Skip to main content

Home/ Globaltech/ Group items tagged knows

Rss Feed Group items tagged

anonymous

Net Cetera - OnGuard Online - 0 views

  •  
    Read Heads-up. Describe two guidelines from each section that you think are relevant advice. May 9 kuni
  •  
    Share with care Your online actions can have real-world consequences. The pictures you post and the words and the words you write can affect the people in your life. Think before you post and share. The advice, mainly for children, is that before you click to send email or when you're ready to post or send a message or a photo, download a file, game or program, or shop for something-stop for a second. Think about things like: Do you know and trust who you're dealing with-or what you're sharing or downloading? How will you feel if your information ends up somewhere you didn't intend? Get someone's okay before you share photos or videos they're in. Online photo albums are great for storing and sharing pictures of special events, and camera phones make it easy to capture every moment. Stop and think about your own privacy-and other people's-before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. Interact With Tact Avatars are people too. When you're playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just INTERACT WITH TACT like you would in person. Remember that your character or avatar is a virtual version of you-what does it tell people about you and your interests? Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. The Protection Connection Learn about social mapping. Many mobile phones have GPS technology, and there are applications that allow you to find your friends-and allow them to find you. Use GPS and social mapping apps only with people you know personally and trust. Take advantage of privacy features in
anonymous

BBC News - Worm steals 45,000 Facebook passwords, researchers say - 8 views

  •  
    Explain the ways these networks are being hacked. How could you know if your facebook account had been hacked? all jan 17 jang
  •  
    Explain the ways these networks are being hacked. It is explained in the article that these networks are being hacked by using the stole credentials to log into the user's Facebook account. When the hackers logs into the Facebook account, it is used to transmit malicious links to other people such as friends. Friends would be a trustworthy person so the link would be visited. This would increase the speed of the malware's speed. Also, some users use the same password for many accounts which can be used by ill-intentioned people on the web. How could you know if your facebook account had been hacked? For you to know if your Facebook account had been hacked, users should run an anti-virus software to check and get rid of any malware that is hacking your account.
anonymous

Stop What You're Doing, And Go See What Google Thinks It Knows About You - 1 views

  •  
    click on the link to view your demographic according to google share with us your thoughts
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

US water facility 'was shut down by hackers' - Telegraph - 17 views

  •  
    How was the attack done? How did they know an attack happened? Why is this an important issue? Describe a possible solution. all nov 23 Chut
  •  
    How was the attack done? The hackers were able to obtain credentials from a company that makes software used to control the industrial systems. How did they know an attack happened? They knew that there was an attack because one of the pumps that is used to deliver water to the city was turned off. Why is this an important issue? This is an important issue because it indicates the amount of attention the United States government is giving to cyber-attacks. A terrorist attack like the one happened on September 9th 2001 can be said to be the faults of those who were monitoring the cyber activity. If the government aren't able to connect the dots to why they are doing this and the patterns of the attacks it might cause the US to be under attack like what happened over ten years ago. Describe a possible solution. Since that the credential software are saved on the clients' server, the employees can do a part in protecting the software. The staffs can help support the software.
anonymous

Control these large smart appliances with your iPhone | Appliances - CNET Reviews - 1 views

  •  
    Describe IT Dawoon Oct 2
  •  
    Most smart appliances have an accompanying application. Those applications are available on iOS and android. (Samsung's washer and dryer application is working on only iOS and Samsung's Galaxy mobile devices, not the rest of the Android devices.) There are some examples of using iOS to control the smart appliances 1. LG Smart ThinQ LFX31995ST LG Smart ThinQ app will tell you the internal temperatures of both the refrigerator and freezer, and whether it's on energy-saving mode or not. You can make grocery lists and automatically update your inventory once you've checked an item off the list. Also, you can search for recipes on the fridge based on what your fridge has in stock. 2. Whirlpool WRL767SIAM Side-by-Side Refrigerator with 6th Sense Live it transmits information directly to the free app on your smart device. Whirlpool's app can let you know, if the refrigerator door is open or if there has been a power outage. Whirlpool has also enabled this refrigerator to connect to the smart grid if it's available in your area, which will let you monitor energy usage through its app. 3. GE Profile PT9550SFSS Built-In Double Convection Wall Oven The game-change app turns your phone into a remote control for the oven. You can set the temperature, mode, and time for both ovens independently and turn them on with app. 4. LG Smart ThinQ LRE3027ST oven Smart ThinQ app will allow you to search for recipes and then cue up the cook time and temperature accordingly, but you still have to manually press start on the oven itself. LG app allows you to run diagnostics on the range to make sure that everything is running as it should be. 5. LG Smart ThinQ WT6001HV Washer/Smart ThinQ DLEX6001V Electric Dryer LG's Smart ThinQ washing machine features a gorgeous touch screen and connects to LG's Smart ThinQ app via your smartphone or tablet. It doesn't have a smart-grid function like some other washer/dryer apps, but it's otherwise similar in that it lets you check your wash cycle
anonymous

Egypt's Internet Block Aims at Social Media - PCWorld - 3 views

  •  
    aNt Feb 4 Why did Egypt block the internet? How has the internet supported civil disobedience? What does it mean when the US says social media is a fundamental right?
  •  
    Why did Egypt block the internet? To shut down communications within the people of Egypt to stop them from organizing protests against the government using social networks as a tool of communication. How has the internet supported civil disobedience? Many of the protests were organised with the use of social networks such as Facebook and Twitter, which helped everyone to organise the protest with people they didn't know. What does it mean when the US says social media is a fundamental right? US is saying that social media is a fundamental right, therefore should not be blocked or shut down, because it has become an important source of communication, and people have the right to know what's going on in the world.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
anonymous

64 Things Every Geek Should Know « Caintech.co.uk - 6 views

  •  
    dangerous info
anonymous

BBC News - Football tweets offer insight into harnessing Twitter - 2 views

  •  
    How is twitter used as a barometer? Explain the potential uses of networks as barometers? m12 october 10 jenny
  •  
    How is twitter used as a barometer? Twitter is used as a barometer because of its users' tweets that update happening events in real time, and can be used to know the change of events in real time. (From this article's example, they monitor users' tweets at major events during a football game (touch downs, scoring). Because of its live feeds, it is up to date all the time, and can have stacks of updates within seconds. Explain the potential uses of networks as barometers. Potential uses include anything with a large audience, televised media like reality shows, political debates, localized applications such as storm news updates, an electricity black out etc. Users will be able to know the changes of what's happening in real time from their mobile devices that supports viewing tweets as barometers.
anonymous

Strange (But Useful) Human Tricks | Can You Believe This? | eons.com - 4 views

  •  
    Just in case you wanted to know...
anonymous

http://www.wired.com/gadgetlab/2009/07/sms-hijack-iphone/ - 1 views

  •  
    How can iphone be hijacked? How can a user tell if she is being SMS attacked? April 26 woo
  •  
    was i supposed to do this? it wasnt on the list so i didnt know...
  •  
    1. How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. The iPhone can be hijacked through a series of invisible SMS message bursts that hijacks the iPhone. The attacker would then be able to control all the functions on the iPhone, as well as continue to send messages to hijack more phones. 2. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. A user can tell if she is being SMS attacked if they receive a message containing a square character. Prevention measures include immediately turning off your iPhone.
Helen Choi

Robot cars ready to roll - 20 views

  •  
    What will be the advantage of robot cars? What will be the problems of robot cars?
  •  
    Selected Article This robot car is another useful tool for tomorrow. It is necessary for us to know what is going on in the world right now. In order to be up to date, this article have to be read. This article will tell you what are robot cars.
Tick Kanjanamaneeroj

Tablets expected to become preferred computing device | Apple - CNET News - 4 views

  •  
    Why do people prefer tablet more than PC ? What advantages of tablet that PCs don't have?
  •  
    Selected Article Tablet is becoming more and more popular so it is important for us to know the advantages of this device that a Laptop doesn't have and why is is so popular among users.
Max Seol

Key Iranian oil terminal 'hacked' - 6 views

  •  
    Iran has been forced to disconnect key oil facilities after suffering a malware attack on Sunday, say reports. The computer virus is believed to have hit the internal computer systems at Iran's oil ministry and its national oil company. Equipment on the Kharg island and at other Iranian oil plants has been disconnected from the net as a precaution.
  •  
    Why is it a serious problem?
  •  
    Selected Article Oil is one of the valuable resources in the world so it is important for us to know how can this happen and how serious it is.
Max Seol

Millions of Americans ignore Facebook's privacy controls - 6 views

shared by Max Seol on 15 May 12 - No Cached
  •  
    NEW YORK (CNNMoney) -- As Facebook barrels toward its IPO, one of its biggest lightening-rod issues -- privacy -- is drawing a fresh spotlight. A Consumer Reports study released this week estimates that 13 million American Facebook users have never set or simply don't know about the site's privacy controls.
  •  
    What consequences will happen seriously? Why should people follow Facebook's privacy controls?
  •  
    Home Communications May 21
anonymous

Privacy controversy over Path for iPhone, iPad should be a wake-up call - The Washingto... - 10 views

  •  
    Explain the issue with Path. Evaluate Apple's solution.  Should services such as Path take or hold our data? all feb 21 johnroy
  •  
    Explain the issue with Path. When you take apps by log in from your iOS device then it would take you personal information and put it into the Apple server. It does this without permission of the user. The reason why is doing this to locate the user where you are at and your friends. Evaluate Apple's solution. Their solution is just to add new feature so you would be aware that apps would take your private information and put into the main server apple server. When you're downloading or getting apps you need to approve that they get you privacy information. Should services such as Path take or hold our data? I believe that they shouldn't because it's hard to trust large companies. The information that they have could be sold to other person that interest about your privacy. Another possible solution is that the data that is stored could be hacked anytime and when this occurrence happens. The hacker can sell my privacy to someone or he directly knows where I live, what's my name and etc.
anonymous

Twitter tired? Fatigued with Facebook? Try a new network - 11 views

  •  
    Would you try a new network? all feb 10 nat
  •  
    Personally I wouldn't try new networks, unless I have friends there. A lot of my friends are focused on Facebook, and I don't mind sharing my content with people I am friends with, as I usually decline requests from strangers, and are friends with people who I actually know or have mutual friends. However, I wouldn't mind giving Pinterest a go, as I think it sounds interesting, and also it sounds like Tumblr, which I like a lot, because we can share images with people with the same interest.
anonymous

How to Catch iPhone Thief? Officer Knows Buttons to Push - NYTimes.com - 8 views

  •  
    How does this work? all feb 3 champ
  •  
    There is a new function on icloud called "Find My iPhone". It used to locate lost iPhone on a digital map in the icloud webpage. It is work simply by logging in to your apple ID that you use to buy songs and the digital map will show where your iPhone is and it can send signal to iPhone and command it to ring calling sound when you get near so it is easier to track the missing iPhone.
anonymous

BBC News - Hackers outwit online banking identity security systems - 9 views

  •  
    Describe the kinds of attacks. Explain the security measures. all feb 9 kevin
  •  
    Describe the kinds of attacks. - First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages. Explain the security measures. - Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
1 - 20 of 41 Next › Last »
Showing 20 items per page