21st Century Learning and Teaching
585.9K views | +5 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'ENCRYPTION'. Clear
Scooped by Gust MEES
Scoop.it!

VeraCrypt | #Encryption #Privacy #ICT #EdTech

VeraCrypt | #Encryption #Privacy #ICT #EdTech | 21st Century Learning and Teaching | Scoop.it
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

Gust MEES's insight:
VeraCrypt ist ein neues Verschlüsselungsprogramm, das besser und sicherer sein will, als TrueCrypt.


VeraCrypt
Mit VeraCrypt betritt eine neue Verschlüsselungs-Software den Markt, die verspricht vollkommen sicher zu sein. Sie setzt zwar auf dem laut den eigenen Machern unsicheren TrueCrypt auf, wurde aber an den entscheidenden Stellen verbessert und soll immun gegen Brute-Force-Attacken sein. Verschlüsseln Sie Ihre Daten um gegen Schnüffeleien seitens Regierungen, Privatpersonen oder Konzernen gewappnet zu sein.

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Yahoo unveils sneak peek at end-to-end email encryption plugin | Privacy |

Yahoo unveils sneak peek at end-to-end email encryption plugin | Privacy | | 21st Century Learning and Teaching | Scoop.it
The web portal giant wants encryption in everyone's hands by the end of the year.
Gust MEES's insight:

The web portal giant wants encryption in everyone's hands by the end of the year.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Let's Encrypt : Liberté, fraternité, sécurité (TLS) - Cases | ICT | EDUcation

Let's Encrypt : Liberté, fraternité, sécurité (TLS) -  Cases | ICT | EDUcation | 21st Century Learning and Teaching | Scoop.it
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


Gust MEES's insight:
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Revealed: how Microsoft handed the NSA access to encrypted messages

Revealed: how Microsoft handed the NSA access to encrypted messages | 21st Century Learning and Teaching | Scoop.it
Documents show company collaborated closely with NSA and FBI to help agencies intercept data
Gust MEES's insight:

 

Learn more:

 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

 

Scooped by Gust MEES
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | 21st Century Learning and Teaching | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:42 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 26, 2013 5:50 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from Time to Learn
Scoop.it!

How to Encrypt Sensitive Data on Flash Drive

How to Encrypt Sensitive Data on Flash Drive | 21st Century Learning and Teaching | Scoop.it

Do you ever worry what would happen if your files fell into the wrong hands, especially those files that you kept on your external flash drive? Thankfully there are many options to encrypt sensitive data. Protectorion ToGo is one such application. While the free version is meant for private use only, it does allow you to encrypt up to two external devices. An added bonus is that the application is compatible with Windows XP/Vista/7/8 (32bit + 64bit).


Via Frédéric DEBAILLEUL
Gust MEES's insight:

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

Gust MEES's curator insight, June 2, 2013 6:25 AM

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

173 Sud's curator insight, June 2, 2013 9:01 AM

 

The free version of Protectorion is limited, as you can only encrypt two external drives and it is for personal use only.

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

New Ransomware Encrypts Victim Data

New Ransomware Encrypts Victim Data | 21st Century Learning and Teaching | Scoop.it
An unusual new strain of ransomware makes good on its threat, doing what the majority of other varieties only claim to do.

 

In this case however, Blinka has witnessed the Trojan encrypting images, documents and executables in an attempt to hinder any removal attempts. Whomever is responsible for the malware is not in the business of completely crippling machines, so Windows system files are not included in the forced encryption. Infected computers will still function for the most part, but data will be lost and many third-party programs will not work.

 

Gust MEES's insight:

                  ===> BEWARE of the MALWARE!!! <===

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 31, 2013 9:27 AM

                     ===> BEWARE of the MALWARE!!! <===

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Encryption on your HD: How to Break Into a Windows PC, easy without...

Encryption on your HD: How to Break Into a Windows PC, easy without... | 21st Century Learning and Teaching | Scoop.it
If you're trying to break into a Windows computer—whether you've forgotten your password or are hatching a more sinster plan—you have quite a few options.

 

Gust MEES: Encryption of your HD is a MUST!

 

Read more why...:

http://lifehacker.com/5674972/how-to-break-into-a-windows-pc-and-prevent-it-from-happening-to-you

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

One step closer to an encrypted web. Next stop: HTTPS for all | Encryption | Privacy | CyberHygiene

One step closer to an encrypted web. Next stop: HTTPS for all | Encryption | Privacy | CyberHygiene | 21st Century Learning and Teaching | Scoop.it



All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer.








Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer.




Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Lernstationen zur Kryptographie [pdf]

Mehr erfahren, das SpionCamp:


-  http://ddi.uni-wuppertal.de/material/spioncamp.html


Rechte

Alle Materialien unterliegen der Creative-Commonce-Lizenz CC BY-NC-SA.
.

Für nichtkommerzielle Nutzung darf alles vervielfältigt und weitergegeben werden. 
Auch eine Bearbeitung ist möglich. Download der Quell-Dateien weiter unten.
Nutzungsbedingung ist die Namensnennung und Weitergabe unter exakt den gleichen Lizenz-Bedingungen.


Gust MEES's insight:

Mehr erfahren, das SpionCamp:


-  http://ddi.uni-wuppertal.de/material/spioncamp.html


No comment yet.
Scooped by Gust MEES
Scoop.it!

Inventor of world wide web criticises NSA over privacy breaches

Inventor of world wide web criticises NSA over privacy breaches | 21st Century Learning and Teaching | Scoop.it
Sir Tim Berners-Lee says NSA has weakened online security

 

 

 

 

 

===> It's naïve to imagine that if you introduce a weakness into a system you will be the only one to use it." <===

 

As well as the dangers of exposing private data to hacker gangs and hostile states, cracking encryptions was also unethical, he said.

Gust MEES's insight:

 

===> It's naïve to imagine that if you introduce a weakness into a system you will be the only one to use it." <===

 

As well as the dangers of exposing private data to hacker gangs and hostile states, cracking encryptions was also unethical, he said.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=PRISM

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Three Steps You Can Take to Protect Yourself From Online Spying

Three Steps You Can Take to Protect Yourself From Online Spying | 21st Century Learning and Teaching | Scoop.it
The recent PRISM scandal has validated both the general public's growing unease with federal law enforcement agencies, and many of the fringe element's accusations about Big Brother's online behavior.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Notebook-Daten vor Diebstahl schützen – So geht’s

Notebook-Daten vor Diebstahl schützen – So geht’s | 21st Century Learning and Teaching | Scoop.it
Der Diebstahl eines Laptops lässt sich leider nicht immer verhindern - sehr wohl aber, dass damit alle Daten in fremde Hände fallen.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/ict-security-tools/?tag=Encryption

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Reasons to Encrypt Your Data

Reasons to Encrypt Your Data | 21st Century Learning and Teaching | Scoop.it
Mankind has invented many ways to keep secrets. To send a private letter in Ancient Rome, nobles could shave a slave’s head, write the letter on the skin, wait for the hair to grow and then send a ...

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Gust MEES's insight:

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's curator insight, May 24, 2013 5:00 PM

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 
Scooped by Gust MEES
Scoop.it!

IT professionals do not display enough concern for data encryption

IT professionals do not display enough concern for data encryption | 21st Century Learning and Teaching | Scoop.it

Nearly two-thirds of IT professionals have admitted that they do not encrypt data stored on portable storage devices.

 

According to a survey of 106 delegates at IP Expo 2012 by iStorage, 64 per cent admitted to not encrypting data held on portable storage devices, while fewer (than those surveyed in 2011) believed that data loss was a serious concern. (!!!???)

 

============================================

 

Gust MEES

 

I am actually preparing a new FREE course about the "Cyber-Security Practice-the basics" which everyone can and should learn, very easy actually... There will be also included a FREE solution for encrypting the complete Hard Disk, stay tuned... It will be published here (soon):

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

============================================

 

 

Read more, a MUST:

http://www.scmagazineuk.com/it-professionals-do-not-display-enough-concern-for-data-encryption/article/270509/?utm_source=dlvr.it&amp;utm_medium=twitter

 

 

 

No comment yet.