Skip to main content

Home/ Ed Tech Crew/ Group items tagged #security

Rss Feed Group items tagged

gokulgg

Effect Hacking: How To Protect USB Drive and Files From Malicious Access - 0 views

  •  
    But if you want protect your USB drive and files from malicious access, you will need something powerful. Scanning the USB drive with antivirus programs cannot provide you the best protection. More clearly, antivirus programs are not really an option.
Roland Gesthuizen

What to do when your cell phone or tablet is stolen | Digital Trends - 0 views

  •  
    "We trust much of our lives to our mobile devices, whether smartphones or tablets or a traditional notebook computers. But what do you do if one of these devices is lost or stolen?"
Rhondda Powling

Make the web faster, more private, and more secure | Disconnect 2 | Disconnect - 2 views

  •  
    The original product, Disconnect, was created by a former engineer at Google and its subsidiary, DoubleClick, Brian Kennish, and a former consumer rights advocate, Casey Oppenheim. It shows users the invisible sites that track their actions on the web and blocks them. According to Kennish, it not only cuts the advertising umbilical cord, but it also reduces the use of bandwidth and increases browser speeds by as much as 27 per cent. A more recent product, Disconnect Search, essentially makes your search terms anonymous.
Roland Gesthuizen

How to Stay Safe on Public Wi-Fi Networks - 0 views

  • Whether you're clicking connect on Starbucks' Wi-Fi or some other unsecured, public Wi-Fi network, here's how to stay safe and secure while surfing a public hotspot.
  •  
    "Whether you're clicking connect on Starbucks' Wi-Fi or some other unsecured, public Wi-Fi network, here's how to stay safe and secure while surfing a public hotspot."
  •  
    Nice bit of advice, how to protect yourself at a free wi-fi spot.
Roland Gesthuizen

Australian teen triggers global Twitter scare - 2 views

  •  
    "An Australian teen has caused havoc on Twitter by discovering an "exploit" that hit thousands of users, including US President Barack Obama's press secretary, and resulted in the tweets of a former British PM's wife linking to hardcore porn."
  •  
    Interesting to consider how this student reacted when he found the exploit and what he then did (and didnt do). Great discussion for the IT classroom.
John Pearce

Facebook Launches 'Guide To Facebook Security,' Helps You Secure Your Account - 2 views

  •  
    "Over the last few months, Facebook has launched several initiatives and features to help you keep your account and data secure. Back in May, the company revealed it was switching over to the secure HTTPS protocol and announced details of its login approvals feature. Facebook has also teamed up with Web of Trust to help protect you from scam websites and recently added its social reporting tool to its mobile website. In addition, the company has launched a bug bounty program that rewards security researchers for finding flaws in the social network's security systems. To help you understand the social network's security features and how to protect your account, a Guide To Facebook Security has been launched. The guide, which you can download from Facebook, is 14 pages long and offers all kinds of tips on how to protect your account, including how to spot and avoid scam apps and clickjacking."
Chris Betcher

Prey - All your devices - 6 views

  •  
    The Prey control panel for missing computers
Roland Gesthuizen

Is it Time for Bring Your Own Technology? - Expert Voices - 12 views

  •  
    "It's time to get over the control paradigm we've all gotten used to and start thinking outside the box. What would it take to allow any device to connect safely and securely to our corporate networks?"
Roland Gesthuizen

Stolen Camera Finder - find your photos, find your camera - 5 views

  •  
    Is your camera lost or missing? Has your camera been stolen? If so, stolencamerafinder can help you find out where it is now.  stolencamerafinder uses the serial number stored in your photo to search the web for photos taken with the same camera. 
Tony Richards

7 cloud services compared: How much control do you give up? | ZDNet - 5 views

  •  
    Dropbox Kisses and Makes Up?
Heather Bailie

Password Bird | Password Generator - 2 views

  •  
    Easy to use password generator, creates passwords based on a name, favourite word and date
Chris Betcher

Stay safe online - Good to Know - Google - 8 views

  •  
    tips and advice for staying more secure on the web
Darrel Branson

Are QR Codes a Real Security Risk For Smartphone Owners? - 0 views

  •  
    Did itmadesimple predict this? "Some owners of Android-powered smartphones in Russia were surprised recently when they tried to download an ICQ chat app by scanning a 2D barcode. What they got instead was an unusually large phone bill after their phone sent a series of SMS messages to a premium texting service, which charges a few dollars per text."
Aaron Davis

Educational Conferences and the ethics of EdTech - Medium - 0 views

  •  
    A really good discussion about things to consider when introducing new programs into the classroom around privacy and the ability to remove data.
Roland Gesthuizen

Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED - 0 views

  •  
    "Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn't just in what they carry, it's built into the core of how they work. "
percy08

Free Complete Mobile Device Management | Comodo Device Manager - 1 views

  •  
    Get Free Complete Mobile Device Management from Comodo and manage mobile devices and Windows endpoints from a single console.
‹ Previous 21 - 40 of 45 Next ›
Showing 20 items per page