Safe Surfing An Introduction to the Internet BOLLI Spring 2008 Lesson 9: Miscellaneous 4/30/2008.

Slides:



Advertisements
Similar presentations
Web 2.0 is a living term describing changing trends in the use of World Wide Web technology and web design that aims to enhance creativity, information.
Advertisements

TOPIC LEARNING BTEC Level 3 Unit 28 Websites L01- All students will understand the web architecture and components which allow the internet and websites.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Breaking Trust On The Internet
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Using the Internet: Making the Most of the Web’s Resources James B. Dang Associate Professor/Department Chair of Computer Science Southeast Campus.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
1 Recruiting in the age of Web 2.0 Bryan Baldwin California Department of Justice WRIPAC April 2008 Meeting.
An Integration Platform of Social Networking Applications to Support Life Long Learning in Rural Territories: the “SoRuraLL Virtual Learning World” Environment.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 VII Kaspersky.
MORE THAN YOU IMAGINE Introduction to Web 2.0 Education in distributed networks TAFE NSW, Sydney Institute, Workforce Development Unit.
Web 2.0 and the Gateway to 21 st Century Skills. What is Web 2.0? Some technology experts, notably Tim Berners-Lee, have questioned whether one can use.
Web 2.0 Project Exploration of the process to develop occupational therapists’ knowledge of and skills in the use of Web 2.0 tools.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Paula Walser, Director of E- Learning, CESA 6, Oshkosh, Wisconsin.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
1 Computer Security: Protect your PC and Protect Yourself.
What is it, how does it work, and why is it important?
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
Free e-Sources for English Language Teachers by Wallace Barboza Carolina TESOL December 6th, 2008 Charleston, SC.
NA in the digital age Early attempts Bulletin boards/modems/user groups AOL ( , boards, chat) alt. groups (alt.recovery.na, etc.) NArchive (first.
Solutions for a 2.0 Technology Classroom MACUL 2010 Mark Lada and Randy Micallef Walled Lake Consolidated Schools.
19, 2007 E merging Technologies of Web 2.0 / Library 2.0 Ruchareka Asavisanu
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Computers and Education EDPY 493 Western Carolina University Summer 2008 Dr. Regis M. Gilman (section 71)
WEB 2.0 READ/WRITE WEB Eidson. WORLD WIDE WEB  Sir Tim Berners-Lee  World Wide Web Inventor-1989  Web 2.0 – The Read/Write Web.
By Crystal Mosley 1. Need Collaboration and sharing information Global diversity Flexibility and convenience Common work and storage space 2.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Web 2.0: An Introduction 許輝煌 淡江大學資訊工程系 NUK.
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
Safe Surfing An Introduction to the Internet BOLLI Spring 2008 Lesson 2: Getting Connected 3/12/2008.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach
Web 2.0 Pragith Prakash Vikram Singh By The Era of.
Web Technologies Introduction Web Technologies are playing the leading role in the World Wide Web includes many latest evolutions in it like Web Services,
Intro To The Internet A Guide to Getting Started.
Protecting and Sharing Documents Lesson 13. Objectives.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Web 2.0 = Schools 1.1 : Transforming the Traditional School Environment Ryan Schaaf Howard County Public Schools Technology Teacher
Beth Schaefer, assistant director Client Services University Information Technology Services IT's 4 U: Putting social networking tools to work.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Internet Services Introduction Expertise is a collaborative tool for knowledge sharing, interacting and group working that can be adapted to the needs.
INTERNET: The Good, The Bad and The Ugly
Safe Surfing An Introduction to the Internet BOLLI Spring 2008 Lesson 5: Communities 4/02/2008.
Antivirus software.
What is Spam? d min.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Computer Skills and Applications Computer Security.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
W elcome to our Presentation. Presentation Topic Virus.
Gutenberg to Zuckerberg. In communication, media (singular medium) are the storage and transmission channels or tools used to store and deliver information.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
S TORYBOARD FOR I NNOVATION : W EB 2.0 By Crystal Mosley 1.
Unit 1 Day 6 FOCS – Human Computer Interaction. Journal Entry: Unit #1 Entry #3 Go to and use the wayback machine to compare a.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Get into flexible learning flexiblelearning.net.au E-xpanding your Training Delivery.
Three steps to prevent Malware infection
Marking the Most of the Web’s Resources
INF 103 MART Successful Learning/inf103mart.com
Web 2.0.
THE CURRENT STATE OF ICT WEB 2.0. The term "Web 2.0" was first used in January 1999 by Darcy DiNucci describes World Wide Web sites that emphasize user-
An Introduction to the Internet
Presentation transcript:

Safe Surfing An Introduction to the Internet BOLLI Spring 2008 Lesson 9: Miscellaneous 4/30/2008

Where Are We Going Today? 1. What's in the News? 2. Class Q & A …. 3. Homework Assignment #8 4. This week’s material 5. Open Q&A

What’s In The News? Class: ?Class: ? You Tube – Identity Theft: Tube – Identity Theft: Reminder: FINAL EVALUATIONReminder: FINAL EVALUATION

Homework Assignment - Week 8 MK: to several addresses & Magazines (eZines)MK: to several addresses & Magazines (eZines) PL: Bankrates (bankrate.com)PL: Bankrates (bankrate.com) MK: Shade loving annualsMK: Shade loving annuals SB: Which search engine best for historic movies: Wiki, Google, Yahoo, IMDb, Movies.com?SB: Which search engine best for historic movies: Wiki, Google, Yahoo, IMDb, Movies.com? Or a group:Or a group: man Or a Blog:Or a Blog: gmar+berman

Web 2.0 is a term describing a trend in the use of World Wide Web technology and web design that aims to facilitate creativity, information sharing, and, most notably, collaboration among users. These concepts have led to the development and evolution of web-based communities and hosted services, such as social-networking sites, wikis, blogs, and folksonomies. The term became notable after the first O'Reilly Media Web 2.0 conference in [2][3] Although the term suggests a new version of the World Wide Web, it does not refer to an update to any technical specifications, but to changes in the ways software developers and end-users use webs. According to Tim O'Reilly:Web 2.0 is a term describing a trend in the use of World Wide Web technology and web design that aims to facilitate creativity, information sharing, and, most notably, collaboration among users. These concepts have led to the development and evolution of web-based communities and hosted services, such as social-networking sites, wikis, blogs, and folksonomies. The term became notable after the first O'Reilly Media Web 2.0 conference in [2][3] Although the term suggests a new version of the World Wide Web, it does not refer to an update to any technical specifications, but to changes in the ways software developers and end-users use webs. According to Tim O'Reilly:World Wide Webweb designcreativityhosted servicessocial-networking siteswikis blogsfolksonomiesO'Reilly Media2004 [2][3]World Wide Websoftware developersend-usersTim O'ReillyWorld Wide Webweb designcreativityhosted servicessocial-networking siteswikis blogsfolksonomiesO'Reilly Media2004 [2][3]World Wide Websoftware developersend-usersTim O'Reilly “ Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as platform, and an attempt to understand the rules for success on that new platform. [4] ” Some technology experts, notably Tim Berners-Lee, have questioned whether one can use the term in a meaningful way, since many of the technology components of "Web 2.0" have existed since the early days of the Web. [5][6]“ Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as platform, and an attempt to understand the rules for success on that new platform. [4] ” Some technology experts, notably Tim Berners-Lee, have questioned whether one can use the term in a meaningful way, since many of the technology components of "Web 2.0" have existed since the early days of the Web. [5][6]businessrevolutioncomputer industry Internetplatform [4]Tim Berners-Lee [5][6]businessrevolutioncomputer industry Internetplatform [4]Tim Berners-Lee [5][6]

New Suspicious Error Dialogue Updated: Malware alertUpdated: Malware alertUpdated: Malware alertUpdated: Malware alert By Villu Arak on November 5, 2007 in Trojans and viruses.By Villu Arak on November 5, 2007 in Trojans and viruses.Trojans and virusesTrojans and viruses It has come to our attention that some Skype for Windows users have been affected by a piece of malware that masquerades as a chat message aimed at finding a lost girl.It has come to our attention that some Skype for Windows users have been affected by a piece of malware that masquerades as a chat message aimed at finding a lost girl. Please do not follow any internet links you may receive in chat messages that resemble the following: “Please help me to find this Girl”.Please do not follow any internet links you may receive in chat messages that resemble the following: “Please help me to find this Girl”. Clicking on the link will lead you to download a worm that is currently best described here.Clicking on the link will lead you to download a worm that is currently best described here.here Currently, this piece of malware — a new strain of the Stration/Warezov worm — can be detected by the following antivirus software: AntiVir, ArcaVir, AVG Antivirus, BitDefender, F-Secure, Kaspersky, McAfee, Microsoft, Norman Virus Control, Panda Antivirus, Sophos Antivirus, TrendMicro, VBA32.Currently, this piece of malware — a new strain of the Stration/Warezov worm — can be detected by the following antivirus software: AntiVir, ArcaVir, AVG Antivirus, BitDefender, F-Secure, Kaspersky, McAfee, Microsoft, Norman Virus Control, Panda Antivirus, Sophos Antivirus, TrendMicro, VBA32.

Miscellaneous VOIP - phone-service.phpVOIP - phone-service.phphttp:// phone-service.phphttp:// phone-service.php MySpace vs. facebookMySpace vs. facebook Ask Bruce! ™ Bruce! ™

MySpace & facebook