Skip to main content

Home/ Digiteen/ Group items matching "safe" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Keeping your child safe online - Crimewatch - East Coast Radio - 0 views

  •  
    Keeping your children safe online! This website stresses the importance of being aware of your child's online activity! Childline's five tips for parents with children on social networking sites. · Set very clear rules for online use and clear consequences if they are broken. · Discuss some of the unique aspects of behaviour in cyberspace-like anonymity and what it means for your child and for others. · Watch the time. Use an alarm clock or timer if you or your child lose track of time. · In addition, many young teenagers are interested in "chatting." Be aware of who they are chatting to · Make sure your teenager knows the legal implications of online behavior
12More

BBB offers parents tips to keep children safe while online | Wichita Eagle - 1 views

  • * Set privacy options.
  • * Explain to your children that they can't take back what they've written.
  • * Know who is looking at your profile
  • ...8 more annotations...
  • * Don't "friend" everyone
  • Don't let your child's profiles on social websites be available to everyone. Explain to your child why it's important to have the highest security and privacy settings. Parents should monitor their children's use of the computer while they're on the Internet.
  • Children and teens should think about who will be looking at their profile. Many people will be able to see their page, including parents, teachers, coaches, the police and the college or the job they might want to apply for in the next few years. They should post only the information they are comfortable with others seeing about them.
  • Merely deleting a post doesn't mean it's not still available for others to see in cyberspace. It is important for children and teens to know that once you press the "send" or "post" button, there is no going back. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people — for example, your friends or your family.
  • Unfortunately there are dangerous people who may be creeping
  • * Don't divulge too much information.
  • Now that school has started children and teens are spending more time online doing school work, research, and socializing. As soon as a child starts using the computer and Internet, it's time to talk with them about online behavior, safety and security. Parents need to know what to do to ensure their child is safe online, in texting, blogging, Facebook and visiting other Internet sites.
  • Better Business Bureau
  •  
    This website talks about how parents can make sure their children are safe online.
1More

Get Safe Online :: Safe social networking - 0 views

  •  
    Being social, but safe online.
1More

Keeping your privacy safe on Google - 0 views

  •  
    How to keep your google searches safe online
1More

Facebook Tips: Staying Safe While Using Games and Apps - 0 views

  •  
    This article have 3 tips how to be safe on a Facebook game. Didn't have much time to read , busy in class!
1More

The Miami Hurricane » Are Facebook applications safe? - 2 views

  •  
    This talks about links to other websites on Facebook and how Facebook might not be safe.
2More

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
2More

Resources: 10 Steps to Protecting Your Computer - 0 views

  •  
    "Everyone must read this! Don't skip it...don't tell yourself that you are safe... Your inaction could cause great harm... At home, your identity, your money, and your personal information could be at risk. At work, your patient's medical information could be at risk!"
  •  
    These are 10 steps to protecting your computer. Are you and your computer safe?
1More

Creating a Safe Social Network Profile Page - Resources - TES - 4 views

  •  
    Some nice resources on creating a safe social network page. A document and an Interactive Whiteboard powerpoint file to use.
1More

Stumbling Blocks: Playing It Too Safe Will Make You Sorry | Edutopia - 0 views

  •  
    discussion article around the challenges that teachers face in trying to educate students on how to be safe online as opposed to blocking sites.
4More

How to Be Safe on the Internet: 10 steps - wikiHow - 0 views

  • Do not give out your full name, address, or phone number to anyone online
  • Don’t use lazy passwords. Choosing password or 1234 is like putting a luggage lock on the front door of your house. Also, people will be able to guess it and hack. Instead, come up with a longer password that contains both letters and numbers/characters, preferably one that references something significant only to you. For example, if the name of your beloved childhood goldfish was Sir Bubbles, swap out some of the letters for numbers and you can end up with a very nice password like s1rbubb735 that only you understand.
  •  
    "Using the Internet and surfing the web can be as sweet as candy, but not always, as sweet as it is, it's very easy to type in personal information. Here are a few ways to stay safe during your online activities. " steps to learn online safety and rules.
  •  
    If you have a good password that contains numbers and letters your identity is a lot safer.
1More

For Students | Stay Safe Online - 0 views

  •  
    This shows you how students can be safe online when they are in school.
1More

Safe Games For Kids - 0 views

  •  
    This web page teaches children through games how to stay safe online.
1More

5 Smart rules for children to stay safe online - Bicester Computers Support Forum - Com... - 0 views

  •  
    This shows a fun graph of the word smart and tells how to be safe.
1More

Basic Internet Safety for Kids | Stay Safe Online - 0 views

  •  
    This page helps explain to parents how to keep their children safe online.
1More

Helping Kids and Families Stay Safe: Workshops on Cyberbullying and On-Line Safety - 0 views

  •  
    Shows how to stay safe from cyberbullying. This page also shows how cyberbulling has become used way more.
2More

Wikipedia, Myspace and Google Maps Are Watching: How Safe Are You Online? - Associated ... - 0 views

  • I'm sure by now you have all realized that the Internet is not always the safest place to give out personal information.
  •  
    We should have good etiquette and it will keep us safe.
1More

GetNetWise | Online Safety Guide - 0 views

  • Keeping children safe on the Internet is everyone's job. Parents need to stay in close touch with their kids as they explore the Internet. Teachers need to help students use the Internet appropriately and safely. Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing. Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities. It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. If that's the case in your home or classroom, don't despair. You can use this as an opportunity to turn the tables by having your child teach you a thing or two about the Internet. Ask her where she likes to go on the Internet and what she thinks you might enjoy on the Net. Get your child to talk with you about what's good and not so good about his Internet experience. Also, no matter how Web-literate your kid is, you should still provide guidance. You can't automate good parenting.
6More

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
1More

Teaching kids to stay cyber-safe - Technology Live - USATODAY.com - 0 views

  •  
    This blogger tells about how we need to teach kids how to be safe on the internet.
‹ Previous 21 - 40 of 146 Next › Last »
Showing 20 items per page