Skip to main content

Home/ educators/ Group items matching "downloads" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Eloise Pasteur

Doing Digital Scholarship: Presentation at Digital Humanities 2008 « Digital Scholarship in the Humanities - 0 views

  • My session, which explored the meaning and significance of “digital humanities,” also featured rich, engaging presentations by Edward Vanhoutte on the history of humanities computing and John Walsh on comparing alchemy and digital humanities.
  • I wondered: What is digital scholarship, anyway?  What does it take to produce digital scholarship? What kind of digital resources and tools are available to support it? To what extent do these resources and tools enable us to do research more productively and creatively? What new questions do these tools and resources enable us to ask? What’s challenging about producing digital scholarship? What happens when scholars share research openly through blogs, institutional repositories, & other means?
  • I decided to investigate these questions by remixing my 2002 dissertation as a work of digital scholarship.  Now I’ll acknowledge that my study is not exactly scientific—there is a rather subjective sample of one.  However, I figured, somewhat pragmatically, that the best way for me to understand what digital scholars face was to do the work myself. 
  • ...6 more annotations...
  • The ACLS Commission on Cyberinfrastructure’s report points to five manifestations of digital scholarship: collection building, tools to support collection building, tools to support analysis, using tools and collections to produce “new intellectual products,” and authoring tools. 
  • Tara McPherson, the editor of Vectors, offered her own “Typology of Digital Humanities”: •    The Computing Humanities: focused on building tools, infrastructure, standards and collections, e.g. The Blake Archive •    The Blogging Humanities: networked, peer-to-peer, e.g. crooked timber •    The Multimodal Humanities: “bring together databases, scholarly tools, networked writing, and peer-to-peer commentary while also leveraging the potential of the visual and aural media that so dominate contemporary life,” e.g. Vectors
  • My initial diagram of digital scholarship pictured single-headed arrows linking different approaches to digital scholarship; my revised diagram looks more like spaghetti, with arrows going all over the place.  Theories inform collection building; the process of blogging helps to shape an argument; how a scholar wants to communicate an idea influences what tools are selected and how they are used.
  • I looked at 5 categories: archival resources as well as primary and secondary books and journals.   I found that with the exception of archival materials, over 90% of the materials I cited in my bibliography are in a digital format.  However, only about 83% of primary resources and 37% of the secondary materials are available as full text.  If you want to do use text analysis tools on 19th century American novels or 20th century articles from major humanities journals, you’re in luck, but the other stuff is trickier because of copyright constraints.
  • I found that there were some scanning errors with Google Books, but not as many as I expected. I wished that Google Books provided full text rather than PDF files of its public domain content, as do Open Content Alliance and Making of America (and EAF, if you just download the HTML).  I had to convert Google’s PDF files to Adobe Tagged Text XML and got disappointing results.  The OCR quality for Open Content Alliance was better, but words were not joined across line breaks, reducing accuracy.  With multi-volume works, neither Open Content Alliance nor Google Books provided very good metadata.
  • To make it easier for researchers to discover relevant tools, I teamed up with 5 other librarians to launch the Digital Research Tools, or DiRT, wiki at the end of May.
  •  
    Review of digital humanities scholarship tools
Barbara Barreda

Deepmemo is even handy for my not-so-deep memos - Download Squad - 0 views

  •  
    Productivity tool- To clip and annotate material from the web and easily share it, blog it or archive it for future use.
Dean Mantz

Cyber, Are you still Bullying? - 0 views

  •  
    Memory game hosted by National Geographic. This game will test your short term memory.
Vicki Davis

Past Issues - UI Design Newsletter - 0 views

  • You can ask them what they noticed, but self reporting of this sort is notoriously inaccurate – if you ask people to point to what they look at, and meld that with an eyetracking overlay of where their eyes actually went there is a startling gap.
  • applied eyetracking methodologies to measure the attention-drawing effects of new and newly modified elements of search results pages.
  • there is a strong correlation where people look and where they click on search results pages
  • ...5 more annotations...
  • They look a bit like hurricane maps. People get most excited about findings where the gaze patterns are highly organized... and look a bit like a well-formed hurricane.
  • The visual design works!"
  • So, the visual design objective of a website is to draw your attention to move around the page.
  • longest looking times may not. In fact, longest looking times can, in some cases, reflect multiple lookbacks and dwell time indicating confusion or uncertainty about a next step, a label or an interaction.
  • If there is no fixation we cannot possibly process the content. If there is no fixation we can't be influenced. Amazing, but the part we should pay attention to in our eyetracking results is probably the area that is NOT highlighted!!
  •  
    Article about how people look at web pages.
  •  
    As you design web pages for use with your students -- do you wonder why they don't sometimes SEE what you're putting in front of them -- it is because of eye movement. It is design!!! This paper writes about the effect of website design on eye movement. Those who are desigining online curriculum need to understand this. My sister, Sarah, has been an onlien professor for Savannah College of Art and Design for a while, ,and this is something she talks about in her courses and shares with me. This is why I emphasize wiki layout and design w/ my students (like having a table of contents and white space.) If it is not attractive, it just doesn't exist, because it IS NOT READ! Educators will do well to remember that!
Kathy Benson

Tar Heel Reader - 0 views

  •  
    free, easy to read, voice to text, books for special needs readers up to teenagers
  •  
    a collection of free, easy-to-read, and accessible books on a wide range of topics. Each book can be speech enabled and accessed using multiple interfaces (i.e. switches, alternative keyboards, touch screens, and dedicated AAC devices). The books may be downloaded as slide shows in PowerPoint, Impress, or Flash format.
  •  
    Free online books for beginning readers of all ages. Some content more appropriate for teenagers. Use the favorites feature to pick books appropriate for you students.
Vicki Davis

ScreenToaster - Free online screen recorder: create screencasts, tutorials and reviews in a few clicks - 0 views

  •  
    Screencasting made easy-no download necessary
  •  
    Free online screen recorder. I've used jing, haven't used this one yet, but it looks interesting.
Dave Truss

Internet Archive: Details: A Brave New World-Wide Web - 0 views

  •  
    I've finally finished the video version:-) This link is to the internet archive for a high quality stream or download (see left sidebar). A lower quality version is also on YouTube.
  •  
    My Brave New World Wide Web slide show made into a movie with music.
Dean Mantz

IFMSA mirror of Explore Science - 0 views

  •  
    Science website is interactive so students, parents, and educators can visualize science.
Vicki Davis

Google Chrome - Download a new browser - 0 views

  •  
    Google Chrome is live - a new web browser.
  •  
    From Stephen Downes - Google Chrome is Live -- a lite web browser from Google. Gotta give it a try.
Vicki Davis

Color me crazy - 10 best online color tools - Download Squad - 0 views

  •  
    If you're decorating or working with art projects - this is a great list.
Dave Truss

CHSF Parenting the Net Generation Program: 2007-2008 - 0 views

  •  
    The Parenting the Net Generation program is designed to educate parents about what kids do on the Internet and offer strategies for ensuring safe, wise and responsible Internet use in the home.
Jim Farmer

Grants Calendar - 0 views

  •  
    PDF file of grant deadlines for the 2008-09 school year. Not a complete list but very comprehensive. Hopefully helpful.
  •  
    PDF file with grant deadlines for the 2008-09 school year.
yc c

Biblical World History Time Line Chart - 0 views

  •  
    Covering 6000 years as described from the Bible and other sources. I designed a graphical chart detailing various historical events as seen from a Biblically conservative viewpoint.
Marie Coppolaro

Paperless World: 50 Tips and Tools for Reading On Your iPod | College@Home - 0 views

  •  
    By now, you probably know that the iPod is for more than just music. It can be a great device for catching up on your reading, too. Whether you're downloading audio books or study guides, the iPod makes a handy and compact reader on the go, and you can make the most of it with the resources we've collected here.
  •  
    use your ipod for storing notes, RSS, reading notes, etc
yc c

Wolfram Demonstrations Project - 0 views

  •  
    Offers interactive demonstrations of anything that can be modeled mathematically - bacteria growth, light refraction, supply and demand, etc. Running a demo requires Mathematica Player, which can be downloaded free, along with the demos
  •  
    About the Wolfram Demonstrations Project Conceived by Mathematica creator and scientist Stephen Wolfram as a way to bring computational exploration to the widest possible audience, the Wolfram Demonstrations Project is an open-code resource that uses dynamic computation to illuminate concepts in science, technology, mathematics, art, finance, and a remarkable range of other fields. Its daily-growing collection of interactive illustrations is created by Mathematica users from around the world, who participate by contributing innovative Demonstrations. Interactive computational resources have typically been scattered across the web--requiring specialized programming knowledge that's made them difficult and expensive to develop. As a result, their coverage has long been limited, and progress has been slow. In many ways, the Wolfram Demonstrations Project introduces a new paradigm for exploring ideas. The power to easily create interactive visualizations, once in the domain of computing experts alone, is now in the hands of every Mathematica user. Demonstrations can be created with just a few short lines of readable code, powered by the revolutionary advances in Mathematica. This opens the door for researchers, educators, students, and professionals at any level to create their own sophisticated mini-applications and publish them online.
« First ‹ Previous 361 - 380 of 437 Next › Last »
Showing 20 items per page