Skip to main content

Home/ Ed Tech Crew/ Group items matching "protect" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
John Pearce

Facebook Launches 'Guide To Facebook Security,' Helps You Secure Your Account - 2 views

  •  
    "Over the last few months, Facebook has launched several initiatives and features to help you keep your account and data secure. Back in May, the company revealed it was switching over to the secure HTTPS protocol and announced details of its login approvals feature. Facebook has also teamed up with Web of Trust to help protect you from scam websites and recently added its social reporting tool to its mobile website. In addition, the company has launched a bug bounty program that rewards security researchers for finding flaws in the social network's security systems. To help you understand the social network's security features and how to protect your account, a Guide To Facebook Security has been launched. The guide, which you can download from Facebook, is 14 pages long and offers all kinds of tips on how to protect your account, including how to spot and avoid scam apps and clickjacking."
Shane Roberts

How to Protect Your Flash Drive Data with TrueCrypt - How-To Geek - 4 views

  •  
    Protecting your private information.
Roland Gesthuizen

Protect yourself from trolls | ACMA - 1 views

  •  
    "Being trolled? Here are five tips to protect yourself: "
John Pearce

Protect kids online by empowering them to explore on their own, not by restrictive rules - CSMonitor.com - 3 views

  •  
    "Protecting kids online is no easy job, especially since the best way to keep them safe is to lessen the Protectionist urge and empower them to explore at will."
buyglobalsmm21

Buy Google 5 Star Reviews-100% trusted reviews, & permanent. - 0 views

  •  
    Buy Google 5 Star Reviews Buy Google Verified Reviews Allows You To Validate The Authenticity Of Any Review Written About A Product Or Service. Simply Enter The Name Of The Company Selling The Product Or Providing The Service, As Well As The Name Of The Person Writing The Review. Why Will You Purchase My Service? ➤ 100% Satisfaction Guaranteed ➤ Full Completed Profiles ➤ Best Quality, Reliable, Non-Drop, And 100% Safe Service ➤ Cheapest Price For Every Service ➤ Service Replacement Guaranteed ➤ 24-Hour Service Access And Customer Support ➤ 100% Money-Back Guarantee You Save Energy And Time ➤ You Will See Results Within 24 Hours ➤ You Are Safe And Discreet-Protected By Data Protection ➤ Manual Order Processing And Quality Assurance ➤ Free Assistance And Tailored Solutions 24 Hours Reply/Contact Email : buyglobalsmm@gmail.com Skype : Buy Global SMM Telegram : @buyglobalsmm
  •  
    Buy Google 5 Star Reviews Buy Google Verified Reviews Allows You To Validate The Authenticity Of Any Review Written About A Product Or Service. Simply Enter The Name Of The Company Selling The Product Or Providing The Service, As Well As The Name Of The Person Writing The Review. Why Will You Purchase My Service? ➤ 100% Satisfaction Guaranteed ➤ Full Completed Profiles ➤ Best Quality, Reliable, Non-Drop, And 100% Safe Service ➤ Cheapest Price For Every Service ➤ Service Replacement Guaranteed ➤ 24-Hour Service Access And Customer Support ➤ 100% Money-Back Guarantee You Save Energy And Time ➤ You Will See Results Within 24 Hours ➤ You Are Safe And Discreet-Protected By Data Protection ➤ Manual Order Processing And Quality Assurance ➤ Free Assistance And Tailored Solutions 24 Hours Reply/Contact Email : buyglobalsmm@gmail.com Skype : Buy Global SMM Telegram : @buyglobalsmm
John Pearce

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | Wired.com - 1 views

  •  
    "No matter how complex, no matter how unique, your passwords can no longer protect you."
Rhondda Powling

'Bill of Rights' Seeks to Protect Students' Interests as Online Learning Expands - Technology - The Chronicle of Higher Education - 4 views

  •  
    "12 educators, many of them well known in online-education circles, did manage to draft a document that they hope will serve as a philosophical framework for protecting the interests of students as online education. Called "A Bill of Rights and Principles for Learning in the Digital Age," the document proposes a set of "inalienable rights" that the authors say students and their advocates should demand from institutions and companies that offer online courses and technology tools."
John Pearce

Can a cyber-bullying commissioner protect our kids? - Law Report - ABC Radio National (Australian Broadcasting Corporation) - 0 views

  •  
    "A federal government discussion paper has proposed the creation of a children's e-safety commissioner to help protect children from cyber-bullying on social media. However not everyone agrees on the proposal, which opponents say is a slippery slope to government censorship, writes Damien Carrick."
gokulgg

Effect Hacking: How To Protect USB Drive and Files From Malicious Access - 0 views

  •  
    But if you want protect your USB drive and files from malicious access, you will need something powerful. Scanning the USB drive with antivirus programs cannot provide you the best protection. More clearly, antivirus programs are not really an option.
Darrel Branson

Guidelines For Mobile Phones Used In Classrooms As Teaching Aid - 3 views

  •  
    Phone camera rules needed to protect teachers....
John Pearce

Terms of Service; Didn't Read | Bright Ideas - 1 views

  •  
    "The most time-consuming part of evaluating web tools for educational use has got to be looking at the Terms of Service (also know as Terms of Use or Terms and Conditions). They can go on for pages, and are so often wrapped up in so much legalese that even if you manage to read to the end, there is no guarantee you will be any wiser. And yet we can't just ignore them; it is our duty as educators and as digital citizens to protect rights and understand responsibilities online."
John Pearce

Schoolchildren at risk of online activity being tracked | World news | guardian.co.uk - 1 views

  •  
    "Schoolchildren are at risk of having their online activity tracked and monitored for targeted advertising by internet firms through free cloud based education services. A survey has found that many parents do not know about data mining - the process of tracking email and web browsing habits in order to target advertising - but once they do they have grave concerns for their kids' online privacy, and believe schools need to do more to protect it. The survey commissioned by American IT industry group SafeGov asked 1000 Australian parents about their knowledge of data mining."
Russell Ogden

Why 1:1 can actually be dangerous for our students. | The L.I.T Ladies - 1 views

  •  
    Never mind the digital divide, it is the distraction divide from which we need to protect our students.
Katherin Smith

Tips to Keep Yourself Safe While Using Public WIFI| Norton Support Call +61-1800-769-903 AUS Toll Free - 0 views

  •  
    tips on protecting your online security when you are using public wi-fi hotspots.
John Pearce

Gorillas, ARIS games and Augmented Reality | The Elastic Learning Network Melbourne - Facilitating 21st Century learning experiences in Melbourne Australia - 4 views

  •  
    I'm still excited after the first meeting with the students at Melbourne City School back in April. Since I approached the school with an idea for using Augmented Reality (AR) and Games-based Learning they have been warm and welcoming and things have progressed ever so fast.  We had some initial discussions about how Curiosity Lab (ELN) and the students could work on something and they embraced the possibilities, so we just got straight into it. Using ARIS,  the novelty of AR and opportunities to attach rich media in the AR browser, we set produce something powerful that is learner driven, which attracts media attention and captures the hearts and imagination of the public. The fact that Layar is an app designed for mobile devices make it well suited to promoting the idea of recycling mobile phones to help protect and preserve the habitat of the Western Lowlands Gorilla.
John Pearce

Copy Protection for 3-D Printing Aims to Prevent a Piracy Plague | MIT Technology Review - 0 views

  •  
    "People in the 3-D printing world have talked for years about the possibility of unauthorized copying and sharing of designs-similar to what the file-sharing program Napster allowed for music. Now the first commercial solution to this as-yet theoretical problem is preparing to launch. It was developed by Authentise, a startup based in Mountain View, California."
John Pearce

How Millennials Feel About Data Targeting and Online Privacy [infographic] - 0 views

  •  
    "95% of Millennials claim to have taken action to protect their online privacy, which is good. Everyone needs to be looking after themselves, especially on the internet, since identity theft is a thing. That still blows my mind. Someone can take your life away over the internet. At least 95% of the Millennials are safe, right?"
John Pearce

How to Password Protect a Google Form - 3 views

  •  
    "When you create a form using Google Forms, the form is public by default meaning it can be filled out by anyone on the Internet as long as they know the web URL of that form. If you are a Google Apps user, you can put the form behind a login screen such that only members of your domain /organization can access and fill out that form but this feature is not available to other users who have regular Google accounts."
John Pearce

Mobile phone tracking: it's not personal - 1 views

  •  
    "Mobile phone tracking techniques are becoming more commonplace. Waste bins target ads. Shopping centres follow customers. Spooks follow airport passengers. Will the Privacy Act's new definition of personal information provide enhanced protections against mobile phone tracking? Not really. Here's why."
1 - 20 of 58 Next › Last »
Showing 20 items per page