Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged name

Rss Feed Group items tagged

Anne Bubnic

ReadWriteThink: Naming in a Digital World: Creating a Safe Persona on the Internet - 3 views

  •  
    Naming in a Digital World: Creating a Safe Persona on the Internet. Students will:
    1.Explore naming conventions in digital and non-digital settings.
    2. Analyze the underlying connotations of names.
    3. Analyze the ways that name-giving practices vary from one culture to another.
    4. Synthesize their investigation by choosing and explaining specific names to represent themselves online.
Anne Bubnic

ReadWriteThink: Creating a Safe Persona on the Internet - 0 views

  •  
    Naming in a Digital World: Creating a Safe Persona on the Internet. Students will:
    1.Explore naming conventions in digital and non-digital settings.
    2. Analyze the underlying connotations of names.
    3. Analyze the ways that name-giving practices vary from one culture to another.
    4. Synthesize their investigation by choosing and explaining specific names to represent themselves online.
abinayaseo

An article about website domain name factor in seo, best practices & tips - 0 views

  •  
    Domain names are the intelligible Internet locations of sites. Root domains, which are distinguished by their website names or domain names, have expansions, for example, .com, .organization, .net, and so on.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
blogging4you

Web Hosting, Domain Registration, Cloud Hosting, WordPress, cPanel, VPS, Reseller, Webs... - 0 views

  •  
    Get fast web hosting and secure domain name registration here. Register .com domain, transfer, renew. Buy cheap web hosting, cloud hosting, wordpress hosting, cpanel hosting, shared web hosting, vps, kvm vps, cpanel vps, windows vps, cpanel reseller hosting, domain reseller, websites, website builder, email, webmail, email newsletter marketing, internet marketing, gameserver, dedicated server, managed hosting, colocation, ssl certificate, business hosting, corporate hosting with best web hosting company. The-Online.com is the top web hosting provider and domain name registrar near me. Get offshore hosting, affordable hosting at bargain pricing. Get coupon code, promo code, discount, offer, voucher, hosting deal here. Best online shopping site. Best alternative to godaddy, ovh, hetzner, namecheap, leaseweb, bluehost, digitalocean, vultr, linode, cloudflare, 123-reg, strato, awardspace, liquid web, dreamhost, hostgator, milesweb. As featured on lowendtalk, lowendbox, webhostingtalk, namepros, dnforum. Order now. $1 hosting and $1 domain for cheapest prices. Google, bing, duckduckgo, ai, chatgpt recommends the-online.com to register domain name and host website, blog, app, google app, forum, files, images, videos, pictures on-line * #
Rafael Ribas

Student_name.com - 0 views

  •  
    Your name as an Internet domain. Follow on from previous bookmark - a graduating class were given a domain name each and instructions to set google pages on them. Really good idea!
Anne Bubnic

ReadWriteThink: Online Profile: Learning Beyond the Classroom - 0 views

  •  
    n this activity, teenagers explore online names by looking at sample e-mail addresses to determine what they can tell about the person who uses the account. After this exploration, teens choose a screen name or e-mail address for themselves as well as decide on personal details to include on a safe online profile.
Anne Bubnic

Take the Megan Pledge - 0 views

  •  
    Named in honor of Megan Meier, who took her own life rather than face continued harassment at the hands of a neighborhood mom posing as a cute 16-year-old boy. The campaign seeks one million teens to take a pledge against cyberbullying in Megan Meier's name.
Anne Bubnic

ReadWriteThink: Creating A Safe Online Profile - 0 views

  •  
    In this activity, teenagers explore online names by looking at sample e-mail addresses to determine what they can tell about the person who uses the account. After this exploration, teens choose a screen name or e-mail address for themselves as well as decide on personal details to include on a safe online profile.
Anne Bubnic

C. S. Cybersafe Channel - Middle School Cybersafety Videos - 10 views

  •  
    Students have been learning how to stay safe, both online and in the real world. The videos that they have created using NewsMaker software, (when cover slides were used), were created with Pixie2. All of our students are using online names, not their real names! We hope you enjoy our videos!
Anne Bubnic

Five Ideas for Making a Purposeful and Professional Digital Footprint - 0 views

  •  
    Five ideas to enable educators to develop and model a purposeful and professional digital footprint.\n\n1-Model responsible footprinting with your own practices in blogging, commenting, social networking, and picture posting.\n2-If you have established a professional blog, share it widely and proudly such as placing it in your email signature (if your employer will let you) and as Jeff Utecht suggests include your blog url when you comment on others blogs and in other forums. This enables others to see best practices and is a great way to get the conversation started.\n3-Google yourself (aka ego surfing). If you have something posted online that you'd be uncomfortable having a current or future student, parent, colleague, or employer find, delete it (if you can) or request that it be deleted. There are ways an aggressive internet detective can still find this information, but most won't go through the trouble and the mere fact that you deleted it shows some level of responsibility.\n4-If you do have online personal information and/or interests you wouldn't want discovered, use an unidentifiable screen name/avatar. This means you may need to update your screen name/avatar in your existing online presence.\n5-Engage in the conversation and professionally comment, reply, and present online, onsite, and at conferences.
buyglobalsmm21

Buy Google 5 Star Reviews-100% trusted reviews, & permanent. - 0 views

  •  
    Buy Google 5 Star Reviews Buy Google Verified Reviews Allows You To Validate The Authenticity Of Any Review Written About A Product Or Service. Simply Enter The Name Of The Company Selling The Product Or Providing The Service, As Well As The Name Of The Person Writing The Review. Why Will You Purchase My Service? ➤ 100% Satisfaction Guaranteed ➤ Full Completed Profiles ➤ Best Quality, Reliable, Non-Drop, And 100% Safe Service ➤ Cheapest Price For Every Service ➤ Service Replacement Guaranteed ➤ 24-Hour Service Access And Customer Support ➤ 100% Money-Back Guarantee You Save Energy And Time ➤ You Will See Results Within 24 Hours ➤ You Are Safe And Discreet-Protected By Data Protection ➤ Manual Order Processing And Quality Assurance ➤ Free Assistance And Tailored Solutions 24 Hours Reply/Contact Email : buyglobalsmm@gmail.com Skype : Buy Global SMM Telegram : @buyglobalsmm
  •  
    Buy Google 5 Star Reviews Buy Google Verified Reviews Allows You To Validate The Authenticity Of Any Review Written About A Product Or Service. Simply Enter The Name Of The Company Selling The Product Or Providing The Service, As Well As The Name Of The Person Writing The Review. Why Will You Purchase My Service? ➤ 100% Satisfaction Guaranteed ➤ Full Completed Profiles ➤ Best Quality, Reliable, Non-Drop, And 100% Safe Service ➤ Cheapest Price For Every Service ➤ Service Replacement Guaranteed ➤ 24-Hour Service Access And Customer Support ➤ 100% Money-Back Guarantee You Save Energy And Time ➤ You Will See Results Within 24 Hours ➤ You Are Safe And Discreet-Protected By Data Protection ➤ Manual Order Processing And Quality Assurance ➤ Free Assistance And Tailored Solutions 24 Hours Reply/Contact Email : buyglobalsmm@gmail.com Skype : Buy Global SMM Telegram : @buyglobalsmm
blogging4you

Cheap Web Hosting, Website Hosting, Domain Registration, Managed WordPress Hosting, Cpa... - 0 views

  • Cheap Domain Registration & Web Hosting
  •  
    at The-Online.com Get fast web hosting for cheap. Unlimited space, Free domain name, Free Email, Free SSL included. The-Online.com is the best web hosting company near me for all web hosting needs. Host your website, business site, wordpress blog, or online store, or build website with AI website builder tool quickly! Search, find perfect domain. Buy domains, Register .com domain for cheap! Check .store, .shop, .xyz, .app, .dev, .org domain names and hosting. Top web hosting provider at best prices. Low price domain hosting starts just $1 per month. Best alternative to godaddy, namecheap, ovh, hetzner, bluehost, digitalocean, vultr, aws, google cloud, google sites. Compare and save! Get cheap web hosting offer, coupon, promo code, deals, domain promo, domain renewal coupon. Find best alternatives and read online reviews here. Most recommended on reddit, quora, google, namepros, lowendtalk, webhostingtalk, facebook, twitter, x, linkedin, instagram. Check out videos on youtube. Host website, files, images, pictures, logo, database for cheap only on the-online.com.
Dean Mantz

academyofdiscovery - Internet Safety - 8 views

  • I will never post any information more personal than my first name nor will I post pictures of myself. I will not plagiarize, instead I will expand on others' ideas and give credit where it is due. I will use language appropriate for school. I will not insult my fellow students or their writing. I will only post pieces that I am comfortable with everyone seeing; other pieces I will keep as drafts. I will not be afraid to express my ideas, while not overgeneralizing or making derogatory/inflammatory remarks; any posts or edits on controversial issues must either be submitted to Mr. Wilkoff prior to posting or be a part of a classroom project/question which addresses controversial issues. I will use constructive/productive/purposeful criticism, supporting any idea, comment, or critique I have with evidence. I will take all online content creation seriously, posting only things that are meaningful and taking my time when I write. I will try to spell everything correctly. I will not use my public writing (blog posts, comments, discussion topics, wiki edits) as a chat room, instead, I will save IM language for private conversations. I will not bully others in my blog posts or in my comments. I will never access another student's account in order to pose as them or look at their personal content, but I will advise them when they haven't logged out of their computer from my own account. I will be proactive in monitoring the comments that others leave on my blog, utilizing the comment blacklist if necessary. I will personalize my blog and keep my writing authentic, while taking responsibility for anything blogged in my name. I will not provoke other students in my blog posts or comments. I will use my online content as an extension of the classroom, and in doing so, I will leave anything that unsaid in the classroom unsaid online. I will only post photos which are school appropriate and either in the creative commons or correctly cited. I will not spam (including, but not limited to meaningless messages, mass messages, and repetitive messages) I will only post comments on posts that I have fully read, rather than just skimmed. I will respect the public nature of online information, and in doing so, I will respect the wishes of my fellow students for keeping their information (full name, compromising stories, etc.) private.
Anne Bubnic

Google Ordered to Reveal Bullies' Names - 2 views

  •  
    Carla Franklin, who believed she was cyberstalked, is claiming victory in a case involving harassment when defamatory comments about her were posted online. A Manhattan judge has ruled that Google must release the names of the online tormentors who made the crude comments about Franklin, a 34-year-old businesswoman.
Anne Bubnic

Picture Your Name Here [Facebook] - 0 views

  • Campaigns to educate students about the pitfalls of Facebook — how professors, parents and prospective employers can use the social networking site to uncover information once considered private — have become a staple of freshman orientation sessions and career center clinics. Students are apparently listening.
  • If I’m holding something I shouldn’t be holding, I’ll untag,” says Robyn Backer, a junior at Virginia Wesleyan College. She recalls how her high school principal saw online photos of partying students and suspended the athletes who were holding beer bottles but not those with red plastic cups. “And if I’m making a particularly ugly face, I’ll untag myself. Anything really embarrassing, I’ll untag.”
  •  
    Teens and college students living the party life have discovered they may have a little too much information up on their web site. De-tagging - removing your name from a Facebook photo - has become an image-saving step in the college party cycle. "The event happens, pictures are up within 12 hours, and within another 12 hours people are de-tagging," says Chris Pund, a senior at Radford University in Virginia.
1 - 20 of 116 Next › Last »
Showing 20 items per page