Skip to main content

Home/ educators/ Group items tagged surf

Rss Feed Group items tagged

Martin Burrett

Internet use in class tied to lower test scores - 2 views

  •  
    "Warning: Surfing the internet in class is now linked to poorer test scores, even among the most intelligent and motivated of students. Michigan State University researchers studied laptop use in an introductory psychology course and found the average time spent browsing the web for non-class-related purposes was 37 minutes. Students spent the most time on social media, reading email, shopping for items such as clothes and watching videos."
Fred Delventhal

KIDO'Z Browser - A browser made for kids - 0 views

  •  
    The KIDO'Z browser is a protected environment made for young kids that enables children to surf sites ,watch videos and play games
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Ted Sakshaug

Rader's PHYSICS 4 KIDS.COM - 4 views

  •  
    If you are looking for basic physics information, stay on this site. It's not just physics for kids, it's for everyone. We have information on motion, heat and thermodynamics, electricity & magnetism, light, and modern physics topics. If you're still not sure what to click, try our site map that lists all of the topics on the site. If you surf and get lost in all of the information, use the search function on the side of the pages.
Vicki Davis

Tor: anonymity online - 0 views

  •  
    A leading proxy system for privately surfing - not saying you'd need this. Tor is a registered 501(c)(3) nonprofit with the purpose of protecting your INternet traffic from analysis.
Ted Sakshaug

Environmental Graffiti: Offbeat Environmental News, Not Hip-Hop! - 2 views

  •  
    Born in May 2007, Environmental Graffiti is an eclectic mix of the most bizarre, funny and interesting environmental news on the planet. We search the vast realms of the internet on behalf of all environmentalists who don't take themselves too seriously and compile it into a daily blog. Surf and enjoy!
Denis S

18 and Under - Texting, Surfing, Studying? - NYTimes.com - 11 views

  • But if you ask the experts, they are pretty unanimous that we don’t know much.
  • So are teenagers any better at oscillating?
  • “If they’re doing well, permitting them to have some choice permits them to find their own style.”
  •  
    "But if you ask the experts, they are pretty unanimous that we don't know much. "
Suzie Nestico

Google+ could make Twitter the next Myspace | VentureBeat - 4 views

  • Although Twitter is growing (having just hit 200 million tweets a day), Twitter has left itself open to be displaced with a slow pace of adding features. Even newly returned founder Jack Dorsey has said that it was too difficult for “normal” people to use Twitter.
  • Google+ is decidedly in the Twitter camp — meaning you can follow anyone, including Google CEO Larry Page. Google+ lets you see Page’s posts and “like” his photos of kite surfing in Alaska. When posting on Google+, it forces users to select specific social circles they are posting to, which includes “everyone” as an option that mimics a Twitter-style broadcast. I
  • There are two different types of social networks, private and public — each defined by its default privacy setting. Facebook is by default private and meant to connect actual friends. Twitter by default is public and anyone can follow anyone else.
  •  
    Interesting article found on Google+ via @markwagner
kim tufts

Looking for people to share their web 2.0 teaching experience - 151 views

Hi - I use diigo for my classroom. I teach 6-8 computer studies and we work on Public Service Announcements for a media literacy project. I make lists of the websites I would like the students to ...

web2.0 pedagogy design

1 - 12 of 12
Showing 20 items per page