Skip to main content

Home/ educators/ Group items tagged passwords

Rss Feed Group items tagged

Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Dave Truss

How to choose good passwords - CMU/SCS Computing Facilities - 8 views

  •  
    How to choose good passwords\nOn this page:\n * What not to do when choosing a password\n * The best method for choosing passwords.\n...
Martin Burrett

MyQR Codes - 14 views

  •  
    This is a useful QR code creator that allows you to add a password to your codes. You can use this to protect private information or make the passwords the answer to a question to access a new question to create a chain of questions for a QR code quiz. Encode for a web link, message, contact details or maps. All without needing to sign up! Sign in to get analysis of your codes. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Nicole Hill

Security Guide for Windows - Random Password Generator - 0 views

  •  
    Need secure passwords for student accounts?
Vicki Davis

LastPass - Download - 13 views

  •  
    Download last pass to add a full level of encryption to your password remembering.
  •  
    I agree 100% that LastPass is useful. I've been using LastPass for a year or so on Chrome for Windows and Mac OSX, an Android phone, and an iPad. I even signed up for the paid service after a while. If you share online accounts with someone else like a colleague or significant-other, if one of you subscribes to the paid service, the paid membert can share a "folder" with a free member so you both always have the most up-to-date account and password info. That's been working great between my wife and I for family online accounts. I've read/heard from security researchers (such as Steve Gibson) that Lastpass.com uses and encourages good security practices and encryption but make sure you use a really good master password or all that protection is not very useful.
EXECUTIVE DIRECTOR

Passwords Do Not Mean Protection - 3 views

  •  
    If you think that your password protected or private social web page means that nobody but you or your friends can see what you post, you do NOT understand digital safety, responsibility or awareness and could already be at risk.
Vicki Davis

Permission Forms - Google Apps Support - 1 views

  •  
    These are the permission forms for the Beaverton School District and Google Apps with specific disclosures about how usernames and passwords will be set up and downloadable permission forms. 
Martin Burrett

JeopardyLabs - 8 views

  •  
    Jeopardy is a popular quiz show and a great format to use in the classroom. This is an easy to use Jeopardy quiz creator. Make your quiz by choosing a password and filling in the boxes for categories, questions and answers. Your quiz is published online along with many others to browse through. Use the search box to find what you want. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Vicki Davis

ChatWing - 9 views

  •  
    This website offers a free global chat on blogs and is creating quite a stir. While it may not be appropriate for all sites - if you put it on a password protected site of some kind (where you know those viewing the page have permission to view - like a wikispaces) - then you could engage in conversation with all kinds of audiences including parents, etc. around topics of interest. Students could host their own live chats. Interesting possibilities here.
Vicki Davis

Cool Cat Teacher Blog: Join the Flat Classroom Global Book Club! #flatclass - 1 views

  •  
    It is finally here. Here are the details on our Flat Classroom global book club. (click the link for more) Every week for 10 weeks we will meet at an alternating time - 12 hours apart. (For the East Coast USA it is Sundays at 6 pm Eastern or Monday mornings at 6 am eastern)  Visit our Book club calendar to convert these times to your Time Zone. Subscribe to this calendar via Google calendar to keep up with events.This is Sunday evenings at 22:00GMT alternating with Monday mornings at 10:00GMT in our Blackboard Collaborate room https://sas.elluminate.com/m.jnlp?sid=2007066&password=M.065891D192F8072208BF5756999CE0 .   The book club is free and everyone is welcome. #flatclass Book Club Meeting Times Week and Date Time Topic of Conversation Week 1: Sunday March 11 22:00 GMT (6 pm EDT) Chapter 1 - Flattening Classrooms through Global Collaboration (p 1-17) Chapter 2 - Impact on Learning: Research in the Global Collaborative Classroom (p18-30) Week 2: Monday, March 19 10:00 GMT (6 am EDT) Chapter 3 - Step 1: Connection (p 31-61) Week 3: Sunday, March 25 22:00 GMT (6 pm EDT) Chapter 4 - Step 2: Communication (p 62-96) Week 4: Monday, April 2 10:00 GMT (6 am EDT) Chapter 5 - Step 3: Citizenship (p 97-125) Take a break. Week 5: Sunday, April 15 22:00 GMT (6 pm EDT) Chapter 6 - Step 4: Contribution and Collaboration (p 126-157) Week 6: Monday, April 23 10:00 GMT (6 am EDT) Chapter 7 - Step 5: Choice (p 158-196) Week 7: Sunday, April 29 22:00 GMT (6 pm EDT) Chapter 8 - Step 6: Creation (p197-214) Week 8: Monday, May 7 10:00 GMT (6 am EDT) Chapter 9 - Step 7: Celebration (p 215-234) Week 9: Sunday, May 13 22:00 GMT (6 pm EDT) Chapter 10 - Designing and Managing a Global Collaborative Project (p 235-267) Week 10: Monday, May 21 10:00 GMT (6 am EDT) Chapter 11 - Challenge-Based Professional Development (p 268-293) Chapter 12: Rock the World (p 293 - 304)  We're also inviting the educators featured in each chapter to be with us for the conversations about "th
Martin Burrett

QRJumps - 5 views

shared by Martin Burrett on 05 Jun 12 - Cached
  •  
    A clever QR code generator that lets you change the link behind the code, add expiry dates and password protect links. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Susan Sedro

When is Good - 10 views

shared by Susan Sedro on 10 Apr 10 - Cached
  •  
    An easy way to find out when everyone is free for your next meeting or event. Click the grid for all the times that are good for you - you get a link to email to your invitees. They see your proposed times and click on when they are free. You visit your results page and see when everyone can do. No sign-up form. No password to choose. No fuss at all.
Anne Bubnic

Online Safety Quiz for Kids - 0 views

  •  
    Online Safety Quiz for Kids from SecureFlorida.org. Questions cover privacy issues like online profiles, pictures, passwords and screen names.
Tero Toivanen

How To Fix the 10 Biggest Windows Annoyances - How-To Geek - 9 views

  •  
    "Windows can be seriously annoying sometimes, but thankfully there's also usually a workaround or third-party utility that fixes the issue. We've rounded up the ten things that annoy us most, along with how to fix them."
Kelly Faulkner

Classroom 2.0 LIVE! - 0 views

  •  
    Keep up with Classroom 2.0 LIve conversations. I actually have this as part of my Google Calendar so I can keep up with it. This week: "This Saturday, Mar. 21st, Peggy George, Kim Caise, and Lorna Costantini will be hosting another Classroom 2.0 LIVE web meeting. Classroom 2.0 "LIVE" meetings are an opportunity to gather with other members of the community in real-time events, complete with audio, chat, desktop sharing, and sometimes even video. (Special thanks to our sponsor, Elluminate, for providing the service that allows us to do this!) A Google Calendar of shows is available at http://live.classroom20.com/calendar.html. The topic this Saturday is: "Podcasting". Our special guest will be Kevin Honeycutt, founder of the "Podstock" Ning. Our Newbie Question of the Week will be: "What is a podcast and how can I use it to support my teaching?" We hope you'll join us to share your ideas and questions. Links for more information can be found at http://live.classroom20.com. We strive to make our shows beginner-friendly and if you've never participated in a live web meeting don't be afraid to come and take a peek at the show's format. We love newbies to join us and 'dip their toes in' the conversations until you feel comfortable enough to "jump in the conversations with both feet"! We want to encourage "experienced Web 2.0 users" to join us by contributing and extending the conversation by sharing real-life examples and tips/suggestions. Date: Sat., Mar. 21, 2009 Time: 9:00am PST/10:00am MST/11:00am CST/12:00pm EST Other time zones link and a link to the actual meeting room can be found at http://live.classroom20.com/. Location: Elluminate https://sas.elluminate.com/m.jnlp?sid=2008350&password=M.97A21EB084879D9442B4EDF2437E3D"
  •  
    Great resources and free PD. This calendar lists all types of activities and webinars for you in one place.
  •  
    the classroom 2.0 calendar, for people (like me!) who have a busy teaching schedule, thereby (haha) getting days/time zones confused :O)
Carlos Quintero

Mind Map: Pedagogía 2.0 - MindMeister - 0 views

  •  
    mapping about pedagogic 2.0 (spanish)/pedagogia 2.0
Adrienne Michetti

OLPC Human Interface Guidelines/Design Fundamentals/Key Design Principles - OLPC - 0 views

  • n which provides a low floor to the inexperienced, but doesn't impose a ceiling upon those who are.
  • tailored to the needs of children in the context of their learning
  • n activity ring that contains icons representing each instance of an open activity
  • ...15 more annotations...
  • limitations
  • mphasis on discoverability and usability
  • the actual behavior of the activities, the layout of the buttons and tools, and the feedback that the interface provides to the children when they interact with it
  • there is no substitute for user testing
  • imple doesn't necessarily mean limited
  • simple—even minimal—controls can have great expressive power.
  • a "fail-soft" approach to their designs
  • five categories of "bad things" software can do: damaging the laptop; compromising privacy; damaging the children's data; doing bad things to other people; and impersonating the child.
  • without the use of menus, pop-up boxes, passwords, etc., as these approaches are meaningless to most people.
  • no noticeable side-effects
  • When children know they have a fallback plan—a way back to the current state of things—they will much more frequently go beyond their comfortable boundaries and experiment with new tools and new creative means of expression
  • the ability to undo one's actions.
  • Interoperability
  • Towards this end, a view source key has been added to the laptop keyboards, providing them with instant access to the code that enables the activities that they use from day to day. This key will allow those interested to peel away layers of abstraction, digging deeper into the codebase as they learn.
  • (without a mouse or trackpad)
Vicki Davis

64 Things Every Geek Should Know - LaptopLogic.com - 1 views

  • Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing.
    • Vicki Davis
       
      Often the keylogger is a program on the computer, so don't think just looking for the hardware will find it!
  • Tor is an onion-routing system which makes it 'impossible' for someone to find out who you actually are.
  • See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.
    • Vicki Davis
       
      FYI - as a person who has had to do this on a Windows computer - this often doesn't work!
  • ...3 more annotations...
  • Every geek should know how to recover the master book record.
    • Vicki Davis
       
      I did this last week! It saved me a TON of time!
  • There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.
    • Vicki Davis
       
      There are inexpensive programs that you can use to do this - it helped us with a personnel matter quite a few years back - I think every IT person should have such a program and every teacher should understand that it is possible for such a program to be used. I teach my students that everything ever saved on a hard drive can be retrieved - be careful.
  • Person to Person data sharing
    • Vicki Davis
       
      Uhm - that is peer to peer!
  •  
    Great article with many things people should know.
  •  
    Cool article that covers a lot of things that people should know - whether you mind being called a geek or not. Very interesting reading.
1 - 20 of 20
Showing 20 items per page