RSS

Monthly Archives: May 2012

Not ONLY rights but also responsibility!?

Not ONLY rights but also responsibility!?


Learning IT-Security

.

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses. One very important knowledge who needs to get taught is “Critical Thinking“; it brings out also new ideas and the courage to become an engager and helps to try to build a better world in both worlds: “Real World” and “Virtual World” (Internet)!

.

Teaching “Critical Thinking” to your students and learners is a MUST for a world who is changing very fast (sometimes too fast…) so that a lot of people can’t follow anymore… But by knowing “Critical Thinking” people would be catching up more quick, so very important!!!

.

===> Critical Thinking is a catalyst when well used together with Social Medias! <===

.

.
When talking about Critical-Thinking then automatically we should talk also about responsibilities! Find out more below…
.

.

sid2014-anim-banner

.

What should get be taught and learned more in 21st Century while using ICT?

.

Chatting, talkingBeing online since 1998 and giving courses about ICT more than 10 years the practice and my online excursions show me that IT-Security and Internet-Safety are not yet taught enough. Seriously I think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉

.

HOW COULD THAT BE IN PRACTICE???

help-books-aj.svgajash01-1
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities fom students in 21st Century
  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

When having read the recommended books YOU will understand much better what are the actions to take and certainly there will be also some new ideas from YOU 😉

.


So, what does this show us!?

Attention Logo

        1. There isn’t enough information from Education (or too theoretical) around about how to get protected
          • Why? Perhaps teachers and educators are Mac users and not prepared for such a serious task!? Lack of REAL knowledge about IT-Security!
          • Lack of IT-Security knowledge in general, so how can one be able then to bring over the right knowledge!?
          • Learners don’t feel it necessary, why? Bad teaching, sorry! Not ONLY a society problem as some say! A teacher doesn’t give up till he finds the right way that it will get understood even that he must learn himself some new stuff to make it more interesting for the learners!
        2. There isn’t enough information from Government to adults and seniors around about how to get protected (or too theoretical)
        3. When courses are giving from Education and Government they are too theoretical and don’t give the necessary practice to learners for protecting their computers
        4. IT-Security can ONLY have best results when done with practical workshops!
          • ===> Confucius, Tell me, and I will forget. Show me, and I may remember. Involve me, and I will understand. – Confucius, 450 B.C.
        • Education and Government are publishing with 21st Century Technology but still doing it with 20th Century knowledge! They have to improve and to employ people with the necessary practice knowledge and skills!
        • There is a need to prepare learners more to the dangers of Internet! Especially against Scam!
        • Learners and adults need to know the laws in Internet!
        • There is a need to create so called “IT Security Help Points (Places)” where people with practice knowledge and skills are available to give advice on the place and wherevisitors can bring their computers to check for vulnerabilities and infections, as I did as a volunteer, but these people should get payed for it!
      1. Ideas for a more secure Internet (in English)
      2. IT-Security Scouts (in English)

Critical Thinking Questions and memes

Questions to make everybody awake for Critical-Thinking and responsibilities as also laws and hopefully to see one day practical courses and workshops:

.

question mark logo

        • What do YOU think about people who are walking door by door and trying if a door is open and enter into the house!? And worth, who are looking for other holes were they can enter into the house!?
          • Port Scanning and scanning web sites where YOU are not the owner of it are not allowed and punished by laws!
        • Imagine YOU would have an exhibition of your talented pictures, drawings, books, texts, sculptures and… in a big exhibition place (Internet); someone is visiting this exhibition and takes your talented work away with him!? Of course without paying YOU for this nor to tell YOU that he did so and that later on this person would make his own exhibition somewhere else pretending that it is his own work and even earn money with it!? What would be YOUR reaction!?  Do YOU know that this is what is called “Copyright“!?
        • Do YOU educate YOUR children and learners at home about bad and good? Do YOU educate them not to steal and not to break in other houses? Do YOU explain YOUR children and learners the laws and also the terms “prison” + “jail”? In virtual life (Internet) there are also laws and rules, explain them also to YOUR children and learners!
        • Do YOU educate YOUR children and learners to become good citizen? Do the same in #virtuallife (Internet) so that they will become good eCitizen, called also Digital Citizen!
        • Someone who doesn’t have the knowledge to use his computer (the vehicle in virtual life/Internet) is a potential danger for the COMMUNITY!!!
        • Protect YOUR children and learners by telling them the laws in Internet to avoid that they will become Cyber-criminals! Show them some practical examples about arrested people who thought that they would be invisible on Internet such as:
        • Do YOU know who is profiting from such a lack of knowledge and naivety!? Cyber-crime is, they use YOUR computer to earn money, funny isn’t it!??? Wake up!!!
.

Learning and teaching how-to stay secure and get protected

.
I suggest to YOU to follow my FREE courses here:
.
programmer man (color)
.
.
.
.
.
Educate parents and kids to become good e-Citizens, Digital Citizens; here some help:
.

Laws in different countries, mostly in Europe

.

balance

.

The French version http://gustmeesfr.wordpress.com/ (en français) includes already a big collection of francophone country laws, such as from:

.

luxembourg flag Luxembourg

.

Liens connexes :


French Flag icon France

.

.

Liens connexes :

Vos contributions sont les bienvenues
.

Canada flag icon Canada

.

.

Belgium


Ceci étant les lois que je connais, si vous en connaissiez d’autres lois de pays francophones , veuillez utiliser les commentaires pour me les communiquer et je les intègrerais afin de faire de ce blog un document collaboratif francophone, merci d’avance.

.

Germany flag icon Germany

.
.

Copyright Laws in certain countries

.
.

Your Rights Online in Europe

.

eYouGuide European Commission

Click image to access the web site!


THE OBJECT of Teaching…

.

.

The object of teaching a child is to enable him to get along without a teacher.

Elbert Hubbard (1856-1915) American author, editor and printer.


Keywords: 


globe-pc

.

21st century learning and teaching, narration and interaction, real and imaginary level, learning on an vivid and understandable way, learning with videos on a visual way, passion, cross-subject education, cross-border thinking, interconnectedness of our global world, different media and disciplines, emotional and motivating effects, motivation, inspiration, solving the problems of the future by critical thinking…

.

.

The main keywords concerning this course:

eCitizen, digital Citizen, respect, laws, community, responsibilities, rights, real world, virtual world, real life, virtual life, awareness, education, eLearning, mLearning, BYOD, IT-Security, Internet-Safety, Online-Safety, digital reputation, prison, jail, society, 

.
.

.

blueman20401Recommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.

Stay tuned for next courses and tutorials 😉

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

What should get be taught and learned more in 21st Century while using ICT?

What should get be taught and learned more in 21st Century while using ICT?


Learning IT-Security

.

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses. One very important knowledge who needs to get taught is “Critical Thinking“; it brings out also new ideas and the courage to become an engager and helps to try to build a better world in both worlds: “Real World” and “Virtual World” (Internet)!

.

Teaching “Critical Thinking” to your students and learners is a MUST for a world who is changing very fast (sometimes too fast…) so that a lot of people can’t follow anymore… But by knowing “Critical Thinking” people would be catching up more quick, so very important!!!

.

===> Critical Thinking is a catalyst when well used together with Social Medias! <===

.

.
When talking about Critical-Thinking then automatically we should talk also about Responsibilities! Find out more in my course Not Only Rights, But Also Responsibility!?
.

HOW COULD THAT BE IN PRACTICE???

help-books
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities fom students in 21st Century…
  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

What should get be taught and learned more in 21st Century while using ICT?

.

chatting, speaking, sharingBeing online since 1998 and giving courses about ICT (Information and Communication Technologies) more than 10 years, the practice and my online excursions show me that IT-Security and Internet-Safety are not yet taught enough. Best practice example is that from 100 computers (Windows) there was only one (1) who was correctly secured and didn’t contain any malware, only some cookies… In my private life when going out and talking with people there comes mostly of time out the discussion about IT-Security with people who I know and others who are following the discussion, and when knowing through discussion that I have good knowledge about IT-Security they ask me also for advice

.

So, with the consent of the owner of these Cafés, Pub’s I arranged an appointment with these people and I checked their computers (Windows machines) in these places while the owner and other present customers could have a look on how I did it and where I explained them also why and how malware is penetrating the computer, by also showing them later on How-To protect their computers. Customers were also allowed to ask questions, where I gave them the links of my free courses and tutorials… That’s the positive part of my so called “on the field adventures and practice” where customers were youth as also adults and seniors…

.

The negative one is that from +/- 30 computers and Laptops I checked there was NO ONE who was secure and ALL of them were infected with malware, even one was acting as a malware server!!!


So, what does this show us!?

icon attention

        1. There isn’t enough information from Education (or too theoretical) around about how to get protected
          • Why? Perhaps teachers and educators are Mac users and not prepared for such a serious task!? Lack of REAL knowledge about IT-Security! IT-Security can ONLY get taught seriously by people who have practice with it!
          • Lack of IT-Security practice knowledge in general, so how can one be able then to bring over the right knowledge!?
          • Learners don’t feel it necessary, why? Bad teaching, sorry! Not ONLY a society problem as some say! A teacher doesn’t give up till he finds the right way that it will get understood even that he must learn himself some new stuff to make it more interesting for the learners!
        2. There isn’t enough information from Government to adults and seniors around about how to get protected (or too theoretical)
        3. When courses are giving from Education and Government they are too theoretical and don’t give the necessary practice to learners for protecting their computers
        4. IT-Security can ONLY have best results when done with practical workshops!
          • ===> Confucius: Tell me, and I will forget. Show me, and I may remember. Involve me, and I will understand. – Confucius, 450 B.C.
        1. Education and Government are publishing with 21st Century Technology but still doing it with 20th Century knowledge! They have to improve and to employ people with the necessary practice knowledge and skills!
        2. There is a need to create so called “IT Security Help Points (Places)” where people with practice knowledge and skills are available to give advice on the place and where visitors can bring their computers to check for vulnerabilities and infections, as I did as a volunteer, but these people should get payed for it!

Critical Thinking Questions and memes

Questions to make everybody awake for Critical-Thinking and hopefully to see one day practical courses and workshops:

.

questions and information icon

        • Can YOU drive a car (and this also safely) ONLY by getting theoretical courses and advice? YOU would surprise me, seriously, a BIG LOL for that 😉 So how YOU will expect that someone could surf secure with his computer as it is “visually seen” the “vehicle” with whom users are driving on the “Data High Way” (Internet)!????
        • Would YOU allow somebody who doesn’t have the knowledge about how-to use the breaks (IT-Security) of a car and the traffic rules (Internet-Safety) to take part of the traffic in public in real life? But that’s what is happening actually in virtual life (Internet)! Think about, please 😉
        • Someone who doesn’t have the knowledge to use his computer (the vehicle in virtual life/Internet) is a potential danger for the COMMUNITY!!!
        • Do YOU know who is profiting from such a lack of knowledge and naivety!? Cybercrime is, they use YOUR computer to earn money, funny isn’t it!??? Wake up!!!
.
Would like to know how the actual worldwide situation is about IT-Security? Check this cartoon, please. Created by IT-Security experts and Antivirus manufacturers; and this is the Reality!
.
ikarus-comic_malwareevolution
..
Related links:
.

Learning and teaching how-to stay secure and get protected

.
I suggest to YOU to follow my FREE courses here:
.
programmer man image by Gust MEES
.
.

.

 THE OBJECT of Teaching…

.

.

The object of teaching a child is to enable him to get along without a teacher.

Elbert Hubbard (1856-1915) American author, editor and printer.


Keywords: 


.

21st century learning and teaching, narration and interaction, real and imaginary level, learning on an vivid and understandable way, learning with videos on a visual way, passion, cross-subject education, cross-border thinking, interconnectedness of our global world, different media and disciplines, emotional and motivating effects, motivation, inspiration, solving the problems of the future by critical thinking…

.

NB: Personally I would feel proud to see one of my PLN (Personal Learning Network) to create a worksheet with screenshots and to send me the link which of course I would include in my courses, come on folks, waiting for it 😉
.
.

….
.

blueman20401Recommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.


.
Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

.
Stay tuned for next courses and tutorials 😉
.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security/Worksheet-Secure Surfing-part2

Visual IT-Security/Worksheet-Secure Surfing-part2


Learning IT-Security

.

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses. 


.

sid2014-anim-banner

.

Learning and teaching how-to surf by choosing safe web sites

By using this web site the teaching person could use the opportunity as well to explain the learners what are trusted content and what not, a short introduction… Show them that by a simple add-on in their browser they will find what trusted content is, example here below who takes only a couple of minutes to explain and also only a couple of minutes to install it…
.
Little help for explaining about trusted content and images from SOPHOSTrust your search engine results? Read how image searches within Bing are being poisoned by attackers in order to drive web traffic to malicious sites. Read the full adviceby clicking links below:

.

.
Personally I prefer to use more than one solution; in Worksheet-part 1 I presented to you WOT (Web Of Trust) and in this Worksheet you will discover McAfee SiteAdvisor:
.
What is SiteAdvisor software?
 Click the image above to go to the web site and download the free add-on
.
.
For questions you may have, read:
 .

How-To do it and who to do it?

.
chaticon01I suggest, if possible, to do this by any teacher, educator on the beginning of a new school year: There are no special technical skills needed and it takes ONLY 5-10 minutes to show the learners how-to use this application! If there are summer camps where some of the learners are present, do it also and ask them to share it with their class over Social Medias, such as Facebook, Twitter and others…
.
Talk also to your System Administrator on School to install this FREE application on any used computer and tablets to have the same standard in the school! Your and your students virtual-life (Internet) would become more secure… Less stress to find trustworthy web sites is also more time for teaching and learning! And you will help the COMMUNITY to surf more secure also…
.
You may also (maybe best suggestion?) share this in summer for that your learners will come back for new school year by having it already installed…
.

sharing icon
.
Prepare a worksheet with screenshots for your learners on How-To do it and encourage them to share this worksheet over Social Medias with their friends. 
.

.

.

Here a non exhaustive list of educational tools which you could use for creating your personal worksheet:


THE OBJECT of Teaching…

.

.

The object of teaching a child is to enable him to get along without a teacher.

Elbert Hubbard (1856-1915) American author, editor and printer.


Keywords: 


globe-pc

.

21st century learning and teaching, narration and interaction, real and imaginary level, learning on an vivid and understandable way, learning with videos on a visual way, passion, cross-subject education, cross-border thinking, interconnectedness of our global world, different media and disciplines, emotional and motivating effects, motivation, inspiration, solving the problems of the future by critical thinking…

.

NB: Personally I would feel proud to see one of my #PLN to create a worksheet with screenshots and to send me the link which of course I would include in my courses, come on folks, waiting for it 😉
.
.
.
.
.

The main keywords concerning this course:

eCitizen, digital Citizen, respect, laws, community, responsibilities, real world, virtual world, real life, virtual life, awareness, education, eLearning, mLearning, BYOD, IT-Security, Internet-Safety, Online-Safety, society, 

.
.

.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security/Worksheet-Secure Surfing

Visual IT-Security/Worksheet-Secure Surfing

.

Learning IT-Security

.

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses. 


.

sid2014-anim-banner

.

 

Learning and teaching how-to surf by choosing safe web sites

By this video the teaching person could use the opportunity as well to explain the learners what are trusted content and what not, a short introduction… Show them that by a simple add-on in their browser they will find what trusted content is, example here below who takes only a couple of minutes to explain and also only a couple of minutes to install it…

WOT: WEB OF TRUST DEMONSTRATION


How-To do it and who to do it?

.
I suggest, if possible, to do this by any teacher, educator on the beginning of a new school year: There are no special technical skills needed and it takes ONLY 5-10 minutes to show the learners how-to use this application! If there are summer camps where some of the learners are present, do it also and ask them to share it with their class over Social Medias, such as Facebook, Twitter and others…
.
Talk also to your System Administrator on School to install this FREE application on any used computer and tablets to have the same standard in the school! Your and your students virtual-life (Internet) would become more secure… Less stress to find trustworthy web sites is also more time for teaching and learning! And you will help the COMMUNITY to surf more secure also…
.
You may also (maybe best suggestion?) share this in summer for that your learners will come back for new school year by having it already installed…
.
WOT-Web Of Trust
Click the image above to go to the web site and download the free add-on
..

Prepare a worksheet with screenshots for your learners on How-To do it and encourage them to share this worksheet over Social Medias with their friends. As you can see on below screenshot WOT is available for ALL OS , any browser and it’s FREE! So, what are you waiting for 😉
.
WOT-Web Of Trust / System requirements

..

Questions you may ask, refer to the links of WOT:

Here a non exhaustive list of educational tools which you could use for creating your personal worksheet:


THE OBJECT of Teaching…

.

.

The object of teaching a child is to enable him to get along without a teacher.

Elbert Hubbard (1856-1915) American author, editor and printer.


Keywords: 


globe-pc

.

21st century learning and teaching, narration and interaction, real and imaginary level, learning on an vivid and understandable way, learning with videos on a visual way, passion, cross-subject education, cross-border thinking, interconnectedness of our global world, different media and disciplines, emotional and motivating effects, motivation, inspiration, solving the problems of the future by critical thinking…

.

NB: Personally I would feel proud to see one of my #PLN to create a worksheet with screenshots and to send me the link which of course I would include in my courses, come on folks, waiting for it 😉
 
.
.


“Do you like this blog?

Please reward it with a little donation.”

.

.
Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security/Learn with videos

Visual IT-Security/Learn with videos

..

Learning IT-Security


MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUET...

MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET

.

For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. Why a computer could become a possible Cyber-Weapon who is attacking web-sites and perhaps also your Government’s web-sites!

But let us start first with some funny videos who will explain to you also about IT-Security in a visual way…

.

.


.

.


Introduction

Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.

.

===> Nobody is perfect! <===

.

Check the video below who explains very well about all the malware, YOU will understand then the need to secure your computer.

.

.


.

.


Some questions to wake you up to critical-thinking, if you permit 😉

Explaining the dangers of infected computers and the dangers to your Government also:

chaticon01

        • Would you allow a person  entry with contagious disease into your home or institution? An epidemic would be the result!
          • An infected #computer is same ===> epidemic danger!
        • YOU know that when driving your car that you could hit a person by accident!? Do you realize that this could happen also virtually (in Internet) with your computer!? This person’s computer would get also infected and this person would need to repair its computer which would cost money as most people don’t know how to get rid of an infection! Are YOU aware that YOU are responsible for that!?
  • Are YOU a good patriot? Would YOU help to defend your country and Government against attacks? So do so also on Internet! Learn the basics of IT-Security!
  • Do YOU know that Cyber-Criminals earn more money than others with Drugs, and that with YOUR computer!?
  • Do YOU know that Cyber-Criminals are better organized as Police and FBI and…?
.
.

Check the videos below and take your time; bookmark this site and come back when having time to watch them…
.

.
Netbasics
Netbasics

.

Protect Your Computer

Protect Your Computer

.

Les sites Internet sécurisés

Les sites Internet sécurisés

 .

Underground Economy

Symantec Guide to Scary Internet Stuff –

Underground Economy

 .

Phishing

Symantec Guide to Scary Internet Stuff

– Phishing

 .

Drive-By-Downloads

Symantec Guide to Scary Internet Stuff

– No 4 Drive-by downloads

.
DDoS-Attacks

Symantec Guide to Scary Internet Stuff

– No 6 Denial of Service Attacks

.
Botnets

Symantec Guide to Scary Internet Stuff

Botnets

.
Misleading Applications

Symantec Guide to Scary Internet Stuff

– No 5 Misleading Applications

.
It’s much easier to understand IT-Security when watching videos…

.


.

.

.

..


What did we learn so far?

We learned already:

        • We need an antivirus and a firewall. This is the absolute minimum for any computer!
        • Internet (the virtual world) is exactly the same as the real world. There are bad and good guys. We need to protect us and the community against the bad guys!
        • Any computer with Windows, Mac and Linux Operating Systems and…, are vulnerable! Nobody is perfect!
        • We can’t trust any web site! Some web sites are infected and malicious! By “drive-by-download” we will infect also our computer by visiting such a prepared web site!
        • We need critical-thinking when working on Internet!
        • Our own computer could become a #cyberweapon and helping to attack our own Government!

.
Sources:
.

For Teachers and Educators

Use my mentioned sources to learn yourself about IT-Security, Cyber-security, Cyber-war, Cyber-warfare, Cyber-crime and… Find below the keywords as a guide for yourself on How-To and with what tools to prepare your personal course(s)… I will provide soon a new course about how you could prepare your courses from my own 14 years practice, as a guide for you… which of course you could adapt to your own needs…

.

What we should learn and what we will learn in these courses…

animated gif-computer user

Keywords and guidelines for teachers educators instructors and learners (students + teachers), self learning included: 

  1. Community: 
    • once connected to Internet we are part of millions of other users of Internet! Each one is responsible for others!
    • By using Social Media (Hashtag is #SoMe) this is even more accurate as more people are getting reached!
  2. Responsibility
  3. Critical Thinking
  4. Competences
  5. Ignorance + Naivety of users is the Power of Cyber-criminals…
  6. 21st Century Knowledge about How-To prepare your courses and to teach…
  7. Dangers of Internet
  8. Reflexes to have (Internet-Safety, Online-Safety, e-Safety)
  9. Getting informed about newest dangers of Internet
  1. Knowledge about best Tools to protect YOU and the COMMUNITY:


===> That are the keywords on which you can build up your courses to teach efficiently! <===

Sources for IT-Security + Internet-Safety + Online-Safety:
.

.
Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

..

Learning IT-Security

Learning IT-Security,e-Learning,m-Learning,Bring Your Own Device, BYOD,Cyberwar,Cyber-Warfare,Cyber-Weapon,Cyber-Crime


MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUET...

MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET

.

For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. Why a computer could become a possible Cyber-Weapon who is attacking web sites and perhaps also your Government’s web-sites!

.

.

.

.

Check the map below to see in real time DDoS attacks, attacks made with infected computers!

.

denial-of-service attacks in real time

Click image map to see in real time the DDoS attacks!

.

Check ALSO my blog below, who shows you more interactive maps:

.

 

..

.

In this ctraffic light greenourse you will learn:

          • Why there is a need to protect your computer.
          • Why a computer is in danger to get a virus, trojan, and other malware infections.
          • Why a computer could become a possible Cyber‐Weapon who is attacking web‐sites and perhaps also your Government’s web‐sites!

Note: by reading ONLY the bold text you will get the most important information, in case that you would like to read it on a fast way because of lack of time…

.

===> This blog contains a lot of information, so I advice you to bookmark and read it carefully as on your convenience, take your time please. <===

Keywords for learners and especially for teachers and educators who want to use this free course to build their own course

community, responsibility, IT-Security, more secure Internet, habits, sharing, characters, good habits, bad habits, less stress, be organized, organization, more confidence in Internet, no loss of money, no loss of privacy, no loss of digital identity, digital foot print, good reputation, e-Citizen, Digital Citizen…

.

 

 

.

English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! French (Français): Danger connu est danger vaincu !

.


Introduction to Visual IT-Security

But let us start first with some funny videos who will explain to you also about IT-Security in a visual way…

Video 1: “Weird Al” Yankovic – Virus Alert

.

.


Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.

.

===> Nobody is perfect! <===

Video MALWARE: What is Botnet?.

Check the video below who explains very well about all the malware, you will understand then WHY the need to secure your computer.

.

.

Knowing NOW what is possible and how computers could get misused for Cyberattacks, YOU should realize that it is NOT anymore fiction, but reality!!!

Read ALSO what Eugene KASPERSKY says as on 01 May 2014: “In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.” Read the full article below, please:

 

.


Video Beyond Today: Mikko Hypponen – Zeitgeist 2012

.


Critical Thinking

Some questions to wake you up to critical-thinking, if you permit 😉

Explaining the dangers of infected computers and the dangers to your Government also:

chat icon, speeching people

        • Would you allow a person  entry with contagious disease into your home or institution? An epidemic would be the result!
          • An infected computer is same ===> epidemic danger!
        • You know that when driving your car that you could hit a person by accident!? Do you realize that this could happen also virtually (in Internet) with your computer!? This person’s computer would get also infected and this person would need to repair its computer which would cost money as most people don’t know how to get rid of an infection! Are you aware that YOU are responsible for that!?
  • Are you a good patriot? Would you help to defend your country and Government against attacks? So do so also on Internet! Learn the basics of IT-Security!
  • Do you know that Cyber-Criminals earn more money than others with Drugs?
  • Do YOU know that Cyber-Criminals are better organized as Police and FBI and…?
.

Some important data who should wake you up!

.

Image source

.

[Start] Text from AllThingsDigital (JULY 4, 2012 AT 7:24 AM PT)

If you needed any further evidence about the possibility of an unexpected blowback from the creation of the Stuxnet worm and other cyber-weapons like it, the U.S. Department of Homeland Security has something for your night table, bound to keep you awake.

Earlier this week, it released a 17-page report, embedded below, detailing the activities of the Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT for short. [End]

.

Video: U.S. is under “Cyber Attack”

.

.
Related links:
.
.

Flame Proves Cyber Warfare is ACTIVE

A MUST READ:
.
Flame proves cyberwarfare is active
.

Video E: VOLUTION

Computer crime is getting worse?

  • What three indicators mentioned in the video indicate to you that computer crime is getting worse?
  • What does it mean when someone says “a virus has evolved”??

Check the video to find out…

.
.

Video A Quick Guide To Scary Stuff on the Internet (Part 3)

After watching this video you will be able to answer the following five questions:



.

Ever thought about that your smartphone is also a computer with phone capabilities?

.
.
.
See screenshot below who shows you the Quarter Report 2012 from McAfee and download the PDF document with full report by clicking the image…
.
McAfee Threats Report - First Quarter 2012
.
.

SUMMARY

So, now by having seen the videos above and by having read my questions, did you get more critical-thinking now and do you realize the dangers? You should be aware now a bit. Let us continue now with a bit more explications:

.

community logo

Once your computer is infected because you don’t use an antivirus and a firewall, because you didn’t make the updates of your Operating System, called also “OS” (Windows, Mac, Linux and…), because you didn’t update yourThird Party Applications” and… you will also infect other person’s computer and this NOT ONLY over Internet; see Dangers of Storage Devices.

It could be also possible that your infected computer (even a Mac!) would become part of a so called “Botnet“, a ring of infected computers who will get used to make attacks on other companies and also on Government web sites, even getting used for a Cyber-War, thus meaning:

  • The infrastructure & energy supply of a country (electricity, gaz …) can be interrupted or disrupted through targeted DDoS attacks, as well the communication channels (Radio, TV, Internet and phone connexions …)

.

Additional Questions on Cyber Weapons & Government Attacks

help books logo

          • This sounds strange to me, never heard about Government attacks!?
          • How can it happen that my computer helps attacking Government web sites?
          • I am ONLY connected to Internet, I don’t see how this is possible that my computer is a so called “Cyber-Weapon“, this sounds weird to me!?
          • I have a Mac computer, I don’t worry, I am not concerned! BIG LOL for that, check here http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security and wake up please!

.

As I have multicultural and international readers, so I will present to you videos in different languages, make your choice. You will see also some commercial videos and you will understand ALSO how difficult it is for an IT-Administrator to manage those risks and ALSO the costs of such protections and hopefully you will understand now the IMPORTANCE of IT-Security!


Video DDoS Angriff (Theorie) – German

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


Video Fight Cybercrime with a Fully Integrated Attack Mitigation Plan – English

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


.Video INTERNET: La cyber-criminalité –  French

Video in French.

cyber-crime,cyber-criminalité,Anonymous,l’essentiel,cyber-criminalité expliquée en vidéo,

Check video by clicking the link here or click image: L’Essentiel (LU)

..


IT SECURITY Expert Reports

.

Curation about IT-Security, Cyberwar, Cyber-Warfare,Internet-Safety,Online-Safety,Cyber-Security

itsecurity,cybersecurity,cyberwar,cyberwarfare,curation,internetsafety,onlinesafety,infosec,

.

.
The Costs Of Cybercrime

 

The Costs Of Cyber-Crime: click image
.

Definition of IT Security in simple words

.

computer logoIT-Security means proactive thinking, acting before it happens! Knowing the dangers of Internet and being prepared for them!

.

.

IT-Security is:

  1. Critical-Thinking
  2. Think everytime on worst-case who could happen
  3. Forewarned is Forearmed, stay informed!
.

Additional Readings

.

Attention logoCyber-Attacks on Governments

Read also the news about already known Cyber-Attacks on Government web sites (will get updated as soon as there are new attacks):

.

Cyber-Crime


IT Security, Twitter, & the Use of Hashtags (#)

Twitter logo

As you might have remarked already I use some strange characters in this tutorial such as “#“, that’s a so called “Hashtag” and used on Social Medias such as Twitter and also on Google+.

What are Hashtags?

.
.

Follow me

Gust MEES on Twitter and best Hashtags on Twitter for following news about IT-Security.


share with different persons

.

Other IT‐Security People to Follow on Twitter, my suggestions are:

Special mention to @kevin_corbett https://twitter.com/#!/kevin_corbett who gave me valuable and professional advice about making this blog better for Accessibility and Search Engine Optimization (SEO), as well on Style, thanks a lot Kevin, much appreciated. That’s what I call “Social Media”, one learns from each other 😉 Check out also Kevin’s web site http://kevincorbett.com/, interesting…


Freeware & Commercial Protection Software

gearing

Check here to find best freeware and commercial protection software:

.
.
.

Final Word

===> Share best practices of IT-Security, Internet-Safety, Online-Safety over Social Medias! Stand up and help to make Internet a more secure place, thanks in advance! <===

Best Hashtag for Social Media is #SoMe.

I hope that this small tutorial (course) will have opened your eyes and also your critical-thinking and made you ready to use NOW protection on your computer. As longer you wait, as longer it will take to learn IT-Security! You will need it anyway one day because of Bring Your Own Device (BYOD), so go for it now!

As some of you readers would not know what “Bring Your Own Device” (BYOD) would mean, it is a new way for schools and also for companies who allows people to bring their own computer, smartphone, tablets, and… to the school and/or working place. This is money saving for schools and work places and also more freedom for the owners of the so called “BYOD” as they can install what they want and work (and learn) with their own programs, but… Watch the video please…

.

..

Image showing community

BTW: Did YOU remark that I highlighted the word you? Why? We are living in a society where the word COMMUNITY doesn’t have anymore that IMPORTANCE as it should have! We use the words SOCIAL, SOCIAL MEDIAS… Critical-thinking, sorry… Think on it please, thanks in advance to do so, would be much appreciated and would help to build up a more secure Internet!

PS: Don’t see the above as condescending please, as it isn’t. It’s a reminder to help make the Internet Community stronger, thanks!

.

.

.

blue man pointing to an important textRecommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security


as on Wednesday 06, 2012 @WebrootRescue We’re very happy to be recommended and used by @knolinfos, an #ITsecurity expert & instructor! Our story: http://bit.ly/GRkX6l

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next courses and tutorials 😉

.

 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Ideas for a more secure Internet-part3/Dangers of storage devices

Ideas for a more secure Internet-part3/Dangers of storage devices
.
sharing icon
International Days of security, which already exist and are organized by the European Commission should be more focused on practice, awareness is not enough! There is a need to do more, such as:
.
.
.

The dangers of storage media
.

USB stick, Memory stick iconCaution with the use of backup and/or storage media (USB drives, portable music players, flash cards for cameras, floppy disks, CDs, DVDs…)! Contrary to what most people believe, a computer is not just infectable via an Internet connection, but also through the infected storage media, without being connected to the Internet. Please be careful and also think of these mediums, learn to have the reflex to scan them with the antivirus before using them on the computer. Also can an USB stick start automatically by the “autorun” function of the PC and so execute a malware instantly!

.


Awareness campaigns against such dangers

.

An awareness campaign on safety, especially concerning the awareness of these new dangers should be organized by the Department concerned, with other partners to choose from.
.
How to educate?

.
Mausi and virus attack protection by Gust MEESThe idea is to distribute free USB drives at strategic locations (where there are lots of human trafficking). These sticks, however, must contain a virus, but a harmless virus, it does exist and it is free.

.
In addition it would create a small script that activates the virus from PC connection, opening a window that informs the user that he was infected with a harmless virus and suggesting an internal link to the USB key where the user will be able to read PDF files containing the advice of awareness.
.

It is used only for demonstration and and quite harmless. This way users will certainly become much more vigilant to know the risks associated with storage devices. In addition, prices of memory sticks are on the fall and that investment is quite easy. Otherwise you should apply to the European Community to submit a project and request funding assistance.

.

.

.

Advice:

Bitdefender USB Immunizer is a free and easy to use tool that helps make sure you transfer the files, not the viruses. It disables autorun-related threats before they access the computer.

 

Once installed, it constantly watches for newly inserted USB storage devices and immunizes them on the fly.

.

.
.

.

Recommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.

Stay tuned for next publication…

.

Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Ideas for a more secure Internet-part2/IT-Security Scouts

Ideas for a more secure Internet-part2/IT-Security Scouts
.
Learning IT-Security
.

.
sid2014-anim-banner
.
.
sharing icon
International Days of security, which already exist and are organized by the European Commission should be more focused on practice, awareness is not enough! BTW: although they do a very good job! There is a need to do more, such as:
.



“Security Help Point” and “Security Scout”

.

blueman
.
.
Knowing that there are a lot of computers already infected, we must help these people clean up their computers and show them how to protect …
.

Why not train people loving ICT to become a “Security Scout” and be present by appointment in a café (Pub) and/or other meeting places (school, youth center, multipurpose room, senior club, etc..) which will then have the label “Security Help Point“. This idea I sent to the Ministry of Economy of Luxembourg/CASES project (LU), which I am an official partner, and who found it very interesting, even they are currently developing a project with young people (not in cafés) based on this idea.
.
To ensure quality it is advisable to predefine strict admission criteria to become a “Security Scout“. Everyone must follow a well defined learning, which will be awarded the title of “Junior Security Scout” and “Senior Security Scout” with delivery of a certificate and a badge.


The “Junior Security Scout”

cartoonsquirrelmikesm1

.

.

The “Junior Security Scout” will be trained by a “Senior Security Scout” for the basic knowledge of computer security at home. The knowledge base will be defined as follows:

  • Knowledge about all forms of attacks (viruses, worms, rootkits, trojans, phishing, keyloggers,steganography, spam, hoaxes, rogue anti-malware, XSS, cross-site-scripting, drive-by-download..).
  • Be informed about new attacks.
  • Be informed about new scams (fake antivirus, fake emails, etc..)
  • Knowledge of software and tools for protection, commercial versions and/or free …
  • Knowing the laws regarding software piracy (in practice it’s scary how people use the “hacked“, and worse yet they find it “cool” [I fucked Microsoft, ha, ha, ha].
  • For information about the Laws he can use the “Security Master File“.

.


The role of these “IT-Security Scouts”

.

blueman10701

  • They will guide computer users to ensure safe use of the computer and the Internet.
  • They advise users.
  • For infringement of software, help users to become legitimate.
  • On request they can organize events information security …
  • They can participate in “Safety + IT-Security Days” and support the national team organization.
  • They help users clean up their computers and/or install protection tools.
  • They will help users choose tools to protect free and they will show users how to use it.
  • They relate their experiences in practice to the  “Senior Security Scouts“.
.
Every six months (insecurity is growing very fast …) the “Security Scout” must be evaluated to see that it still meets the quality criteria (be informed), to avoid that someone wants to argue for his title and he does not learn anything … It is imperative that these individuals have very good knowledge …
.

The “Senior Security Scout”

.
blueman20401The “Senior Security Scout” has the same responsibilities as the “Junior Security Scout” except he (she) has more knowledge, he (she) has years of experience in the field of security and it also has the right to exercise training function, e.g. he (she) can be contacted by the common (and others) to give evenings (days) for information on domestic security, and he (she) can also train the “Junior Security Scouts“.
.
.

Senior Security Scouts” report the practical experience to the Department so that they are aware of the current situation on the field.

.

It is also advisable to develop a help file containing documents and tutorials about IT-Security. This file “Security Master File” to be present in each “Security Help Point” to ensure the same quality at each location. That way, if there will be questions we can provide people with correct answers and always the same at any place (quality monitoring).

.


“Security Master File”

.
help-books-aj-svgajash01This folder should contain the following:
.
.
  • Safety data sheets developed by the Department or others having been recognized as being educational.
  • Guidelines for behavior on the Internet and use the computer for use without fear …
  • A list (not exhaustive) list of good links for legal downloads, trustworthy download sites…
  • A list of “FAQ” (Frequently Asked Questions), containing also the legal aspects.
  • A list of laws concerning ICT.
  • A list with links to security tools, free and commercial software…
.

Find information about international IT-Laws

.

help-books-aj-svgajash01

..

.

blueman20401Recommendations from the BIG Players on IT-Security, Cyber-security, Internet-Safety, privacy, Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.

Stay tuned for next publication…

.

Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Ideas for a more secure Internet-part1/National Security Day as a Family Day

Ideas for a more secure Internet-part1/National Security Day as a Family Day
.
Learning IT-Security
.
International Days of security, which already exist and are organized by the European Commission should be more focused on practice, awareness is not enough! BTW: although they do a very good job! It is advisable to organize these days in spring when the weather is nice outside and preferably organize them as a family party, ie:
.

sharing icon

===> These safety  and security days could well be used also for the exchange between generations … <===

.

  • Children in clothes of virus, worm, trojan, etc.. will jump around and try to scare visitors, under supervision of instructors.
    • A special workshop for the creation of these costumes will be arranged with instructors who help and guide children in creatingthe costumes, easy to perform and inexpensive. Here the generation exchange could get made while seniors who still have good knowledge about sewing may help to create these costumes and also showing the kids on How-To
  • Stands with hardware, especially with security software and free software must be present.
    • National Computer Clubs may be there also…
  • Stands with drinks and grilled course, also, this should be a festive family day…
  • Musicians must also be on site and for Luxembourg, the winners of the “Song Contest” Internet rights of children should be involved as well as a booth distributing CDs of winners…
  • A theater piece about security, as explained in my blog (in French) Sécurité PC et Internet / Théâtre Interactif et Pédagogique should also be present…
  • Presentations on safety and security on the big screen should also be presented to the public…
  • Sponsors must be found to cover the costs …
  • Invite as society “Web Of Trust” (WOT) that produces a FREE, comprehensive safety check of websites, based on the community …
  • Create “Scavenger Hunt’s“” using the QR-Code, see example (in English) here:
.
.
Possible partners could be:
.
  • European CommissionThe Antivirus Manufacturers
    • Generation Exchange by SID2102
  • The Ministry of Family
  • The Ministry of Youth
  • Companies who would pay for advertising…
  • Multicultural Associations
  • Banks
.
Related links to learn about IT-Security:
.

..

.

blueman20401Recommendations from the BIG Players on IT-Security, Cyber-security, Internet-Safety, privacy, Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.

Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Get smart with 5 minutes tutorials/IT-Security/Part 6: Ideas for a more secure Internet

Get smart with 5 minutes tutorials/IT-Security/Part 6: Ideas for a more secure Internet

.

Hi,

I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security 😉

.Learning IT-Security

.

What we already learned in Part1 + Part2 + Part3 + Part4 + Part5:

.

The browser, such as: Internet Explorer [IE], Mozilla FirefoxGoogle ChromeSafari + … is the entrance portal for malware. You use your browser to navigate Internet and if your browser and add-ons are not updated they might lead you to a “drive-by-download“; thus meaning you infect your computer by only visiting a web site!!!

.

.

Continuing in the mentality of my 5 min tutorials to get smart for IT-Security https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/ I will present to you more valuable courses and tutorials and some talking about on How-To…

.

As I said it already in a previous blog post, not all tutorials should be technical, so isn’t this one again. It will give you some ideas in general and those ideas will get deepened each other in next 5 min smart tutorials, here below is a short overview…

.

There is a need for following actions, which of course need to be FREE for the whole population:

Check out ALSO (updated on April 7, 2013):

.

Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

 

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,