Skip to main content

Home/ Globaltech/ Group items tagged tools

Rss Feed Group items tagged

anonymous

The Survival Station - 51 Free Tools to Stay Informed and Invisible on the Internet - 1 views

  •  
    How could this help you? march 17 jenny
  •  
    1.3_privacy_anonymity 2.5_home_leisure 3.2 _software
  •  
    How would this help you? These tools could help us by providing us with at least some more sense of security that what we barely have left now. Because we are often on the Internet, we are exposed to the danger of being seen and tracked by others. These tools help us stay invisible and informed. The use of encryption is used as well as proxies to hide user IP addresses. The free tools are basically for us to be aware of what is being tracked of our online activity, and how we can prevent it with the software.
anonymous

Twitter Is a Critical Tool in Republican Campaigns - NYTimes.com - 2 views

  •  
    How is Twitter used? How effective is it? m12 feb 2 alec
anonymous

Gawker Hack Exposes Ridiculous Password Habits - PCWorld - 4 views

  •  
    What kinds of passwords do people use? Check Slate.com, which has created a handy tool to search the database for your username or e-mail address. What is Farhad Manjoo's advice on creating a superstrong password?
anonymous

Book Review - The Net Delusion - By Evgeny Morozov - NYTimes.com - 3 views

  • the ­asocial pursuit of profit is what drives social media
  • more capricious technology” than radio or television
  • capricious technology” than radio or television. Neither radio nor TV has “keyword-based filtering,” which allows regimes to use URLs and text to identify and suppress dangerous Web sites, or, like marketers, to collect information on the people who visit them
  • ...5 more annotations...
  • “Technology changes all the time,” he writes, “human nature hardly ever.”
  • Mass journalism and democracy are inextricably entwined
  • The Net Delusion
  • Against the Machine: How the Web Is Reshaping Culture and Commerce — and Why It Matters
  • For more on “The Net Delusion,”
  •  
    Feb 22 Does the Net allow more freedom or does is it a tool for governments and business to control us? Jenny
  •  
    1.7_surveillance 2.6_pol_gov 3.4_internet
  •  
    Does the Net allow more freedom or is it a tool for governments and businesses to control us? The Net allows both. The users can roam freely to their discretion where and what they want to put onto the web. It is just a matter of a country censoring the content, or the user self-censoring what is to be put on the web. Also, the governments and businesses both can use the Net to their advantage. The government can learn and find out various information of various individuals and trends of the public through the Net's social networking websites and other portal that have discussion between citizens themselves. Business are able to keep track of trends to see what is happening, such as the stock prices to what people like to eat, listen to, what they like to use. Thus the businesses are able to stay in business a little easier through knowing the information from the web. The businesses can also advertise themselves through the net, and that way, it is actually faster than having actual offline campaigns and advertisement. Therefore, the net can allow us both. We are free to use it more than let it control us. It's just a matter of fact that higher class society, social ranking, or economic status-ed has more chances to controlling the net due to their connections with the higher ups. Yet, censorship and surveillance is everywhere, and thus doesn't allow absolute freedom.
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
Helen Choi

Robot cars ready to roll - 20 views

  •  
    What will be the advantage of robot cars? What will be the problems of robot cars?
  •  
    Selected Article This robot car is another useful tool for tomorrow. It is necessary for us to know what is going on in the world right now. In order to be up to date, this article have to be read. This article will tell you what are robot cars.
In Hee Jang

FinSpy Software Is Tracking Political Dissidents - 2 views

  •  
    SAN FRANCISCO - Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveillance tool from Bahrain across five continents.
  •  
    Describe different ways of this type of software spying on people
Alex Lenk

The science and technology of air traffic control | Ars Technica - 6 views

  •  
    Da Woon November 1st  Describe the IT system
  •  
    This article tells us the air traffic controller (ATC) which helps us to have safe fly. ATC has access to sophisticated radar systems that provide an overview of the airspace they control, and they have communication tools to coordinate flight paths with the air crew. When the aircraft travel at higher speed than common modes of transport, the time available for pilots to react to a dangerous situation can be quite short. And ATC helps to aircraft approaching an airfield carefully and it checks the weather conditions for prevent pilots can't see other aircraft. ATC uses radar systems positioned at ATC facility to get a real time overview of the aircraft flying in the airspace they control. Many types of radar equipment are served for traffic on the ground. Primary Surveillance Radars (PSR) - The radar sends a directed pulse into the atmosphere, and when that pulse encounters an object it gets reflected back to the radar station. The bearing of the object with respect to the radar station and its approximate distance can be calculated by this. The radar is typically enclosed in a dome to protect it from adverse weather. Secondary Surveillance Radars (SSR) - the Secondary Surveillance Radar listens for messages from the aircraft's transponder. The radar rotates about the vertical axis, but transmits a specific signal on 1030 MHz. This signal is subsequently received by the aircraft's onboard transponder, which responds with a reply on 1090 MHz. SSR Modes - There are different modes of interrogation that compliant transponders respond to. A - The transponder responds with its squawk code, a unique identifier for the aircraft assigned by ATC comprising of four octal numbers. This code enables ATC to differentiate between the various aircraft being monitored, though it can also be used to discretely communicate the existence of an emergency situation onboard the aircraft. C - the transponder responds with the aircraft's pressure altitude, which is the altitude ab
Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
anonymous

Top 10 Google Products You Forgot All About - 1 views

  •  
    Which would you use? march 17 kuni
  •  
    I would use Google Sketchup, because this is one of the applications that I have on my computer. Google Sketchup is a software with which you can make a 3D model easily. Compared to the other 3D modeling software, Google Sketchup is easier to use. It has some tutorials for beginners, and you will find out how easy it is to create 3D model like a kid making a tower of blocks. Also, if you buy it, you will be able to convert it to a file that can be used for other 3D modeling software and modding games. I would use Google Trends just to see what's trending and Flight simulator in Google earth sounds pretty fun for when you're bored. I would use ; Google Page Creator, Flight simulator in Google Earth, and SketchUp. I would use the fight simulator, because it looks fun, and SketchUp mainly because I've always wanted to do some sort of graphics design on the computer. -In my opinion I would like to use Google SketchUp, and Google Book Search. First of all Google Sketch Up is helping me to make 3-D model. This is very useful in art class because when we have something like installations, we need some sketch of location and installation therefore by this program, I can draw 3-D installation and see how it looks like therefore this program is very useful for me. Also For the Google Book Search, this is kind of digital library which I can find book very easily and efficiently. I can see the books by this program also I can upload by own books which I can scan it. Therefore it might be very useful when I have something like writing essays. I would use Google Page creator. It enables to me create a page where I can find snippets of web pages, quotes, and images all over the web.
anonymous

KeepMeOut - 2 views

shared by anonymous on 04 Feb 11 - Cached
  •  
    Try this if it helps
anonymous

Egypt's Internet Block Aims at Social Media - PCWorld - 3 views

  •  
    aNt Feb 4 Why did Egypt block the internet? How has the internet supported civil disobedience? What does it mean when the US says social media is a fundamental right?
  •  
    Why did Egypt block the internet? To shut down communications within the people of Egypt to stop them from organizing protests against the government using social networks as a tool of communication. How has the internet supported civil disobedience? Many of the protests were organised with the use of social networks such as Facebook and Twitter, which helped everyone to organise the protest with people they didn't know. What does it mean when the US says social media is a fundamental right? US is saying that social media is a fundamental right, therefore should not be blocked or shut down, because it has become an important source of communication, and people have the right to know what's going on in the world.
anonymous

http://venturebeat.com/2011/02/20/arab-revolts-another-good-week-for-social-media-a-bad... - 1 views

  • The protests have been spurred by extensive use of social media such as Facebook and Twitter, which are seeing their moment in the sun as the tools of revolution
  • They’re unleashing movements for peace, democracy and freedom in a region of the world that seemed like it was content to live without them
  • It shows that the power of the network effect can work in political revolutions just as it does in other parts of our lives. Social media has become like the lever that opens the doors that stand in the way of freedom
  • ...1 more annotation...
  • “triumphalism about the recent events in the Middle East is premature. The contest is still in its early stages, and the new age of internet-driven democratization will endure only if we learn to counter the sophisticated measures now being developed to quash it
  •  
    To what extent do you think social media opens the door to freedom? march 1
anonymous

Bangkok Post : Leveraging social networks for sales - 4 views

  •  
    What does it mean to leverage social networks? Define digimarketing. Explain the mistakes marketers make with social networking. march 17 nat
  •  
    What does it mean to leverage social networks? To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising. Define digimarketing. Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online. Explain the mistakes marketers make with social networking. Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers. Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
anonymous

BBC News - Facebook profile access 'leaked' claims Symantec - 3 views

  •  
    brief may 17 soo
  •  
    - Identify the area of impact the scenario relates to Home and Leisure, Business and e-commerce - Identify the main stakeholders to the IT system People who are using Facebook, Facebook Company and Application Company - Identify one ITGS social/ethical concern in the article Security, Privacy - Describe ITGS terminology and systems  Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.  http://developers.facebook.com/docs/guides/canvas/  Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.  http://kb.iu.edu/data/agzf.html - If possible, describe a solution to the concern (Issues) Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
anonymous

64 Things Every Geek Should Know « Caintech.co.uk - 6 views

  •  
    dangerous info
anonymous

Yes, your iPhone is tracking you -- the question's why - Computerworld - 3 views

  •  
    Why are iphones tracking people? april 28' cream
  •  
    Why are iphones tracking people? This is the issue of storing user's location data in unencrypted file. The file, named "consolidated.db," is an unencrypted SQLite database that can be found in the devices' file systems and in the iOS backup files created and updated by iTunes every time an iPhone or 3G iPad is synced. Since, we know that Apple is actually collecting location and some information on iphone that's why iphone is not safe at all. Although the file isn't immediately accessible on the device itself, it can be accessed on a jailbroken device via the iTunes-generated backup file. It also could potentially be accessed using other tools that allow you to explore an iOS device's file system while it's attached to a computer.
anonymous

Twine / An open-source tool for telling interactive, nonlinear stories - 1 views

  •  
    "You don't need to write any code to create a simple story with Twine, but you can extend your stories with variables, conditional logic, images, CSS, and JavaScript when you're ready. "
anonymous

Food & Beverage News: Top News - Surveillance tools or technologies that help in delive... - 10 views

  •  
    Identify the scenario. Define surveillance. List how CCTV is used. Describe the benefit of GPS. How does GPS work? How do you compress a video? Describe lossy compression.
1 - 20 of 20
Showing 20 items per page