Skip to main content

Home/ ltis13/ Group items tagged security

Rss Feed Group items tagged

Claude Almansi

WordPress tops for blogging and malware distribution | Larry Seltzer ZDNet -2014-03-25 - 0 views

  •  
    "By Larry Seltzer for Zero Day | March 25, 2014 -- 12:00 GMT (05:00 PDT) Internet security research and services company Netcraft has determined that sites running the WordPress blogging software are a major source of both phishing attacks and malware distribution. Interestingly, none of the phishing sites were hosted on WordPress.com, a a large blog-hosting service run by Automattic. The founder of Automattic was one of the original authors of WordPress and the company still contributes to the WordPress.org open source project. Netcraft speculates that this familiarity explains their security record. It also shows that WordPress can be administered securely. But the WordPress application is free and is installed on many web sites across the world. The administrators of these sites are responsible for keeping WordPress and its component parts updated, and many do not. "
fabrizio bartoli

The Definitive Guide to WordPress Security - Moz - 0 views

  •  
     If you work with wordpress.org in any capacity, this post is for you (much of this post doesn't apply to *.wordpress.com hosted sites).
Claude Almansi

Sudan sanctions are keeping secure communications tools from activists. Slate Danielle ... - 0 views

  •  
    "They are making it difficult for activists to use secure communication tools and putting them at risk."
  •  
    aggiungo coursera e MOOC. ai tag, perché il blocco tramite IP dei corsi Coursera in Iran, Siria, Sudano e Cuba viene menzionato, con link, nell'articolo.
Claude Almansi

Zombie-Based Learning -- "Braaaaaaains!" | Edutopia Andrew Miller 2013-05-17 - 2 views

  •  
    "And so it begins... Zombie-Based Learning! David Hunter You read that correctly: Zombie-Based Learning. When I started learning about it, my inner geek squealed with joy. I've always loved zombies. I've watched all the movies and even read the original Walking Dead Comics before it became a hit series in the classroom. One Teacher's Curriculum Geography has always been a learning target for social studies teachers, and David Hunter, who teaches at Bellevue, Washington's Big Picture School, decided to create a curriculum using Kickstarter as its funding source. He sought to make geography relevant through engaging scenarios and stories with a zombie theme tying it all together. The whole curriculum is standards-based and includes over 70 lessons where students must "consider how to duck the undead invasion, secure their supplies and, eventually, rebuild society" through a variety of activities, worksheets and discussions. (...) English and Language Arts (...) Science (...) Math (...)" Categoria: Project-Based Learning
  •  
    Categoria Project-Based Learning di Edutopia: http://www.edutopia.org/blogs/beat/project-based-learning Su Edutopia e George Lucas (sì, quello di Star Wars): http://www.edutopia.org/mission-vision
fabrizio bartoli

Quick Screen Share - 1 views

  •  
    "About QuickScreenShare.com: QuickScreenShare.com is the simplest way to share screens with anybody: No registration required and completely free. Nothing to install for sharer or sharee (assuming you have Java). Works on Windows, Mac, and Linux. Even lets you remotely control mouse and keyboard! This free service is a side project from the creators of Screencast-O-Matic.com and is still in BETA. We use it extensively for remote user support and collaboration. The current version creates a direct peer-to-peer connection, so if you're on a super duper secure school or company network it may or may not be able to connect, but in most cases you'll find it works quite well so give it a shot!"
Claude Almansi

How Laws Restricting Tech Actually Expose Us to Greater Harm | WIRED Cory Doctorow 2014... - 0 views

  •  
    "if the world's governments continue to insist that wiretapping capacity must be built into every computer; if the state of California continues to insist that cell phones have kill switches allowing remote instructions to be executed on your phone that you can't countermand or even know about; if the entertainment industry continues to insist that the general-purpose computer must be neutered so you can't use it to watch TV the wrong way; if the World Wide Web Consortium continues to infect the core standards of the web itself to allow remote control over your computer against your wishes-then we are in deep, deep trouble. The Internet isn't just the world's most perfect video-on-demand service. It's not simply a better way to get pornography. It's not merely a tool for planning terrorist attacks. Those are only use cases for the net; what the net is, is the nervous system of the 21st century. It's time we started acting like it."
Claude Almansi

Data-Privacy-Guidebook.pdf - 0 views

  •  
    "Introduction California school districts and County Offices of Education-collectively, Local Educational Agencies ("LEAs")-collect a vast amount of data in providing educational and related services. This data may include pupil records, medical records, financial information, and more. With the advent of individualized learning management systems, LEAs are sharing such data with third-party vendors more than ever before. There has also been a corresponding, and sometimes competing, increase in compliance measures to protect student data. This guide is intended to provide an overview and streamline some of the key laws governing student data privacy. Please note that the laws referenced herein may not be exhaustive. This guide contains information only and is not intended to provide legal advice, nor does it establish an attorney- client relationship. LEAs are encouraged to contact their legal counsel or member organization for any questions or clarifications concerning the content contained herein. This guide is also available electronically at www.f3law.com . This guide may be updated periodically; such updates may be found in the electronic version"
Claude Almansi

Coursera Privacy Policy - 0 views

  •  
    "Privacy Shield Policy Introduction. Coursera, Inc. (referred to as "we," "us," or "our"), believes in protecting your privacy. We participate in and commit to adhering to the EU-U.S. Privacy Shield Framework which includes the Privacy Shield Principles of notice, choice, onward transfer, security, data integrity, access and enforcement (the "Principles") for all transfers of personal data from EEA to the U.S. To learn more about Privacy Shield, please visit the U.S. Department of Commerce Privacy Shield website: https://www.privacyshield.gov/. For more information regarding our Privacy Shield certification, please see: https://www.privacyshield.gov/list (Note: Coursera is currently in the process of obtaining formal self-certification to Privacy Shield)."
Claude Almansi

BBC NEWS | South Asia | Pakistanis recoil against 'crackdown' - March 11 09 - 0 views

  •  
    Political gatherings have been banned in two Pakistani provinces and many activists arrested to prevent them joining a planned protest march. Opposition supporters and lawyers had organised what they are calling a "long march" against the government due to start later this week. Activists, lawyers and ordinary citizens have reacted to the latest developments with a mixture of defiance and fear.
Daniele Guerrieri

Dalla parte di Edward Snowden - 6 views

  •  
    Questo analista 29enne ha appena riununciato a tutta la sua vita, la sua ragazza, il suo lavoro, la sua casa, per far sapere al mondo dello scioccante programma PRISM del governo americano, che ha letto e registrato le nostre email, i nostri messaggi Skype, post su Facebook e telefonate per anni.
  •  
    Io sto con Edward Snowden, con Bradley Manning, con Julian Assange, con Aaron Swartz e con tanti altri che lavorano per la libertà di espressione.
Claude Almansi

In defense of the cheating scumbags caught up in the Ashley Madison hack | ZDNet - 0 views

  •  
    By Zack Whittaker for Zero Day | August 19, 2015 "...Everyone has a right to privacy. It doesn't just keep our information safe, but it helps us be the people we want to be. Without privacy, we're always being watched. Without privacy, we can't have private discussions or experiences that shape our views, opinions, and thoughts that better society. Without privacy, we can't express ourselves as who we want to be. Privacy either exists, or it doesn't. Today it's cheating spouses, tomorrow it could be you."
Claude Almansi

Microsoft reveals zero-day attacks against Word | Larry Seltzer ZDNet 2014-03-24 - 0 views

  •  
    "By Larry Seltzer for Zero Day | March 24, 2014 -- 19:16 GMT (12:16 PDT) Microsoft announced today that an unpatched vulnerability in Microsoft Word is being exploited in the wild. All versions of Microsoft Word, both Mac and Windows, and several related programs like the Word Viewer and Word Automation Services on Microsoft SharePoint Server are also vulnerable, but the current attacks are directed at Microsoft Word 2010. Exploits such as these are often version-specific, and in targeted attacks, such as this appears to be, the attacker may already know which version he needs to exploit. Microsoft also says that Microsoft Outlook could also be exploited with such an RTF file if Word were set as the viewer for Outlook. In the default configuration Word is the viewer in Outlook 2007, 2010 and 2013."
Claude Almansi

SEND (Smart Education Networks by Design) | CoSN - 0 views

  •  
    "Advances in technology make it possible for students to experience personalized learning anytime and anywhere. But this can only take place if our school systems have well designed networks that support the increased demands of student devices and 24/7/365 access and that remain current in the face of rapidly evolving technologies. In our first phase, with the generous support of Qualcomm, the SEND Initiative developed guidelines for network design and a checklist for district network planning. Currently, SEND II is building on that work in collaboration with leading technology partners: ENA, Filewave, Fortinet, Presidio, Juniper Networks, and SAFARI Montage, SEND II is developing next-level resources for building network architectures that can handle and evolve with new demands."
1 - 13 of 13
Showing 20 items per page