Skip to main content

Home/ educators/ Group items tagged virus

Rss Feed Group items tagged

Vicki Davis

Crypto Locker Virus Holds Your Computer Hostage | WebProNews - 2 views

  •  
    Ransomware is a new kind of malware. The worst Ransomware to hit in some time is the Crypto virus. This virus encrypts your hard drive and you have to send them a $300 certificate (untraceable) so they'll give you the encryption key to decrypt your drive and get your data back. In an interesting twist, the US government disabled the servers running this ransomware scan and now all of the people with the virus have no hope of getting their decryption keys. This is another reason you should be very careful NOT to open suspicious attachments even from legitimate sounding sources. (Many of these messages appeared to be from Fedex and UPS.) The greatest internet filter ever created is the human brain. Educate teachers and others - not through fear but through a skeptical empowerment that always thinks before it clicks and especially before it downloads.
Dave Truss

YouTube - Steering Clear of Cyber Tricks - 8 views

  •  
    Great comment: I KEEP TELLING MY MOMMY NOT TO CLICK ON THOSE FAKE THINGS!! she never listens ._. gosh why is she so uninternet savvy @_@ if the computer gets a virus she better not say anything to me ._.
anonymous

ourlostchildren » home - 0 views

  •  
    Student created wiki. Thomas Cooper is the teacher behind this project. He teachers at the Walker School in Marietta, GA. Many people believe that child labor and abuse is something of the past, but there could not be more of a false statement. Around the world children are being marginalized, and abused, and forced into labor. Children in Africa are being forced to join the military and kill children and adults alike. Other children are living on the streets because their parents' lives were taken by the AIDS virus. And due to India's class system, young children will live in poverty with no possible way of hope in the future. Children are even forced into prostitution and labor. Childhood deformities and disabilities cause affected children to live in isolation and cause pain and suffering for both them and their families. Be sure to check out the teacher resources in the table of contents.
Ben Rimes

Education Software for Schools: Free Software, Open Source | School Forge - 18 views

  •  
    Open source educational tools development site for school. Large projects including student information systems, utilities, anti-virus and more. Fun take on the Sourceforge concept of open-source commercial developers.
Vicki Davis

Curriki - ContinuityofLearning - 0 views

  •  
    Just received this in my inbox: "WASHINGTON DC (August 25th, 2009) - Curriki, the largest online community for creating and sharing open source K-12 curricula, was asked by the Department of Education, Office of Innovation and Improvement (OII) to provide a continuity of learning plan for states, school districts, and individuals as part of a nationwide readiness initiative for a possible resurgence of the H1N1 virus. Curriki's continuity of learning plan includes access to a free and open repository of teaching and learning resources built on an open platform that can be customized for individual states or school districts. Like an iTunes playlist, users of Curriki can create collections of free and open educational resources, along with repositories of other supplemental content. If a teacher prefers one lesson to another, he or she can easily swap content in or out to meet the individual needs of the students. States or school districts can take advantage of customized landing pages designed to provide specific information, news, resources, and links to their education stakeholders. Additionally, Curriki's group function allow members of a district, school, or community to stay connected and privately share resources, communicate and post news and collaborate on projects from any location. " I think that perhaps online learning is about to completely boom largely as a result of the growing pandemic and the need for isolation and ongoing learning. Curriki has things together for this and I'm going to take a look at this for our school.
Martin Burrett

FREE - UKEdChat 2020 Online Conference - 3 views

  •  
    "Following the success of our previous online conference, and in line with the frustrations around the COVID-19 virus, we are pleased to announce that we have moved our plans for the 2020 UKEdChat Online Conference forward to June 2020. The conference has proven a great platform for continuous professional development (CPD) and we are lining up some great video presentations based on: pedagogy, classroom management strategies, practical learning, assessments, improving subject knowledge and so on."
Carl Bogardu

Scan Websites for Exploits, Malware and other Malicious Threats - URLVoid.com BETA - 7 views

  •  
    If one is constantly searching for new education websites, as I am, this is a handy tool to use before opening that site.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Kelly Faulkner

Unhid.co.cc - uncover your suspicious or shortened links! - 7 views

  •  
    an online tool to check the validity of shortened links.
1 - 9 of 9
Showing 20 items per page