Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "One" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

Chatroulette: What's an Educator to Do? - 2 views

  • You never know who you are going to encounter: a predator? Someone sitting there naked?” asks Barnett. “All it would take is one such incident and the school will be sued by an angry parent. Our focus should be on helping students to learn to be cyber safe and we don't have to do that by actually being on Chatroulette.com.”
  •  
    On listservs and blogs, education researchers and teachers are beginning to discuss how to handle this latest online application. To most educators, filtering is never a preferred option. Teachers and media specialists almost uniformly choose to use opportunities like this to teach students how to make decisions about what's appropriate on their own. "One of the responsibilities of working with students on the use of online resources is to make them aware of potential dangers so they can make informed choices," says Deb Logan, librarian and media specialist for Mount Gilead (OH) High School, by email. "A discussion of online resources like Chatroulette offers a learning opportunity. These opportunities sometimes come at unexpected times." But educators believe Chatroulette may be a bit different then other similar sites like Omegle.com and Facebook's PopJam in that video is involved-and there's no way to edit what pops up on the screen other than clicking "next" after it's already appeared. There's no lurking allowed on Chatroulette-once a user signs in, they're visible to anyOne who chances upon them, and anyOne, in turn, is visible to them. Needless to say, there's a bit of nudity and sexual play being reported on the site, and the swiftness of people moving from image to image doesn't allow children to protect themselves-other than signing off.
adrinawinslet

15 Fascinating eCommerce Forums That Triggers Business Growth - 0 views

  •  
    Think about all those times when you were puzzled for your online store. Luckily with the growing use of the internet, you can find the extensive knowledge on a wide range of eCommerce Forums and Communities. You can post questions, help others with answers, participate in discussions, and chat with other entrepreneurs like you. eCommerce Forums Increase Your Reach Of Knowledge Across The eCommerce Universe Where People Exchange Their Experiences With Each Other. Best eCommerce Forums and Communities You Should Join. SEO Chat. On top of having a great social media presence, this is a great forum that will enable you to create a good foundation for your ecommerce concepts. 15 eCommerce Forums which are bound to make an impact on your Business:- 15 Fascinating eCommerce Forums that triggers Business Growth JANUARY 12, 2019 ELIZABETH BENNET eCommerce Forums Think about all those times when you were puzzled for your online store. Luckily with the growing use of the internet, you can find the extensive knowledge on a wide range of eCommerce Forums and Communities. You can post questions, help others with answers, participate in discussions, and chat with other entrepreneurs like you. 15 eCommerce Forums which are bound to make an impact on your Business 1. Shopify Forums 2. Bigcommerce Community Forums 3. PrestaShop Forums 4. Ask.Oberlo 5. Reddit Forums 6. Digital Point eCommerce Forums 7. eCommerce Fuel Forums 8. Webretailer Forums 9. SEO Chat 10. Envato Community 11. Small Business Forums 12. Web Design Forums 13. WordPress Forums 14. Small Business Brief 15. Ecwid Forums Whether you're just a new-bee on the online store environment, or you're looking to increase your presence on social media it all comes from the people who are dealing with it on a daily basis. And here is where eCommerce Forums play their part! For More Information: http://bit.ly/2OVenZ5
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be dOne only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
realcounterfeits

Buy North Carolina Driver's License - Buy genuine driving licence online - 0 views

  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
Anne Bubnic

DeLand teen gets probation for threatening school assault - 0 views

  • He was originally charged with conspiracy to commit murder. On Friday, Circuit Judge Hubert L. Grimes sentenced him to probation, which could last until he turns 19. He was accused of making threats on MySpace, where his page showed a tombstone, satanic references and admiration for the shooters in the 1999 massacre at Columbine High School in Colorado, authorities said. Through instant messages on MySpace to another student, he also threatened to lock the cafeteria doors during one of the lunch periods and shoot everyone inside, authorities said.
  • boy used his MySpace page to react against the intense bullying at the middle school, which left him in fear. The boy has said that one of the bullies threatened to slit his throat.
  •  
    A 14-year old boy was accused of making threats on MySpace, where his page showed a tombstone, satanic references and admiration for the shooters in the 1999 massacre at Columbine High School in Colorado, authorities said. Through instant messages on MySpace to another student, he also threatened to lock the cafeteria doors during one of the lunch periods and shoot everyone inside, authorities said. In lieu of imprisonment, the student has been transferred to an alternative facility and is prohibited from logging onto MySpace or Facebook or making contact with students from his former school. The boy's attorney said the boy used his MySpace page to react against intense bullying at the middle school, which left him in fear. The boy has said that one of the bullies threatened to slit his throat.
Anne Bubnic

Generation YouTube: Anything that can be a video will be a video. - 0 views

  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • ...3 more annotations...
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • Because video was not possible before, the web was dominated by text. Now that video cameras and broadband are cheap, information that is better served by video is getting converted. As a result, YouTube is now the second largest search engine, and traffic is through the roof. And because kids like Ian's son are video natives, this is just the beginning.
  • Imagine a whole generation of kids growing up and learning about the world through YouTube. In the first half of the 20th century, people grew up reading books and newspapers. Then there was a generation that grew up on movies and television. The last shift was to the Internet. And now web video is creating yet another generation. Kids no longer learn about the world by reading text. Like the television generation, they are absorbing the world through their visual sense
  •  
    For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
Anne Bubnic

35 Perspectives on Online Social Networking - 0 views

  •  
    There are many different perspectives to put on online social networking and it is important to know where one is coming from when talking about social networking and youth. The perspective(s) one has will be very different whether one is a parent with a teenage daughter on MySpace, a marketing executive interested in the target group "14 to 20," a journalist looking for the next big news story on young people and new media, a youngster using a social networking site as part of everyday life or a researcher investigating how young people are using social networking sites.
Anne Bubnic

ReadWriteThink: Copyright Infringement or Not? - 0 views

  •  
    Copyright Infringement or Not? The Debate over Downloading Music
    Students discuss their own experiences and conduct further research on the controversial topic of sharing music and other audio content on the Internet. Based on their research, students take a stand on the controversy and develop persuasive arguments on their position that they present in a class debate on the subject of downloading.
Anne Bubnic

School CyberSafety Presentation Leads to Arrest of Miami Man - 0 views

  • Attorney General Bill McCollum today announced that a Miami man is in custody on charges of sexual battery on a child. Acting on a tip received from a Clay County student at one of the Attorney General’s CyberSafety presentations, deputies from Clay County Sheriff Rick Beseler’s Office arrested Anthony Alexander Caldara, a mechanic serving active duty in the U.S. Navy, for sexually abusing a young girl. The tip was reported by the victim’s older sister to an investigator with the Attorney General’s CyberCrime Unit.
  • The older sister, a student at a local Clay County junior high school, approached the CyberCrime investigator after attending the Attorney General’s CyberSafety presentation. She reported to the investigator that she and her younger sister had been communicating with Caldara, 21, via cell phone and text messaging and Caldara had sent the children pornography. The two children eventually met Caldara in real life and a subsequent investigation revealed Caldara sexually abused the younger sister.
  •  
    Attorney General Bill McCollum today announced that a Miami man is in custody on charges of sexual battery on a child. Acting on a tip received from a Clay County student at one of the Attorney General's CyberSafety presentations, deputies from Clay County Sheriff Rick Beseler's Office arrested Anthony Alexander Caldara, a mechanic serving active duty in the U.S. Navy, for sexually abusing a young girl. The tip was reported by the victim's older sister to an investigator with the Attorney General's CyberCrime Unit.
Anne Bubnic

FactCheckED.org - 0 views

  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
JOSEPH SAVIRIMUTHU

Changes at MySpace Signal a Move Away From Social Networking | - 0 views

  • SHARETHIS.addEntry({ "title": "Changes at MySpace Signal a Move Away From Social Networking", "url": "http://www.thewrap.com/article/2736", "published": "1240950792" }, { "button": true })ShareThis yahooBuzzArticleHeadline = "Changes at MySpace Signal a Move Away From Social Networking"; yahooBuzzArticleSummary = "Sign of the times: One senior executive for comedy at MySpace has 1,403 friends on Facebook."; yahooBuzzArticleCategory = "entertainment"; yahooBuzzArticleType = "text"; thewrapcom49:http://www.thewrap.com/article/27363 votesBuzz up! Slideshow Depeche Mode's Traffic-Stopping Concert Depeche Mode celebrated the release of its 12th studio album, "Sounds of the Universe," with a free concert on Hollywood Boulevard Thursday evening -- which literally stopped traffic. The performance, which also appeared on ABC's "Jimmy Kimmel Live!" later in the evening, drew a reported crowd of over 10,000. (Photographs by Jonathan Alcorn) Keywords Facebook news corp MySpace Chris Van Natta
Anne Bubnic

Libraries booking young video gamers - 0 views

  • The American Library Association has announced a new project funded with a $1 million grant from the Verizon Foundation, the charitable branch of Verizon Communications.
  • Libraries that already have mature gaming systems in place will be studied to gauge how electronic games improve players' literacy skills. Then, a dozen leading national gaming experts, including a Tucson librarian, will build a tool kit that libraries across the country can use to develop gaming programs.
  • There's growing evidence that games in general, from the traditional board versions to electronic and online ones, support literacy and 21st-century learning skills, she said, though libraries have been slow to capitalize on them.
  • ...2 more annotations...
  • for the first time ever this year, the American Library Association's annual conference had a gaming pavilion, showcasing efforts to reach a demographic — tweens, teens and 20-somethings — that's tough to pull into the library.
  • Then there's just the overall focus on puzzle-solving, Danforth noted. Unlike books, games often have multiple story lines, depending on decisions that gamers make along the way. In the overall scheme of things, deploying a warrior for one job and a wizard for another isn't that much different from a boss sending an engineer out for one task and a public relations professional for another.
  •  
    If you made a list of sounds you might hear at your local library, the rumbling of explosions and the loud hum of race-car engines probably wouldn't rank high on it. But in a darkened room at the Quincie Douglas Branch Library, about 20 preteens and teens gather around two screens. It's a mostly soundproof room, to make sure their efforts to rack up points on Nintendo's Wii and PlayStation 2 don't bother the consumers of decidedly more static media. It's a sight that could become more frequent at a library near you.
Judy Echeandia

With iTunes, schools join digital world - 0 views

  • Students there and in four other New Jersey school districts will take a leap in classroom technology this year, using Apple's iTunes store to post and share educational material.
  • Lectures, student projects, orientation videos and other media can be posted on iTunes, available free to students and parents in the five districts, or anyone else.
  • K-12 on iTunes U
  • ...4 more annotations...
  • Schools are starting to embrace iPods, portable digital media players, as teaching tools. While some teachers have dabbled in podcasting -- like posting snippets of news broadcasts on school websites for students to download -- K-12 on iTunes U is billed as a way to bring content to a place where it can be searched and shared.
  • Districts can post for free on iTunes, plus they receive 500 gigabytes of online storage, enough to hold thousands of videos. New Jersey is one of seven states participating.
  • While iTunes U content is available to anyone with a computer, internet connection and free iTunes software, some question the commercial aspect of using it in schools.
  • "If you want to prepare your students for real life in the global economy, you want them to be able to interface with these technologies. It's got to be part of their education,"
  •  
    Schools are starting to embrace iPods, portable digital media players, as teaching tools. While some teachers have dabbled in podcasting -- like posting snippets of news broadcasts on school websites for students to download -- K-12 on iTunes U is billed as a way to bring content to a place where it can be searched and shared.
Anne Bubnic

R U a Cyberbully? -Kids Say It's on the Rise - 0 views

  • In a survey of 45,000 children in middle school, 85 percent said they have been cyberbullied at least once, said Parry Aftab, executive director of the Internet safety group WiredSafety.org, based in Irvington, N.Y., about 20 miles northeast of New York. Just 5 percent admitted it at the high school level, she said.
  •  
    A group of high school students said recently that cyberbullying is on the rise in their schools, just as it is nationally. Cyberbullying is loosely defined as using computers or cell phones to harass or bully another. It can happen by cell phone text messages, on social networking sites and even on online games that allow chatting. "It's growing and it's going to continue to grow," said Rich Horner, the police superintendent for North Franklin Township in Washington County, on the southwest side of Washington. "A lot of this stuff is kids being kids. There's always been bullying. Now, they have more avenues to do it. It's enough of a problem that the state attorney general's office created a video about cyberbullying and will launch it in May, said Diana Woodside, assistant director of education and outreach.
scrollmantra

Digital Marketing Agency in Karol Bagh, Delhi - 0 views

  •  
    So no denying it, the world is shifting to the digital space, consuming all kind of information through digital means; mobile phones, laptops or desktops. While there are the ones who've grown up with smartphones and internet are very well embracing the new brave world of versatility and speed. Before we totally grab on the benefits of Digital Marketing for our business growth, you can't ignore the fact that Public Relations is equally important for any business or organisation effectiveness. The mix of traditional PR with content marketing on different social media platforms and search has led to different fold of opportunities for business growth. INTERGRATING DIGITAL MARKETING WITH PR Communication marketing agencies are all around the world willing to work for you but an effective integration can only happen if some of the key points are kept in mind: Clarity on business objective Comprehend the impact and process of the business before initiating campaigns WHY DIGITAL MARKETING We all are acknowledged to the fact that Digital marketing of a business or product can easily transmit for the scanty fraction value/cost of the print or TV ad. Also, the reach can be easily tracked and monitored as nowadays companies rely on reviews and feedback more than any celebrity endorsement. Hence, for every business, it's an effective way for a brilliant brand growth.
elevencart

Best Kids Cars in india Shop Now At 11Cart.com - 1 views

Buy Kids Electric Cars Online. Biggest Range of Children's Electric Ride-On Cars, Motorbikes, Jeeps, Quads, Tractors & Scooters in India. Kids Electric Cars at Internet Prices! Welcome to 11Cart ...

social networking

started by elevencart on 29 Nov 21 no follow-up yet
Anne Bubnic

Tweens Hooked on Phones - 0 views

  •  
    As any parent knows, tweens are crazy about cellphones. Those hoping to delay such a purchase--despite cries of "But everyone else has one!"--take note: 46% of U.S. tweens (ages 8 to 12) use cellphones, but only 26% own them, according to data released Wednesday by Nielsen Mobile. These "mobile borrowers" use their parents' phones when they go out with friends or on short trips, says Sally DePiro, a Nielsen product manager who worked on the report. The borrowing is more than an occasional habit: About 50% take their parents' phones more than three times a week. The key age for these early adopters is 10. While kids start using borrowed cellphones, on average, at around age eight-and-a-half, American tweens generally acquire their own phones between the ages of 10 and 11, reports Nielsen.
jordanspieths

Weddings 1 Article Golden Goose Sale World - 0 views

Wedding Unity And Memorial Candles Significance At Your Weddings 1 Article Golden Goose Sale World Your wedding is a difficult emotional time for you and your loved ones. It is always sad to rem...

Golden Goose

started by jordanspieths on 19 Mar 16 no follow-up yet
buyverifiedets

Buy Verified Cash App Accounts - 100% Verified BTC Enable - 0 views

  •  
    Buy Verified Cash App Accounts Introduction Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money. Buy Verified Cash App Accounts What Is Cash App Accounts? Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money.
  •  
    Introduction Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money. Buy Verified Cash App Accounts What Is Cash App Accounts? Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
1 - 20 of 1335 Next › Last »
Showing 20 items per page