Skip to main content

Home/ educators/ Group items matching "secure" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Vicki Davis

Popular network tool Nmap in CNET security brouhaha | Naked Security - 3 views

  •  
    More information on the Cnet download.com controversy. This one probably explains best why this "gray area" practice is drawing the ire of security analysts and those who have shared their software on download.com. What will be the alternative? Stay tuned.
darkbird18 Wharry

  Home of Gibson Research Corporation  Internet Security Tools.url - 2 views

  •  
    Your use of the Internet security vulnerability profiling services on this site constitutes your FORMAL PERMISSION for us to conduct these tests and requests our transmission of Internet packets to your computer. ShieldsUP!! benignly probes the target computer at your location. Since these probings must travel from our server to your computer, you should be certain to have administrative right-of-way to conduct probative protocol tests through any and all equipment located between your computer and the Internet
  •  
    Your use of the Internet security vulnerability profiling services on this site constitutes your FORMAL PERMISSION for us to conduct these tests and requests our transmission of Internet packets to your computer. ShieldsUP!! benignly probes the target computer at your location. Since these probings must travel from our server to your computer, you should be certain to have administrative right-of-way to conduct probative protocol tests through any and all equipment located between your computer and the Internet
Nspire IT Jobs

Blackberry Engineer (3-6mths Contract, Immediate start) ACT $90-$100 per hour + - 0 views

  •  
    Our client specializes in Security and Gateway services. A newly created contract position is available for a Blackberry Engineer. As the successful Blackberry Engineer, you will be working with the best of best and part of a team of highly skilled professionals. The project is high profile and part of a highly secured Federal Government portfolio. This is a 6 months contract. You will be required to have both design and implementation of the BlackBerry infrastructure experience across a Federal Government enterprise level. The following mandatory requirements include: *Demonstrated knowledge and experience in designing a BlackBerry Server Infrastructure to support a large Federal Government customer. *Security Clearance Essential (Restricted or Baseline).
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Nelly Cardinale

How to Secure Your Wireless Network - 0 views

  •  
    Great artiicle on how to secure your own wireless network.
Vicki Davis

Part 6: Staying Secure with Evernote - 2 views

  •  
    Evernote security tips.
Vicki Davis

Research Consent form for Research - 0 views

  •  
    This is an example of a consent form for research for a research student done at the University of Georgia. If you are a researcher, you'll want to check with your university as to the proper way to format and secure permissions, however, as students become researchers, I have questions about securing permission for research. This is an area we need to discuss and understand because students can now be viable, authentic researchers and perhaps may have links to more accurate data collection techniques than researchers. What happens when researchers partner with students to collect data? A whole new world of research is opening up, so research forms are worth collecting.
Martin Burrett

Boys secure in their racial identity seek more diverse friendships - 0 views

  •  
    "Children often seek answers from parents, friends and media to better understand their racial identity. Middle school boys who feel secure about their race during this ongoing information gathering will likely befriend diverse people, according to a new University of Michigan study."
Ed Webb

Seen Not Heard- Boing Boing - 3 views

  • Cameras don't make you feel more secure; they make you feel twitchy and paranoid. Some people say that the only people who don't like school cameras are the people that have something to hide. But having the cameras is a constant reminder that the school does not trust you and that the school is worried your fellow classmates might go on some sort of killing rampage.
  • Some people say youngsters are more disrespectful than ever before. But if you were in an environment where you were constantly being treated as a criminal, would you still be respectful? In high school, one of my favorite English teachers never had trouble with her students. The students in her class were the most well behaved in the school--even if they were horrible in other teachers' classes. We were well-mannered, addressed her as "Ma'am," and stood when she entered the room. Other teachers were astonished that she could manage her students so well, especially since many of them were troublemakers. She accomplished this not though harsh discipline, but by treating us with respect and being genuinely hurt if we did not return it.
  • The Library and a few good teachers are what kept me from dropping out.
  • ...6 more annotations...
  • Schools today are not training students to be good citizens: they are training students to be obedient.
    • Ed Webb
       
      Schools have always attempted to teach this. And they have always ended up teaching how not to get caught.
  • I even read about a girl who ran a library of banned books out of her locker.
  • the football team got a bigger budget than the Library
  • @SchoolSecurityBlog, the issue is that in schools your constitutional rights are completely ignored. Random bag searches are not conducted with probable cause or a search warrant. If students spend the first part of their life in an environment where their rights are ignored, then they will not insist on them later in life. Someone might make the argument that since students are minors that they don't have rights. It is a weak argument. For one thing, I reached the age of majority while still in public school, and they still ignored my rights.
  • most of these so called "reasonable risk reduction measures" are not reasonable nor do they reduce risk. Cameras are entirely ineffective in preventing crime or violence. My school had a camera watching the vending machines, but a student still robbed them and was not even caught (he took the simple measure of obscuring his face). I acknowledge that there have been many court ruling that make what schools do legal. However, even with the "in loco parentis" policy in place, even my parents would not have a legal right to search my stuff without my permission when I turned 18 (which is how old I was my senior year). Yet the school could search my bag if they wanted to. Or my friends car (I am pretty sure he was also 18 when that happened, he was only a few months younger than I). That means that once a kid turns 18, the school system technically had more control over the kid than his parents do. Another problem that I have with in loco parentis is that the school really is not a students parent. A parent presumably has the child's best interests at heart, if they didn't it could be grounds for the state to take the child away from the parent. Unfortunately, school faculty members do not always have the student's best interests at heart. They should and often do, but many times some faculty members just like messing with people. It is an unfortunate fact, and one that I am sure many people would like to ignore, but the fact of the matter is that bullies are not confined to the student body. Also parents go to extraordinary measures for their children. They pay to keep them clothed and fed and cared for. They devote endless hours taking care of them. Therefore it makes sense that they should be granted extraordinary legal measures to take care of their children. To grant these same legal measures to an arbitrary school faculty member is really in insult to the hard and loving work of parents everywhere.
  • The schools of decades past seemed to get by without universal surveillance. Why is it all of the sudden essential today? Could many of these security measures be over reactions stemming from mass publicized incidents of school violence?
Maggie Verster

Today's the day: signups open for free Google Message Security for K-12 schools - 0 views

  •  
    Google Message Security - powered by Postini - provides the capability for administrators to limit messages based on who they are from, where they are going, or the content they contain. Message rules can be applied to groups of users, allowing customization for different user sets (like younger students, older students, and teachers).
Vicki Davis

LastPass - Download - 13 views

  •  
    Download last pass to add a full level of encryption to your password remembering.
  •  
    I agree 100% that LastPass is useful. I've been using LastPass for a year or so on Chrome for Windows and Mac OSX, an Android phone, and an iPad. I even signed up for the paid service after a while. If you share online accounts with someone else like a colleague or significant-other, if one of you subscribes to the paid service, the paid membert can share a "folder" with a free member so you both always have the most up-to-date account and password info. That's been working great between my wife and I for family online accounts. I've read/heard from security researchers (such as Steve Gibson) that Lastpass.com uses and encourages good security practices and encryption but make sure you use a really good master password or all that protection is not very useful.
Maggie Verster

Opening Up YouTube at School - 0 views

  • "The biggest challenge we're presented with right now is how to take advantage of all the things the Internet has to offer without compromising our students' security or giving them access to things that are inappropriate,
  •  
    "The biggest challenge we're presented with right now is how to take advantage of all the things the Internet has to offer without compromising our students' security or giving them access to things that are inappropriate,"
Kevin Jarrett

Home - ACT Online Cyber Security Training - 0 views

  •  
    Free online training on cyber security from DHS.
Susan Sedro

Facebook - Privacy settings recommended by Sophos - 0 views

  •  
    Facebook walkthrough - adjust your privacy settings This guide walks you through Sophos-recommended privacy settings in Facebook, and shows you how to set more secure levels of privacy and reduce the chance of becoming a victim of online identity theft.
Nicole Hill

Security Guide for Windows - Random Password Generator - 0 views

  •  
    Need secure passwords for student accounts?
Keith Hamon

Moserware: The First Few Milliseconds of an HTTPS Connection - 0 views

  •  
    A wonderful tour through the first 223 milliseconds of your connection to a secure website, in this case Amazon. It will help you appreciate the magic underneath the Web.
Martin Burrett

Is your school https compliant? - 0 views

  •  
    "Earlier this year (2018), Google's Chrome web browser began marking sites without HTTPS as non-secure, meaning that when using a website, HTTP connections are being penalised. This has implications for many schools, in that crucial school information placed on the website will get flagged up to potential readers as being insecure"
Vicki Davis

Mexico Education Reform: President Enrique Peña Nieto Faces Teachers' Revolt - 0 views

  •  
    Rebellion from teachers in Mexico who have bought and sold teaching jobs for generations without any national certification. Teachers are striking and bearing crowbars. These are reforms that most agree need to happen, but putting them in place is tough and sadly, it often hurts those we should protect the most... the children. Despite what some say, reforms need to happen in the US as well and this means upheaval here too. It can be challenging to separate the truth from the fabrications but I  hope that wherever the flag of edreform is raised that people will think of children and what is best for them. What is best for teachers is not always the best for children. It might be good in my own eyes to have a job, but if I'm not a good teacher, perhaps it is something that doesn't need to happen. Interesting reading. "The conflict is fueled by the importance of teaching jobs for the poor mountain and coastal villages where the dissident union is strongest. Teaching jobs in Guerrero with lifelong job security, benefits and pension pay about $495 and $1,650 a month, depending on qualifications and tenure, well above average in rural areas, according to teachers and outside experts. They said the price to get such as job can cost as much as $20,000, usually going to the departing teacher, with cuts for union and state officials."
Steve Ransom

Principal fires security guards to hire art teachers - and transforms elementary school - The Daily Nightly - 3 views

  •  
    Funny... when you treat children with dignity and create beauty around them, they tend NOT to act like criminals. Create a school environment that's like a prison, and...
1 - 20 of 93 Next › Last »
Showing 20 items per page