Uso inteligente d...
Follow
Find tag "Government"
66.1K views | +20 today
Uso inteligente de las herramientas TIC
Ciencia, tecnología, innovación y educación
Your new post is loading...
Your new post is loading...
Rescooped by Ursula Sola de Hinestrosa from Pedalogica: educación y TIC
Scoop.it!

Student Privacy 101: FERPA for Parents and Students | Digital CitizenShip

Ever have questions about your rights regarding education records? This short video highlights the key points of the Family Educational Rights and Privacy Act (FERPA).

.

Learn more:

.

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

.

https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/

.

https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/

.


Via Gust MEES, Alazne González
more...
Rescooped by Ursula Sola de Hinestrosa from 21st Century Learning and Teaching
Scoop.it!

Virtual private network (VPN) : un tunnel sécurisé

Le VPN (virtual private network) est une technologie qui permet aux employés de se connecter à distance et en toute sécurité à leur réseau d'entreprise via l...

Via Gust MEES
more...
Gust MEES's curator insight, October 15, 2013 11:31 AM

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Gust MEES's curator insight, October 15, 2013 11:35 AM

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

Amandine Duffoux's curator insight, October 16, 2013 2:35 PM

Une excellente vidéo de vulgarisation présentant le principe du VPN. Très bien si vous voulez savoir comment ça marche de manière très simplifiée.

Rescooped by Ursula Sola de Hinestrosa from Personal Branding and Professional networks - @TOOLS_BOX_INC @TOOLS_BOX_EUR @TOOLS_BOX_DEV @TOOLS_BOX_FR @TOOLS_BOX_FR @P_TREBAUL @Best_OfTweets
Scoop.it!

Second iPhone passcode hack vulnerability discovered

Second iPhone passcode hack vulnerability discovered | Uso inteligente de las herramientas TIC | Scoop.it
You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.

 

But as Macworld noted, this isn't the first time Apple has had to grapple with an iPhone password security flaw.



Via Gust MEES, Philippe Trebaul
more...
Gust MEES's curator insight, February 27, 2013 2:25 PM

Nobody is perfect!!!

 

Gust MEES's curator insight, February 27, 2013 2:29 PM

Nobody is perfect!!!


Philippe Trebaul's curator insight, February 27, 2013 4:19 PM
Second iPhone passcode hack vulnerability discovered.

You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.

 

But as Macworld noted, this isn't the first time Apple has had to grapple with an iPhone password security flaw.


Second iPhone passcode hack vulnerability discovered via @knolinfos http://sco.lt/...


Rescooped by Ursula Sola de Hinestrosa from 21st Century Learning and Teaching
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Uso inteligente de las herramientas TIC | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 


Via Gust MEES
more...
Rescooped by Ursula Sola de Hinestrosa from "#Google+, +1, Facebook, Twitter, Scoop, Foursquare, Empire Avenue, Klout and more"
Scoop.it!

13 Million Facebook Users Haven't Touched Their Privacy Settings [Infographic]

13 Million Facebook Users Haven't Touched Their Privacy Settings [Infographic] | Uso inteligente de las herramientas TIC | Scoop.it
Do you know how to change your Facebook settings to stay out of strangers' Graph Search results? If not, check out this infographic to learn how.

Via Gust MEES, ABroaderView
more...
AnnC's curator insight, May 1, 2013 9:56 PM

Protecting your privacy on Facebook - better safe than sorry.

Terry Doherty's curator insight, May 2, 2013 1:40 PM

I'm sure our kids are among the majority of the users who "accept" Facebook's default privacy settings.

Productive Tech Tips's curator insight, May 6, 2013 6:23 PM

Please make sure you update your privacy settings, monthly if possible. 

¿Necesitas una estrategia para promocionarte en la red? ¡Búscanos!

#SEO #CommunityManager #PosicionamientoWEB