Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged reading software

Rss Feed Group items tagged

Anne Bubnic

Social Networking Gets Schooled - 0 views

  • As a whole, the education industry is usually relatively slow to integrate technology into the classroom. In lots of schools nationwide, unbridled access to computers and the Internet is still the exception rather than the rule.
  • The moment students get outside of the classroom, on the other hand, social networking is almost a daily ritual.
  • Dedicated commercial Web 2.0 products and social networking applications are still too new and too rich for typical school leaders to afford. So third-party providers are more likely to offer technology services to students and their schools to expand their horizons in ways never before possible. For example, some school districts are going beyond e-mail technology and using collaboration software and online services to share information, host Web conferences and assign tasks and projects.
  • ...1 more annotation...
  • "Teachers are famous for relying on other teachers for the best ideas about what's working and what's not working. For that reason, as new teachers (read younger, tech-savvy, "Generation Network" college grads) enter the system, they are leveraging education-focused social networks to connect with other teachers, find content contributed by teachers and make sure that they are wringing every ounce of 'network effect' technology from the Internet."
  •  
    To today's students, online social networking is almost second nature outside of the classroom. What about inside the classroom? Educational software and services are taking a cue from Facebook and MySpace, adding a twist of online collaboration and interaction that brings students, teachers and parents together.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
1 - 2 of 2
Showing 20 items per page