Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged rogers

Rss Feed Group items tagged

Michele Watkins

(192) Celebrating Mister Rogers - YouTube - 0 views

  •  
    Celebrating Mister Rogers
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

House passes Rogers' Anti-Bullying Bill [Massachusetts] - 0 views

  • By a unanimous vote, the House of Representatives passed the Anti-Bullying Bill sponsored by Norwood state Rep. John H. Rogers to fight bullying and cyber-bullying in the schools of the Commonwealth. The legislation applies to public schools, charter schools and schools providing special education services to students for school districts.  The bill prohibits bullying at school including school-sponsored events, on school buses and at school bus stops as well as the use of electronic devices to commit cyber-bullying. The ban on bullying includes bullying or cyber-bullying that takes place outside of school if the bullying affects the school environment. 
  •  
    A bullying/cyberbullying bill (similar to the one that passed in California in 2009) became legislation in Massachusetts this week. It requires training of teachers and students, reporting and investigation into cyberbullying incidents by school administrators if the bullying incidents that take place on campus, at school-sponsored events or bullying that affects the school environment.
1 - 3 of 3
Showing 20 items per page