Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged engineering

Rss Feed Group items tagged

Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Brevity Software Solutions Pvt Ltd

A Complete Solutions for Hire Travel and Tourism Portal Developer - 0 views

  •  
    Brevity Software provides the best solutions for travel technology, all booking engine system, B2B and B2C travel portal, payment gateways integration and many more services by experienced developers. For any query visit our website.
JOSEPH SAVIRIMUTHU

Fostering Learning in the Networked World - 1 views

  • Imagine a high school student in the year 2015. She has grown up in a world where learning is as accessible through technologies at home as it is in the classroom, and digital content is as real to her as paper, lab equipment, or textbooks. At school, she and her classmates engage in creative problem-solving activities by manipulating simulations in a virtual laboratory or by downloading and analyzing visualizations of real-time data from remote sensors. Away from the classroom, she has seamless access to school materials and homework assignments using inexpensive mobile technologies. She continues to collaborate with her classmates in virtual environments that allow not only social interaction with each other but also rich connections with a wealth of supplementary content. Her teacher can track her progress over the course of a lesson plan and compare her performance and aptitudes across a lifelong “digital portfolio,” making note of areas that need additional attention through personalized assignments and alerting parents to specific concerns. What makes this possible is cyberlearning, the use of networked computing and communications technologies to support learning. Cyberlearning has the potential to transform education throughout a lifetime, enabling customized interaction with diverse learning materials on any topic—from anthropology to biochemistry to civil engineering to zoology. Learning does not stop with K–12 or higher education; cyberlearning supports continuous education at any age.
  •  
    The more one delves into the Net Generation - Cyber Safety Debate, the more one is inclined to think that one of the most difficult challenges facing educators and parents is to embrace the "cultural" shift.
  •  
    (EDUCAUSE Review
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Jocelyn Chappell

Pupils and the Caring Sharing Internet | - 0 views

  •  
    I blog about pupils' use of interent, safe searching and the read/write web
Anne Bubnic

Generation YouTube: Anything that can be a video will be a video. - 0 views

  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • ...3 more annotations...
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • Because video was not possible before, the web was dominated by text. Now that video cameras and broadband are cheap, information that is better served by video is getting converted. As a result, YouTube is now the second largest search engine, and traffic is through the roof. And because kids like Ian's son are video natives, this is just the beginning.
  • Imagine a whole generation of kids growing up and learning about the world through YouTube. In the first half of the 20th century, people grew up reading books and newspapers. Then there was a generation that grew up on movies and television. The last shift was to the Internet. And now web video is creating yet another generation. Kids no longer learn about the world by reading text. Like the television generation, they are absorbing the world through their visual sense
  •  
    For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
Anne Bubnic

Google's Privacy Principles [Video] - 1 views

  •  
    At Google, we pursue ideas and products that often push the limits of existing technology. As a company that acts responsibly, we work hard to make sure any innovation is balanced with the appropriate level of privacy and security for our users. Our Privacy Principles help guide decisions we make at every level of our company, so we can help protect and empower our users while we fulfill our ongoing mission to organize the world's information.
Cheryl Mitchell

Tutorial: How to Choose a Search Tool - 9 views

  •  
    How to search for anything online
Anne Bubnic

TwiPICK - 0 views

  •  
    Real-time image search.
Anne Bubnic

Facebook jumps to cellphones, other websites - 0 views

  • “In the coming months, you’ll be able to interact with your stream on even more websites and through more applications, in ways we’re only beginning to imagine,” Facebook engineer Justin Bishop wrote on the company's blog.
  •  
    Facebook's 200 million active users will soon be able to share their status updates, photos and other personal information without checking into the site.
adina sullivan

The Top 100 Search Terms Queried by Kids - 0 views

  •  
    Security firm Symantec has identified the top 100 searches conducted by children online. Popular items in the list include some expected entries like YouTube, Facebook, and MySpace as well as queries for popular pop idols like Michael Jackson and Miley Cyrus. However, what's surprising about the children's list is how similar it looks to that of any other online adult - something which seems to imply that our online activities aren't all that age dependent after all.
Grace Kat

Time to Be Afraid of the Web? - 0 views

  •  
    Two years ago, engineers at Google reported that about 10 percent of millions of Web pages they analyzed engaged in "drive-by downloads" of malware. Google today has about 330,000 Web sites listed as malicious, up from about 150,000 a year ago.
theccmuktheccmuk

online hnd courses - 0 views

  •  
    Online HND Courses provided by the PEARSON education has opened many opportunities for students all around the world to achieve a qualification which has value in the industry. Nowadays, many employers in the industry emphasise on the importance of practical skills and training in an employee while hiring them. In the UK the employers hire many HND graduates because of the quality of knowledge the qualification provides in a working environment
susmitaseo

Manual 200 High Quality Profile Backlinks Service - 0 views

  •  
    Elevate your website's search engine ranking and credibility with meticulously crafted High profile backlinks. As a skilled specialist in profile backlink generation, I offer a strategic approach that drives targeted traffic and enhances your online prese
wasifali

CarX Street - 0 views

image

CarX Street

started by wasifali on 02 Jul 23 no follow-up yet
wasifali

CarX Street - 0 views

image

CarX Street

started by wasifali on 02 Jul 23 no follow-up yet
wasifali

CarX Street - 0 views

image

CarX Street

started by wasifali on 02 Jul 23 no follow-up yet
buyverifiedets

Buy Bing Ads Accounts - 100% Best & Cheap Price - 0 views

  •  
    Are you looking for the best Buy Bing Ads Accounts in the market? In today's digital landscape, online advertising has become a crucial vehicle for reaching potential customers. One of the most popular advertising platforms is Bing Ads, and businesses can greatly benefit from leveraging its capabilities. However, setting up a Buy Bing Ads Accounts can be a daunting task. Thankfully, there are services available that make this process easier such as buying a pre-approved Bing Ads Accounts. Order now and enjoy your package.
  •  
    Buy Bing Ads Accounts Introduction Any company that wants to be successful online must have a strong advertising plan, and Bing Ads is a fantastic choice. Businesses can design ad campaigns using Bing Ads that specifically target visitors who are looking for particular terms on the search engine. Why should you use Bing Ads? There are various advertising platforms to pick from when you want to promote your business online. They are not all made equal, though. Bing Ads is a platform that has a lot of benefits over other platforms, making it a wise choice for companies of all sizes.
‹ Previous 21 - 40 of 40
Showing 20 items per page