Blog posts about Education, CyberSecurity, Digital Citizenship, Privacy, InternetSafety, curation, PKM, PLN, blogging, Global Collaboration, Coaching, Collaboration, eSkills, eLeadership, Coding, MakerED, MakerSpace, Social Media, How to learn, learning to learn
Are YOU aware of the dangers of WiFi on public places? YOU should!
.
.
Protect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
Click the above image, please, to access the video explaining in detail.
.
.
128
.
.
As learned already now from the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
.
A public, non secured WiFi Access can intercept all of our internet traffic…
With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (passwords) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
.
Read here the full article who explains very well:
So how can we protect us against those threats (MAC and Windows and Linux)???
By using a public WiFi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway.
.
.
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:
Get behind the SHIELD! 100% FREE!
Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
Protect yourself from identity theft online.
Hide your IP address for your privacy online.
Access all content privately without censorship; bypass firewalls.
Protect yourself from snoopers at WiFi hotspots, hotels, airports, corporate offices.
Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)
Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.
Any device connecting to public WiFi could get sniffed, even Smartphones, so use DroidSheep Guard to secure your Facebook, eBay, Twitter, LinkedIn etc accounts from “Man In The Middle” attacks on public WiFi!
Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).....
Why (And How) Teachers Should Start Learning and Teaching Cyber-Security
.
What should get be taught and learned more in the 21st Century while using ICT?
.
…
.
.
Being online since 1998 and giving courses aboutICT more than 10 years the practiceand my online excursions show me that IT-Security (basics of Cyber-Security) and Internet-Safety are not yet taught enough. SeriouslyI think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉
In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!
The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…
===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===
HOW COULD THAT BE IN PRACTICE???
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
5 Minds For The Future (Howard GARDNER) to understand what the world needs for abilities from students in 21st Century…
The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:
A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.
Seriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from the early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and Smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!
So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot…) and here are my propositions and advice:
Apart from teaching the basics of Cyber-Security in schoolsby traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:
I created a detailed blog about “Bring Your Own Device” (BYOD) who explains the Dangers, Risks, Policy, Advantages and ALSO Awareness for Cyber-Security on following address (READ IT!):
Internet-Safety ALONE isn’t anymore enough to teach in schools! By having read the above and understood it, YOU should admit that Internet-Safetyand basic knowledge ofCyber-SecurityTOGETHER are a MUST to teach in schools!
.
.
.
PS: Give your brain a kick and start thinking on how yourselves can contribute for a more secure Internet, the solutions are described here in this blog 😉
.
===> We are ALL responsible for a more secure Internet! <===
Some wise words:
With realization of one’s own potential and self-confidence in one’s ability, one can build a better world. Dalai Lama
By developing a sense of concern for others’ well-being, then no matter what others’ attitudes are, you can keep inner peace. Dalai Lama
.
.
.
===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===
Lots of Schools are using BYOD ===> Cyber-Security is a MUST then!
…
When schools, Colleges and Universities are facing a Downtime due to Malware, so are the courses online NOT available, nor can the learners, students access the necessary educational stuff for their learning, communication and sharing! This is a lost of time ===>
.
Under construction…
.
.
EdTech versus ICT?
.
.
.
.
Tonight on April 29, 2013 there will be a Twitter-Chat about this TOPIC which I will (hopefully) follow as it is at 8 pm, which means at 02:00 am in my country and it’s running 1 hour!
.
It looks like there is a big problem between the IT-department in schools and the Teachers as in some institutions Social Media is forbidden and a lot of restrictions to resources are made, which is certainly NOT a big pleasure for the educators, nor for the learners! AND it doesn’t reflect 21st Century Mentality at ALL!
Lots of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:
I created a very easy to follow plan on how schools could make Cyber-Security (IT-Security) much more easy for the IT-Admin when it would get followed; BUT the IT-AdminSHOULD try to make it aREFLEX on any FRIDAYthus to remind people of the Security-Task! That’s why I created on Twitter the #Hashtag ===> #FSCD <=== which means “Friday Security Check Day“!!!
Infographics, Videos and Curation as a pedagogical help for Learning
.
Over the years I have collected and curated a lot of Infographics and videos about IT-Security, Cyber-Security, Internet-Safety, Online-safety, eSafety, eCitizen, Digital Citizen, Digital CitizenShip which are a great way for learners, students to learn on a very quick way, you may check the resources here:
Me profiting from when I help other people, it is me who gives something and not the other person???” Such may be your thinking, but…There are new ways in Psychology who are describing this very well such as:
Barbara FREDRICKSON: Her main work is related to her broaden-and-build theory of positive emotions, which suggests that positive emotions lead to novel, expansive, or exploratory behavior, and that, over time, these actions lead to meaningful, long-term resources such as knowledge and social relationships.
.
When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.
.
===> SO, don’t forget please, to share this blog with others! WE are ALL responsible for a more secure Internet! <===
.
.
.
Final Word
If this blog makes you think and your grey cells are getting activated, so that your filter situated between your two ears (your brain) starts to get more activities as usual, than the author is very happy. Thus meaning that my message(s) made move something. Feel free to leave a constructive message…
.
..
.
.
.
===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Learning IT-Security,e-Learning,m-Learning,Bring Your Own Device, BYOD,Cyberwar,Cyber-Warfare,Cyber-Weapon,Cyber-Crime
MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET
.
For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. Why a computer could become a possible Cyber-Weapon who is attacking web sites and perhaps also your Government’s web-sites!
.
.
.
.
Check the map below to see in real time DDoS attacks, attacks made with infected computers!
.
Click image map to see in real time the DDoS attacks!
.
Check ALSO my blog below, who shows you more interactive maps:
Why a computer is in danger to get a virus, trojan, and other malware infections.
Why a computer could become a possible Cyber‐Weapon who is attacking web‐sites and perhaps also your Government’s web‐sites!
Note: by reading ONLY the bold text you will get the most important information, in case that you would like to read it on a fast way because of lack of time…
.
===> This blog contains a lot of information, so I advice you to bookmark and read it carefully as on your convenience, take your time please. <===
Keywords for learners and especially for teachers and educators who want to use this free course to build their own course
community, responsibility, IT-Security, more secure Internet, habits, sharing, characters, good habits, bad habits, less stress, be organized, organization, more confidence in Internet, no loss of money, no loss of privacy, no loss of digital identity, digital foot print, good reputation, e-Citizen, Digital Citizen…
.
.
English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! French (Français): Danger connu est danger vaincu !
.
Introduction to Visual IT-Security
But let us start first with some funny videos who will explain to you also about IT-Security in a visual way…
Video 1: “Weird Al” Yankovic – Virus Alert
.
.
Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.
.
===> Nobody is perfect! <===
Video MALWARE: What is Botnet?.
Check the video below who explains very well about all the malware, you will understand then WHY the need to secure your computer.
.
.
Knowing NOW what is possible and how computers could get misused for Cyberattacks, YOU should realize that it is NOT anymore fiction, but reality!!!
Read ALSO what Eugene KASPERSKY says as on 01 May 2014: “In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.” Read the full article below, please:
Video Beyond Today: Mikko Hypponen – Zeitgeist 2012
.
Critical Thinking
Some questions to wake you up to critical-thinking, if you permit 😉
Explaining the dangers of infected computers and the dangers to your Government also:
Would you allow a person entry with contagious disease into your home or institution? An epidemic would be the result!
An infected computer is same ===> epidemic danger!
You know that when driving your car that you could hit a person by accident!? Do you realize that this could happen also virtually (in Internet) with your computer!? This person’s computer would get also infected and this person would need to repair its computer which would cost money as most people don’t know how to get rid of an infection! Are you aware that YOU are responsible for that!?
Are you a good patriot? Would you help to defend your country and Government against attacks? So do so also on Internet! Learn the basics of IT-Security!
Do you know that Cyber-Criminals earn more money than others with Drugs?
Do YOU know that Cyber-Criminals are better organized as Police and FBI and…?
If you needed any further evidence about the possibility of an unexpected blowback from the creation of the Stuxnet worm and other cyber-weapons like it, the U.S. Department of Homeland Security has something for your night table, bound to keep you awake.
Earlier this week, it released a 17-page report, embedded below, detailing the activities of the Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT for short. [End]
So, now by having seen the videos above and by having read my questions, did you get more critical-thinking now and do yourealize the dangers? You should be aware now a bit. Let us continue now with a bit more explications:
.
Once your computer is infected because you don’t use an antivirus and a firewall, because you didn’t make the updates of your Operating System, called also “OS” (Windows, Mac, Linux and…), because you didn’t update your “Third Party Applications” and… you will also infect other person’s computer and this NOT ONLY over Internet; see Dangers of Storage Devices.
It could be also possible that your infected computer (even a Mac!) would become part of a so called “Botnet“, a ring of infected computers who will get used to make attacks on other companies and also on Government web sites, even getting used for a Cyber-War, thus meaning:
The infrastructure & energy supply of a country (electricity, gaz …) can be interrupted or disrupted through targeted DDoS attacks, as well the communication channels (Radio, TV, Internet and phone connexions …)
.
Additional Questions on Cyber Weapons & Government Attacks
This sounds strange to me, never heard about Government attacks!?
How can it happen that my computer helps attacking Government web sites?
I am ONLY connected to Internet, I don’t see how this is possible that my computer is a so called “Cyber-Weapon“, this sounds weird to me!?
As I have multicultural and international readers, so I will present to you videos in different languages, make your choice. You will see also some commercial videos and you will understand ALSO how difficult it is for an IT-Administrator to manage those risks and ALSO the costs of such protections and hopefully you will understand now the IMPORTANCE of IT-Security!
Video DDoS Angriff (Theorie) – German
What is a DDoS attack & how can it be mitigated? Check video to find out…
.
Video Fight Cybercrime with a Fully Integrated Attack Mitigation Plan – English
What is a DDoS attack & how can it be mitigated? Check video to find out…
.
.Video INTERNET: La cyber-criminalité – French
cyber-crime,cyber-criminalité,Anonymous,l’essentiel,cyber-criminalité expliquée en vidéo,
Check video by clicking the link here or click image: L’Essentiel (LU)
As you might have remarked already I use some strange characters in this tutorial such as “#“, that’s a so called “Hashtag” and used on Social Medias such as Twitter and also on Google+.
Special mention to @kevin_corbett https://twitter.com/#!/kevin_corbettwho gave me valuable and professional advice about making this blog better for Accessibility and Search Engine Optimization (SEO), as well on Style, thanks a lot Kevin, much appreciated. That’s what I call “Social Media”, one learns from each other 😉 Check out also Kevin’s web site http://kevincorbett.com/, interesting…
Freeware & Commercial Protection Software
Check here to find best freeware and commercial protection software:
===> Share best practices of IT-Security, Internet-Safety, Online-Safety over Social Medias! Stand up and help to make Internet a more secure place, thanks in advance! <===
Best Hashtag for Social Media is #SoMe.
I hope that this small tutorial (course) will have opened your eyes and also your critical-thinking and made you ready to use NOW protection on your computer. As longer you wait, as longer it will take to learn IT-Security! You will need it anyway one day because of Bring Your Own Device (BYOD), so go for it now!
As some of you readers would not know what “Bring Your Own Device” (BYOD) would mean, it is a new way for schools and also for companies who allows people to bring their own computer, smartphone, tablets, and… to the school and/or working place. This is money saving for schools and work places and also more freedom for the owners of the so called “BYOD” as they can install what they want and work (and learn) with their own programs, but… Watch the video please…
.
..
BTW: Did YOU remark that I highlighted the word you? Why? We are living in a society where the word COMMUNITY doesn’t have anymore that IMPORTANCE as it should have! We use the words SOCIAL, SOCIAL MEDIAS… Critical-thinking, sorry… Think on it please, thanks in advance to do so, would be much appreciated and would help to build up a more secure Internet!
PS: Don’t see the above as condescending please, as it isn’t. It’s a reminder to help make the Internet Community stronger, thanks!
.
.
.
Recommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:
Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…..
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security 😉
.
.
.
.
What we already learned in Part1 + Part2 + Part3 + Part4:
.
The browser, such as: Internet Explorer [IE], Mozilla Firefox, Google Chrome, Safari + … is the entrance portal for malware. You use your browser to navigate Internet and if your browser and add-ons are not updated they might lead you to a “drive-by-download“; thus meaning you infect your computerby only visiting a web site!!!
Very important and what most of people don’t know and don’t realize:
Any installed software on your computer must be updated as older versions might have a vulnerability who could get exploited by the bad guys to take control over your computer!
Not every web site you are visiting and/or who you find in the search results of search Engines are trustworthy and/or secure!
===> You can ALSO infect your computer without being connected to Internet! Any connected USB and other storage device (CD, DVD, Flash-Cards, Floppy Disk…) who is infected will also infect your computer if not protected!!! <===
Not ONLY the reflexes to stay secure as told worldwide by organisations and Education do help for a secure Internet, Internet-Safety tips are a NEED, for sure but there is more: the NEED to secure the computers!
.
Let’s go for part 5: Not Only Internet-Safety/ALSO IT-Security!
.
A bit of theory. If you don’t like, switch to first screenshot shown below to start straight of for practice. But it might be good (important) to know that theory, take your time, please 😉
.
And don’t forget this reminder, please!
.
What you MUST KNOW!
Automatic Windows Update must be enabled
Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)?Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programshttps://secunia.com/
Browsers (ALL) need to get updated!
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
.
Not any tutorial should be technological but also based on life experience… The practice lived…
Today, in this 5 minutes tutorial we will ONLY talk a bit, no technical advice for change. This is necessary sometimes…
The author Gust MEES is online since 1998 and was given courses toadult people, seniors and youth, helping women to find a job again and preparing them to have necessary ICT knowledge to get a job in an office, primary school classes as also to teachers in primary schoolmore than 8 years long and this on an 8 hours a day and this alone…
..
Normal classes were 10 people with different ages from 16-79 (10 computers) and with primary schools and teachers it was 20 people (2 persons per computer), where he gave the learners also the opportunity to bring their computers and Laptops to the learning place.
.
People who wished so could also have checked their computers and Laptops for security issues and I cleaned those devices from malware and I installed FREE security programs on those computers. After a few days people came back and I taught them about the security issues (screenshots provided with a report in their language [FR, DE, EN]) and showed them how to use the FREE programs…
.
From 100 computers and Laptops checked there was “ONLY 1” computer, and this from a male person aged 69 who followed my IT-Security courses carefully, the Windows computer was “clean” and not infected!!!
.
Other lived example: women (young and elder) which I gave courses and/or help about ICT for Office work had to write their CV’s and brought me their passport photo from a professional Photo Service in the North of my country, where the photo was stored on a Flash-Card from a photo machine. By scanning first that Flash-Card on my computer with my installed antivirus suite (Norton Internet Security) and also with an anti-malware I found malicious trojans on the Flash-Card! This happens 5 times in 2 years, even after I gave a phone call to that so called professional Photo Service to tell them that their computer is infected!
So, thus meaning, e.g. above, this Photo Service infected probably hundred of customers with trojans (Trojan Horses malware) and their customers (as their Flash-Cards were infected) infected also any other computer where those Flash-cards were connected to. This could result to a mass infection of computers, even by being not connected to Internet!!!
.
This shows the impact of not having the right knowledge about the need to install security programs on a computer, even today also on a Mac!
Today (May 2012) we are are talking and reading about Cyber-Security, attacks on Government web sites, Cyber-Crime, National Security, Cyber-War, Cyber-Warfare and much more… Check links below to learn more:
there is much more, but I think read first that above and start with Critical Thinking, OK 😉
..
MUST KNOW: once a computer is infected with malware it can infect also thousands of different other computers through Internet! So we all have a certain responsibility to the “Internet Community”, making sure not to infect others by applying best protection on our computers!
.
So, this was a bit life experience which I think is necessary for learners to understand the context of IT-Security! In next 5 minutes tutorial we will talk about “Visual IT-Security” where I will try to make IT-Security visual to you with real life examples. Stay tuned, coming soon 😉
.
We can have best “Internet-Safety” knowledge, but when our computer is not protected we will face serious problems and the most important; once our computer infected we infect also our contacts and the Internet-Community! We need to protect our Community!!! Don’t let Cyber-crime take over Internet, otherwise we will have a “MadMax-Scenario” in a couple of years, no need for that! But we have to protect ourselves and to share the acquired knowledge over Social Medias (Hashtag is #SoMe), that’s our role in Education, follow it please, thx!
.===> Internet-Safety is similar to the traffic rules in real world and IT-Security is the security of the vehicle! Bad breaks on a vehicle = similar to bad security on a computer! You will hurt Community one day, think on that please 😉 <===
.
.
.
Don’t want to read all the above text and start the practice?
.
Download Links:
SECUNIA PSI ===> Automatic check and download of Third Party Applications
WOT ===> Web Of Trust helps you identifying suspect web sites
Lots of new technical words, isn’t it? I will try to prepare also a technical dictionary about ALL these strange used words and review my tutorials by publishing inside them the signification of these words, coming soon, stay tuned… Step by step we go further 😉
.
.
.Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)...
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Check my #curation to find best articles, blogs and courses about #education #itsecurity #CyberSecurity #EdCollCoach #GlobalEDU #cyberbullying, #AR #RA #augmentedreality #health #science #QR #qrcodes in EN, FR, DE…
Play the FREE Game and Learn about Cyber Security and Coding
App Advisor
App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
Click image to use this free service and find out of your installed Apps are “privacy-friendly” or check new Apps before installing them!
RT @PoliceLux: #MirSichenDech
Du hues e Master/Bachelor-Ofschloss an der Informatik (oder Equivalent) a wëlls d'Police bei hire Missiounen… 5 hours ago