Skip to main content

Home/ educators/ Group items tagged shoulders

Rss Feed Group items tagged

Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Vicki Davis

Wichita teachers union balks at lesson-plan requirements | The Daily Caller - 0 views

  •  
    There are many who don't understand this one point. I used to have someone who required me to have beautiful lesson plans. They were detailed. I spent more than an hour a day on them. So much time so that sometimes I felt unprepared when the kids actually walked in the door. When those detailed plans were removed and I was allowed to focus on the content created for the students to use and then keep a grid (I keep links, etc. to what I'm doing) - THAT Was when real innovation happened in my classroom. Things like wikis, blogs, etc. happened after those super-restrictive requirements were taken off my shoulders. I had the wrong audience when I had those detailed lesson plans - my audience was the principal at the time. Now, I still have plans but I keep it in a grid in a book and then keep copies of what I use with students in dropbox and other places. I do far more now than then because my focus is the students. Lesson plans aren't bad. However, if you spend your time making the LESSON PLAN itself pretty and perfect then likely you're not spending your actual time PLANNING, printing, collecting, and creating what you'll be doing with your students. Also, when you do things like #geniushour and 20% time projects, you no longer have a lesson plan but a project plan which is an entirely different thing altogether. Don't fault teachers for this.  Teaching is the hardest job everybody thinks they can do and few really can.
Vicki Davis

Setting up your PLN - Horizon Project 2008 - 0 views

  •  
    Today on horizon, my students set up their PLN (personal learning network) in their RSS reader -- we use Netvibes although some switched to Google reader. Here is how I will assess this: I am assessing the students on this by having them print the page out and turn it in -- I'm also checking over their shoulders in lieu of printing -- but I may not get to everyone. -- In this blog post, I've REQUIRED 6 things on the page -- each is worth 10 points -- with 2 of those points being for a properly edited title in Netvibes (so that they may see what is what!) -- and then I have them find at least four additional sources of information for another 10 points each. Knowing how to set up a PLN for a topic of study is a VITAL skill for the 21st century researcher. I like Netvibes because it is very simple -- one page interface.
  •  
    Best practice on setting up a PLN as done for the horizon project 2008.
David Wetzel

Seven Habits of Adult Learners - Continuing Education - 14 views

  •  
    The common habits of successful adult learners guides their completion of continuing education programs through dedication and will power. Success or failure rests squarely on their shoulders, and no one else's. Their overall view is that any short-term sacrifice is well worth the effort, as long as long-term goals are met and success becomes a reality.
1 - 5 of 5
Showing 20 items per page