Skip to main content

Home/ Cool Tools & Ed Tech/ Group items matching "security" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Lisa Winebrenner

Google University Relations - Faculty Summit 2010 - 6 views

  •  
    2010 Faculty Summit Opening Remarks, presented by Alfred Spector, VP of Research and Special Initiatives (YouTube)Storage Architecture and Challenges, presented by Andrew Fikes, Principal Software Engineer (PDF)Cloud Computing and Software Security, presented by Ulfar Erlingsson, Manager, Security Research (YouTube)Engineering Private Spaces Online, presented by Betsy Masiello, Policy Manager (YouTube)Defeating the Password Anti-Pattern with Open Standards, presented by Dirk Balfanz, Staff Software Engineer (YouTube)Security at Scale, presented by Eric Grosse, Engineering Director, Security (YouTube)Anatomy of a Large-Scale Social Search Engine, presented by Damon Horowitz, Engineering Director (YouTube)Closing Remarks, presented by Vint Cerf, Chief Internet Evangelist (YouTube)
Duane Sharrock

Enterprise Efficiency - Pablo Valerio - Finally, Unbreakable Message Encryption - 1 views

  •  
    A new concept is starting to appear in encryption services for data and messaging: zero knowledge. Providers of such services claim that they do not know who you are, and that they never store the encryption key anywhere outside of your device. One such service from FoxyFone of Switzerland (a country famous for bank security and secrecy) is now available on the Apple App Store for the iPhone, iPod Touch, and iPad. The app, Foxygram, lets the user encrypt data on the device, including contacts, email, pictures, and video, with 256-bit AES security.
LUCIAN DUMA

Top 10 tools to share secure your files in the cloud . Feed-back welcome - 14 views

  •  
    What cloud tool do you like more to keep your files secure in the cloud ? Leave a comment after you read article
Lisa Winebrenner

CyberCIEGE Syllabus - 6 views

  •  
    The seven modules identified below are a notional organization of  material contained in typical cyber security courses.  This syllabus does not attempt to cover all such material, rather the purpose is to identify which elements of CyberCIEGE could be deployed within selected instruction modules. 
Fred Delventhal

DROPitTOme - Securely receive files from anyone to your Dropbox - 25 views

  •  
    "Securely receive files from anyone to your Dropbox. Ever wish you could easily receive big files from anyone? Now you can! Together with Dropbox you can setup an unique upload address with password protection. DROPitTOme is your one stop solution when an email is just not enough."
Professional Learning Board

What Principals Must Know About Information Technology - 20 views

  •  
    KUTZTOWN, Pennsylvania - They're being called the Kutztown 13 - a group of high schoolers charged with felonies for bypassing security with school-issued laptops, downloading forbidden internet goodies and using monitoring software to spy on district administrators. You must think of your building's digital information in the same manner that you consider the overall building security and tests being locked in the school safe. One analogy is: To know what 'digital doors' information is behind and who has the 'digital keys' to those doors.
Allison Kipta

The Facebook "video message" spammer worm is making rounds again - 0 views

  •  
    If you received a Facebook message similar to these: ---------- Hey funny. Between You and a Friend Today at Time/Date Is that you making love?!: Long link to video download web site here ... ---------- or ---------- Hi my friend. Between You and a Friend Today at Time/Date Who and when made this video of you?!!!: Long link to video download web site here ... ---------- DELETE it. Do NOT click the link. If you clicked the link, do NOT download the file! If you downloaded, do NOT click/run the file! If your Facebook profile is suddenly sending spam-like messages to all your friends (similar to those above), please read the instructions for removing the Koobface worm. If the worm is a variant of Koobface.A, there may be instructions and antivirus data files (update, dat file, signature, etc.) or a remover application specific to the variant. Don't panic. There is no good reason to format a hard drive to get rid of a virus. Most antivirus software can do a good job of cleaning up. As this thing relies on an internet connection to propagate, please unplug your network cable. Follow the removal instructions for your operating system, and scan your computer with updated antivirus software. I think any one of the popular antivirus applications (and some spyware progams) will take care of it as long as what you're using has the latest virus definitions/signatures/dat file/updates, etc. W32.Koobface.A http://www.symantec.com/norton/security_response/writeup.jsp?docid=2008-080315-0217-99 Free stuff here that may help: Browser security Tests: http://www.pcflank.com AVG Anti-Virus Free: http://free.grisoft.com Ad-Aware Spyware Remover: http://www.lavasoft.com/single/trialpay.php Spybot Search & Destroy http://www.safer-networking.org/en/
Cathy Arreguin

Kitely - Virtual Worlds on Demand - 12 views

  •  
    On demand virtual world with unique pay-as-you-use plan.  Very inexpensive and SECURE for K12 uses!  Uses OpenSim technology
Dwayne Abrahams

What to do with your USB flash drive: Scan for malware | How To - CNET - 1 views

  •  
    What do you do when a virus or trojan horse cripples your system? Your favorite security app may have a bootable rescue CD you can use but could require you to enter a valid license key. Alternatively, you can use the free AVG Rescue CD.
Professional Learning Board

Buddy Browser - 0 views

  •  
    Safe & Secure Internet Children Browser wParental Controls
Jeff Johnson

SurveyShare - 0 views

  •  
    SurveyShare is a web site that lets you design and conduct online surveys. Your surveys and response data are hosted on our secure servers. Each survey is given a unique web address (URL) where respondents can take the survey. You can use SurveyShare to email this web address to your respondents, or you can distribute the URL yourself. Your survey's web address is a clickable HTML link you can paste into an email message or post on your web site.
Maggie Verster

Kidblog.org - Blogs for Teachers and Students - 13 views

  •  
    "Kidblog.org is designed for elementary and middle school teachers who want to provide each student with an individual blog. Kidblog's simple, yet powerful tools allow students to publish posts and participate in discussions within a secure classroom blogging community. Teachers maintain complete control over student blogs. "
Amy Hess

SAFE-Net - 9 views

  •  
    SAFE-Net, a Cyber Safety Awareness program of the Pittsburgh Supercomputing Center, focuses on raising the awareness of students, parents, and educators about cyber threats, measures of protection, and cyber ethics. Through this website, it provides materials to teach teachers, parents and students about cyber security issues. All materials can be downloaded free of charge. However, you will need to create a SAFE-Net account in order to access them. When you are logged in and agree to the Terms of Use, you will be given access to the materials.
William Gaskins

Classroom Blog - 57 views

I want to control blogs for many classes of students. I want to manage and supervise the user. How does edublog allow you to do that.. Bill Cathy Arreguin wrote: > Edublogs is super! > > The plat...

blog

Jeff Johnson

Empowering middle schools through technology - Ideablob: where ideas grow - 1 views

  •  
    In ten years, modern education will have fully integrated new classroom media: video, online collaboration, and other web tools. We hope to pioneer a web tool that is a platform for this new media, bringing the power of the web to students, teachers, and parents in a secure, innovative environment. Our idea is a response to problems in schools that we have identified through primary research and user involvement. The way students, parents and teachers interact and learn in middle schools has many opportunities for growth and improvement. Here is one example:Research shows that in the last ten years the way people obtain and digest information has changed, incorporating tools like the web. Unfortunately, the classroom environment has not kept pace with this aggressive expansion of technology as a social, educational and communication tool. We hope to provide the tools to solve this and other problems in the middle school context. Read more at AlightLearning.com
M. Miller

Welcome to myOpenID - 4 views

  •  
    Diigo open ID, and more business solutions 
Lisa Winebrenner

CyberCIEGE Educational Video Game - 3 views

  •  
    Educational licenses are available at no cost to educational institutions. Contact cyberciege@nps.edu. If you are a student, ask your teacher to request the game. A free evaluation version of CyberCIEGE is available.
1 - 20 of 28 Next ›
Showing 20 items per page