Skip to main content

Home/ Literacy with ICT/ Group items tagged Protect

Rss Feed Group items tagged

Phil Taylor

Why Google+ Could be a Game-Changer in Higher Education - Century College Marketing Pro... - 4 views

  • instructors have blasted Facebook (and rightfully so) for its poor privacy protections.
  • Google+ allows a person to place all of their contacts into Circles, allowing a user to control with great precision who among their contacts will have access to which bits of shared content.
John Evans

Gaggle.Net - CIPA Compliance for Google Apps - 0 views

  • Google Apps for education provides an excellent set of communication tools for students and educators. However, the email account feature of Google Apps does not offer a method to meet the requirements of the Children's Internet Protection Act. As a solution, Gaggle accounts can be integrated with Google Apps. The same great monitoring and filtering capabilities found in Gaggle can be applied to your Gmail accounts.
  •  
    Gaggle accounts can be integrated with Google Apps. The same great monitoring and filtering capabilities found in Gaggle can be applied to your Gmail accounts.
Phil Taylor

Friending your students - a researcher's perspective « Lucacept - interceptin... - 0 views

  • Translation: teachers should NEVER ask a student to be their Friend on Facebook/MySpace but should accept Friend requests and proceed to interact in the same way as would be appropriate if the student approached the teacher after school
  • What do you think is the best advice for other teachers when it comes to interacting with students on social network sites? When should teachers interact with students outside of the classroom? What are appropriate protocols for doing so? How can teachers best protect themselves legally when interacting with students? How would you feel if you were told never to interact with a student outside of the classroom?  
Phil Taylor

Hacked! - Magazine - The Atlantic - 3 views

  • provides specific advice on protecting and backing up data now—and gives a picture both consoling and unsettling of the vulnerabilities we can all expect to face in the future.
zafar iqbal

Ex-Penn St. associate Sandusky in prison for abuse - 0 views

  •  
    Ex-Penn St. associate Sandusky in prison for abuse http://alturl.com/qtoji BELLEFONTE, Pa. - Jerry Sandusky was charged Saturday of intimately battling 10 young boys over 15 decades, suggestions that smashed the Satisfied Area picture of Penn Condition baseball and led to the shooting of Area of Popularity instructor Joe Paterno. Sandusky, a 68-year-old outdated protecting instructor who was once Paterno's heir obvious, was in prison for 45 of 48 number. Sandusky revealed little sentiment as the judgment was study. The assess requested him to be taken to the city prison to welcome sentencing in about three months. He encounters the likelihood of life in prison.The assess suspended Sandusky's help and requested him locked up. In trial, Sandusky half-waved toward household as the cops led him away. Outside, he gently stepped to a sheriff's car with his arms cuffed before side of him. As he was placed in the car, someone screamed at him to "rot in terrible." Others thrown insults and he shaken his go no in reaction. The accuser known in trial documents as Sufferer 6 split down in rips upon listening to the decisions in the trial docket. bsequently, a district lawyer accepted him and said, "Did I ever lie to you?"
zafar iqbal

Syria conference basically leaves start Assad question - 0 views

  •  
    GENEVA - An worldwide conference on Sunday accepted a U.N.-brokered serenity strategy that demands the development of a adjusting govt in Syria, but at Russia's insistence the bargain contract remaining the entrance start to Syria's chief professional being aspect of it. The U.S. supported away from requiring that the strategy should clearly contact for President Bashar Assad to have no part in a new Syrian govt, expecting the concession would motivate Italy to put higher stress on its long time best friend to end the aggressive attack that the resistance says has stated more than 14,000 life. But even with Russia's most specific declaration of assistance yet for a governmental changeover in Syria, it is far from certain that the strategy will have any actual impact in reducing the assault. A key expression in the contract needs that the adjusting relating to human body "shall be established on the foundation common approval," successfully providing the existing govt and the resistance veto energy over each other. Syrian resistance results instantly denied any idea of providing in a changeover with Assad, though the contract also needs protection power chiefs and solutions to have the assurance of the individuals. Assad's govt had no immediate response, but he has regularly said his govt has a liability to remove terrorists and will not take any non-Syrian style of government.
tech vedic

How to check spam communication? - 0 views

  •  
    Spamming is generally unsolicited communication targeted to deceive users with tricky messages from remote locations. However, most of you live in a misconception that spamming is confined only to email service. Such communication may leave you in puzzled state even with the Web-based services like Facebook, Twitter or LinkedIn.
tech vedic

How to check USB drives from spreading viruses? - 0 views

  •  
    Sometimes being unaware of the USB virus-or malware-infection, you may put your computer security at stake. The AutoPlay feature of the Windows, executes the file or program stored on your device, without asking for permission, and that may bring havoc on the operating system as well as the confidential data stored on the machine. Thus, you need to disable the AutoPlay feature to deter such security breaching.
tech vedic

Ransomware-now-targeting-mac-users - 0 views

  •  
    Now, Mac is the next target of hackers. Till now, Mac operating system was untouched by hackers and Mac users were accessing web freely.
tech vedic

How to Cut Down on Unwanted Email? - 0 views

  •  
    Tired of dozens of unwanted emails? Then it's time to do something for cutting off the pass emails that you just don't need.
tech vedic

Computer security outlook: Online identity theft and juxtaposed security initiatives - 0 views

  •  
    E-commerce, gaming, and social networking sites are grabbing the maximum attention, where you knowingly, or sometimes even unknowingly submit your personal information. And, Internet perpetrators are taking advantage of the pervasive Internet, people's growing dependencies on the Web, and addiction thereof. Thus, what you share on the Web, and with whom you share is an area of concern.
tech vedic

How to clear off viruses and malware from an infected PC? - 0 views

  •  
    Despite updated operating system, browser, browser add-ons, installed firewall, and acute computer security settings, clever viruses, spyware or Trojans may find loop-holes to slip into your system. Not only in terms of performance, but in terms of stability and security too, these malicious software push you on back-foot. What to do next?
tech vedic

Your-tablet- is-it-secure - 0 views

  •  
    Nowadays, mobile computing devices let you access the web smoothly. But, at the same time it is also bringing several online threats for your device.
tech vedic

Why don't you need to install a third-party firewall (and when you do)? - 0 views

  •  
    Firewall is an important part of computer security. And, you often get people selling you a new one. Windows always come with its solid firewall. This tutorial contains the answers of some important questions related to firewall security.
tech vedic

How to fix your biggest Internet security risk? - 0 views

  •  
    Threats related to Java programming language are increasing day by day. It also reminds about the old whack-a-mole arcade game. With the vulnerable version of Java, your computer becomes prone to malware or other threats.
tech vedic

Top 5 enterprise security threats - 0 views

  •  
    Nowadays, the list of security concerns is getting bigger and bigger. All enterprises have five types of security threats. Here in this tutorial, let's uncover these top five security threats of enterprises.
« First ‹ Previous 121 - 140 of 144 Next ›
Showing 20 items per page