Skip to main content

Home/ educators/ Group items matching "hacks" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Jackie Gerstein

ReconfigurEd. - Hacking student passions through Genius Hour - 6 views

  •  
    Hacking student passions through Genius Hour
Ben W

Ted Talks: Johnny Lee's Wii remote hacks - Boing Boing - 0 views

  •  
    Cheap hacks using the Wii remote: Interactive white board for $50 & head tracking for cheap
Nelly Cardinale

Guides, HowTos and Tips for Technology Geeks - The Geek Stuff - 0 views

  •  
    Howto and instruction guides on Linux, Database, Hardware, Security and more.. You can download a great free e-book called Linux 101 Hacks
Vicki Davis

Hacking at Education: TED, Technology Entrepreneurship, Uncollege, and the Hole in the Wall - 5 views

  •  
    I agree with Audrey Watters -- we need a way to QUESTION TED talks. Good ideas worth spreading are worth interrogating and discussing. There is NO platform for that and a growing issue, I think that TED MUST address if it is going to live long and prosper. Good educators, good leaders always question and are curious. We try things out and we wonder. We want solutions but solutions packaged in a cute 15 minute presentation aren't ever really as simple as they seem. There is a different between a sound byte and a bit of something I can REALLY use.  I agree with Audrey - READ her post. My worry is that we're spreading ideas that haven't, perhaps, been tested and gone through full examination. IF we didn't learn anything from the Mortensen "3 cups of tea" fiasco then education deserves to be mislead again. We should examine and have transparency with the speeches and be able to continue the conversation. "But I have questions. I have questions about this history of schooling as Mitra (and others) tell it, about colonialism and neo-colonialism. I have questions about the funding of the initial "Hole in the Wall" project (it came from NIIT, an India-based "enterprise learning solution" company that offers 2- and 4-year IT diplomas). I have questions about these commercial interests in "child-driven education" (As Ellen Seitler asks, "can the customer base be expanded to reach people without a computer, without literacy, and without any formal teaching whatsoever?"). I have questions about the research from the "Hole in the Wall" project - the research, not the 15 minute TED spiel about it. I have questions about girls' lack of participation in the kiosks. I have questions about project's usage of retired British schoolteachers - "grannies" - to interact with Indian children via Skype. I have questions about community support. I have questions about what happens when we dismantle public institutions like schools - questions about
Vicki Davis

Some thoughts on blogging and copyright, trademark, cyberstalking and more - I Speak of Dreams - 7 views

  •  
    It is unfortunate that controversy is surrounding autism and yet it is something misunderstood by many. Here is an article on Liz Ditz's blog going back to an issue that arose in December when she quoted a person's Facebook who then denied the posting and accused Liz of hacking the account and writing the comments herself. I am not on the inside of this but am watching as the outcome has implications for my own thoughts of digital citizenship. I am just saddened any time a person is taken of a mission to help others because of flame wars and it doesn't look like this one is going to stop soon. All I know is I have been reading Liz's blog for quite some time and although I don't know her personally, I find the charges leveled against her doubtful from what I do know.
Nelly Cardinale

Hack Allows PowerPC Macs to Access Flash 11 Content - 3 views

  •  
    Solution for not being able to play Youtube videos inside of Facebook on a Power PC chip Mac computer. It is so easy and it works.
Vicki Davis

Zombie Reader: How the Corpse of Google Reader Can Let You Browse Your Archived Google Reader Data - 1 views

  •  
    Cool trick to archive and keep what you've read in Google reader. Here's how you can do this trick -- that is if you ever used Google reader - or used it a lot (like I did for quite a period of time.) Very cool hack.
Vicki Davis

Hacking Your Classroom: Getting Around Blocks & Bans - 0 views

  •  
    Dawn Casey-Rowe hits a tough topic that is the number one complaint that teachers have. I had her on my show not too long a go and she speaks from a tough situation with lots of blocks and bans but gets it done anyway. If your complaint is blocks and bans, then take time to read this post to focus on what you CAN do. Dawn is offering a set of PD blog posts that you'll want to dig into. "This week, we're going to discuss the white elephant in the room. Tech frustration. Many teachers struggle to bring students the type of tech experience they would like because of systemic blocks and bans, or worse, feel embarrassed as students have more access to tech than teachers do. This is the issue that brought me to the tech world myself. Students continually asked the hard questions about why they couldn't utilize technology such as smartphones, laptops, and tablets, and why phones were confiscated when students were using them for educational purposes. I wanted to improve my classroom experience and give my students more, but budget was a concern. Tech access is a problem in many schools. There are legitimate reasons-the desire of administrators to protect students from the darker side of the internet, fear of the unknown, lack of wireless capacity and budget difficulties which cause insufficient numbers of computers or the inability to upgrade existing tech. Some educational leaders have overcome these hurdles, but others are still working to get to that space."
Dave Truss

The Ultimate Guide To Gmail [PDF] - 31 views

  •  
    Inside the 34 page eBook you will learn: * The history of Gmail and how it began * Why you should choose Gmail over another email provider * How to use Gmail, manage and organize your emails * Getting the most out of Gmail * Instructions on how to use Gmail with other email providers * Links to best Gmail tips and hacks. * Access Gmail on a mobile device * Gmail Buzz
Ric Murry

YoungHyun Chung - 0 views

  •  
    Wii remote hack. Digital Wheel Art.
Kevin Jarrett

Literactive - Teaching Children to Read - 0 views

  •  
    AWESOME site for early readers, recently back from the DEAD (it was hacked). Sign up and start downloading - this content is AMAZING!
John Evans

25 Incredible Skins, Resources & Tools for the Gmail Power User - 0 views

  •  
    Each day seems to produce a new hack, tool or tip for better Gmail use. In this post, I want to highlight only the very best, hand-picked from hundreds of resources. This is not another resource list you'll bookmark and never look at again. These tips, monster resources and tools will change the way you use Gmail.
Patti Porto

makezine.com: MAKE: Technology on Your Time - 1 views

  •  
    MAKE brings the do-it-yourself mindset to all the technology in your life. MAKE is loaded with exciting projects that help you make the most of your technology at home and away from home. This is a magazine that celebrates your right to tweak, hack, ...
Vicki Davis

Constructing Modern Knowledge 2009 - 0 views

  •  
    Great post by Ben Grey on his participation in Constructing Modern knowledge - he hits several things including the fact that many at the conference said that computer programming should be mandatory for all students and a presenter who said that the problem with today is that too many people have a voice. My comments from Ben's blog are below. Great conversations happening here! Programming - OK, on the programming thing, here are my thoughts. In our curriculum our objective is not as much a specific LANGUAGE. One year I may use HTML with Javascript, this past year I used LSL - what I want kids to know that when they encounter programming and coding that there are certain conventions. Some are case sensitive, some are not. How do you find out how to add to what you know about programming? Do you know where to go to find prewritten code? Can you hack it to make it work to do what you want it to do? We spend about a week - two weeks but I require they know how to handcode hyperlinks and images - they are just too important. But to take 12 weeks or 6 weeks to learn a whole language - yes maybe some value - but to me the value is HOW is the language constructed or built. What are the conventions and how do I educate myself if I am interested in pursuing. What comes out of this time is kids who say either "I never want to do that" or "this is really cool, I love coding." They are doing very simplistic work (although the LSL object languages were pretty advanced) but since we don't have a full course nor time in our curriculum, I do see this as an essential part of what I teach. I'm not teaching it for the language sake but for the sake of understanding the whole body of how languages work - we talk about the different languages and what they are used for as part of Intro to Computer science and have an immersive experience. To me, this is somewhat a comprimise between leaving it out entirely or forcing everyone to take 12 weeks of it. I
Dave Truss

100+ Google Tricks That Will Save You Time in School - Eternal Code - 35 views

  •  
    From super-effective search tricks to Google hacks specifically for education to tricks and tips for using Gmail, Google Docs, and Google Calendar, these tricks will surely save you some precious time.
Claude Almansi

Murdoch-Owned Wireless Generation's Contract Should Be Scratched, Teachers' Union Leaders Write - 0 views

  •  
    Joy Resmovits Aug. 5, 2011 ""We have become increasingly concerned with the proposed contract," Michael Mulgrew and Richard Iannuzzi, who respectively head New York City's and the state's teachers' unions, wrote in the note. The letter is addressed to New York State Board of Regents Chancellor Merryl Tisch, state Commissioner of Education John King, Jr., and copied to State Comptroller Tom DiNapoli. "It is especially troubling that Wireless Generation will be tasked with creating a centralized student database for personal information even as its parent company, News Corporation, stands accused of engaging in illegal news gathering tactics, including the hacking of private voicemail accounts," the letter reads. Murdoch acquired 90 percent of Wireless Generation for about $360 million last November. At the time of the acquisition, Murdoch said he saw K-12 education as a "$500 billion sector." Murdoch's first general move in the education sector had come just a few weeks earlier, when he tapped Joel Klein, then the chancellor of New York City's schools, to lead his education ventures. The Wireless Generation contracts were approved while Klein still ran the district, leading to speculation about the chancellor's intentions."
Claude Almansi

Swiffy: convert SWF files to HTML5 - The official Google Code blog - 11 views

  •  
    Tuesday, June 28, 2011 Swiffy: convert SWF files to HTML5 By Marcel Gordon, Product Manager, Swiffy "Some Google projects really do start from one person hacking around. Last summer, an engineering intern named Pieter Senster joined the mobile advertising team to explore how we could display Flash animations on devices that don't support Adobe Flash player. Pieter made such great progress that Google hired him full time and formed a team to work on the project. Swiffy was born! Today we're making the first version of Swiffy available on Google Labs. You can upload a SWF file, and Swiffy will produce an HTML5 version which will run in modern browsers with a high level of SVG support such as Chrome and Safari. It's still an early version, so it won't convert all Flash content, but it already works well on ads and animations. We have some examples of converted SWF files if you want to see it in action."
Maggie Verster

Internet Safety for Families and Children - 1 views

  •  
    The Internet is a useful and important part of our daily lives. Many can't remember how we handled even the most mundane tasks without online assistance. How did we even survive when we were kids? :-) However, along with the good, there is bad. Children and teens (but not their parents!) are very well versed in using the Internet, including web pages, blogs, uploading and downloading information, music and photos, etc. They are also trusting. This presentation will give an overview of the Internet and the inherent dangers. Learn the realities and dangers of ``virtual communities'' websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com. Learn about the persistence of information on the net and Google hacking. Learn the differences between a wiki, blog, Instant Messaging, text messaging, and chat. Learn the Internet slang, key warning signs, and tips for Parents and Kids. This talk is for anyone who has a child, who knows a child, or who ever was a child!
Vicki Davis

Quick Key Turns Your iPhone Into a Scanner | iPad Apps for School - 4 views

  •  
    This has to be the coolest app ever. Create a quiz on Quick Key and then you can print out a bubble sheet. Snap a picture of the quiz with your iphone and it will grade it for you! Wow. Just remember that if all you do is bubble in - you're probably not testing very well. Hat tip to Richard Byrne's Awesome Facebook page for this one! (Free Technology for Teachers)
1 - 20 of 30 Next ›
Showing 20 items per page