Skip to main content

Home/ ACSE Discussion/ Group items tagged key

Rss Feed Group items tagged

tech vedic

A lesson on the "Internet Explorer shortcut keys - 0 views

  •  
    Internet Explorer shortcut keys can make browsing, surfing, downloading and even email communication faster and smarter. There are many shortcut keys that can be used to speed up the Internet browser.
tech vedic

Your phone finds your stuff  - 0 views

  •  
    misplace your phone? How about your keys? Your camera? A combination of iPhone case an app and series of tags for tracking
Doug Peterson

Top 10 Ways to Break Into and Out of Almost Anything - 1 views

  •  
    Whether you're stuck inside and need to break out or you've found locked outside and need to get in, having the key or password is rarely your only option. Here are our top 10 favorite tricks for breaking into and out of nearly any locked down environment.
Peter Beens

A Simple Guide to All That Teachers Need to Know about Digital Citizenship - 1 views

  •  
    Digital citizenship is a key component of the technology and media literacy. We should not only teach our students how to be  good citizens in the real physical world  but how they can be good netizens of the online world  as well.
Doug Peterson

Inventor encrypts tweets to evade govt - Computers: PC, Mac, Laptop, Desktop, Tablet & ... - 2 views

  •  
    Sydney-based inventor Mark Pesce has developed a way to use public key cryptography over private Twitter messages in response to the social media site providing the US Department of Justice (DOJ) access to user accounts last year.
Doug Peterson

Google Online Security Blog: Protecting data for the long term with forward secrecy - 0 views

  •  
    Last year we introduced HTTPS by default for Gmail and encrypted search. We're pleased to see that other major communications sites are following suit and deploying HTTPS in one form or another. We are now pushing forward by enabling forward secrecy by default. Most major sites supporting HTTPS operate in a non-forward secret fashion, which runs the risk of retrospective decryption. In other words, an encrypted, unreadable email could be recorded while being delivered to your computer today. In ten years time, when computers are much faster, an adversary could break the server private key and retrospectively decrypt today's email traffic.
Doug Peterson

How to avoid common PC building mistakes | PCWorld - 2 views

  •  
    "Building a PC sounds daunting, but it's actually pretty straightforward. Still, a few key details can trip up even seasoned geeks who are not being mindful. This handy-dandy guide can help you avoid the most common PC building mistakes-and their associated frustrations. "
Peter McAsh

My Cell Phone is Tracking Me - bitly bundle - 1 views

shared by Peter McAsh on 26 May 11 - No Cached
  •  
    A bitly bundle of, in my opinion, key articles to use with students in ICS on the issue of privacy - via issue of cell phones tracking your movements!
Peter Beens

Hash table - Wikipedia, the free encyclopedia - 1 views

  •  
    At the heart of the hash table algorithm is a simple array of items; this is often simply called the hash table. Hash table algorithms calculate an index from the data item's key and use this index to place the data into the array.
grant hutchison

HTML5 test site - 2 views

shared by grant hutchison on 13 Nov 12 - No Cached
  •  
    There are a number of HTML5 testing sites (like HTML5TEST), but this one has an interesting way of grouping key features into Rings. Ring 0 is not too difficult to reach, but there are very few browsers that go beyond Ring 0 these days.
tech vedic

KEYS TO A SECURE PASSWORD - 0 views

  •  
    Are you in a habit of using short or same passwords? Then change it now. Online world is becoming risky day by day. Hackers are always ready to hack your account and thus, it is your responsibility to protect yourself against cyber-crimes. We are providing you important tips to create strong as well as secure password.
tech vedic

The power user's guide to picking the perfect keyboard - 0 views

  •  
    Are you still using the same plastic keyboard that came with your PC? Then it's time to go for a change. Just go through this tutorial and choose an apt keyboard for your PC.
Doug Peterson

Mobile App Builders/Services - 0 views

  •  
    Google document of application builders for Android, Blackberry, and iPhone.
1 - 16 of 16
Showing 20 items per page