Ciberseguridad + Inteligencia
16.2K views | +0 today
Follow
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Free Tutorials in EN, FR, DE
Scoop.it!

HowTo Fight Spam efficiently

HowTo Fight Spam efficiently | Ciberseguridad + Inteligencia | Scoop.it
A short tutorial showing you how to get protected against Spam and How-To fight it very efficiently... . This blog explains you how to fight spam on an efficient way, my own experience over more th...

Via Gust MEES
more...
Gust MEES's curator insight, February 8, 2013 4:26 PM

Spam in my "E-mail Inbox" is nearly gone by zero as this Online application fights it on its root:

 

SpamCop determines the origin of unwanted email and reports it to the relevant Internet service providers. By reporting spam, you have a positive impact on the problem. Reporting unsolicited email also helps feed spam filtering systems, including, but not limited to, SpamCop's own service.


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

InternetSafety for Kids & Families

InternetSafety for Kids & Families | Ciberseguridad + Inteligencia | Scoop.it

In an age when everyone can author or share information to a mass audience almost instantly, it is more critical than ever to develop and sharpen our ability to discern the credible from the implausible things we see online.


There are many purveyors of false or biased information on the Internet – a company seductively advertising the effectiveness of its weight loss product, a politically-motivated organization hoping to persuade you to vote for their cause, a hacker attempting to fool you into clicking on something that infects your computer with malicious software.


Thankfully, among the mounds of information we find online, there is also the credible and the safe. It’s a good habit to have and teach others how to figure out which is which. I believe the skill to do this is made up of 2 basic things: information literacy and information security.

==========================================

 

Gust MEES

 

Concerning "Information Security", please read my FREE courses here (easy to follow):

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/  (Secure surfing-Part1)

 

http://gustmees.wordpress.com/2012/05/28/visual-it-securityworksheet-secure-surfing-part2/   (Secure surfing-Part2)

 

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

===========================================

 


Via Gust MEES
more...
No comment yet.