Skip to main content

Home/ educators/ Group items tagged windows

Rss Feed Group items tagged

Ben Rimes

The Secret Door - Step Through To The Unknown… | Safestyle UK - 13 views

  •  
    Open a door to the world with this intriguing site which transports users to indoor spaces from all over the world with a Google StreetMap mashup. Found via http://twitter.com/@SparkyTeaching. http://ictmagic.wikispaces.com/PSHE%2C+RE%2C+Citizenship%2C+Geography+%26+Environmental
  •  
    Fantastic tool for generating creative writing prompts. Click on the door to be invited to view a random location in Google street view. Teachers might want to preview locations ahead of time before using with younger classes.
Vicki Davis

LastPass - Download - 13 views

  •  
    Download last pass to add a full level of encryption to your password remembering.
  •  
    I agree 100% that LastPass is useful. I've been using LastPass for a year or so on Chrome for Windows and Mac OSX, an Android phone, and an iPad. I even signed up for the paid service after a while. If you share online accounts with someone else like a colleague or significant-other, if one of you subscribes to the paid service, the paid membert can share a "folder" with a free member so you both always have the most up-to-date account and password info. That's been working great between my wife and I for family online accounts. I've read/heard from security researchers (such as Steve Gibson) that Lastpass.com uses and encourages good security practices and encryption but make sure you use a really good master password or all that protection is not very useful.
Megan Black

Free software downloads and reviews - Softonic - 16 views

  •  
    Outstanding Open Source software site. I just used the PDF Sam to merge PDF files and it worked instantly.
  •  
    Thanks for sharing!
Vicki Davis

MLTI Student Tech Team Conference « The View From My Window - 0 views

  •  
    Student tech conferences are really gaining steam in many states.
  •  
    Alice Barr's thoughts about the Maine Student tech conference. THESE ARE GREAT!!! We need one in every state!
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Vicki Davis

Computer Science Teacher - Thoughts and Information from Alfred Thompson : Popfly Coin ... - 0 views

  •  
    Information on popfly and windows live writer and how it may be used in the classroom. Cool post.
  •  
    This is a fascinating blog post about how Alfred Thompson used PopFly to create a mashup activity for a classroom demo for teachers. He also took this document from word into Live writer to make a blog post. It is important to look at many ways to do things. I found this information very insightful and cool.
Vicki Davis

Windows and OS X Software Alternatives | Linux App Finder - 0 views

  •  
    Linux app finder website.
  •  
    For those using linux, this linux app finder helps you find what will replace other apps that you may be used to.
Vicki Davis

Free Windows Movie Maker Tutorial from Atomic Learning This Month - 0 views

  •  
    Movie Maker 2 is a great entry level moving making program for the PC -- and MovieMaker comes FREE with your PC. (I highly recommending updating Movie Maker before embarking on a project!) I love atomic Learning, and this should be a great tutorial.
Jocelyn Chappell

Synergy - 0 views

  •  
    This sounds like I can sit at one computer in a room and control each of the others -- just by moving the mouse of the side of the screen in the direction of the next computer -- keyboard input to the computer with screen display
Nelly Cardinale

Guides and help on using basic Linux commands & basic Unix commands with step-by-step e... - 6 views

  •  
    Awesome archive of practical command line Linux tutorials.
  •  
    Awesome archive of practical command line Linux tutorials.
Dean Mantz

Format Factory - Free media file format converter - 9 views

  •  
    Download software to convert a variety of formats.
Vicki Davis

TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP... - 1 views

  •  
    Use this to create an encrypted drive for your financial records if you have them on your laptop! Remember to backup the folder as well! It is free. I would also recommend this for those who have private files on their computer like guidance counselors.
yc c

Logiciels SVT, Académie de Toulouse, auteur Pierre Perez - 0 views

  • Gribouill_i
    • yc c
       
      Portable app, Enables to draw on the screen
  • Mon dessin.
    • yc c
       
      Portable software: Graphic editor with image database
  • Bibliothèques pour Mon_dessin.
    • yc c
       
      Image database for Mon Dessin app
  • ...2 more annotations...
  • Pictogrammes de sécurité
    • yc c
       
      Security Icons
  • Librairies de dessins vectoriels.
    • yc c
       
      Vector Cliparts
  •  
    Gribouill-i is a portable graphic editor to draw on the screen L'œil et la vision., Cœur2., Planètes 3D... are interactive documents.
« First ‹ Previous 81 - 100 of 111 Next ›
Showing 20 items per page