Skip to main content

Home/ educators/ Group items tagged Internet

Rss Feed Group items tagged

Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
anonymous

The Ultimate Guide to Google Knol: 50+ Tips and Tricks - 0 views

  •  
    Google Knol is turning into an excellent resource for both researchers and experts alike. It offers information consumers a platform for finding encyclopedia-like articles. Read on to learn how you can make the most of this useful new tool.
Dean Mantz

Cyber, Are you still Bullying? - 0 views

  •  
    Memory game hosted by National Geographic. This game will test your short term memory.
anonymous

100 Free Academic Journals You Can Access Online - 0 views

  •  
    Whether you're seeking information about art, finance, or science, there's a free academic journal out there for you. Read on to find out about the wide variety of journals that you can use online for free.
Vicki Davis

Telstra launches social network for kids - Internet - iTnews Australia - 0 views

  •  
    In Australia, a new social network for children ages 6-12 accessible only to students and teachers at Australian primary schools is launched. Called SuperClubsPLUS -- what a GREAT idea. Now, this is something other countries should be doing -- flattening at least the schools under their jurisdiction. Hope they have their disciplinary and reporting issues worked out b/c any where two students are gathered, online or off, there are always issues. Still don't understand why they are calling it a SOCIAL NETWORK. It is an educational network -- unless they are going to let it be social.
  •  
    Educational Network launches for Australian kids ages 6-12.
Dave Truss

BPS Internet Safety Blog: Listen to the "Be Safe" CyberSafety Song - 0 views

  •  
    The BPS Cyber Superheroes long awaited release of the "Be Safe" song is available for download! You can listen to it here on the blog and download it from the Boston Public Schools Cybersafety website.
anonymous

Global Network Initiative - 0 views

  •  
    Protecting and Advancing Freedom of Expression and Privacy in Information and Communications Technologies
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
  •  
    Susan Silverman creates excellent projects for global collaboration among elementary students.
Diane Hammond

Education World ® Technology Center: Miguel Guhlin: The CTO Challenge: Buildi... - 0 views

  • essential learning tools that every 21st century learner should have.
    • Diane Hammond
       
      It would be interesting to re-visit this list in 6 months (eons in Internet time) and see which tools have stood the test of time and which have been replaced by newer and better.
  • Miguel Guhlin
    • Diane Hammond
       
      Thanks for this Miguel! This is a great place to start teachers new to PLNs. Your examples are very effective.
  • use your blog as your "backup brain"
  •  
    Great examples of using networking tolos such as Twitter and Diigo together.
Vicki Davis

From the Annointed Few to the Collective Many - 0 views

    • Vicki Davis
       
      How sad!
  • the Internet has morphed from a presentation medium to an interactive platform in just a few years
  • a leading web analysis site
    • Vicki Davis
       
      I find this description of Technorati almost amusing.
  • ...18 more annotations...
  • more than 50 percent of Americans aged 20-30 years old use Facebook
  • among Americans under the age of 35, social networking and user-generated content sites have overtaken TV as a primary media.
  • “Visitors to MySpace.com and Friendster.com generally skew older, with people age 25 and older comprising 68 and 71 percent of their user bases, respectively.”
  • We’re in the midst of a paradigm shift where individuals are indeed connecting “in ways and at levels that [they] haven’t done before”
  • Workplace communities
  • orkplace communities are designed to solve workplace-related challenges
  • talent management is about finding, developing, and retaining key talent within the organization
  • Ernst & Young, for instance, has a significant presence on Facebook in support of its recruiting efforts
  • Google, Home Depot, Enterprise Rent a Car, and Deloitte also are recruiting using Web 2.0 tools through YouTube videos and even alumni social networks
  • “If companies keep social networks out, they will be doing a significant disservice to their bottom lines
    • Vicki Davis
       
      Understanding networks is important to students. Knowing how to be professional and what is appropriate for different spaces is vital.
  • Between 2000 and 2020, 75 million Boomers will reach retirement age.
  • The only content service with mass adoption (greater than 50 percent) was Social Networking, and this was only among respondents under the age of 35.”
  • In addition, Millennials are the first generation to spend more hours online per week than watching TV (16.7 vs 13.6).
  • some of the characteristics of Millenials, which included a desire to work in  “[open] and flat organizations” as “part of a tribe.”
  • “heavy use of technology (messaging, collaboration, online learning) as a daily part of their work lives.”
  • robust and active communities will have an easier time recruiting talented Millennials
  • they have opportunities to meaningfully connect to their peers and supervisors.
  • A retiring Boomer who is an expert in a particular field could be an excellent community manager, blogger, or wiki contributor.
    • Vicki Davis
       
      Blogging might be the answer for retiring boomers?
  •  
    Business people and management should read this article about the transformation of business by using workplace communities. "Workplace communities are designed to solve workplace-related challenges" -- they focus on tasks. I would find it interesting to see a business REALLY use technology to change things. Having the business in a business network (OK a NING) and let people tag their posts with the business related PROBLEMS they are having and blog, video, or photograph it-- the tag cloud would tell the business IMMEDIATELY what the problems are in the company. The problem with this model is that there are few corporate executives who REALLY want to know the problems within their organizations. They don't want to be problem solvers, just opportunity creators. However, when managers open their eyes (and I'm a former General Manager myself) and see that two things give business opportunity: problem solving and innovation. And they are directly related. True innovation solves problems. Read this article and think about how you may solve problems using the networks you may now create. If you don't want everyone to know, keep it private and only allow people in your company in.
Ric Murry

YouTube's Pattern Recognition Adapted To Fight Child Abuse - 0 views

  •  
    Interesting that YouTube, the evil, filtered video place for schools, is perhaps going to lead the way to internet protection for child safety.
Art Gelwicks

No videoconference to Williamsburg - I'm sad » Moving at the Speed of Creativity - 0 views

  • but we’ll do so from our church, away from school, and we will not involve any Edmond PS students in the videoconference to comply with the directive from the district technology director. I did not realize the district forbids any parents or students from using any type of personal computer and outside Internet connection device (like my cell network data card) to provide an interactive learning opportunity for students. Now I know.
  •  
    Yet another district technology director giving the rest of us a bad name. Good grief....justify yourself without using the paranoid buzzphrase, "To Protect the Children!"
  •  
    Why are we afraid to confront district technology personnel and administrators over knee-jerk tragic decisions like this?
Ben W

Science News / Scientists Get A 2nd Life - 0 views

  • Through iPods and mp3 players, Facebook, cell phones and texting, young people become familiar with current technologies and often view them as an extension of themselves, Kennedy says. As a result, they’re drawn to learning techniques that employ novel devices. “Most of this younger generation has grown up entirely with the Internet. How can we not incorporate technology into our curriculum?” she says
  •  
    Article describing real science being done in virtual environments. Excellent read. Also discusses use of second life as an educational tool.
John Evans

Weblogg-ed » Not "The Dumbest Generation" - 0 views

  • So with the caveat that I am only halfway through Mark Bauerline’s book The Dumbest Generation, I have some early impressions to throw out there. While I think there is some merit to this side of the debate (much like Keen’s Cult of the Amateur) what really bothers me about this book so far is, as the title suggests, this sense that our kids are at fault. Let me put it plainly: our kids are not “dumb” nor is this generation “dumb” simply because they spend a lot of time in front of television screens and computers or because they haven’t worked out for themselves how to get smarter using the Read/Write Web.
  •  
    So with the caveat that I am only halfway through Mark Bauerline's book The Dumbest Generation, I have some early impressions to throw out there. While I think there is some merit to this side of the debate (much like Keen's Cult of the Amateur) what really bothers me about this book so far is, as the title suggests, this sense that our kids are at fault. Let me put it plainly: our kids are not "dumb" nor is this generation "dumb" simply because they spend a lot of time in front of television screens and computers or because they haven't worked out for themselves how to get smarter using the Read/Write Web.
Emily Vickery

Apple - Seminars Online - The Podcast Recipe. - 0 views

  • Podcasting is one of the most explosive technologies to hit the Internet. And with literally thousands of podcasts available on Apple iTunes, the need for high-quality production is critical. In this free, on-demand, three-part seminar Apple experts take you behind the scenes to see what it takes to perform a great-sounding podcast, produce a professional show, and promote a podcast to reach as many people as possible.
  •  
    Online "how to" podcasting from Apple.
« First ‹ Previous 321 - 340 of 453 Next › Last »
Showing 20 items per page