Skip to main content

Home/ Globaltech/ Group items tagged i

Rss Feed Group items tagged

anonymous

AppleInsider | Georgia state senator hopes to replace schoolbooks with iPads - 3 views

  •  
    Is this a good or bad idea? Feb 14 Alec
  •  
    I believe that this is a good idea because the children will get an ipad for $500 and also the text books included this will cut down on the price of schooling because instead of having to pay more money for books. Also this will give the children more up to date knowledge on current events because they will get updates from around the world everyday.
anonymous

Home - The home of Spybot-S&D! - 3 views

  •  
    Azman - Is this any good?
  •  
    I don't think so. The site looks very unprofessional and it doesn't look legitimate at all. A company that is not well known rates most of the awards that they won. It could be pretty good software but since it's free, there will be downsides and restrictions to it; and users need to be careful when installing freeware.
anonymous

http://insideitgs.ning.com/ - 1 views

shared by anonymous on 22 Feb 11 - Cached
  •  
    az wiki versus ning, or wikis linked to ning which is better especially compare to - http://itgsopedia.wikispaces.com/ march 1 look at some of the other itgs sites i am posting here on diigo to compare... and ideas for format also consider individual wikis linked to mother site or everything on one site What's more feasible and practical?
anonymous

✉ GuerrillaMail.com - 2 views

  •  
    Why might you use this? may 19 alec
  •  
    This is a disposable email that only lasts for one hour then erases itself. This could come in handy if you have to give an email address to make a game account you could use it so that you don't get spammed from the game site. Also it would make it impossible to track information sent from that email address to someone because it erases itself after one hour after being activated. You do not have to create your name because the site gives you an example. When I opened the site it told me that my email address was ready for use and was (owbjehey@guerrillamailblock.com) however you could change the name and use that as long as it has not been used before or is in use now.
anonymous

Maximum PC | 30 Useful (and Unknown) Web Apps You Need to Bookmark - Page 2 - 1 views

  •  
    apps Anything good? may 19 woo
  •  
    1. Anything good? - ConvertCenter - Good for calculation checks while doing labs and conversions. - Aviary - An alternative to having to install photoshop which takes a long time and takes up space. - Wolfram|Alpha - Useful for math. - Floorplanner - I'm a nerd so there'll come a time I'm bored and play with it. - Drumbot - Something to keep me entertained. - Remember The Milk - To help organize my homework and schedules if I use it. - Zoho - Feels more like Microsoft word, feels like an alternative to Google docs.
  •  
    Tags: 3.2 Software
anonymous

HowStuffWorks "How to Surf the Web Anonymously" - 1 views

  •  
    Is this a good guide? may 19 kuni
  •  
    I would say that it can be a good guide. However, it might be possible that you can't be 100% anonymous because it is not easy as removing the recent history. It is automatically recorded on server by the IP address.
anonymous

Crime Map Beta - Trulia - 9 views

  •  
    What is the value of this? all sept 29 Jang
  •  
    The crime map is a site that shows the amount of crimes committed in an area. The map gives specific information about what kind crime was committed, the location and time of the crime. The site also gives data of places that crimes do not happen frequently. This crime map website can be really useful for avoiding crime scenes and being aware of crimes that are happening in your neighborhood. If you want to move to a new place you can look at the crime map to see if your new neighborhood is safe and crime free. This site is still on beta and only have information on few states in America. I think a lot of people would use this site if it have data for all the countries in the world. However keeping up with new information everyday would be very hard because there are so many crimes happening all over the world and the site would need to be updated every few minutes.
anonymous

Moods on Twitter Follow Biological Rhythms, Study Finds - NYTimes.com - 3 views

  • The new analysis suggests that our moods are driven in part by a shared underlying biological rhythm that transcends culture and environment.
  •  
    Who is reading our tweets? Interesting info. m12 october 10 jenny
  •  
    Who is reading our tweets? Sociologists at Cornell University, as well as research teams around the world are ready our tweets to see the change in biological patterns in the days of the week, as well as the hours of the day.
anonymous

Identity Theft Resource Center ITRC Fact Sheet 118 - 0 views

  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. may 9 cream
  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? It is about checking the validity of site certificates for guarantee myself that I sent sensitive information to real and Safety Company. Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? This action is when you see a green lock in the URL space of web browser such as hotmail.com, which it says about US privacy and stuff. Https codes help you know that you are transmitting via a safe system. If the padlock is open, do not transmit sensitive information! You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. It is best to ere on the side of caution and use encryption to not only protect the data but also protect yourself
  •  
    1.3 Privacy and anonymity 3.3 Networks 3.4 Internet 3.5 Personal and public communications
anonymous

Magid on Tech: How Sony users can protect themselves in wake of security breach - San J... - 2 views

  •  
    List and explain each of the ways suggested to provide protection from this type of security breach. May 9 nat
  •  
    List and explain each of the ways suggested to provide protection from this type of security breach. Change the password. This is very crucial, if you've used the same password for every other accounts, because it means that anyone can open any account that belongs to you. An easy way to make a complicated password that's fairly easy to remember, is to create a meaningful sentence and take the initials. 'I was born on July 30th 1994' = Iwboj3094 Check your credit reports. This allows you to check and activities that is carried out with your credit card. You can also set your fraud alert. Don't get deceived by e-mails that looks official, because it may be a phishing site.
anonymous

BBC News - Rise in UK requests for Google content removal - 8 views

  •  
    Describe 3 examples of legitamate cases for removal. all oct 31 kuni
  •  
    i. Critical Politician movement: Google remove 236 communities and profiles from social network in India after the government complained that they were critical of a local politician. ii. Privacy violation: The users in Turkey were restricted from being able to see material about the private lives of political officials. iii. Local law violation: There was a problem that in Thailand, where someone uploads the video that insulted Thailand's monarchy, which was illegal under local laws. This caused the user in Thailand to ban YouTube site for a year.
‹ Previous 21 - 31 of 31
Showing 20 items per page