Skip to main content

Home/ educators/ Group items matching "cyber" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
EXECUTIVE DIRECTOR

Office of the Cyber General Safety Alert - 3 views

  •  
    Practice 2.1C - What You Do With ANY form of digital technology is Public & Permanent.
Martin Burrett

England Schools told to monitor pupils' web use - UKEdChat.com - 1 views

  •  
    All schools in England are being told to filter inappropriate content and teach pupils about staying safe including online harm. Plans unveiled by the Education Secretary Nicky Morgan will require all schools to put in place strengthened measures to protect children from harm online - including cyber bullying, pornography and the risk of radicalisation.
Martin Burrett

Active Tech by @ICTMagic - 1 views

  •  
    Technology is often lambasted for creating lazy, passive cyber couched-potatoes. While the hours we endure bathed in flickering pixel light, slumped in a variety of contorted lurching positions over the input device of our choice is hardly the recipe for a healthy body. Yet, technology is becoming ever more part of our active lives and it is also spilling out into the 'real' world. As teachers, we can insist technology, or we can make it part of our classroom repertoire for PE and beyond.
Martin Burrett

Cyber Tree House - 5 views

  •  
    A well made, child friendly flash site with videos, interactive games and other resources about Internet safety and smart thinking online. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Vicki Davis

Dress the Christmas Tree on your Interactive Whiteboard - 10 views

  •  
    Remember the old feltboards we used to use? Now, we have one for your Interactive whiteboard. Talk about the different words as you pull them into the tree. You could decorate the tree and have it on your board during your class party!
Dave Truss

YouTube - Steering Clear of Cyber Tricks - 8 views

  •  
    Great comment: I KEEP TELLING MY MOMMY NOT TO CLICK ON THOSE FAKE THINGS!! she never listens ._. gosh why is she so uninternet savvy @_@ if the computer gets a virus she better not say anything to me ._.
Jeremy Davis

Enhancing Child Safety and Online Technologies - 0 views

  •  
    Government Report 2008
Gary Bertoia

Remote Access: Lesson Plans on Cyber Bullying - 0 views

  •  
    The Media Awareness Network has always been one of my favourite resources since I started spending more time online with kids in my classroom. While I'm not big on republishing press releases, I thought this one was worth sharing.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Dean Mantz

Online Sexual Predators - Myth and Fact - 0 views

  •  
    Wired Safety presentation by Art Wolinsky from WiredSafety.
Dean Mantz

Cyber, Are you still Bullying? - 0 views

  •  
    Memory game hosted by National Geographic. This game will test your short term memory.
Vicki Davis

FOXNews.com - Trading Nude Photos Via Mobile Phone Now Part of Teen Dating, Experts Say - Science News | Science & Technology | Technology News - 0 views

  • The instant text, picture and video messages have become part of some teens' courtship behavior, police and school officials said.
  • "I've seen everything from your basic striptease to sexual acts being performed," said Reynoldsburg police Detective Brian Marvin, a member of the FBI Cyber Crime Task Force of Central Ohio. "You name it, they will do it at their home under this perceived anonymity."
  • "This happens a lot," said Kelsey, author of Generation MySpace: Helping Your Teen Survive Online Adolescence. "It crosses every racial socio-economic group. Christian kids are doing it. Jewish kids are doing it." Male teens are also doing it.
  • ...1 more annotation...
  • A study last year found teens are placing more of an emphasis on image and fame than in the past. Jean Twenge, a psychology professor at San Diego State University who studies young people's trends, found that teens are more confident and assertive than ever before.
  •  
    Teens are really moving a lot of their relationships to cell phones as Danah Boyd said recently on a Wow2 show. This example of teenage habits of sharing photographs on cell phones is an example. Discussions of cell phone use should be a part of what parents and teachers do with kids. This makes me think twice about allowing cell phone cameras on my children's phones, but I'd rather help them be wise in using it.
EXECUTIVE DIRECTOR

School Spying On Students via Computers...This Is Surprising In 2010? - 6 views

  •  
    Any 2.1Certified citizen will tell you that this story seems pretty vanilla and is not too shocking except for the fact that, in this case, the school was the C.E.L.
Ted Sakshaug

Cybersafety - 10 views

  •  
    A site for grade 5 to adult to learn some basics of using the Internet.
Dennis OConnor

Bullying | Scoop.it - 19 views

  • “School and Cyber Bullying - Info & Tips on bullying types, tactics, targets etc. ” Created and curated by UllaMS UllaMS curates this topic from blogs, tweets, videos and much more: find out how!
‹ Previous 21 - 40 of 44 Next ›
Showing 20 items per page