Skip to main content

Home/ educators/ Group items tagged software engine

Rss Feed Group items tagged

Vicki Davis

OnlineKnowHow.com - Open Source Finder Google Gadget - 0 views

  •  
    igoogle gadget to help you find open source software
  •  
    Those people who are open source junkies -- this is a great google gadget custom search engine to add to your igoogle or gadget. It will help you easily find open source software.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Julie Altmark

West Point Bridge Design Contest - 3 views

  •  
    WestPoint bridge design software  
Nelly Cardinale

STSC CrossTalk - Computer Science Education: Where Are the Software Engineers... - 0 views

  •  
    Excellent article written by NYC professors discussing which programming language should be taught first in CS majors.
Suzie Nestico

Jim Klein :: Weblog :: To those who would lead... - 9 views

  • What we must never forget, no matter what circumstances are forced upon us, is that without failure, there is no success. We learn when we fail. We grow when we fall. Science is all about learning from failure, and failure is a key component of innovation, without which nothing would ever be tried. The right technology brings with it the opportunity to create environments where students have the opportunity to not just fail, but to fail gracefully, recover quickly, and move forward having learned from the experience in a non-threatening way.
    • Suzie Nestico
       
      Seems, by far, to be one of the most powerful statements in this blog.  As educators, we need to remind our students how very important failure can be.  Not to suggest we purport failure as a good thing, but that we emphasize it as part of a growth model.
  • As is so well stated by Weston & Bain (2010), "Bransford et al (2000), Jonassen (2000, 2004, 2006, 2008), and Jonassen et al. (1999), fix the future of educational technology in cognitive tools that shape and extend human capabilities. Cognitive tools blur the unproductive distinctions that techno-critics make between computers and teaching and learning (Bullen & Janes, 2007; Hukkinen, 2008; Kommers et al., 1992; Lajoie, 2000). When technology enables, empowers, and accelerates a profession's core transactions, the distinctions between computers and professional practice evaporate.
  • For instance, when a surgeon uses an arthriscope to trim a cartilage (Johnson & Pedowitz, 2007), a structural engineer uses computer-assisted design software to simulate stresses on a bridge (Yeomans, 2009), or a sales manager uses customer-relations-management software to predict future inventory needs (Baltzen & Phillips, 2009), they do not think about technology. Each one thinks about her or his professional transaction." 
  •  
    Must read about considerations for the future directions of our schools and developing the 21st Century learner.
Dennis OConnor

Catapult Demo in Time Engineers - 0 views

  •  
    Interesting learning environment, elements of virtual reality and game based learning. This is a demo with the first level free.
1 - 7 of 7
Showing 20 items per page