9.4 | Potential dangers on the Internet Including description of potential threats and possible preventions. |
1.5h |
Find out what you need to participate |
||
| 9.5 | Special Internet topics of children and teenagers Main topics are: Social media, Online-gaming, Cyberbullying, Sexting and how to make the Internet a safer place for children. |
1.5h |
Find out what you need to participate |
||
Trainings at your place +| No. | Description | Duration | No. of persons | Select/Deselect |
|---|---|---|---|---|
| 9.7 | Potential dangers on the Internet Including description of potential threats and possible preventions. |
1.5h | ||
| 9.8 | Special Internet topics of children and teenagers Main topics are: Social media, Online-gaming, Cyberbullying, Sexting and how to make the Internet a safer place for children. |
1.5h | ||
Estimated total time: 00:00
![]() |
*Remotely: The service can be performed by remote connection. This allows the secure remote control of a computer from another over the Internet. It means services can be carried out on a computer without having to be on site. Besides saving time, this option is also more environmentally friendly. To enable remote connections, a specific program is necessary. |
| Currently only on Windows computers: | RustDesk installation and configuration information |
| Connecting remotely with RustDesk |