RSS

Category Archives: Stalking

Specialized Magazines For Apps

Specialized Magazines For Apps

.

Evolution of Education: Wordle Logo

.


Why Is It Important To Read Specialized Magazines?

book-question-markThere are masses of Apps from any kind of Topics and from anywhere around from the world, difficult to know WHAT choice to make, as well as there is also the problem with “Privacy” and “Cyber Security“. Therefore it is important to read the reviews from experts on the field. And there are ALSO people who prefer reading a magazine, than reading online and/or from an eBook. For Apps creators it is important to make Apps known to the public, so it might be good to give the public an overview of YOUR precious work 😉 These specialized magazines have ALSO an online presence…

.


Specialized Magazines For Apps in Europe

Please find below a non-exhaustive list of magazines from different countries:

Germany

France

United Kingdom

 

Switzerland

.

Graphite

 

Click the above image to access the service

 


Magazines For Developpers

Please find below a non-exhaustive list of magazines:

 


Food For Thoughts… Critical Thinking

Chat icon.

As WE discussed already about “Privacy” and “Cyber Securityrisks, so here again, for newcomers and/or as a reminder some articles worth to read:

.

.

There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?

.

Albert-EINSTEIN-Technology-Idiots

Image found on Twitter and edited to hide visages…

.

.

Stay tuned for next blog post(s) 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

.

Evolution of Education: Wordle Logo.


ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

programmerman-animatedGovernment and Education MUST be digital illiterates when NOT accepting that it is time for TEACHing the basics of Cyber-Security! By reading the reports of experts from the professional companies from Cyber-Security protection software, one MUST accept the facts that Cyber-Crime is evolving at a very rapid rate! Cyber-criminals learned How-To trick the users and THEY are inventing every day NEW tricks to trick THEM (US ALL), BUT Education and ALSO the Government are NOT YET ready to counter such actions! 

WE have to ACCEPT that (that are facts!!!)  20% of all malware ever created appeared in 2013 and THAT there are 31.53 % infected computers worldwide!!! That MUST give people a kick for Deep-Thinking! In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day. Check article below, please:

Isn’t it time to introduce in Schools as a MAIN core ===> LEARNing the basics of Cyber-Security <=== as WE are ALL using computers and ===> BYOD <=== (Bring Your Own Device) and actually ALSO using Mobile-LEARNing and e-LEARNing!? WE can’t anymore bury the heads in the sand and NOT wanting to see the problems! THE reality is there and it can’t get fought ONLY by giving the IT-Admin of the school THAT responsibility, that is pure NONSENSE and a Middle Ages mentality, excuse-me, please!

==========> WE are ALL responsible for a secure internet! <==========

.


How Could This Be Realized And Up From Which Age?

programmerman-animatedI suggest to teachInternet-Safetyup from the age of 5 years old and the basics ofCyber-Security to the kids up from the early age, 8 years old! THEY would be able to understand how to get used to reflexes! These reflexes SHOULD get repeated once a week. I suggest the Friday as I started it ages ago already on Social-Media Twitter. It is called the ===> Friday Security Check Day <=== and the Hashtag for it is ===> #FSCD <=== SO, as it is under the age of the terms of use from Twitter, parents need to get involved as well to help THEIR kids to become GOOD “Digital Citizen” and by the same way the parents will learn also and with that COLLABORATION WE are on the winning side to make the internet a more secure place! Everybody will profit from it 😉

======> Safer Internet Day: Children need educating from age of 5, say campaigners <======

Read more:

.

 

Digital-Citizenship-infographic-620x965

Image credit ===> https://magic.piktochart.com/v/49853c8b-b418-406a-b979-0b240ca62352 <===

Check upper corner on right-hand side, there is “Digital Security” mentioned 😉 It should actually be ===> Cyber-Security <===

BUT anyway, it is THE BEST explication I ever have seen about “Digital Citizenship“!!!

 


SO… WHAT’S About Basic Cyber-Security Knowledge NOW As It Is Mentioned As Well!?

programmerman-animated.

That’s actually the easiest part of it, MOST of YOU think that it is the MOST difficult one, BUT it isn’t at ALL 😉 It’s ONLY based on reflexes and a one-time installation of software on YOUR computers (Smartphones included…).  Please check my following blog posts and YOU will see how easy it is:

 

Related articles, YOU might check as well for BETTER understanding (secret TIP):

.

==========> A Proactive-THINKing and Critical-THINKing will get created which is a MUST in a modern, technology driven society!!! <==========

.

YOU should ALSO be interested about ===> Youth Leadership and Students Voice <=== where YOUR students, learners will take themselves the responsibility for THEIR future, check below, please:

. 

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.


 

.

Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,

.

Stay tuned for next blog post(s) 😉

.

.

 
3 Comments

Posted by on March 19, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Facebook, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Quality Courses, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Stalking, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

My Published Articles About Cyber-Security In The Press And Social Media

My Published Articles About Cyber-Security In The Press And Social Media

.

Learning basics of IT-Security and Cyber-Security.


My Published Articles About Cyber-Security In The Press And Social Media

programmerman-animatedBeing online since 1998 I realized very quickly that “Every Medal Has Its Reverse” and ALSO what Physic laws tells us “Where is positive there is also negative and both make 100%” (differently explained). OR, in OTHER words, there is BAD and GOOD people! I realized very quickly that through the internet, in the Virtual-World, the BAD guys have BIG chances to make THE BIG money and by reading a lot of PC-Magazines in English, French and German as well by getting informed through the internet. I learned about Cyber-Security and How-To get protected.

Being a diligent learner and always wanting to share my knowledge with others, I started a website about it (later some more in different languages…) , actually the first (private) one and second in general in my country Luxembourg (Europe). At the time people told me that I am crazy to talk about Cyber-Security, NO ONE was realizing about the impact of virus, trojans, backdoors, DDoS, Scam, and other Cyber-Beasts

NOW, WE have to deal with Cyber-Crime, Cyber-Espionage, Cyber-Attacks, Cyber-War, Cyber-Warfare, Botnets,  Cyber-Hygiene, where OUR computers (Smartphones included…) are part of such BAD actions!!!

SO… Later on (2004), already 13 years ago (in 2017) my FREE courses were available on the server of the “Ministry of Education from Luxembourg” (Europe); the FIRST courses about Cyber-Security and Safer Internet in Luxembourg EDUcation, check screenshot below, please…

.

Gust-MySecureIT

.

In 2004 I became ALSO member of the Advisory-Board from CASES (CYBERWORLD AWARENESS &
SECURITY ENHANCEMENT) and from BEE-SECURE. I won ALSO an National Contest, organized by Education, about Cyber-Security with a Mix-Team (one young [12 years old] woman and a 40 years old woman) in 2004 (February 06, 2004).


February 2004

Together with two young students and my temporary assistant Diane, WE won a national contest themed “Multimedia Poster“, please find below the article in German:


15-06-2004:

I participated on a “JournĂŠe PĂŠdagogique“, organized by “NorTIC” and “eLuxembourg” (Ministry of EDUcation Luxembourg) on 15-06-2004, where I presented my knowledge and my “BEST PracTICEs” with ICT at that time. I had a BIG success with IT! There were ALSO EDUcators, TEACHers present as visitors from different countries to lurk around WHAT is NEW; such as “Robert GOBERT“, WHO wrote a book and mentioned me in it.

Please click on the images to enlarge them.

 

JournĂŠe PĂŠdagogique-HOSINGEN-NorTIC-15-06-2004

ROBERT-GOBERT-GUST MEES-2004-2005

ROBERT-GOBERT-GUST MEES-2004-2005-2

ROBERT-GOBERT-GUST MEES-2004-2005-3

 
..
Links:
.

There were articles published about me from Luxembourg Newspaper “Luxemburger Wort” on 08.05.2006 and on 04.10.2008, where I don’t have any web address, as NOT existing anymore on their server(s), need to find out…

.

Gust MEES-Tageblatt 13.11.2007

The above article (partial view) was published in Luxembourg on “Tageblatt” on 13.11.2007.

.

On March 2008 there was a major infection of a very popular website through a “Cross-Site-Scripting” and the press was reporting about it and posting it ALSO on Social-Media. I replied to them on Social-Media and I got interviewed, whereby my interview was published on March 18, 2008 and later in April 02, 2008 an other article from me followed, see links below, please:

.


In February 23, 2006 I was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

.


Curation and EdTech Tools

13-02-2012

Gust MEES-Scoop.it-21C Tools-13-02-2012

Click the above image, please, to access the article.

In 2011 I started something what was NEW for me, Curation on Scoop.it, and in November 2011 I got interviewed and honored by the title “Lord Of Curation“. It was published on November 30, 2011, check it below, please:

Actually (2014) I am very present on Social-Media with nearly 65k posts on Twitter and I am involved in a lot of Twitter-Chats and conversations on Twitter, through them I meat ALSO online friends and one of them, Doug PETERSON contacted me to make an interview which was published on Doug’s Blog on March 12, 2013, check below, please:

.


5 Excellent Resources for Teaching Students about cyber-Safety

05-08-2013

.

Gust MEES-Educators Technology-InternetSafety-05-08-2013

Please click the image above to access the article.


Ransomware

And again (March 17, 2014) there was an article in the national press (WORT.LU) about Scam, actually about “RansomWare“, which was tweeted over Social-Media Twitter and where I replied to, to give them more and BETTER information about that Topic. I got replied by them that THEY made an Update about it online and ALSO that THEY recommend me, check below, please:

.

WORT-17.03.2014-Recommandation Gust MEES

.

WORT-article-online-Gust MEES-Recommandation-17.03.2014

.


19.03.2015: My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

Blog Selected By Luxemburger Wort-2015

.

.

WORT-Luxembourg-Blogosphere-19-03-2015

Click the image above, please, to access the article.

.


13.03.2015: Recommendations on LinkedIn

Recommendation-Gust MEES-LinkedIn

Click the above image to access the article, please.

..


09.12.2015: My FREE courses about Cyber Security referenced at TU-DRESDEN (Technical University DRESDEN / Germany)

.

TU-DRESDEN-09-12-2015-CyberSecurity-2

Click the above image please to access the article

.

TU-DRESDEN-09-12-2015-CyberSecurity-1

.

Related links:


2016

My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

Blog selected by Luxemburger Wort-2016


Beeing A Pioneer Gets Recognized!

icono_pioneer.

.

As I like challenges, I take part in international competitions for “Good PracTICES” in EDUcation and so did I here, see PIC below please… SO… NOW I am an “Open EDUcation Europa Pioneer“!

.

.

.

OPEN EDUCATION EUROPA 2016-Pioneer-Badge-Gust MEES

Click above image please, to access my blog posts.

.

..


I got mentioned as a reference from the Ministry of EDUcation in Luxembourg

I am feeling very honored for THIS ONE, please check below. It was published on 02-05-2017 in the Newsletter from the Ministry of EDUcation in Luxembourg.

.

Gust MEES-NEWSLETTER-MINISTRY of EDUCATION LUXEMBOURG-02-05-2017

Please click the above image to access the article.

..


I got selected and being part of the “Albert Index” for TOP EdTech Blogs

June 26, 2017

.

Gust MEES-ALBERT.io-03-09-2017

Please click the image to access the article.

.


eReputation and Marketing-Territorial (06-10-2017)

Check the article below, please, to read it (in French).

.

eReputation-Gust MEES-2017

Click the image above, please, to access the article.

.


2018

My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

WORT-blog-2018

.

WORT-2018-Selected Blogs-Blogospere-Gust MEES-Luxembourg

Click the image please to access the article


05-02-2020: 

I got mentioned in Luxembourg’s weekly magazine “revue” for my participation of the #SID2020, “Safer Internet Day 2020“!

.

REVUE-06-2020-SID2020-Gust MEES

.

REVUE-06-2020-SID2020-Gust MEES-2

.


23-07-2020

Through LinkedIn I got contacted from SEEEDSTUDIO asking me for a cooperation concerning their ARDUINO compatible products. I accepted to make a review of the Grove Beginner Kit for Arduino”. Check below please my tutorials:

.


30-06-2021

My blog was selected by FEEDLY as:

GUST_MEES-FEEDLY-2021-5eme-PLACE-Best Digital Literacy Blogs and Websites

Best Digital Literacy Blogs and Websites and is ranked Nr. 5

.


GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

.Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

.

Wordle-Logo-Apps

.


WHAT Are Apps?

[START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphones, tablet computers and other mobile devices. The term “app” is a shortening of the term “application software“. It has become very popular and in 2010 was listed as “Word of the Year” by the American Dialect Society.[2] In 2009, technology columnist David Pogue said that newer smartphones could be nicknamed “app phones” to distinguish them from earlier less-sophisticated smartphones.[3] [END Text from Wikipedia]

.

Apps-usage-2013-infographic

Infographic credit ===> http://fluency21.com/blog/2013/04/21/all-about-apps-infographic/ <===

.

As already mentioned above: “Apps are designed to run on smartphones, etc.” means that they were created, actually programmed by humans and any code has bugs!

First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

.


Creating Apps In Schools For Kids And Parents: WHAT Should WE Be Aware About!?

programmerman-animated

.

Apps are NOT ===> TOYS <===! There are STRICT rules to be followed as mentioned from the ===> U.S. Small Business Administration <===:

12. If you’re dealing with financial data, health data, or kids’ data, make sure you understand applicable standards and regulations

If your app deals with kids’ data, health data, or financial data, ensure you’re complying with relevant rules and regulations, which are more complex. The FTC offers details on the regulations that your business needs to be aware of in the following guides:

.

Find out the complete guidelines here, please:

.

.


Apps And Cyber-Security

Apart from programming errors, there are ALSO the bad boys (Cyber-Criminals) who are creating (programming) Apps to take the control over YOUR devices to earn money with them!

.

easy to hack Apps

Click the image to access the article who explains well in detail.

[START Text from TrendLabsSM 2013 Annual Security Roundup] On the mobile security front, we witnessed the mobile malware and high-risk app volume surpass the 1-million mark as early as September 2013.2. The current volume has, in fact, reached roughly 1.4 million, with 1 million new malicious and high-risk apps found in 2013 alone. [END Text from TrendLabsSM 2013 Annual Security Roundup]

.

Malicious and High-Risk Mobile App Growth, 2013

Image credit ===> http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-cashing-in-on-digital-information.pdf <===

.

Please find the full report of TrendLabsSM 2013 Annual Security Roundup here:

.

state_of_security_2014_11-Apps-hacked

 Click the above image to access the article, please.

.

Apps vulnerabilities

 Click the above image to access the article, please.

.

Click the above video to learn more.

.

Check out ALSO (A MUST to understand) the video below, please, who explains BEST:

.

And ALSO the McAfee LAbs Threats Report Fourth Quarter 2013

.

TOTAL MOBILE MALWARE 2013

TOTAL MOBILE MALWARE 2013

.

.


Good To Know: Who Is Hosting Most Of Malware And Spam?

I am getting asked very often who are the countries who host most of Malware and Spam, check below to find out, please.

.

Location Of Servers Hosting Suspect Content 2013

Location Of Servers Hosting Suspect Content 2013

.

TOP Countries Hosting Phishing And Spam URLs 2013

TOP Countries Hosting Phishing And Spam URLs 2013

.


Third Party App Stores, Avoid Them!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

The main distribution method of malware Apps is still shady apps downloaded via third-party app stores, say the Security experts! Thus meaning: download Apps ONLY from their ORIGIN website, please check below:

.


Smartphones Are Mini Computers With Phone Capability

Chat icon.

.

DON’T forget that Smartphones are Mini-Computers with phone capability and so YOU MUST treat them ALSO! Thus meaning: the same AWARENESS and PROTECTION is necessary as for computers ===> ANY OS & ANY DEVICE <===!

.

.

When Good Technology Goes Bad: Evolution of Mobile Technology

March 2014

Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.

Read more:

.


How To Protect OUR Smartphones?

programmerman2SO, now WE know about the online dangers, BUT How-To protect OUR Smartphones and tablets? Well, there are a lot of professional Security companies who offer protection tools, even as FREEWARE, check links below, please:

.

.


And WHAT About Privacy!?

sharing-iconTalking about Privacy? YES, in some countries Privacy isn’t really (not yet) a matter, BUT in EUROPE WE fight for OUR human right about PRIVACY! When WE work together with children WE need to take care about the DATA which is used from the kids in EDUCATION and ALSO, especially, the private data who is shared through the different APPS! MOST of people don’t even know about the word “Permissions” when THEY install APPS on their devices, and that is very BAD!

People expose so THEIR complete ONLINE LIFE (which is ALSO their private life in Real-World…) on the internet! This is THEIR “Digital Footprint” who is used by commercials to address them tailored advertising and ALSO, the MOST important, it is THEIR resume for future employers! OUR “Digital Footprint” will replace the resume in the future (even NOW already…) where employers find out what WE deed over years and SO can make a profile over their future (OR NOT) employees!

.

“When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.

“App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they’re free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.

.

Read more:

.

.

.

Apps Security and Privacy

Infographic credit ===> http://go.pronq.com/fortifymobile <===

.

Read more below, please, a MUST for understanding:

.


Are There Existing Tools To Let Me Know Which Apps I Should Be Cautious?

YES, there are FREE online tools where YOU get instant transparency while you’re using Apps on the Web or Facebook, such as App Advisor, who helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.

.

Farmville and Privacy

Click this link ===> App Advisor <===

.


Sounds like a lot of RESPONSIBILITY, isn’t it?

sharing-icon

.

The word RESPONSIBILITY, oh YES, do YOU still know what it means? Internet shows us all again that WE are ALL responsible about OUR actions, interactions with other people, same actually as in the REAL-WORLD 😉

.


Think For More…

DON’T forget about tools (Apps) ===> THEY are ONLY as good as the person who uses them and knows ALSO which tool to use for a specific task! <===

Deep-THINKing: DON’T use a screwdriver to hit nails 😉 Thus meaning: YOUR Professional Development needs to be Up-To-Date to know which tool to use and when to use it for a quality course!

.


Some Critical Thinking: Do I really need an app to do that?

Chat icon

.

There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?

.

.

Albert-EINSTEIN-Technology-Idiots

Image found on Twitter and edited to hide visages…

..


THE MUST HAVE Apps

Here below my non-exhaustive list of MUST-HAVE Apps:

.

And as WE know that the NSA is spying around (Cyberespionage) it would be a good idea to look for companies located in Europe instead in the USA for stocking OUR DATA! Check below for possibilities:

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Keywords as a reminder for me to create this blog post: Privacy, Mobile-Security, Cyber-Security, Nobody-Is-Perfect, Bugs, Malware, Threat Report 2013, Mobile-Malware on the rise, FREE protection software and Apps, Privacy settings and awareness, Digital Citizen, Mobile Botnet, Curation links, Infographics, stress, too many Apps, do I really need an app to do that? Right use of tools, Third Party App Stores,

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Privacy In The Digital World-SHOULDN’T We Talk About It!?

Privacy In The Digital World-SHOULDN’T We Talk About It!?

.

Evolution of Education: Wordle Logo


Privacy In The Digital World-A MUST To Talk About It!

.

Chat icon.

Since Edward SNOWDEN‘s revelations nearly everybody knows about the word “Privacy“, even those WHO were NOT interested about it, as it was worldwide broadcasted! This person did reveal WHAT is really happening in the so called “Virtual-World” (the internet) and how much secret services around the world are interested about to grab ANY information about ANY person WHO is online! BUT, it’s NOT ONLY them, ALSO Cyber-Criminals are looking for these information! And ALSO commercials who find out YOUR psychological profile through YOUR behavior on Social-Media!

.

Start Text from The Guardian:

The UN general assembly unanimously voted last week to adopt a resolution, introduced by Germany and Brazil, stating that “the same rights that people have offline must also be protected online, including the right to privacy”. Brazil’s president, Dilma Rousseff, and the German chancellor, Angela Merkel , were among those spied on, according to the documents leaked by Snowden.

===> The resolution called on the 193 UN member states “to review their procedures, practices and legislation regarding the surveillance of communications, their interception and collection of personal data, with a view to upholding the right to privacy of all their obligations under international human rights law”. It also directed Pillay to publish a report on the protection and promotion of privacy “in the context of domestic and extraterritorial surveillance … including on a mass scale”. <===

She told Berners-Lee that it was “very important that governments now want to discuss the matters of mass surveillance and right to privacy in a serious way”.

Read the full article here:

.

.

The Future Of Advertising (Cartoon)

Image credit ===>  http://tomfishburne.com/2014/01/internet-of-things.html <===

.

Der Nutzer wird entmĂźndigt-CES2015

Click the above image, please, to access the article ===> A MUST READ!!! <===

.

Check ALSO the videos below, watch and listen carefully to it…

.

.


.

.


.

.

Check below the resources to find out more, please:

.

Google Glass PrivacyBUT is THAT all why I created this blog!? Certainly NOT, there is much more behind, mostly hidden by its creators BUT WHAT MUST get said to tell YOU to stay aware about WHAT YOU are publishing and on what you are get tracked in the “Virtual-World“, such as:

===> Critical-THINKing: are WE creating a “Stalking-Society”!? <===

.

. .


WHAT do the above mentioned articles really mean!?

sharing-iconWHEN WE are online WE are transparent already as website owners are using OUR data for commercial purposes and with posting more about OUR private life, especially on Social-Media (Twitter, Facebook and…) WE give THEM even more information about ourselves!

.

.

..

Network Hacking May Lead to Bigger Problems

[START Text from links below] While social networks don’t have your bank account information or credit card number, they may provide enough personal data for hackers to answer security questions on other sites. If you use the same password for your Facebook as your PayPal or Amazon login, hackers could then take control of these accounts. [END Text from  links below]

.   Check out also:

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01.

ALSO commercials who find out YOUR psychological profile through YOUR behavior on Social-Media!  Check the articles below:

. .


THE danger with photos on the internet

. .

.

Check also:

.


Phishing, Spear-Phishing through Privacy sharing

.

I don’t talk too much about it, BUT check the video below and YOU SHOULD understand

.

.

.

Related links:

.


Do WE Still Have Privacy Rights In The Digital World!?

1ibdy1vf6wghd-n05dgl-aigainformation1According to latest press releases: Based on internal NSA documents, Der Spiegel reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. 

Check:

.

Check YOUR PRIVACY ===> Clueful   –   Privacy Monitoring App for iPhone & Android

.

This blog will get updated as soon as I get new information and certain Topics, such as Google Glass, Skype in Global Education and Google+ Hangouts in Global Education will get updated and described later…

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

My personal reminder keywords for creating this blog: Cyber-Security and privacy ===> Phishing, Kettenbriefe, chain letters, IBM, psychological profile, ads used by knowing psychological profile on Social Media, NSA, PRISM, GHCQ, HTML5, Apps, Google Glass, Skype, Google+ Hangouts, Laws in different countries, global EDUcation, smartphones, photos, GeoTagging, Google Latitude, Google’s Location History, WiFi, Foursquare, Klout… … . . . . ..

.

Stay tuned for next blogs 😉 .

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

THE missing link in Cyber-Security-THE user!

THE missing link in Cyber-Security-THE user!

.Learning basics of IT-Security and Cyber-Security

.


WHO is THE user who’s NOT in the interest of Cyber-Security programs BUT WHO is THE most important!?

.

programmerman-animatedTHIS is a question which I have for more than 12 years in my memory and WHICH I didn’t have the courage to speak out loudly! BUT NOW I do, let’s go. I have followed ALL possible actions from Governments worldwide and Europe actions and participated ALSO as an individual, as an individual who is involved in advisory boards from the Luxembourg Government, such as:

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

I am NOT complaining about WHAT those organisations made, which is very “THUMBS UP“, BUT it isn’t enough, sorry! WE forgot ALL to bring in the daily “USER”!!! The “daily users” are people like moms, seniors and adults! That is the part of the population who are out of school since very long, BUT THEY also need to get educated about Cyber-Security and Internet-Safety, THEY are ALSO “Digital Citizens“! There ===> MUST be <=== special programs created for that part of the population!

.

In my country Luxembourg (Europe) WE start such a program this year through BEESECURE (co funded by the European Union), check below, please…

.

BEE-SECURE_Seniors-2014

Get the PDF document (in French and English) here ===> https://www.bee-secure.lu/sites/default/files/BEE%20SECURE%20Annual%20Public%20Report%202013.pdf <===

.

With the internet WE are going ===> global <=== and that is WHY I want to share such good practices with YOU 😉 One can learn from each other to make this place (internet)  more secure! Together WE stand STRONG!

.

Keywords (as a reminder for me) to create this blog post: adults, seniors, NO courses for adults, for seniors about Cybersecurity, EU, Europe, privacy, America NR.1 in  Spam

.

Stay tuned for next blog post(s) 😉

.

.

 
2 Comments

Posted by on November 20, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Creativity, Critical Thinking, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Courses, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Social Media, Spam, Stalking, Students 21st Century Survival Guide, Sustainability, Technology Integration, Third Party Applications, Tutorials, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security is easy / Get THE right reflexes!

Cyber-Security is easy / Get THE right reflexes!

.

Learning basics of IT-Security and Cyber-Security

.


Cyber-Security is easy / Get THE right reflexes!

Strange title isn’t it!? I am talking about reflexes, WHAT has THAT to do with Cyber-Security? A lot, actually even THE most when well applied! WE learned already in previous blogs WHY WE need protection ===> Learning the basics of Cyber-Security <=== and ALSO How To get BEST protection with mostly FREE software ===> Cyber-Security Practice: Learn it in one week <===, BUT is THAT enough?

===> NOT everything is automated, so it needs a human interaction, THE missing factor in previous posts which WE will discuss here in this blog. <===

.


1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

===> There is some THEORY below, if YOU don’t want to read it switch to next chapter! BUT, it might be good to take the time one day to learn it as it is important to understand the WHY! <===

FYI: Brown text is THEORY, explications…

.


Let’s first decide what Cyber-Security is!

Chat iconFirst of ALL: let us make one point clear! A Security by 100% doesn’t exist as ===> The weakest link in a security chain is the human! <=== and Nobody Is Perfect! The developed software ALSO is created by humans, so…! BUT, WE can learn to get a maximum of knowledge about Cyber-Security and protection as well, step by step! As more people have THAT knowledge and installed protection on any device and on any OS, as more secure the internet will be!

BUT, let us come back to Cyber-Security in general, WHAT is Cyber-Security? There are so many information on the internet about Cyber-Security, BUT none explains in depth with simple words WHAT it is! A lot of confusion for people who want to learn about it!

In fact it is everything WE should know for avoiding malicious actions WHO can get used to bring in danger a Government, Companies and ALSO private persons! And that is a lot WHO can get brought into that topic and should also be! WE should get used to ONLY one word ===> Cyber-Security <=== where by the following SHOULD be included, as they ALL are related to it, especially ALSO the human behavior:

.


The PracTICE / How To Get The Right Reflexes To Stay Secure?

programmerman-animated

          • First of ALL, check my blog ===> Cyber-Security Practice: Learn it in one week <=== and follow ALL the steps.
          • Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
  • On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
  • Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,

.

Stay tuned for next blog post(s) 😉

.

.

 
11 Comments

Posted by on October 27, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Europe, For a Better World, Free courses, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Social Media, Spam, Stalking, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tracing, Tutorials, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security Blogs To Follow

Cyber-Security Blogs To Follow

.

Learning basics of IT-Security and Cyber-Security.


WHY Should I Follow Security Blogs?

.

Chat iconWHY SHOULD WE follow Security and Cyber-Security blogs as well, when using Twitter, following some great Cyber-Security experts!?

Well, I will give YOU a question back: WHY should YOU read newspapers? It is as simple as that, WE need the information about WHAT is going on in the world and also WHAT is going on in the Virtual-World as both worlds, the Real-World and the Virtual-World (Internet), are influencing each other!

.

.

===> DON’T forget, in the word ICT is the letter “I“, which means “Information“, use it. <===

WHEN working with any technical device, especially with devices who are connecting to the internet, it is crucial to have some basic knowledge of Cyber-Security! Whether theses devices are mobile (smartphones, iPhone, iPad, Android, tablets…) or desktop units, YOU need to know How To get protected on a maximum and ALSO about WHEN there are NEW threads around, new scams, new updates, new privacy dangers, new security risks, new valuable tips and tricks to stay secure!

Thankfully, there are many experts in the field of Cyber-Security and Education who do this for us and share their knowledge online. SO… By reading those blogs and following ALSO those experts on Social-Media Twitter, YOU will learn slowly but surely about how to stay best protected and also what are the news where YOU need to be aware about! First step is ===> AWARENESS <===.


book-question-markNext step is to know how WE could get BEST protection and mostly for FREE:

WE need ALSO to get OUR daily stream of news, YES, I said daily stream of news as the Virtual-World is moving very quickly and WE need to be informed about WHAT is going on. A hard task indeed, BUT a MUST!!! Like everything else it is the beginning who is the most hardest, BUT once used to it it will just become a normal daily task, believe me 😉

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. -Aristotle <===

.

So, here below my selection of blogs from Cyber-Security experts, which I believe, are the most valuable ones which YOU should follow. These experts write on a style who is easily to understand and I learned a lot myself from them:

.

Graham CLULEY Blog

Graham CLULEY Blog

 

Naked Security (Sophos)

Naked Security Blog (Sophos)

Brian KREBS Blog

Brian KREBS Blog

F-Secure Blog

F-Secure Blog

SOFTPEDIA Security News

Softpedia Security News Blog

ZDNET

ZDNET

SCMAGAZINE

SCMAGAZINE Blog

arstechnica

arstechnica

PCWorld SECURITY

PCWorld

BBC Cyber-Security News

BBC Cybersecurity News

The Guardian

The Guardian

ITespresso (DE)

ITespresso (DE)

SECURELIST (KASPERSKY BLOG)

Securelist (KASPERSKY BLOG)

SILICON (FR)

SILICON (FR)

ZATAZ (FR)

ZATAZ (FR)

McAfee Labs Blog

McAfee Blog

.
sharing-iconThe above blogs are the blogs which I recommend as it is easy to understand them, that’s the ones I check first to understand as quick as possible what’s going on and to share my new acquired knowledge with others! Of course I use ALSO different OTHER sources for deeper learning, BUT that’s the sources from where one can grab information on the fly
.
.

As in a modern world WE use ALSO Social-Media, especially Twitter, I recommend the following people to follow:

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:

21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
.

Stay tuned for next blogs 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Smartphone pictures pose privacy risks

Smartphone pictures pose privacy risks

.

Evolution of Education: Wordle Logo

..
.


.

SID2014

SID2014

.


Did You Know: You and your kids could get easily tracked!

.

Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data of any device who is getting used to take photos!

.

.

.


Keep It Private Till Everything Is Checked In Depth

.

What YOU should know:

    • Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
    • Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
    • WHAT is Geotagging?

.

.


How To Remove The GPS Tracking Of Photos

The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:

Another trick is, while using PhotoScape, to remove the EXIF information and any other information, see screenshot below.

.

PhotoScape settings for privacy

.

Camera information – Exchangeable image file format (Exif)

.

Stay tuned for next blogs ;)

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

PracTICE: Using Blogs For Home Work To Get ICT Skills and Creativity

PracTICE: Using Blogs For Home Work To Get ICT Skills and Creativity

.

Evolution of Education: Wordle Logo

.

This is the second blog about “Blogging” and in the first one ===> PracTICE: Using Blogs for Critical Thinking and Proactive Thinking <=== WE were talking about WHAT would be the BEST way to introduce the students (learners) to blogging. NOW, lets go for a practical example where the teachers (educators) tell the students (learners) to create a blog on a specific topic. It should be a topic WHERE there will be a lot of engagement from the students and from WHAT they would get a maximum out of ICT SKILLS, creativity, use of the technology (camera, smartphone, photo camera…), Social Media knowledge, communication, Social Learning, preparation knowledge, privacy knowledge (not publishing blog…), working in a team, collaboration

.

SO… WHAT could that be for a topic? Well, I think that something everybody could do is to write a blog about WHAT any single person makes probably different, ===> WHAT are WE eating at home? <===

sharing-iconOf course, if someone of YOUR students (learners) OR parents don’t WANT and allow to use that topic, leave it FREE to them to chose another topic! Make sure ALSO that the parents sign a paper that they agree with such an action as it goes into PRIVACY!

Other possibilities could be: pet, sport activities, reading (my books…), games (games which I play…), my hobbies (some have more than one hobby…), my friends hobbies… Talk to YOUR responsible psychological person in YOUR school, in case if YOU have kids with problems to find out WHAT could be the BEST way to get THEM also ===> engaged in that learning process <===

.

OR perhaps about an excursion which YOU made with the students, I recommend to visit my following blog to find out about the possibilities:

.

Have a look below, please, how this could look. I prepared myself a blog about what’s served on a table in Luxembourg (Europe), to give YOU an idea:

.

Depending in which country and/or state YOU are living, this could cause problems as well because of social status and privacy and certain parents wouldn’t allow such actions (NO one needs to know what’s happening in our family…)… Feel FREE to prepare a form which YOU handle out to the parents to hear THEIR opinion about it and tell THEM that THEIR kids (students, learners) are NOT forced to apply to it and could use another topic as already mentioned above… YOU will NEVER get a 100% agreement, BUT YOU could make the project a worth way to create together a project THAT shows the different ways HOW people THINK and HOW to show THAT it is STILL possible to create a COMMON project WHERE people are working together!

YOU will face the problems of REALITY from the REAL-WORLD by using the possibilities of the VIRTUAL-WORLD and YOU will be able to discuss these problems as well with YOUR students (learners) ===> Critical-Thinking and Proactive-Thinking… <=== Do YOU have this courage!???

Explain THEM also WHY it would be a good idea to agree to that project because of:

  • Students would work together to exchange about life, about the REAL-WORLD…
  • Students will learn from each other about different ways of life…
  • Students will learn how to use their smartphones and how to blog, learning about Social Media, blogging, getting 21st Century skills, how to combine smartphones, tablets, using THEIR creativity, working in a team, how to edit and correct photos for BETTER quality
  • Students will learn how to stay private while using blogs, securing their privacy so, because the teacher (educator) WILL FIRST HAVE A LOOK ON IT AND GIVE ADVICE before publishing the final version…
  • Students will learn to accept each other whatever their social status is…
  • Students prepare first THEIR own blog and than later a selection of the photos from each student will get used on THE COMMON COMMUNITY BLOG, where the students write also THEIR experience to document it…

.


The needed Tools And Services-The Preparation

.

ruotadentata2architet01First of all, WE need a FREE blogging service. I recommend WordPress as it is very easy to use and as it allows the students to chose from a variety of templates, so each student could use its own template to show its creativity. Then WE need ALSO an easy to use and a multi-platform (any OS compatible) PHOTO-EDITOR, where I recommend PHOTOSCAPE for Windows users ONLY, and GIMP (Windows, Linux, Mac) see below the links:

.


Keep It Private Till Everything Is Checked In Depth

.

Private publishing in WordPress.

.

As already mentioned above, students blogs should get kept private, WordPress offers this (check left hand screenshot) till the teacher(s) checked them in depth to make sure that their isn’t any privacy problem such as:

                    • Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
                    • Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
                    • WHAT is Geotagging?

.

.

.

.

Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data!

.

.


How To Remove The GPS Tracking Of Photos

The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:

Another trick is, while using PhotoScape, to remove the EXIF information and any other information, see screenshot below.

.

PhotoScape settings for privacy

.

Camera information – Exchangeable image file format (Exif)

.


Useful Tips For Creating Blogs

.

book-question-markTo make sure for NOT loosing the topic of the created blog(s), I suggest to add at the bottom some reminder, the keywords which explain about WHAT the blog should be and ALSO the guideline for the students (learners), as shown below.

.

===> create blogs private, teacher checks blog & discusses with learners in a group, photos will get later ALL published in one blog as a TEAM blog, blog will get used with other students on a global view, like Skype, global exchange of habits to know each one better, social global approach… <===

.

This blog was created to make YOU THINK, to know about possible problems, to make YOU Critical-THINKing persons and Proactive-THINKing persons, use it as such, please 😉

.

Stay tuned for next blogs 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,