Skip to main content

Home/ educators/ Group items matching "lock" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Martin Burrett

Pora Ora : The Online 3D Educational Game for Children - 13 views

  •  
    This is a MUST TRY site. It's not often that I'm amazed be an educational resource, but I am with this one. Pora Ora is a stunning educational virtual world for Primary school aged students. Play truely fun educational games which practise skills in English, maths and many other subjects. The graphics and useably is superb. Online safety is at the heart of this site. The parential admin account can set the student's account to free chat with everyone to completely locked down where they have the world to themselves and everything in between. The site has a language filter and users can report any incidents of trouble. Also, the first task requires the user to complete an online safety task. The site is free with a few premium features coming out later. You have got to try this one! http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Jim Farmer

The (Very) Unofficial Facebook Privacy Guide [DOWNLOAD] - 6 views

  •  
    Like Facebook, but wish your information wasn't so public? Time to lock your settings down. Facebook doesn't make this easy, however; features are constantly added and the default for each new one seems to favor transparency instead of privacy.
Fred Delventhal

Web Browser for Kids - KidRocket™ - PC Desktop Protection - 0 views

  •  
    # New Email for Kids with Art/eCard attachments # New Time Lock for limiting a childs time on the computer. # New updated browser navigation (thumbnail GUI) and graphics. # New Kidrocket.org websites. (Public & KidSafe) # New online games and puzzles. # Now Vista compatible. (Windows 98, 2000, XP, MCE, Vista) # Updated kidsafe website list. view approved websites # Now provides vocal prompts and confirmations, for alerts and various security related operations. - It Talks!
Fred Delventhal

CSRIU: Center for Safe and Responsible Internet Use - 6 views

  •  
    "Swimming pools can be dangerous for children. To protect them, one can install locks, put up fences, and deploy pool alarms. All of these measures are helpful, but by far the most important thing that one can do for one's children is to teach them to swim." - Youth Pornography and the Internet
Dennis OConnor

Information Fluency: Online Class: Investigate and Evaluate Digital Materials - 0 views

  • On Demand Classes help you meet the needs of your students. You know the need for 21st Century Information Fluency Skills has never been higher You also know you’re understaffed and overbooked Start the new school year with a customized online training experience that will teach your students critical reading skills as they learn to search and evaluate Internet resources. Our multimedia enhanced, interactive course is suited for students from middle school through adult.
    • Dennis OConnor
       
      If you are reading this note, you are tuned to the need for 21st century skills. See if our work can help your work! ~ Dennis@21cif.com
  •  
    We combine performance evaluation with a series mastery quizzes to lock in the essential concepts delivered by the tutorials. As an educator you'll have access to performance evaluation and mastery quiz data. You'll have an online record of each student's performance that can be downloaded for data analysis.
Jennifer Garcia

Official Google Blog: Locking SafeSearch - 7 views

  •  
    "a feature that lets you filter sexually explicit web sites and images from your search results."
Jennifer Garcia

aroundtheworldwith80schools - home - 16 views

  •  
    "aroundtheworldwith80schools * Join this WikiJoin this Wiki * Recent ChangesRecent Changes * Manage WikiManage Wiki 1. Home 2. After Skype Calls 3. Curriculum Integration 4. During Skype Calls 5. Journey Around the World 6. Obectives & Standards 7. Preparing Skype Calls 8. Signing-Up 9. Skype Rituals 10. Technical Know How 11. Time Zones 12. Your 2BJourney 13. Your ASMadrid Journey 14. Your Journey edit navigation * home * pagesubmenu o Details and Tags o Print o PDF o Backlinks o Source o Delete o Rename o Redirect o Permissions o Lock * discussion (8) * history * notify me Details last edit Nov 6, 2009 3:14 pm by langwitches langwitches - 11 revisions hide details Tags * none * Type a tag name. Press comma or enter to add another. Cancel Protected I am Technology Integration Facilitator and 21st Century Learning Specialist from Jacksonvill e, Florida/ USA . I am taking on the challenge to connect my students and teachers with at least 80 schools in different countries and continents. We want to circle the globe. Will you connect with us via Skype to complete the challenge? All it takes is a 5-10 minute Skype call. Interested? Sign up for the project to be added to a growing list of over 200 interested teachers from around the world. around-world3.jpg"
Daniel Mendes

Amazing video shows quantum levitation in action - The Feed - CBS News - 7 views

  •  
    We are one step closer to achieving my personal dream of owning a hoverboard from "Back to the Future 2" This is groundbreaking.  Quantum superconductors locked in a magnetic field.
Martin Burrett

QB Buzzer - 2 views

  •  
    "A simple online group buzzer, where pupils can connect using any web-enabled device to 'raise a virtual hand' to answer quick-fire quiz questions. Connect as many pupils as you wish, see who presses first, while the others are locked out."
Dave Truss

The Door That's Not Locked - Internet Safety - 7 views

  •  
    Parent & Teachers Sections with: -What's my kid doing? -What's normal? -Relationships? -What do I need to know? -What does my kid need to know?
Tero Toivanen

How To Fix the 10 Biggest Windows Annoyances - How-To Geek - 9 views

  •  
    "Windows can be seriously annoying sometimes, but thankfully there's also usually a workaround or third-party utility that fixes the issue. We've rounded up the ten things that annoy us most, along with how to fix them."
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Jeff Johnson

Giving Students' learning Choices Through Technology « Education with Technology Harry G. Tuttle - 0 views

  • I wonder what school would be like if we could have more options and choices available to students. Sure all students have to learn the same basic standards. How much choice do we give the students in how they go about doing it? Do we provide lectures, demonstrations, guided instructions, interactive activities, group activities, and self-tests in various digital formats for them? By using technology we can have many different forms of learning the standard available to the students. What, if instead of lock stepping the class in terms of the students’ learning, we freed up the class to make their own choices? They can select in what order or format to see/hear/experience the learning.
1 - 13 of 13
Showing 20 items per page