Thursday, August 31, 2006
Many steps can be taken to keep this from happening.
NEVER click the “X” on a popup!
Instead, right click the menu bar and click “Close”
To create a secure internet environment, go to “Tools – Internet Options – Security.
Here, you can create security settings to one’s liking.
When buying online, always be sure that the URL contains “https” – this will almost always signify a secure internet connection.
Otherwise, a packet sniffer, a program used to find things such as a credit card number, will find and use your number.
Never publish specific information about yourself on the internet
Be careful when dealing with spam.
Some emails might look official yet they might have viruses encoded on them.
Still, spam can be used to be a harmless annoying object.
Always use spam blockers.
http://antiphishing.com/index.html - this is a very good way to identify spam
http://ftc.gov/ - this site lists all rights you have for privacy over the internet
http://www.zabasearch.com/ - this is a site most widely used by people trying to find information about other people
Wednesday, August 30, 2006
You open the Logitech software. Then click the QuickCapture button. A window will pop up. You should see yourself through the webcam. If you don’t, make sure your lens is open. From here you can record a video, take a picture, or even add effects. To record, simply press the Record a Video button. To take a picture, press Take a Picture. To add effects, click the arrow by the settings camera. It’s at the bottom-right hand of the picture. Click Quick Assistant. This will bring up a small window. From here you can add all kinds of effects. Click the shadow-looking button with the question mark. From here you can become a wrestler, an alien, or even a robot. Fiddle around with the different controls to get used to them.
Monday, August 28, 2006
Questions from Quickcheck A in orientation chapter. (pg.11)
Central processing unit
Suggestion of categories that are not included in the book
ID items on pg. 10
Types of files hand out.
Mac = apple version of personal
Monday, August 21, 2006
What is a computer?
- Device that accepts input, processes data, stores data, and produces output
- Input devices: keyboard, mouse, scanner, digital camera
- Output devices: screens and printers
- A computer uses disks, CDs, and DVDs to store data
- A stored promgram means that a seires of instructions for a computing task can be loaded into a computer's memory
- Computers are categorized based on criteria such as usage, cost, size, and capability
- Roomba/Scooba-a robotic vaccumer cleaner
- RFID=Radio Frequency Identifier
- RFID tags can be attatched to any object to identify it using radio waves
- Two kinds of RFID: Active and Passive
Friday, August 18, 2006
We worked on the first chapter of our wikibook. Chapter one is Computer and Privacy, it tells several problems and solutions to being safe on the web. To check out the wikibook go to www.westwood.wikispaces.com. Turn in your origianl book CD and burn your own. Make sure you did everything from yesterday...Quick check A and B. Be sure you send the checks to mrs. vicki. Make a wiki and try to get into the wiki hall of fame.
Thursday, August 17, 2006
Prevent your laptop/computer from being stolen:
- Lojack- for laptops, little piece of software that runs in the back of the web browser, scenario- some one steals the computer…lojack gets the IP #/address from the computer and sends it to the internet company
- Tag your name on your laptop (ie. On the battery- sauder your name or write it with a sharpie)
- Change your password
- 2 accounts on your computer your account or guest account
- Malware/viruses- steals data or destroys files, can create traffic jams on your computer, you may not know it is there
- Install virus fighting software, make sure it runs at all times when the computer runs, check it every week to make sure it runs good
- Anti-virus software should scan files, emails, etc.
- Auto protect- runs in the back of the screen
- Viruses slow computer down, spam can also hurt you
- Today most viruses come in e-mails or websites
- Senders have found ways to use others’ email addresses to get the malware onto your computer
- Pirated videos have started to get viruses, so when you download the video you will get viruses on your computer
- Whackers- wireless hackers
- Firewall software-software designed to analyze and control incoming and outgoing packets on a network, used to enhance security by filtering out potential intrusion attempts
Hackers can get information from your computer if you stay on the internet for a long period of time
- To block hackers you should have an active firewall
- How to check your firewall: click the Start buttonà then click control panelà click network connectionsà click the connection you use for internet accessà under network tasks, click change settings for this connectionà click the advanced tab and look for a check mark in front of the box labeled protect my computer and network
- Ping of death- virus that gave computers’ viruses, it pings Microsoft continuously, when someone pings Microsoft more than about 50 times, Microsoft will shut down their computer
- “In computer terminology, a honeypot is a trap set to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information or a resource that would be of value to attackers. A honeypot that masquerades as an open proxy is known as a sugarcane.” (wikipedia)
Wednesday, August 16, 2006
- Review on the CD: how to navigate through pages
- Tracking device: save to memory key
- We took the pre-assessment test to see what we know in this chapter. The study guide was printed out for us to use for the test.
- We are teaching sections on 8/16: avoiding viruses, preventing intrusions, blocking spyware and pop-up ads, protecting e-commerce or transactions, avoiding e-mail scams, and protecting your privacy tomorrow.
Monday, August 14, 2006
makes their home. Each day a different scribe will post the class notes so that the class can participate in the discussions. Welcome!