Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged password

Rss Feed Group items tagged

7More

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
1More

Password checker - 0 views

  •  
    Do you use strong passwords? Password Checker can help you to gauge the strength of your password. It is for personal reference only. Password Checker does not guarantee the security of the password itself.
2More

Does your password pass the test? - 0 views

  •  
    Do we all need to be that careful about our passwords? Probably not. But passwords are one of the web's most important security tools. Whether it's for your Google account, your banking center, or your favorite store, choosing a good password and keeping it safe can go a long way toward protecting your information online.
  •  
    Advice from Google engineers on generating secure passwords.
1More

Passwords-Can't Live With 'em, Can't Live Without 'em - 0 views

  •  
    Take the Symantec Password Survey. Tips for password safety are also given.
1More

Password generator - 0 views

  •  
    Generate strong passwords with a free password generator program.
10More

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
1More

Teen Harrassed By Older Men After MySpace Page Hacked - 0 views

  •  
    Latest story of an 8th grade student being harassed online after giving her password to some friends. After a falling out, they sabotaged her MySpace page, changed her password info and proceeded to post sexually provocative information.
1More

How I'd Hack Your Weak Passwords - 3 views

  •  
    f you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
1More

Passwords Are Like Underwear [Poster Program] - 0 views

  •  
    Developed by the IT Dept at University of Michigan, this series of five clever posters gets users to remember and adopt a few basic principles of password security. You can order copies off of their web site.
1More

Students: Everything Kids Need to Know About Wireless - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    An understanding of the wonderful world of wireless will help the young people avoid any pitfalls that may arise from using laptops, smart phones, and PDAs. And if they are going to be using wireless technology it doesn't hurt if they understand how it works. This unit explains the importance of password protection and cybersecurity. The graphics are Nickelodeon style. A short quiz assesses understanding. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
1More

What to Do If Hackers Steal Your Online Accounts - 5 views

  •  
    Stolen accounts-caused by aggressive phishing attacks and distribution of malicious programs to collect passwords-have become a plague upon the Web. Spammers want them so their messages can get past spam filters. And crooks, who often lock out the true owners by changing their passwords, use them to find and get inside financial accounts or to impersonate the owners and weasel money out of their friends.
1More

Tween Cybersafety [pdf] - 3 views

  •  
    Cisco & Wired Safety's Tween CyberSafety 6-page document is loaded with colorful graphics and gives kids tips on a variety of Internet safety topics, such as cyberbullying, remembering passwords, and determining which sites are safe.
1More

BUDD:E - (Primary Grades) - 1 views

  •  
    Budd:e Primary introduces e-security basics to stay smart online, including privacy, password creation, protecting personal details, virus scanning, secure websites, copyright and scams.
1More

10 Most Dangerous Things Users Do Online - 0 views

  •  
    Security pros cringe as their users download software for personal use, turn off firewalls to speed up a connection, or leave their passwords stuck to their laptops.Wouldn't it be nice if you could give end users a list of the most dangerous things they do online every day, and then tell them why those activities are particularly risky? The following is our list of "The Ten Most Dangerous Things Users Do Online," along with some explanation of the risks - and solutions - associated with each.
1More

Online Safety Quiz for Kids - 0 views

  •  
    Online Safety Quiz for Kids from SecureFlorida.org. Questions cover privacy issues like online profiles, pictures, passwords and screen names. Find out how safe you are. Web links lead to best practices for parents & kids.
1More

Should social networking sites be used to determine employment? - 0 views

  •  
    More employees are asking for and viewing social networking sites of job applicants. Most employees like to get a clear picture of the person they are hiring. Lets face it most companies want to make sure they know what they are getting before they spend the time and resources to hire and train a person. Recently officials in Bozeman, Montana requested for all job applicants to turn over their usernames and password of all of their social networking sites as part of the background check. Is that crossing the line?
1More

Webonauts Internet Academy | PBS KIDS - 5 views

  •  
    In WEBONAUTS INTERNET ACADEMY, kids (age 8-10) explore what it means to be a citizen in a web-infused‚ information-rich world. Participants play through a series of 12 missions adhering to the Webonauts' motto: "Observe, Respect, Contribute." Each mission helps children understand critical online safety issues, such as the importance of protecting passwords and maintaining privacy settings. Other missions teach how to differentiate between credible and non-credible sources of information and how to react to bullying. Note: this resource was developed as a partnership project between PBS KIDS and Common Sense Media.
1More

The unvarnished truth about unsecured Wi-Fi - 2 views

  •  
    This article outlines the dangers of using unsecured WIFI networks both at home and with others. Hackers can access and capture sensitive data over your network.
1 - 20 of 36 Next ›
Showing 20 items per page