Group items matching
in title, tags, annotations or urlOffice of the Cyber General Safety Alert - 3 views
England Schools told to monitor pupils' web use - UKEdChat.com - 1 views
-
All schools in England are being told to filter inappropriate content and teach pupils about staying safe including online harm. Plans unveiled by the Education Secretary Nicky Morgan will require all schools to put in place strengthened measures to protect children from harm online - including cyber bullying, pornography and the risk of radicalisation.
Active Tech by @ICTMagic - 1 views
-
Technology is often lambasted for creating lazy, passive cyber couched-potatoes. While the hours we endure bathed in flickering pixel light, slumped in a variety of contorted lurching positions over the input device of our choice is hardly the recipe for a healthy body. Yet, technology is becoming ever more part of our active lives and it is also spilling out into the 'real' world. As teachers, we can insist technology, or we can make it part of our classroom repertoire for PE and beyond.
Cyber Tree House - 5 views
-
A well made, child friendly flash site with videos, interactive games and other resources about Internet safety and smart thinking online. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
YouTube - Steering Clear of Cyber Tricks - 8 views
Cyber Safe Kids - 7 views
Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views
-
For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
-
"A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
- ...7 more annotations...
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Online Sexual Predators - Myth and Fact - 0 views
Cyber, Are you still Bullying? - 0 views
FOXNews.com - Trading Nude Photos Via Mobile Phone Now Part of Teen Dating, Experts Say - Science News | Science & Technology | Technology News - 0 views
-
The instant text, picture and video messages have become part of some teens' courtship behavior, police and school officials said.
-
"I've seen everything from your basic striptease to sexual acts being performed," said Reynoldsburg police Detective Brian Marvin, a member of the FBI Cyber Crime Task Force of Central Ohio. "You name it, they will do it at their home under this perceived anonymity."
-
"This happens a lot," said Kelsey, author of Generation MySpace: Helping Your Teen Survive Online Adolescence. "It crosses every racial socio-economic group. Christian kids are doing it. Jewish kids are doing it." Male teens are also doing it.
- ...1 more annotation...
-
Teens are really moving a lot of their relationships to cell phones as Danah Boyd said recently on a Wow2 show. This example of teenage habits of sharing photographs on cell phones is an example. Discussions of cell phone use should be a part of what parents and teachers do with kids. This makes me think twice about allowing cell phone cameras on my children's phones, but I'd rather help them be wise in using it.
Thinkuknow - 8-10 - Cyber Cafe - 0 views
Cybersafety - 10 views
Bullying | Scoop.it - 19 views
-
“School and Cyber Bullying - Info & Tips on bullying types, tactics, targets etc. ” Created and curated by UllaMS UllaMS curates this topic from blogs, tweets, videos and much more: find out how!
‹ Previous
21 - 40 of 44
Next ›
Showing 20▼ items per page