RSS

Tag Archives: SID2014

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

.

Evolution of Education: Wordle Logo.


I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?

programmerman-animatedActually it is not really a question BUT a statement from MOST people ===> I Have Installed An Anti-Virus And A Firewall, I Am Protected NOW! <=== BUT is that true!? NO, NOT anymore, this was true ages ago BUT NOT anymore today! When YOU use the two above mentioned then YOU are already a bit protected, but far away that YOU can say, I am safe now! WHY? First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

..

I will cite ALSO my online friend https://twitter.com/dougpete about WHAT he has to say about. Check below, please.

.

Doug PETERSON - coding- nobody is perfect

Check the original blog here ===> http://dougpete.wordpress.com/2014/03/01/a-wakeup-call/ <===

.

Find out more about Doug PETERSON here:

.

SO… NOW WE know that WE have to be aware a bit MORE and that WE have to create a Cyber-Security Mentality for ourselves and for the community! Even Anti-Virus programs have sometimes ALSO vulnerabilities! These vulnerabilities can even bypass the installed protection software, such as Anti-Virus and Firewall and the bad boys (Cyber-Criminals) can take the control over the computers by exploiting these vulnerabilities! Once a computer controlled by the cyber-criminals (===> YOU don’t remark it <===) they include it into a network of other controlled computers, that network is called a “Botnet”! These so called “Botnets” are getting used to attack Government websites and ALSO other websites as well as “Spam” generating computers, and this ALL without the knowledge of THEIR owners!!! So, let us find out NOW what “Botnets” are and WHAT they can perform, YOU might get impressed, there is a BIG POWER behind, and that with OUR computers and without OUR knowledge!!!

Learn more:

Thus meaning ALSO that YOUR computer could become a Cyber-Weapon who is attacking YOUR own Government and this without YOUR knowledge!!! Sounds strange, isn’t it!? BUT that’s REALITY! Check my blog post below for more information, please:

As YOU might have remarked (for those who follow my posts…) I bring every time a bit of creativity and also music in to my posts, so this time it will be a music video from ===> “Weird Al” Yankovic – called Virus Alert <=== Check it, watch it and listen to the music as well, it is funny and great to watch. It shows the REALITY 😉 BTW: there are lots of other interesting music videos from  “Weird Al” Yankovic”, check them ALSO…

.

.

===> Forewarned is Forearmed!!! <===

.

As WE know NOW, after reading the above mentioned, there is certainly the question: WHAT else SHOULD I do then to get BEST protection!?

.


WHAT else SHOULD I do to get BEST protection!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01WE learned already that even Antivirus-Programs could have vulnerabilities and ALSO the reason WHY (inevitable bugs in programming code, as a reminder), SO, what’s NEXT!? Thus meaning: ===> Nobody Is Perfect <=== (Mac, Apple and Linux included)! WHEN such problems are getting known by the manufacturers of software programs, THEY release as soon as possible (asap) UPDATES!!! These UPDATES are NOT ONLY an option BUT a MUST to install!!! YOU understood already NOW THAT UPDATES are a MUST, right 😉 And a MUST for any “Operating System” (OS)!!! NO exception!!!

So, let us have a look on those vulnerabilities on any “Operating system” (OS):

OK, I got the message NOW and I don’t have THAT much time to spend to UPDATE manually ALL my installed programs and WHATEVER, this is stressing me really!!! I can’t cope with THAT!!! Isn’t there around some solution for ALL THAT, an automated solution!? Of course there is an automated solution for the so called “Third Party Applications“, and that on is actually very easy to install and FREE, check my blog post (tutorial) about it below, please:

BUT: please don’t let us forget about the ===> Patch-Tuesday <===, that is THE day to UPDATE YOUR Windows machines and ALSO ADOBE related products such as FLASH-PLAYER and ADOBE READER (PDF), and THIS for any Operating System (OS)!!! Make sure to get THE ===> reflex <=== to UPDATE them! BTW: this is any second Tuesday on each month!

An OTHER, OH YES, there is STILL some OTHER, sorry: ===> Browsers (ALL of them…) <=== are THE Gateway for Malware infections, this is NOT known by MOST users!!!

Learn more below, please:

.

OH MY GOD, again so much stuff to remember, how could I do this!? Well, I agree with that and therefore I started ages ago (???) on Social-Media Twitter the “Hashtag” ===> #FSCD <=== who means ===> Friday Security Check Day <=== and who reminds YOU on any FRIDAY about to get THE ===> REFLEX <=== to take care about YOUR security 😉

.

book-question-markI invite YOU ALSO to read my following blog posts:

.

.

Keywords as a reminder for me to create this blog post: Anti-Virus, Firewall, Third Party Programs, Updates, Drive-By-Download, Flash vulnerabilities, adobe vulnerabilities, Plugins vulnerabilities, Bad programming, Cyber-Security, Responsibility, links to related blog posts, Cyber-Crime, Passwords, human behavior, naivety, Computer as Cyber-Weapon, malware bypasses anti-virus and Firewall, Countries worldwide and Cyber-Security,

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.
.Stay tuned for next blog(s) 😉

.

.

 
5 Comments

Posted by on February 9, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Europe, Facebook, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Motivation, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Security in Schools, SID2014, Social Engineering, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?

.

Evolution of Education: Wordle Logo.


Are WE Becoming Too Paranoid About Cyber-Security?

This is a question I get asked very often, and I got remembered again by my online friend Doug PETERSON ===> @dougpete <=== about it on a Social-Media conversation (BTW: it’s called a “convo” on Twitter) on Twitter, check below please:

.

Twitter Conversation about cyber-Security

.

SO… As I can’t answer Doug’s very good question on a Twitter based conversation, as it would be too long, I took the challenge to create a new blog post here. And actually it inspired me to create a series of new blog posts with the TOPIC ===> Often Asked Questions:… <=== This was the introduction, now let us go for it…

.


Shouldn’t WE Have A bit Of Paranoia Anyway!?

sharing-iconA good question back, isn’t it? My direct answer to this would be, YES! A healthy paranoia attitude, why!? Let us try to go a bit for Deep-THINKing if YOU permit 😉 Let us ALSO try to make a comparison between the Real-World and the Virtual-World (the internet). WHEN YOU take the time to compare both worlds YOU would find out that there really few differences, apart that the internet is technology driven and that WE connect global on instantly actions

===> BUT: Let us first admit that the Real-World and the Virtual-World have MORE positive attributes than negative ones!!! <===

Mausi-parapluie.

BUT ALSO: WE have to accept THAT WE are NOT gods, and therefore WE are ALSO on a status as ===> Nobody-Is-Perfect!!! <=== 

ALSO negative things as present in the Real-World are ALSO present in the Virtual-World, as WE copy ourselves ONLY into the Virtual-World with ALL OUR character

.

.

Let us go for an ===> Visual walk <===  on what the internet is, try to follow me please:  YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!

.

WHAT do the Governments worldwide say!? Check below, please:

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Check ALSO:

Coming back to the negative things as THEY are present in both worlds, let us be honest, as new born people into the Virtual-World  (mostly…), WE have to acknowledge THAT there is a STRONG (actually on 2014) dominance of the bad boys, the criminal ones!!! Don’t believe me? BETTER to check out the shown resources below, please:

Please, take YOUR time to UNDERSTAND the shown resources above, OTHERWISE YOU won’t get THEIR importance and YOU will go on with YOUR same question, which is NOT the goal of this blog post anyway! YOU SHOULD read it to get the message and the answer to YOUR question 😉 To give YOU an answer to YOUR question, the BEST way is to read about it and to go for Deep-THINKing anyway, NO ONE can convince YOU about WHAT YOU don’t want to accept, so build YOUR own Mentality about it through the published facts 😉

.

Meanwhile listen to the music below… Bridge Over Troubled Water (Simon & Garfunkel)

.

.

As the title of the music video tells us “Bridge Over Troubled Waters“, it is exactly THAT what this blog post wants to bring over! Trying to get YOU convinced about the present dangers , to make YOU aware about the present dangers (OH YES, there are MORE as YOU might expect…) and to SHOW YOU as well WHERE those dangers are and making YOU fit to fight against THOSE dangers, to make YOU responsible “Digital-Citizens“! YES, the word RESPONSIBILITY is being used again, YOU SHOULD remember it 😉

.

I invite YOU ALSO to read my following blog posts as well, please:

.

WHEN coming back to the TOPIC ===> Are WE Becoming Too Paranoid About Cyber-Security? <=== I think that YOU, after reading the above mentioned, that YOUR question is answered and that YOU go for a ===> Community-Mentality <=== as it is THIS what would fight against the bad boys

.

Keywords:  often asked questions, what do people think about Cyber-Security, Mac Mentality, I installed Antivirus & Firewall, I am secure, Cyber-Security is ONLY for paranoia people, Cyber-Security is ONLY a hype, Sharing Responsibility, community, Critical Thinking, Proactive Thinking, any device as Cyber-Weapon possibility, patriotism, holistic view, selfish mentality, community mentality, Technology and maintenance as well as Safety and Security, Education’s Responsibility, everybody’s Responsibility, Curation about Cyber-Security, it’s ONLY ALL about commercial to sell…, Cyber-Espionage, NEUTRALITY of the internet?, Privacy, 20th Century Mentality expressed through 21st Century Technology,

 

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.

.
.Stay tuned for next blog(s) 😉

.

.

 
8 Comments

Posted by on February 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, browser, Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Home-Work, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Quality Courses, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Technology Integration, Tutorials, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

WE Are Living In A World Of Connected Technology/Cyber-Security Knowledge Is A Must!

.

Evolution of Education: Wordle Logo

.


.

SID15_Banner_anim

.

Cyber-Security And Privacy Knowledge As Skills In The 21st Century Are NOT Yet Enough Taught And Present, WHY!?

.

userfredericmoser01Did YOU realize already that WE are living in the 21st Century and that WE nearly ALL are using the so called NEW TECHNOLOGIES, the internet, the smartphone(s), laptops, computerstablets, household goods who are connected to the internet, and this on a daily base!? Did YOU ever started THINKING about such consequences concerning YOUR Privacy and vulnerability to Cyber-Security!? As far as I know, from practice while talking to people, most people are NOT as nobody has given them advice, NOR were they taught about it in schools, and there is the problem!

In the digital age, as WE are living NOW in it, WE MUST learn on a daily base to adapt to its very quick change! Education can’t follow with that as it is and was almost years behind… It needs to have a ===> RETHINK <=== to catch up!

SO… By knowing this and accepting it ALSO (the most difficult, BUT…) WE would be good advised for learning on a daily base to get the MOST out of necessary knowledge and skills to give OUR kids the BEST Education possible, an ===> Up-To-Date <=== knowledge, a knowledge who isn’t ONLY a cherry-picked knowledge, BUT a knowledge who includes ALSO Privacy and Cyber-Security as also skills!

The future is also that any device, even in the household, will be connected to the internet. It is called “The Internet Of Things” and as with any NEW technical stuff, it brings risks and vulnerabilities

MOST of people don’t realize the importance of privacy, especially for Cyber-Security and Identity Theft, check the video below who explains very good, please.

.

.

After watching the video YOU certainly are surprised and hopefully also willing to learn a bit more, it is actually NOT that difficult as most people think.


Who’s To Blame For Cyber-Security problems!?

Surveys from professional companies are NOW ALSO showing that Cyber-Security is OUR ALL responsibility, check below, please…

.

CyberSecurity-Responsibility

Check the full article here, please:

To start with learning, I would suggest YOU to read my blog about it first:

.


The Internet Of Things

Check out my curation about it and read the articles to find out what “The Internet Of Things” is, please…

.

Internet Of Things

Click image OR follow this link ===> http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Internet+Of+Things

.


The Dangers And Vulnerabilities Of  The Internet Of Things

.

Same procedure again, read my curation about it to find out, it is THE easiest way to get aware of the existing dangers and to get convinced about that LEARNing about Cyber-Security is a MUST…

.

Internet Of Things Vulnerabilities and Dangers

Click image OR follow this link ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

.


Wearables

[Start text from Kaspersky] The word “wearable” was once merely an adjective describing an article of clothing that was easy to wear. Now “wearable” refers to a mobile device that users wear on their body, and this latter wearable was a major topic of discussion last week. New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.

“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.” [End text from Kaspersky]

Learn more:

.


Additional And Informative Stuff

programmerman-animatedBelow YOU will find some Tweets which I posted, related to this Topic of Cyber-Security and who will give YOU also an overview on How-To YOU could create Tweets (Posts) on Social-Media Twitter. YOU may use them, BUT please give credit to me as I was its creator, thanks 😉

.

#THINK global ===> #act global <=== #CyberSecurity is a MUST as WHEN WE are ONLINE WE are already #surfing #2gether on THE #DataHIGHWAY 😉

.

#Naivety in the Digital Age? http://wp.me/p20Rwv-u4 

.

Do YOU realize WHAT’s happening in the #VirtualWorld!? #EdChat

.

Like in #RealWorld YOU need #1stAidKit & #Safety WHEN using tools, SO ALSO in #VirtualWorld! #EdTechChat #InternetSafety #CyberSecurity 1/2

.

2/2 Using tools in #VirtualWorld WE need ALSO #1stAidKit which is #Protection #Antivirus as well as #InternetSafety #knowledge! #EdTechChat

.

By analogy, anyone who selects only the data that appeals to them and supports their personal view or theory is called a cherry picker. SO… WHEN using #BYOD #EdTech tools #iWHATEVER #Apps ===> #LEARNing & #TEACHing about #CyberSecurity & #Privacy is a MUST! <===

.

NEW #Technology gives YOU the possibility 2 SHOW UP as… BUT its a dreaming world! DON’T loose the #REALITY 😉 Do YOU got #Maturity!??? InternetSafety existing but NOT for adults, seniors… MUST get updated and created .

.

.

That’s WHAT #Teachers #EDUcators are today, DON’T see #REALITY ===> The aim of art is to represent not the outward appearance of things, but their inward significance. -Aristotle <=== #EDUcators .

.

WHEN #Researchers #EDUcators #TEACHers are relating #CyberSecurity to #software ===> #BackToSchool with THEM!

.

Please #Update YOUR #knowledge WE need 2 #RETHINK how WE are using #ICT #Technology #EdTech #iWHATEVER #Apps as WE do it unconsciously MOSTLY without #Responsibility#EDU

.

WE MUST #RETHINK #HowTo use #ICT #Technology #EdTech #iWHATEVER #Apps as WE use unconsciously MOSTLY without #Responsibility#CyberSecurity

.

WE have to prepare OUR children a safe internet… #EDUcation SHOULD lead learners 4 the #FUTURE, BUT actionnaly is a #Century behind, especially its #LEADERS ===> #LeaderShip #CyberSecurity

.

Remember these words ===> #Responsibility & #NotYET <== as a guide 2 GO a step FURTHER as #preparation 4 THE #FUTURE of OUR #Kids 😉

.

Keywords necessary for me to create this blog:

RETHINK, habits, bidirectional, 2 way, technology in 21st Century, connected, household goods, internet of things, BYOD, EDU, teachers and educators role, teachers create other professions, NO HALF-BAKED KNOWLEDGE, NO GADGETS MENTALITY, NOT ONLY a software problem,”Critical-Thinking, Proactive-Thinking, community sharing, Twitter Chat, Life-Long-Learning, MORAL, ETHICS, PRIVACY, Maturity, naivety, Zeitgeist, Smart Homes, wearables, Augmented Reality, ..

.

Will get updated often, as I have to publish it one day, otherwise I would NEVER finish it!

 

 

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

You are very welcome to give me new ideas, would be appreciated! Stay tuned for next blog(s) 😉

.

 
4 Comments

Posted by on January 8, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Books, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, BYOD, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Evernote, Facebook, Free courses, FREE-courses, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Identity Theft, Internet Of Things, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tracing, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Habits You SHOULD Apply For The New Year

Habits You SHOULD Apply For The New Year

.

Learning basics of IT-Security and Cyber-Security.


Introduction

Chat iconA New Year is approaching and WE SHOULD think about WHAT WE learned during this year to make the next coming year even BETTER! When revising my curation about Cyber-Security YOU MUST agree that Cyber-Criminals are getting more and more professional and that WE as users MUST learn to stay secure while surfing and to be prepared to avoid the pitfalls of cyber-criminals.

.

.

Check also a new report from KASPERSKY here: Dangers of not securing your Internet Device

Check it out in the different proposed languages, please:

The above Curation gives YOU an overview what happened during the year with:


OK, NOW WE Know The Dangers, BUT How To Protect Against Them!?

.

programmerman-animatedThat’s a good question, isn’t it? WHERE to start? Actually it isn’t THAT difficult at all, ALL YOU need (mostly) is to get the right reflexes! YOU need to get used on a daily base to be aware of the dangers YOU are used to this in Real-Life, so do it ALSO in Virtual-Life [internet]). BUT HOW!? I will present to YOU a couple of automated software programs who will make it very easy for YOU, the rest is just routine and reflexes 😉

Remember that in real life WE do Hygiene: brushing OUR teeth is ALREADY (OR SHOULD be) a daily task, reflex, which WE are using; right? WE SHOULD get such daily reflexes in the Virtual-World as well, WE need to get educated to it so that it becomes a daily reflex! SO… Here WE go NOW…

MOST of the below mentioned TIPS are for Windows users, BUT as “Nobody Is Perfect“, so lots of the advice’s are ALSO a MUST for Mac users!

First of ALL, WE SHOULD try to find a way THAT WHEN WE make a mistake (Nobody Is Perfect…) that WE don’t get infected OUR computers and devices (smartphones, tablets…)! So WE MUST first look for a protection software, I advice YOU to install a commercial “Internet Security Suite“, NOT ONLY an Anti-Virus, BUT an “Internet Security Suite“. Let’s say this ALSO, any installed Anti-Virus protection (FREEWARE) is BETTER than NO Protection, BUT commercial software has STILL BETTER results in protection, check the following links, please:

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01So, WE have NOW a protection installed, are WE safe NOW!? NO not at all! As already mentioned, “Nobody Is Perfect” and so it is also for the Anti-Virus programs. WE MUST be aware ALSO of OUR behavior (WE are nearly new born kids in the Virtual-World) and OUR Naivety (YES, some are STILL…):

The above mentioned links might be seen as lot of information, BUT it isn’t as ALL of them are very easy to understand and to apply! Take YOUR time and follow the instructions on How To apply them, please. BEST would be to read my FREE courses here:

.

Guidelines for securing your home

 

Click the above image to access the article, please.

.


Stay Informed About New Threats

.

SOPHOS Security Threat Report 2014

Click image to download the report.

.

[START Text from SOPHOS]

It includes a range of security tips, and a section on proactive protection, entitled Staying Ahead of Today’s Most Sophisticated Attacks.

The report isn’t just about Windows and Windows malware, either.

You’ll find a wealth of information about how the cybercrooks are broadening their attack horizons to the Mac, Linux and Android platforms, too.

This is important material because it necessitates that we broaden our defensive horizons in reply.

The report also looks the technology and the underground economy behind crimeware tools such as exploit kits, botnets, click fraud, ransomware, and more.

As well as being a fascinating read, the Security Threat Report 2014 will help you to understand and to protect yourself against an enemy that is becoming ever smarter, shadier and stealthier.

[END Text from SOPHOS]

.


Get THE Weekly Reflex!

thumbs upAs already mentioned it are the reflexes who are very important! SO, let’s create them by checking every Friday OUR computer(s), as a reminder: I created the ===> Hashtag #FSCD <=== on Twitter! #FSCD means ===> “Friday Security Check Day”! <=== Follow it to make sure that YOU don’t forget about it 😉

.

Learn more:

.

.


GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
.

Stay tuned for next blog posts 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security Blogs To Follow

Cyber-Security Blogs To Follow

.

Learning basics of IT-Security and Cyber-Security.


WHY Should I Follow Security Blogs?

.

Chat iconWHY SHOULD WE follow Security and Cyber-Security blogs as well, when using Twitter, following some great Cyber-Security experts!?

Well, I will give YOU a question back: WHY should YOU read newspapers? It is as simple as that, WE need the information about WHAT is going on in the world and also WHAT is going on in the Virtual-World as both worlds, the Real-World and the Virtual-World (Internet), are influencing each other!

.

.

===> DON’T forget, in the word ICT is the letter “I“, which means “Information“, use it. <===

WHEN working with any technical device, especially with devices who are connecting to the internet, it is crucial to have some basic knowledge of Cyber-Security! Whether theses devices are mobile (smartphones, iPhone, iPad, Android, tablets…) or desktop units, YOU need to know How To get protected on a maximum and ALSO about WHEN there are NEW threads around, new scams, new updates, new privacy dangers, new security risks, new valuable tips and tricks to stay secure!

Thankfully, there are many experts in the field of Cyber-Security and Education who do this for us and share their knowledge online. SO… By reading those blogs and following ALSO those experts on Social-Media Twitter, YOU will learn slowly but surely about how to stay best protected and also what are the news where YOU need to be aware about! First step is ===> AWARENESS <===.


book-question-markNext step is to know how WE could get BEST protection and mostly for FREE:

WE need ALSO to get OUR daily stream of news, YES, I said daily stream of news as the Virtual-World is moving very quickly and WE need to be informed about WHAT is going on. A hard task indeed, BUT a MUST!!! Like everything else it is the beginning who is the most hardest, BUT once used to it it will just become a normal daily task, believe me 😉

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. -Aristotle <===

.

So, here below my selection of blogs from Cyber-Security experts, which I believe, are the most valuable ones which YOU should follow. These experts write on a style who is easily to understand and I learned a lot myself from them:

.

Graham CLULEY Blog

Graham CLULEY Blog

 

Naked Security (Sophos)

Naked Security Blog (Sophos)

Brian KREBS Blog

Brian KREBS Blog

F-Secure Blog

F-Secure Blog

SOFTPEDIA Security News

Softpedia Security News Blog

ZDNET

ZDNET

SCMAGAZINE

SCMAGAZINE Blog

arstechnica

arstechnica

PCWorld SECURITY

PCWorld

BBC Cyber-Security News

BBC Cybersecurity News

The Guardian

The Guardian

ITespresso (DE)

ITespresso (DE)

SECURELIST (KASPERSKY BLOG)

Securelist (KASPERSKY BLOG)

SILICON (FR)

SILICON (FR)

ZATAZ (FR)

ZATAZ (FR)

McAfee Labs Blog

McAfee Blog

.
sharing-iconThe above blogs are the blogs which I recommend as it is easy to understand them, that’s the ones I check first to understand as quick as possible what’s going on and to share my new acquired knowledge with others! Of course I use ALSO different OTHER sources for deeper learning, BUT that’s the sources from where one can grab information on the fly
.
.

As in a modern world WE use ALSO Social-Media, especially Twitter, I recommend the following people to follow:

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:

21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
.

Stay tuned for next blogs 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Smartphone pictures pose privacy risks

Smartphone pictures pose privacy risks

.

Evolution of Education: Wordle Logo

..
.


.

SID2014

SID2014

.


Did You Know: You and your kids could get easily tracked!

.

Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data of any device who is getting used to take photos!

.

.

.


Keep It Private Till Everything Is Checked In Depth

.

What YOU should know:

    • Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
    • Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
    • WHAT is Geotagging?

.

.


How To Remove The GPS Tracking Of Photos

The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:

Another trick is, while using PhotoScape, to remove the EXIF information and any other information, see screenshot below.

.

PhotoScape settings for privacy

.

Camera information – Exchangeable image file format (Exif)

.

Stay tuned for next blogs ;)

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2014: Safer Internet Day 2014-Participation

SID2014: Safer Internet Day 2014-Participation

.

Evolution of Education: Wordle Logo

.


Safer Internet Day 2014 – Save the date!

.

sid2014-anim-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world.

Safer Internet Day 2014 will be celebrated on 11 February 2014. The strapline for the campaign is “Let’s create a better internet together”. 

This website showcases some of the exciting activities and events that took place across the globe to celebrate the day in 2013, and will be updated for 2014 as the campaign gathers pace. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You’ section to explore news from the many countries and institutions which were involved.

Alternatively, read the summary or the full public report on Safer Internet Day 2013 activities and successes.

Keep checking back for the latest news as the SID 2014 starts to take shape.

.SID2014-logo-BS-small

.


.

Learning IT-Security

.

My participation for the SID2014

.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2014 with my FREE courses here:

and also with my curation here:

.


Final word

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2014 on their blogs and/or websites :)

Where can I get the banners?

People who are on Twitter may use the hashtag #SID2014 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

 
1 Comment

Posted by on July 10, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, HotSpot, HowTo, Ideas for a more secure Internet, Internet Monitor, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tutorials, Twitter Chat, Visual IT-Security, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ICT Awareness: What YOU SHOULD KNOW!

ICT Awareness: What YOU SHOULD KNOW!

.

.Learning IT-Security

.


.

sid2014-anim-banner

ICT Awareness: What YOU SHOULD KNOW!

.

programmerman2Since 1998 already I am giving FREE courses about IT-Security and Cyber-Security (since 2002 pedagogical ones…) as well as I blog a lot about it and it’s a NEVER ENDING story as the Virtual-World (Internet) is becoming more and more tricky and starting to become a trap for lots of people while surfing in the jungle of information worldwide… SO… There was published a lot about it and most people are worry of such a lot of BIG DATA and don’t know anymore where to START to learn about it! To make it handy for YOU, I will give YOU again a 5 minute small course about it, check below, please… YOU will see WHAT YOU have to take care about to stay secure and then YOU might click the links for a deeper knowledge, don’t fear as it’s easy 😉

===> Education and TEACHers, this is especially for YOU! <===

.

===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===

.

programmerman-animatedTHE known issues (there might be some more to get discovered…):

.

The World’s Biggest Data Breaches in One Stunning Visualization

.

Data-Breaches

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

The above mentioned are ONLY the most relevant where YOU need to take care about and the blog post will get updated when NEW ones are on the front!

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01The above mentioned tools are ALL part in Education and are getting used on a daily base from teachers and students around the world, AND Education doesn’t find it STILL necessary to teach the basics of Cyber-Security up from the early age!??? Did I say, the early age!??? YES, one can teach the kids the reflexes to stay secure up from five (5) years age, see link below:

.

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please 😦 <===

.

7 Cybersecurity Myths Busted

.

===> PRINT IT OUT and DISPLAY IT in YOUR CLASSROOM!!! <===

.

Read ALSO my daily NEWS:

.


.

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)………

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.

Stay tuned for next free courses and tutorials ;)

.

.

 
21 Comments

Posted by on June 23, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Education, eLearning, Encryption, Engagement, Environment, Evernote, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, Ideas for a more secure Internet, Instagram, IT-Security Worksheets, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, JOOMLA, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Motivation, Naivety, Not ONLY rights but also responsibilities, OpenOffice Vulnerabilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, SID2014, Skype insecurity, Smart TV's, Social Engineering, Stalking, Students 21st Century Survival Guide, Sustainability, Technology Integration, TOR-Anonymat, Tracing, Tumblr, Tutorials, UBUNTU Forums, vBulletin Forum, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security PracTICE: Verify Your Anti-Malware Solutions!

Cyber-Security PracTICE: Verify Your Anti-Malware Solutions!

.

Learning basics of IT-Security and Cyber-Security

.


.

sid2014-anim-banner

.

 

Introduction

programmerman2

In previous articles WE discussed already about the responsibility that everyone is responsible for a safer and more secure Internet, that the weakest link in the security chain is the human and I provided you also with some great FREE tools to get protected, as well that I gave you advice such as learning to become “Proactive -Thinking“, “Critical-Thinking” and I provided you also a plan on how to learn to get a maximum protection in a week time by applying protection on a step by step guide, as different other important articles… Just check the navigation menu on right hand side to find out, please…

.

YOU might say OK, WE did that, BUT: How To be sure that this is working!??? YOU are right, so here WE go to find it out!

.

I discovered today through Twitter a very interesting Tweet from http://www.virusbtn.com/blog/2013/06_04.xml which brought me to the following website and where I tried out the below:

.

Welcome to the AMTSOFeature Settings Check” for your favorite Anti-Malware solution. With the different checks you can verify if the corresponding feature is configured properly within your Anti-Malware solution.

  1. Test if my protection against the manual download of malware (EICAR.COM) is enabled
  2. Test if my protection against a drive-by download (EICAR.COM) is enabled
  3. Test if my protection against the download of a Potentially Unwanted Application (PUA) is enabled
  4. Test if protection against accessing a Phishing Page is enabled
  5. Test if my cloud protection is enabled

.

With these tools YOU could get more confidence about the Cyber-Security tools, BUT don’t forget that a protection of 100% doesn’t exist and that  The Weakest Link In The Security Chain Is The Human!

.


.

Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next free courses and tutorials ;)

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Dangers of WiFi in public places

Dangers of WiFi in public places

.

Learning basics of IT-Security and Cyber-Security.


Are YOU aware of the dangers of WiFi on public places? YOU should!

.

.
wifi-hotspotProtect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
.
Follow this BBC investigation and be surprised:
.
.
1,226
.
Check ALSO the video below, please (08-07-2015) from F-Secure
.

.
And read the article here, please:

And the MOST IMPORTANT!!! Update from 16-10-2017:  A major WPA2 security flaw puts almost every Wi-Fi device at risk!!!

.


Terms Of Service: Do YOU READ THEM!?

.

NAIVETY-First Born Child-2014

Click the above image, please, to access the video explaining in detail.

.


.
128
.
.
As learned already now from the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
.
  • A public, non secured WiFi Access can intercept all of our internet traffic…
  • With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (passwords) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
firesheep sample
.
Read here the full article who explains very well:
.

.

Sophos Project Warbike

.

Check the video who explains all…

.

5,935 (27.05.2013)

.

15,432 (12.08.2014)

.

So how can we protect us against those threats (MAC and Windows and Linux)???
 
By using a public WiFi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway. 
.

.
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:

Get behind the SHIELD! 100% FREE!

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.
  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
  • Protect yourself from snoopers at WiFi hotspots, hotels, airports, corporate offices.

Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.

Here is the address to download it http://hotspotshield.com/.

.
.
1,627,152
.
.
.
AND a solution from Europe <===> F-Secure FREEDOME:
.

.
Check out ALSO the FREEWARE “BlackSheep” who shows you when someone is using “FireSheep“! Knowing your enemy is every time good ;)
.
.
26,523
.
And here is the download link:

What YOU should know about Mobile-Security

.

.

.

.


Protection for the SmartPhones

.

Any device connecting to public WiFi could get sniffed, even Smartphones, so use DroidSheep Guard to secure your Facebook, eBay, Twitter, LinkedIn etc accounts from “Man In The Middle” attacks on public WiFi!

.

.


.

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).....

 

.

Stay tuned for next free courses and tutorials ;)

.

.

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,