Skip to main content

Home/ educators/ Group items tagged Internet Security webs

Rss Feed Group items tagged

darkbird18 Wharry

  Home of Gibson Research Corporation  Internet Security Tools.url - 2 views

  •  
    Your use of the Internet security vulnerability profiling services on this site constitutes your FORMAL PERMISSION for us to conduct these tests and requests our transmission of Internet packets to your computer. ShieldsUP!! benignly probes the target computer at your location. Since these probings must travel from our server to your computer, you should be certain to have administrative right-of-way to conduct probative protocol tests through any and all equipment located between your computer and the Internet
  •  
    Your use of the Internet security vulnerability profiling services on this site constitutes your FORMAL PERMISSION for us to conduct these tests and requests our transmission of Internet packets to your computer. ShieldsUP!! benignly probes the target computer at your location. Since these probings must travel from our server to your computer, you should be certain to have administrative right-of-way to conduct probative protocol tests through any and all equipment located between your computer and the Internet
darkbird18 Wharry

Protect Yourself from Internet Scams - Subscribe to Internet ScamBuste (...).URL - 4 views

  •  
    "Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?" Unfortunately, as we hear every single day, being smart is NOT enough to protect yourself from dangerous Internet scams, frustrating spam, or devious identity theft
  •  
    Unfortunately, as we hear every single day, being smart is NOT enough to protect yourself from dangerous Internet scams, frustrating spam, or devious identity theft
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Vicki Davis

Deleting your digital past -- for good - 0 views

  • But what if you don't just want something massaged, manipulated or suppressed? What if you want it gone? Is it possible for an ordinary person to get some damaging tidbit entirely erased from the Web?
  • The Communications Decency Act of 1996 gives almost total immunity to Web sites
  • another surprise dead end is the place where many people launch their erasure efforts: Google.
  • ...2 more annotations...
  • "Removing content from Google or another search engine would still leave the original content that exists on the Web," says a Google spokesman.
  • the webmaster of the page or the Internet hosting companies or ISPs hosting the content to find out their content removal policies."
  •  
    Can you erase your tracks online? We tried to get a few bad mentions off the Net forever. Here's how we did.
  •  
    How to get rid of information for good - not as easy as you think. the problem is that nasty little digital footprints with your full name - even if NOT left by you can influence your life FOREVER. Good information to share. Another reason, digital citizeenship IS an issue.
Fred Delventhal

Web Browser for Kids - KidRocket™ - PC Desktop Protection - 0 views

  •  
    # New Email for Kids with Art/eCard attachments # New Time Lock for limiting a childs time on the computer. # New updated browser navigation (thumbnail GUI) and graphics. # New Kidrocket.org websites. (Public & KidSafe) # New online games and puzzles. # Now Vista compatible. (Windows 98, 2000, XP, MCE, Vista) # Updated kidsafe website list. view approved websites # Now provides vocal prompts and confirmations, for alerts and various security related operations. - It Talks!
Jennifer Garcia

Safe - The DigitalMe Certificate in Safe Social Networking for Primary Schools - 15 views

  •  
    "Safety Skills Safe is a new programme of practical, activities to develop primary children's skills, self-confidence and safety awareness when using social network sites. Safe brings together the FREE social network for schools, Radiowaves, with leading safety organisations Childnet International and The I in Online. "
1 - 6 of 6
Showing 20 items per page