Skip to main content

Home/ Literacy with ICT/ Group items tagged protecting

Rss Feed Group items tagged

tech vedic

How to password-protect a PDF before e-mailing in OS X? - 0 views

  •  
    Protecting a document containing sensitive information is very important. Thus, protecting it with password is a better option. This tutorial contains steps for protecting your PDF document with password before sending it to receiver.
John Evans

Losing an iPad: Simple Things to Protect Identity and Theft on Your Mobile Devices | Th... - 6 views

  •  
    "Last night I had one of those incredibly horrifying moments that I hope you never experience. Just as I'm getting ready to go to bed at 11 PM in my hotel room I suddenly realize my iPad was missing. Losing an iPad is upsetting - knowing the damage someone could do if they accessed online accounts using my iPad was terrifying. Fortunately I knew I had some protection because I password protect my devices and had set up Find My iPad/Phone. Which can't be said for many of the educators I noticed using mobile devices at ISTE. But had I done enough?"
John Evans

Free Technology for Teachers: Good Reminders About Password Security - 0 views

  •  
    "The mot recent Facebook hoax making its rounds has prompted me to remind everyone about the importance of using strong and varied passwords (don't use the same password for Facebook as you do for your bank account). Creating a strong password is a just the first step in protecting your email and social media accounts from hackers. To really protect your account there are some additional steps you should take like using two-factor authentication. In their most recent video Common Craft explains how to protect your online accounts. Click here to watch the video or you can view it as embedded below. "
John Evans

How to Password Protect Pages, Keynote, & Numbers Documents in iOS - 0 views

  •  
    "The iWork suite of productivity apps include Pages, Numbers, and Keynote, and each of them allow users to password protect individual documents. In practice, this means that a document created within iWork in iOS, OS X, or iCloud, can be safely locked with built-in encryption, and the document can not be opened or viewed without entering the defined password on any other device. For example, you can set a password to a Pages document on your iPhone, then open it again on the Mac from iCloud and it will require a password, and vice versa."
John Evans

5 Essential Tools for Protecting Student Privacy Online - 5 views

  •  
    "Protecting student privacy and making sure online environments are safe and secure is a very big deal. We have digital landscapes that are constantly evolving and students who are more and more confident exploring online without instruction or supervision. The below five tools are not just a starting point to help your students manage and maintain their online privacy, they should be the beginning of an ongoing discussion detailing the importance, consequences and risks associated with online privacy and security."
John Evans

Protect Your Prep: 5 Ways to Avoid Ambushes, Interruptions, and Procrastination | Edutopia - 0 views

  •  
    "If you are lucky enough to have one, you know how quickly it can become a dumping ground for last-minute meetings, interruptions (welcomed and unwelcomed!), and procrastination. Before you throw up your hands and give up on getting any substantive work done during the school day, here are five tips to protect your preparation period. All of them require trust, upfront communication, and a little dose of courage -- and only you know your particular school's culture -- but I have seen great success when teachers give these strategies a try."
tech vedic

HOW TO PROTECT AGAINST SPYWARE? - 0 views

  •  
    Viruses, spyware and malware are some of the serious issues related to computer. Without your permission, if your Internet program is tracking and sending information back to a third party then your computer must be spyware infected. Let's uncover some essential tips to protect against spyware.
John Evans

CMEC - 1 views

  •  
    " This Copyright Decision Tool was developed by the Copyright Consortium of the Council of Ministers of Education, Canada (CMEC) . The CMEC Copyright Consortium is composed of the ministers of education of the provinces and territories, with the exception of Quebec. (For further background on copyright and education, you can visit the CMEC Web pages on copyright. ) This Copyright Decision Tool is a supplement to the Fair Dealing Guidelines , created to help teachers determine whether their use of a copyright-protected work is fair dealing. The tool helps teachers assess whether fair dealing permits them to use a copyright-protected work for students without permission or payment of copyright royalties. Fair dealing is only one of several users' rights provided to educational users in the Copyright Act. For a description of other educational users' rights, see Copyright Matters! Every school board or school district should have a staff member who is familiar with copyright law. For more information, contact the ministry or department of Education Copyright Officer for your province or territory, listed here. CMEC wishes to acknowledge that the Copyright Decision Tool is liberally adapted, with permission, from the University of Ottawa's Fair Dealing Decision Tree ."
Phil Taylor

Online Privacy, Online Publicity: Youth do more to protect their reputation than their ... - 3 views

  •  
    "Online Privacy, Online Publicity: Youth do more to protect their reputation than their information"
John Evans

53+ Free Image Sources For Your Blog and Social Media Posts - 2 views

  •  
    "But there's one question we get asked quite often: Where can you find free, good quality images that are cleared to use for your blog posts or social media content? It's a question with a lot of different answers and caveats. Nearly every image created in the last 30 years is still protected by copyright-a protection that gives virtually every author the exclusive right to use or reproduce their work. But you can find a public domain photo, use a Creative Commons image that might need attribution or even create your own image from scratch."
John Evans

MediaShift . Teens Turn to Social Coding to Protect Privacy on Social Nets | PBS - 6 views

  •  
    "Teens Turn to Social Coding to Protect Privacy on Social Nets"
John Evans

How Developing Trust is Problematic (But Essential) For Independent Learning | Edudemic - 0 views

  •  
    "Katrina Schwartz's recent KQED blog post explores why trust is crucial in shaping independent learners. The article points out that in this age of preparing students to be "college and career ready," it is puzzling that schools block portions of the internet in the name of protecting students from inappropriate online behavior. Additionally, by blocking digital tools that serve a useful purpose in learning, schools effectively stop educators from teaching and modeling appropriate online behavior. And yet, younger students especially need some kind of protection online. In this article, we explore why building trust today is difficult in a traditional sense, while also remaining crucial for independent learning activities."
tech vedic

Most important smartphones of 2012-13 - 0 views

  •  
    "iPhone 5 Called ""Gadget off the Year"" by Time Magazine, Apple's iPhone 5 (from $199 on 2-year AT&T, Sprint or Verizon plan) is a serious piece of hardware. Along with its powerful new A6 chip, iPhone 5 works on 4G/Long Term Evolution (LTE) networks for wireless speeds that rivals your home's broadband connection. iPhone 5 also has improved cameras: an eight-megapixel iSight rear-facing camera (3264 x 2448 pixels) and front-facing FaceTime camera with 720p HD quality for video calling. Samsung Galaxy S III The Samsung Galaxy S III (from $149 on 2-year plan with AT&T, Sprint, T-Mobile, U.S. Cellular, Verizon) is a true smartphone in every sense of the word -- and we're not even referring to its stunning 4.8-inch display, fast LTE speeds or versatile Android operating system. the Galaxy S III's front-facing camera knows when you're looking at the screen, so it'll give you the bright display you seek, but if your eyes look away it'll dim itself to preserve its battery. It also knows when you want to talk: if you're messaging with someone and want to call them, simply lift the smartphone to your ear and it'll dial for you. Nokia Lumia 920 As the flagship Windows Phone 8 device, Nokia's Lumia 920 (from $99.99 on 2-year AT&T plan), has a lot to offer, including a colorful Start screen with ""live tiles""; familiar Microsoft apps like Outlook, Word, Excel, PowerPoint and OneNote; and a People hub that aggregates all your contacts into one page per person (so you don't need to close, say Outlook, to see what that friend is up to on Facebook or Twitter). HTC Droid DNA and HTC One X+ A pair of Android-powered HTC devices are also worthy of ""best of 2012"" nods: the HTC Droid DNA ($149.99 on 2-year Verizon Wireless plan) and HTC One X+ ($199.99 on 2-year AT&T plan). Protected by Corning's uber-durable Gorilla Glass 2 technology, the Droid DNA's 5-inch 1080p HD screen was built for video, games, ebooks and web browsing. Integrated Beats Audio - an
John Evans

How to Protect Your Kid from "Fortnite" Scams | Common Sense Media - 0 views

  •  
    "You were just getting used to your kid's obsession with Fortnite, and now, all you hear about is V-Bucks. V-Bucks, like Robux on Roblox, are Fortnite's in-game currency. Players use them to buy the fun "skins" (characters and outfits) and "emotes" (those hilarious dances like "Flossing" and "Take the L") that kids will say they totally need to make Fortnite even cooler. For the record: You don't need V-Bucks to play Fortnite, and if you do spring for them, they cost real money. Also, online scammers are all over V-Bucks. Fortnite's incredible popularity among kids has made it an easy target for rip-off artists trying to make some actual bucks while the game is hot. A recent study from online security company ZeroFox discovered more than 4,700 fake Fortnite websites, and the company sent out more than 50,000 security alerts about Fortnite scams in a single month. Kids are particularly vulnerable to requests to turn over personal information, including names and email addresses or even credit card numbers. Here's how you can spot the scam and protect your kids."
John Evans

Updated Password Advice: What Teachers and Students Need to Know - The Edublogger - 0 views

  •  
    "Creating, remembering, using and protecting passwords. It's all part of everyday life but are you and your students managing passwords well? Poor password management can lead to minor annoyances, like someone changing your blog theme, to life changing issues, like identity theft. The divisions between your online and offline world are blurring and many of your most valuable possessions and information are now housed online. So much of what we do online is password protected, from your blog to your email, bank account, social media and more. The advice around passwords has recently been updated and while there are varying opinions, this post will help you learn about the current best practices."
John Evans

What Does Well-Being Mean to Children in a Digital Age? - Connected Learning Alliance - 0 views

  •  
    "Much of the conversation around children's use of technology focuses on the potential risks and harms of exploring the digital world. While protecting children is an essential focus, it cannot be the only one. As children's lives become increasingly digital, we also have an obligation and an opportunity to reframe the discussion using a whole child approach, in support of children's ability to learn, create, connect, play, and, more broadly, in support of "well-being" - a state inclusive of happiness, health, safety, and comfort. With this goal in mind, The LEGO Group and UNICEF have brought together a global coalition and initiated a new multi-year project called RITEC - Responsible Innovation in Technology for Children - to empower business and policy leaders to protect and promote children's well-being in a digital age."
1 - 20 of 144 Next › Last »
Showing 20 items per page