Public or Private (1)
|
|
- Marilyn Daniels
- 5 years ago
- Views:
Transcription
1 Pi Day: 3.14 Public or Private (1) CCST Mar, 2012 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering Results from Tutorial Compare to Results from % 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Age Gender Birth date address content Web page currently viewing Web browsing history Current Location Content of your IM School grades Photos of you Video of you Your phone call content Phone numbers you have dialed in the past week Bank account number Bank account password Mobile phone number What's on your mind Relationship status What you did yesterday night when you were on the street Political view No Depends Yes % 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Age Age Gender Gender Birth date address Birth date address content content Web browsing history Web page currently viewing Web page currently Web browsing history Current Location Content of your IM Current Location Content of your IM School grades School grades Photos of you Photos of you Video of you Your phone call content Video of you Your phone call content Bank account number Phone numbers you have Bank account number Phone numbers you have Mobile phone number Bank account password Mobile phone number Bank account password Relationship status What's on your mind Relationship status What's on your mind What you did yesterday What you did yesterday Political view Political view 3 4 Defining Public vs. Private n It is extremely difficult to define what is public information and what is private information n It depends on context, intention, convention, social norm, legal system, etc. n All of them very difficult to have a solid definition From Private to Public (1) E.g. Consider the fact that you like the girl sitting next to you. 1. You keep it to yourself without telling anybody Private to you, public to nobody else. 2. You tell the girl you like her, started to date each other, but you don t want other people to know about it Private to you and your girlfriend only 5 6 1
2 From Private to Public (2) 3. You two decided to let your closest friends knows about your relationship Public information among your friends, but not other people. 4. You two decided to get married Public to everybody And many more variations Variation on the situation n Before stage 3, you and your girlfriend are shopping in a public shopping mall, acting like a couple. Situation 1 A stranger on the street saw you two, and realized you two are dating each other Situation 2 Your parent walked by and saw you two, and realized you two are dating each other Do you feel your privacy being violated in either scenarios? 7 8 Some Definitions of Privacy n The issue isn t privacy but control: control of our information and our identities -- Jeff Jarvis, Public Parts, p.93. n privacy is not about controlling information, but about having the ability to control a social situation. -- dana boyd Reverse of Default n Note that in the earlier example, information starts from being private and progress into public information. è Public through effort n A new generation, pioneered by Facebook, has a reverse default that information is public by default è Private through effort E.g. message on a FB wall is viewable by all your friends/public by default, made private by setting it explicitly 9 10 Evolution of Facebook Default A visualization by Matt McKeon Questions to Ponder Upon n What kind of information about you is available, both offline and online? n How do you control the access to the information? n How do you control how your information can be used? n Where do you draw a line between public and private information? n How do you protect your private information? n Why do you need to protect your private information?
3 14/3/12 Content of your s/IMs n Almost 100% said the contents of their s/IMs should remain private. But are they really private? 13 A packet passes through many networks! All your conversations Tier 3 Tier-2 Tier 1 Tier 1 Tier-2 Tier-2 Do you expect the postmen to read your content of your letter before they deliver your mail? Tier-2 Tier-2 15 Sending Postcards Content is wide open Are s/ims more like sealed letters or postcards? Do you expect the postmen to read the content of your postcard before they deliver your mail? Photo by JohnnyEnglish - What makes the difference? Sealing envelope è do not expect people to see the content inside 14 are transmitted as data packets that travel across the Internet. Everybody in the middle can take a look at your message. Photo by gbaku - Sending Letters NAP Tier 1 A. Letter B. Postcard 18 3
4 Encrypting your messages n One way to avoid people reading your IMs (and s) while it travels across the Internet is to encrypt the messages n Many kinds of encryption: Encrypting the content Application layer Encrypting the traffic Transport layer Encrypting the physical network And more Without Encryption Transport Layer Encryption With Server in Between e.g. When you type https in the web browser 21 e.g. You may be connected to an e-commerce site securely with https, but the site relay your information insecurely. 22 End-to-End Encryption Encryption Summary n Transport layer encryption provides endto-end connection between two machines on the Internet n But many applications rely on the presence of a centralized server The server might be able to see all content in some cases n True, application-layer encryption avoid any entity in the middle to decrypt the content
5 Application Layer Encryption Example n For example, if you and your friend understand apple means YES; orange means NO. Then everybody else will only see apple and orange But n You need different ways to code your message to different friends n Also, with insecure lower layer, you increase the chance that someone can break your encryption n E.g. It s quite easy to decrypt simple codebook messages like above if a bad person knows something about you 25 Caveats n The server in the middle will know all your IM content Unless application-layer (end-to-end) encryption is used n In any case, the server knows exactly where and who are you talking to n User do not know exactly what kind of encryption is used Usually just a simple encrypt chat button n Not all IMs provide built-in encryption Built-in Encryption Facility? ICQ/AIM Yahoo Messenger Google Talk MSN messenger Administrivia n Quiz next week Covers lecture & tutorial materials since last quiz n Homework 1 is being graded Results will be available next week n Homework 2 will be posted by end of this week Individual homework Due in 5 April 20% penalty per late day Submit through Moodle Mandatory plagiarism check through integrated Turnitin function 29 Administrivia Project Component Mark Remark Midterm Presentation Final Presentation 4 3 Minutes presentation, 1 slide 8 8 minute presentation + 2 minutes Q&A No limit on # of page Recommend 1 or 2 presenters Summarize results Be entertaining too! Website 12 Use Wordpress as a content management system Account created based on your HKU Information will be sent to your address A blank site template will be created for each group Each group member may modify and insert content for the project 15 mins introduction next week during tutorial Final report (individual) 6 Part 1 (4 pts) Summarize project findings and your role in the project Part 2 (2 pts) review of 5 other projects 30 5
6 Quick Demo of Project Current Location n ~60% said private n ~20% said depends n Most of you said depends on how precise the location information is OK if it is about the level of city NOT OK if it is very precise How well modern technologies can track your position? Knowing your Location n IP address n Global positioning system n WiFi access point association n Cellphone tower association n Digital photos n Many more Identifying Computer n Computers are identified by the IP address on the Internet n Current standard (2012), IPv4 address expressed as 4 numbers between 0 to 255, separated by a dot E.g n Each computer MUST have a unique public IP address on the Internet Maximum about 4 billion addresses in IPv
7 14/3/12 Locating IP Addresses Information from IP address n IP n From your IP address, many of the following information can be found: addresses are allocated by an international body called Internet Assigned Numbers Authority (IANA) n IP Your location Your The corresponding name addresses allocated hierarchically IANA è Regional Internet Registries (RIR) RIR è Internet Service Provider () n Try n The ownership of each IP address can be traced n Free n i.e. A lot can be found out from just the IP address looking up the following IPs: online tools: Using your IP location? Other Information Exposed Localized Recommendations n Apart from IP address, many more information can be obtained about you: n E.g. Browser Screen resolution Your computer platform n Try: Targeted Advertisement Geographical Location Restrictions Datacenter Co-Location n Large companies have their data replicated across the globe through colocation Companies restrict contents to particular physical locations E.g. Google, YouTube, Yahoo, etc n Allow much faster access to data by redirecting your traffic to the nearest datacenter geographically n Localized service Local search results from Google Localized advertisements
8 Discussion Do you mind your current IP address be known to the webserver (e.g. Facebook, YouTube) you are connected to? A. Yes B. No C. I have no choice Hiding your IP n One way (there are many ways) to obscure your IP address is to use a proxy server Originally designed for performance enhancement/ management n Instead of connecting from A to B Connect from A to C Ask C to connect to B Web server Returns the result to A proxy With proxy Without proxy client Tradeoff in using Proxy Server n Now all your traffic has to go through the proxy server It knows all your content Why would someone wants to redirect your content? For profit? n On the other hand, some companies, countries require the use of proxy servers All contents are managed Filter out unwanted contents Content audit Next time n Global Positioning System n WiFi n Mobile Phone
Public or Private (1)
100% Results from Tutorial 2012 Public or Private (1) 90% 80% 70% 60% CCST9015 20 Mar, 2013 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 50% 40% 30% 20% 10% 0% No Depends
More informationThe Internet. Charging for Internet 2/8/12. Conceptual Picture of the Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
2/8/12 The Internet CCST9015 Feb 8, 2012 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How
More informationIntroduction to the Internet
Introduction to the Internet CCST9015 8 th Sep, 2010 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Internet in 2003 3 Internet Basics The Internet is a network that connects
More informationSession Booklet Social Media & Facebook
Session Booklet Social Media & Facebook Social networking refers to the use of online social networks such as Facebook to communicate with other people. A social network can include blogs and other ways
More informationCLIENT ONBOARDING PLAN & SCRIPT
CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in
More informationCLIENT ONBOARDING PLAN & SCRIPT
CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in
More informationA SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS
A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS EXPLORING THE INTERNET through HOBBIES AND INTERESTS. LEARN HOW TO KEEP IN TOUCH WITH FRIENDS AND FAMILY USING THE INTERNET In these busy times it s easy
More informationThe Free Internet. Questions to Ponder On. Packet Switching Network. Circuit Switch vs Packet Switch. Circuit Switching
The Free Internet CCST9015 Feb 15, 2012 Questions to Ponder On 1. Think of 5 things that you get for free from the Internet. 2. Think of 5 things that you get for free in real life. Dr. Hayden Kwok-Hay
More informationGoogle Docs Tipsheet. ABEL Summer Institute 2009
Google Docs Tipsheet ABEL Summer Institute 2009 Contents Logging in to Google Apps for CollaborativeSchools.net for the First Time... 2 Text Documents Creating a New Text Document in Google Docs... 5 Uploading
More informationFamily Technology Boundaries:
General questions to answer Family Technology Boundaries: How much time per day/week will various technologies be allowed? Can social media be accessed from all devices? What should children do if they
More informationCS Paul Krzyzanowski
Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide
More informationSo on the survey, someone mentioned they wanted to work on heaps, and someone else mentioned they wanted to work on balanced binary search trees.
So on the survey, someone mentioned they wanted to work on heaps, and someone else mentioned they wanted to work on balanced binary search trees. According to the 161 schedule, heaps were last week, hashing
More informationTomTom Navigation app for iphone/ipad Reference Guide
TomTom Navigation app for iphone/ipad Reference Guide Contents Getting Started 6 Start TomTom Navigation app for iphone/ipad... 6 Updating your TomTom Navigation app for iphone/ipad... 6 GPS reception...
More information** Pre-Sell Page Secrets **
** Pre-Sell Page Secrets ** Page 1 - CommissionBlueprint.com 2008 Introduction Using a pre-sell page is a highly effective tactic that can be used in almost any market to motivate a visitor into purchasing
More informationMeeting 39. Guest Speaker Dr. Williams CEH Networking
Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationComputer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017
Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes
More informationPrivate Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes
Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,
More informationfacebook a guide to social networking for massage therapists
facebook a guide to social networking for massage therapists table of contents 2 3 5 6 7 9 10 13 15 get the facts first the importance of social media, facebook and the difference between different facebook
More informationThe Basics of Networking
c h a p t e r 3 The Basics of Networking Making the Connection lawrence snyder Times are Changing Nowhere Is Remote People are more interconnected Social interactions are changing Freedom of Seach and
More informationAnalytics, Insights, Cookies, and the Disappearing Privacy
Analytics, Insights, Cookies, and the Disappearing Privacy What Are We Talking About Today? 1. Logfiles 2. Analytics 3. Google Analytics 4. Insights 5. Cookies 6. Privacy 7. Security slide 2 Logfiles Every
More informationSecurity in ECE Systems
Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today
More informationThe Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation
The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? In our experience, we find we can get over-excited when talking to clients or family or friends and sometimes we forget that not everyone
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 08 Tutorial 2, Part 2, Facebook API (Refer Slide Time: 00:12)
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationUser Manual for Student. Moodle Administrator
User Manual for Student Moodle Administrator 1.Introduction About this document This document is part of a Moodle Learning Management System(LMS) documentation Start Guides for Students. What is Moodle?
More informationSocial Networking Applied
Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday
More informationCourse Staff Intro. Distributed Systems Intro. Logistics. Course Goals. Instructor: David Andersen TAs: Alex Katkova.
Distributed Systems Intro Instructor: David Andersen TAs: Alex Katkova Course Staff Intro Jonathan Harbuck Administrative: Angela Miller Logistics Course Policies see web page... http://www.cs.cmu.edu/~dga/15-440/f10
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationGOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL
GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP INSTRUCTIONS WITH
More informationTELSTRA TECH SAVVY SENIORS - BEGINNERS GUIDE INTRODUCTION TO SOCIAL MEDIA - PART 1
TOPIC: INTRODUCTION TO SOCIAL MEDIA PART 1 WHAT TO USE AND WHEN The internet helps you stay in touch with friends and loved ones. Social media sites like Facebook and Twitter let you see what s happening
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationLecture 41 Blockchain in Government III (Digital Identity)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III
More informationCyber Smarts Using Social Media Wisely
Cyber Smarts Using Social Media Wisely Posted on March 24, 2016 by Shridevi Stock Photo You have access to the world s largest museum, art gallery, library and social group ever created. You also have
More informationGOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL
Your Your Company Logo Logo GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP
More informationIntroduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras
Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 07 Tutorial 2 Part 1 Facebook API Hi everyone, welcome to the
More informationThe Internet and World Wide Web. Chapter4
The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History
More informationThe Activist Guide to Secure Communication on the Internet. Introduction
The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes
More informationGathering Open Source Intelligence Anonymously Ntrepid Corporation. All rights reserved. PROPRIETARY
Gathering Open Source Intelligence Anonymously Background Founded Anonymizer in 1995 Creating Solutions Since 1992 Known for Consumer Privacy Service Major Corporate and Government Customers 2 Exposed
More informationIntroduction to the Internet. Internet Basics. Back in time ARPANET 11/20/10 ENGG st semester, Hayden Kwok-Hay So
11/20/10 Introduction to the Internet ENGG1015 1st Semester, 2010 Hayden Kwok-Hay So 2 Internet Basics The Internet is a that connects millions of of computing devices throughout the world. The Internet
More informationVIDEO 1: WHAT ARE THE SMART CONTENT TOOLS? VIDEO 2: HOW DO YOU CREATE A SMART CTA?
VIDEO 1: WHAT ARE THE SMART CONTENT TOOLS? Hello again! I m Angela with HubSpot Academy. Now that you have a contextual marketing strategy in place with segmentation and personalization, you re ready to
More informationFIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE
FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE CONTENTFAC.COM As an FYI, this document is designed to go along with our video by the same name. If you haven t checked that out yet, you
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationGetting Started with Moodle
Getting Started with Moodle Moodle is the Virtual Learning Environment (VLE) for the University of Kent. Your teachers will use Moodle to provide course materials such as handouts, lecture notes and PowerPoint
More informationINTRODUCTION TO SOCIAL MEDIA Part 1
TECH SAVVY SENIORS The NSW Tech Savvy Seniors program is a key initiative of the NSW Ageing Strategy and the Telstra Digital Literacy Strategy. Victorian Tech Savvy Seniors is a Seniors Card Age Friendly
More informationWelcome to Moodle! How To Moodle
Welcome to Moodle! The MH Vicars School Moodle site is where you ll find all the online components of your Vicars curriculum. For the following year, this will include quizzes and access to multimedia
More informationHow to Get a Free Account
1 How to Get a Free Email Account This is a free service. You will not be charged in any way to use this service. If you choose this option and signup you can get your email anywhere at home, work, on
More informationUsing the Staff Directory Portlet
Using the Staff Directory Portlet Table of Contents Introduction... 3 Who Should Use This Guide... 3 Setting Up Roles... 3 Adding a Staff Directory Portlet... 4 Setting up the Staff Directory... 4 Tabs
More informationA Step by Step Guide to Postcard Marketing Success
A Step by Step Guide to Postcard Marketing Success Table of Contents Why VerticalResponse?...3 Why Postcards?...4 So why use postcards in this modern era?...4 Quickstart Guide...6 Step 1: Setup Your Account...8
More informationCertificate-based authentication for data security
Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important
More informationInternet Crimes Against Children:
Internet Crimes Against Children: Web, 2011 PROGRAM MATERIALS Presented By Professor Donald R. Mason Associate Director & Research Professor The National Center for Justice & the Rule of Law at The University
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More informationMeeting 40. CEH Networking
Cyber@UC Meeting 40 CEH Networking If You re New! Join our Slack ucyber.slack.com SIGN IN! Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach, Recruitment
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More informationEADS up. stop think connect
EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through
More informationMichael Phelps Foundation: Privacy Policy
Effective November 7, 2018 Michael Phelps Foundation: Privacy Policy General Understanding of Our Privacy Policy The Michael Phelps Foundation ( the Foundation, We, Us, or Our ) understands and respects
More informationKey questions to ask before commissioning any web designer to build your website.
Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,
More informationHow to Read AWStats. Why it s important to know your stats
How to Read AWStats Welcome to the world of owning a website. One of the things that both newbie and even old time website owners get overwhelmed by is their analytics and understanding the data. One of
More informationMap & Locations 16 Using Google Maps Using HTC Footprints
Map & Locations 16 Using Google Maps...16-2 Turning on Location Services... 16-2 Opening Maps... 16-2 Searching for a Location... 16-3 Getting Directions... 16-3 Finding Friends with Google Latitude...
More informationNORTON WI-FI RISK REPORT: U.S. Results
NORTON WI-FI RISK REPORT: U.S. Results Research Objective Norton by Symantec commissioned its second annual online survey, this year expanded to 15 global markets, in order to better understand consumers
More informationParent. Portal. User. Manual
EDUCATIONAL SERVICES Parent Portal User Manual Version 3.0 GENESIS STUDENT INFORMATION SYSTEM PARENT PORTAL Introduction 3 Logging In & Logging Out 4 Student Summary Dashboard The Dashboard Selecting a
More informationONLINE SAFETY. Messaging, , Vlogging and Sexting
ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.
More informationAzon Master Class. By Ryan Stevenson Guidebook #10 Google and YouTube Marketing
Azon Master Class By Ryan Stevenson https://ryanstevensonplugins.com/ Guidebook #10 Google and YouTube Marketing Table of Contents 1. Google Analytics 2. Google Webmaster Tools 3. Google Plus 4. YouTube
More informationWebsite Designs Australia
Proudly Brought To You By: Website Designs Australia Contents Disclaimer... 4 Why Your Local Business Needs Google Plus... 5 1 How Google Plus Can Improve Your Search Engine Rankings... 6 1. Google Search
More informationPrayerful Living Singles User s Manual
Prayerful Living Singles User s Manual Rev. 7/30/15 1 Contents Welcome... 2 Join for free! (Register)... 2 Setting up your profile... 3 Click on Home... 5 Adding Pics... 5 Editing your profile... 6 Understanding
More informationStudent Guide INTRODUCTION TO ONLINE RESOURCES
Student Guide INTRODUCTION TO ONLINE RESOURCES Date: 12. March. 2018 By: Technical Support Team Table of Contents 1) Introduction 3 2) Student Panel (SIS) 3 2.1) Student Panel (SIS) Login 3 2.1.1) Definitions
More informationI Shopping on mobile / RU
I Shopping on mobile / RU Exploring how people use their smartphones for shopping activities Q3 2016 I About this study Background: Objective: Mobile apps and sites are a vital channel for advertisers
More informationASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014
ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette
More informationFacebook Tutorial. An Introduction to Today s Most Popular Online Community
Facebook Tutorial An Introduction to Today s Most Popular Online Community Introduction to Facebook Facebook is the most popular social network, in the U.S. and internationally. In October 2011, more than
More informationSo, you re child wants to sign up for Myspace...
So, you re child wants to sign up for Myspace... Social networking is a brilliant concept that has sadly been tainted by several nefarious individuals. The term simply means a website that allows its users
More informationWeek - 01 Lecture - 04 Downloading and installing Python
Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and
More informationPinterest. What is Pinterest?
Pinterest What is Pinterest? Pinterest is like an electronic bulletin board that allows users to save and share photos they find on the internet. Usually when a user pins a photo it is linked to a blog
More informationHardening Network Routing. Kevin Brady ICTN 4040 April, 2006
Hardening Network Routing Kevin Brady ICTN April, 6 7 NETWO RK P ROCES SI NG ENG INE- 7 NETWO RK P ROCES SI NG ENG INE- 7 NETWO RK P ROCES SI NG ENG INE- In today s world we are constantly reminded of
More informationI Shopping on mobile / KSA
I Shopping on mobile / KSA Exploring how people use their smartphones for shopping activities Q3 2016 I About this study Background: Objective: Mobile apps and sites are a vital channel for advertisers
More informationComputer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So
Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer
More informationIntroduction to MySQL. Database Systems
Introduction to MySQL Database Systems 1 Agenda Bureaucracy Database architecture overview SSH Tunneling Intro to MySQL Comments on homework 2 Homework #1 Submission date is on the website.. (No late arrivals
More informationWhy isn t your chapter on Facebook?
Why isn t your chapter on Facebook? Last Updated February 2011 Why Facebook? Interact with other Women of Today members Recruit members for your chapter Connect with younger generation Facebook is the
More informationWelcome to Facebook. Presented by Suzi Huisman
Welcome to Facebook Presented by Suzi Huisman PRESENTATION GUIDELINES No cell phones, please turn the sound off. Questions at the end, but at the presenter s discretion. See hhiccbb.org for link to slides
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 04 Tutorial 1, Part 1 Ubuntu Hi everyone, welcome to the first
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationHow to Stay Safe on Public Wi-Fi Networks
How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi
More informationFACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:
FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,
More informationSession Booklet Facebook part 2
Session Booklet Facebook part 2 Facebook, like any online or offline meeting place, carries with it some risks. Remember that you should apply the same common sense and safety rules as you do when you
More informationLogging In & Logging Out
Logging In & Logging Out Logging In Logging into Genesis is very simple: 1. Go to the Web Access URL supplied with your district welcome packet. 2. Enter your Email Address in the Username field 3. Enter
More informationOnline Marketng Checklist
Online Marketng Checklist By Claude Bailey PUBLISHED BY: Weston Bailey, LLC Copyright 2016 Weston Bailey, LLC Contents Is My Website Mobile-Friendly?... 3 Is My Website Indexed By The Big 3 Search Engines?...
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationWhat s Working Now. October YouTube Optimization
What s Working Now October 2015 YouTube Optimization Software Updates Today s Content Crowd Force & Bounce Breaker Why use YouTube? Video content strategy Uploading your videos the right way Optimization
More informationFocused on locking down and monitoring a child s computer/cell phone use. Created for use by Canal Computer Services
Focused on locking down and monitoring a child s computer/cell phone use. Education Background -Bachelors in Information Technology Security -Certified: A+ Network+ Security+ Microsoft Professional Microsoft
More informationDistributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to
More informationComputer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet
More informationCS 240 Fall Mike Lam, Professor. Just-for-fun survey:
CS 240 Fall 2014 Mike Lam, Professor Just-for-fun survey: http://strawpoll.me/2421207 Today Course overview Course policies Python Motivation Computers are digital Data is stored in binary format (1's
More informationFacebook Basics (for individuals)
P a g e 1 Facebook Basics (for individuals) ABOUT THIS CLASS This class is designed to give a basic introduction into Facebook Basics. Throughout the class, we will progress from learning how to create
More informationTHE HISTORY & EVOLUTION OF SEARCH
THE HISTORY & EVOLUTION OF SEARCH Duration : 1 Hour 30 Minutes Let s talk about The History Of Search Crawling & Indexing Crawlers / Spiders Datacenters Answer Machine Relevancy (200+ Factors)
More informationCS 4349 Lecture August 21st, 2017
CS 4349 Lecture August 21st, 2017 Main topics for #lecture include #administrivia, #algorithms, #asymptotic_notation. Welcome and Administrivia Hi, I m Kyle! Welcome to CS 4349. This a class about algorithms.
More informationBlackberry Addiction in Sekolah Bogor Raya
Blackberry Addiction in Sekolah Bogor Raya By Kellya Sociology Sekolah Bogor Raya Academic Year 2011-2012 TABLE OF CONTENT Introduction 3 Reviewing the literature.5 Hypothesis...7 Research design.8 Research
More informationWebsite Training Part 2. Administration of the Website
Rotary Websites: Websites Club, Website Training Part 2 Administration of the Website Club Admin To login first click here Enter your username and password and then click Log In If you have forgotten your
More informationBowie Senior Center Surfing the Web
Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful
More informationMy Digital Footprint. A guide to digital footprint awareness and management
My Digital Footprint A guide to digital footprint awareness and management 2017 Crown copyright 2017 You may re-use this information (excluding logos) free of charge in any format or medium, under the
More information