Public or Private (1)

Size: px
Start display at page:

Download "Public or Private (1)"

Transcription

1 Pi Day: 3.14 Public or Private (1) CCST Mar, 2012 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering Results from Tutorial Compare to Results from % 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Age Gender Birth date address content Web page currently viewing Web browsing history Current Location Content of your IM School grades Photos of you Video of you Your phone call content Phone numbers you have dialed in the past week Bank account number Bank account password Mobile phone number What's on your mind Relationship status What you did yesterday night when you were on the street Political view No Depends Yes % 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Age Age Gender Gender Birth date address Birth date address content content Web browsing history Web page currently viewing Web page currently Web browsing history Current Location Content of your IM Current Location Content of your IM School grades School grades Photos of you Photos of you Video of you Your phone call content Video of you Your phone call content Bank account number Phone numbers you have Bank account number Phone numbers you have Mobile phone number Bank account password Mobile phone number Bank account password Relationship status What's on your mind Relationship status What's on your mind What you did yesterday What you did yesterday Political view Political view 3 4 Defining Public vs. Private n It is extremely difficult to define what is public information and what is private information n It depends on context, intention, convention, social norm, legal system, etc. n All of them very difficult to have a solid definition From Private to Public (1) E.g. Consider the fact that you like the girl sitting next to you. 1. You keep it to yourself without telling anybody Private to you, public to nobody else. 2. You tell the girl you like her, started to date each other, but you don t want other people to know about it Private to you and your girlfriend only 5 6 1

2 From Private to Public (2) 3. You two decided to let your closest friends knows about your relationship Public information among your friends, but not other people. 4. You two decided to get married Public to everybody And many more variations Variation on the situation n Before stage 3, you and your girlfriend are shopping in a public shopping mall, acting like a couple. Situation 1 A stranger on the street saw you two, and realized you two are dating each other Situation 2 Your parent walked by and saw you two, and realized you two are dating each other Do you feel your privacy being violated in either scenarios? 7 8 Some Definitions of Privacy n The issue isn t privacy but control: control of our information and our identities -- Jeff Jarvis, Public Parts, p.93. n privacy is not about controlling information, but about having the ability to control a social situation. -- dana boyd Reverse of Default n Note that in the earlier example, information starts from being private and progress into public information. è Public through effort n A new generation, pioneered by Facebook, has a reverse default that information is public by default è Private through effort E.g. message on a FB wall is viewable by all your friends/public by default, made private by setting it explicitly 9 10 Evolution of Facebook Default A visualization by Matt McKeon Questions to Ponder Upon n What kind of information about you is available, both offline and online? n How do you control the access to the information? n How do you control how your information can be used? n Where do you draw a line between public and private information? n How do you protect your private information? n Why do you need to protect your private information?

3 14/3/12 Content of your s/IMs n Almost 100% said the contents of their s/IMs should remain private. But are they really private? 13 A packet passes through many networks! All your conversations Tier 3 Tier-2 Tier 1 Tier 1 Tier-2 Tier-2 Do you expect the postmen to read your content of your letter before they deliver your mail? Tier-2 Tier-2 15 Sending Postcards Content is wide open Are s/ims more like sealed letters or postcards? Do you expect the postmen to read the content of your postcard before they deliver your mail? Photo by JohnnyEnglish - What makes the difference? Sealing envelope è do not expect people to see the content inside 14 are transmitted as data packets that travel across the Internet. Everybody in the middle can take a look at your message. Photo by gbaku - Sending Letters NAP Tier 1 A. Letter B. Postcard 18 3

4 Encrypting your messages n One way to avoid people reading your IMs (and s) while it travels across the Internet is to encrypt the messages n Many kinds of encryption: Encrypting the content Application layer Encrypting the traffic Transport layer Encrypting the physical network And more Without Encryption Transport Layer Encryption With Server in Between e.g. When you type https in the web browser 21 e.g. You may be connected to an e-commerce site securely with https, but the site relay your information insecurely. 22 End-to-End Encryption Encryption Summary n Transport layer encryption provides endto-end connection between two machines on the Internet n But many applications rely on the presence of a centralized server The server might be able to see all content in some cases n True, application-layer encryption avoid any entity in the middle to decrypt the content

5 Application Layer Encryption Example n For example, if you and your friend understand apple means YES; orange means NO. Then everybody else will only see apple and orange But n You need different ways to code your message to different friends n Also, with insecure lower layer, you increase the chance that someone can break your encryption n E.g. It s quite easy to decrypt simple codebook messages like above if a bad person knows something about you 25 Caveats n The server in the middle will know all your IM content Unless application-layer (end-to-end) encryption is used n In any case, the server knows exactly where and who are you talking to n User do not know exactly what kind of encryption is used Usually just a simple encrypt chat button n Not all IMs provide built-in encryption Built-in Encryption Facility? ICQ/AIM Yahoo Messenger Google Talk MSN messenger Administrivia n Quiz next week Covers lecture & tutorial materials since last quiz n Homework 1 is being graded Results will be available next week n Homework 2 will be posted by end of this week Individual homework Due in 5 April 20% penalty per late day Submit through Moodle Mandatory plagiarism check through integrated Turnitin function 29 Administrivia Project Component Mark Remark Midterm Presentation Final Presentation 4 3 Minutes presentation, 1 slide 8 8 minute presentation + 2 minutes Q&A No limit on # of page Recommend 1 or 2 presenters Summarize results Be entertaining too! Website 12 Use Wordpress as a content management system Account created based on your HKU Information will be sent to your address A blank site template will be created for each group Each group member may modify and insert content for the project 15 mins introduction next week during tutorial Final report (individual) 6 Part 1 (4 pts) Summarize project findings and your role in the project Part 2 (2 pts) review of 5 other projects 30 5

6 Quick Demo of Project Current Location n ~60% said private n ~20% said depends n Most of you said depends on how precise the location information is OK if it is about the level of city NOT OK if it is very precise How well modern technologies can track your position? Knowing your Location n IP address n Global positioning system n WiFi access point association n Cellphone tower association n Digital photos n Many more Identifying Computer n Computers are identified by the IP address on the Internet n Current standard (2012), IPv4 address expressed as 4 numbers between 0 to 255, separated by a dot E.g n Each computer MUST have a unique public IP address on the Internet Maximum about 4 billion addresses in IPv

7 14/3/12 Locating IP Addresses Information from IP address n IP n From your IP address, many of the following information can be found: addresses are allocated by an international body called Internet Assigned Numbers Authority (IANA) n IP Your location Your The corresponding name addresses allocated hierarchically IANA è Regional Internet Registries (RIR) RIR è Internet Service Provider () n Try n The ownership of each IP address can be traced n Free n i.e. A lot can be found out from just the IP address looking up the following IPs: online tools: Using your IP location? Other Information Exposed Localized Recommendations n Apart from IP address, many more information can be obtained about you: n E.g. Browser Screen resolution Your computer platform n Try: Targeted Advertisement Geographical Location Restrictions Datacenter Co-Location n Large companies have their data replicated across the globe through colocation Companies restrict contents to particular physical locations E.g. Google, YouTube, Yahoo, etc n Allow much faster access to data by redirecting your traffic to the nearest datacenter geographically n Localized service Local search results from Google Localized advertisements

8 Discussion Do you mind your current IP address be known to the webserver (e.g. Facebook, YouTube) you are connected to? A. Yes B. No C. I have no choice Hiding your IP n One way (there are many ways) to obscure your IP address is to use a proxy server Originally designed for performance enhancement/ management n Instead of connecting from A to B Connect from A to C Ask C to connect to B Web server Returns the result to A proxy With proxy Without proxy client Tradeoff in using Proxy Server n Now all your traffic has to go through the proxy server It knows all your content Why would someone wants to redirect your content? For profit? n On the other hand, some companies, countries require the use of proxy servers All contents are managed Filter out unwanted contents Content audit Next time n Global Positioning System n WiFi n Mobile Phone

Public or Private (1)

Public or Private (1) 100% Results from Tutorial 2012 Public or Private (1) 90% 80% 70% 60% CCST9015 20 Mar, 2013 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 50% 40% 30% 20% 10% 0% No Depends

More information

The Internet. Charging for Internet 2/8/12. Conceptual Picture of the Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So

The Internet. Charging for Internet 2/8/12. Conceptual Picture of the Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So 2/8/12 The Internet CCST9015 Feb 8, 2012 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How

More information

Introduction to the Internet

Introduction to the Internet Introduction to the Internet CCST9015 8 th Sep, 2010 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Internet in 2003 3 Internet Basics The Internet is a network that connects

More information

Session Booklet Social Media & Facebook

Session Booklet Social Media & Facebook Session Booklet Social Media & Facebook Social networking refers to the use of online social networks such as Facebook to communicate with other people. A social network can include blogs and other ways

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS

A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS EXPLORING THE INTERNET through HOBBIES AND INTERESTS. LEARN HOW TO KEEP IN TOUCH WITH FRIENDS AND FAMILY USING THE INTERNET In these busy times it s easy

More information

The Free Internet. Questions to Ponder On. Packet Switching Network. Circuit Switch vs Packet Switch. Circuit Switching

The Free Internet. Questions to Ponder On. Packet Switching Network. Circuit Switch vs Packet Switch. Circuit Switching The Free Internet CCST9015 Feb 15, 2012 Questions to Ponder On 1. Think of 5 things that you get for free from the Internet. 2. Think of 5 things that you get for free in real life. Dr. Hayden Kwok-Hay

More information

Google Docs Tipsheet. ABEL Summer Institute 2009

Google Docs Tipsheet. ABEL Summer Institute 2009 Google Docs Tipsheet ABEL Summer Institute 2009 Contents Logging in to Google Apps for CollaborativeSchools.net for the First Time... 2 Text Documents Creating a New Text Document in Google Docs... 5 Uploading

More information

Family Technology Boundaries:

Family Technology Boundaries: General questions to answer Family Technology Boundaries: How much time per day/week will various technologies be allowed? Can social media be accessed from all devices? What should children do if they

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

So on the survey, someone mentioned they wanted to work on heaps, and someone else mentioned they wanted to work on balanced binary search trees.

So on the survey, someone mentioned they wanted to work on heaps, and someone else mentioned they wanted to work on balanced binary search trees. So on the survey, someone mentioned they wanted to work on heaps, and someone else mentioned they wanted to work on balanced binary search trees. According to the 161 schedule, heaps were last week, hashing

More information

TomTom Navigation app for iphone/ipad Reference Guide

TomTom Navigation app for iphone/ipad Reference Guide TomTom Navigation app for iphone/ipad Reference Guide Contents Getting Started 6 Start TomTom Navigation app for iphone/ipad... 6 Updating your TomTom Navigation app for iphone/ipad... 6 GPS reception...

More information

** Pre-Sell Page Secrets **

** Pre-Sell Page Secrets ** ** Pre-Sell Page Secrets ** Page 1 - CommissionBlueprint.com 2008 Introduction Using a pre-sell page is a highly effective tactic that can be used in almost any market to motivate a visitor into purchasing

More information

Meeting 39. Guest Speaker Dr. Williams CEH Networking

Meeting 39. Guest Speaker Dr. Williams CEH Networking Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes

More information

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a private browsing modes Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,

More information

facebook a guide to social networking for massage therapists

facebook a guide to social networking for massage therapists facebook a guide to social networking for massage therapists table of contents 2 3 5 6 7 9 10 13 15 get the facts first the importance of social media, facebook and the difference between different facebook

More information

The Basics of Networking

The Basics of Networking c h a p t e r 3 The Basics of Networking Making the Connection lawrence snyder Times are Changing Nowhere Is Remote People are more interconnected Social interactions are changing Freedom of Seach and

More information

Analytics, Insights, Cookies, and the Disappearing Privacy

Analytics, Insights, Cookies, and the Disappearing Privacy Analytics, Insights, Cookies, and the Disappearing Privacy What Are We Talking About Today? 1. Logfiles 2. Analytics 3. Google Analytics 4. Insights 5. Cookies 6. Privacy 7. Security slide 2 Logfiles Every

More information

Security in ECE Systems

Security in ECE Systems Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today

More information

The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation

The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? In our experience, we find we can get over-excited when talking to clients or family or friends and sometimes we forget that not everyone

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 08 Tutorial 2, Part 2, Facebook API (Refer Slide Time: 00:12)

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

User Manual for Student. Moodle Administrator

User Manual for Student. Moodle Administrator User Manual for Student Moodle Administrator 1.Introduction About this document This document is part of a Moodle Learning Management System(LMS) documentation Start Guides for Students. What is Moodle?

More information

Social Networking Applied

Social Networking Applied Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday

More information

Course Staff Intro. Distributed Systems Intro. Logistics. Course Goals. Instructor: David Andersen TAs: Alex Katkova.

Course Staff Intro. Distributed Systems Intro. Logistics. Course Goals. Instructor: David Andersen TAs: Alex Katkova. Distributed Systems Intro Instructor: David Andersen TAs: Alex Katkova Course Staff Intro Jonathan Harbuck Administrative: Angela Miller Logistics Course Policies see web page... http://www.cs.cmu.edu/~dga/15-440/f10

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP INSTRUCTIONS WITH

More information

TELSTRA TECH SAVVY SENIORS - BEGINNERS GUIDE INTRODUCTION TO SOCIAL MEDIA - PART 1

TELSTRA TECH SAVVY SENIORS - BEGINNERS GUIDE INTRODUCTION TO SOCIAL MEDIA - PART 1 TOPIC: INTRODUCTION TO SOCIAL MEDIA PART 1 WHAT TO USE AND WHEN The internet helps you stay in touch with friends and loved ones. Social media sites like Facebook and Twitter let you see what s happening

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Lecture 41 Blockchain in Government III (Digital Identity)

Lecture 41 Blockchain in Government III (Digital Identity) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III

More information

Cyber Smarts Using Social Media Wisely

Cyber Smarts Using Social Media Wisely Cyber Smarts Using Social Media Wisely Posted on March 24, 2016 by Shridevi Stock Photo You have access to the world s largest museum, art gallery, library and social group ever created. You also have

More information

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL Your Your Company Logo Logo GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP

More information

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 07 Tutorial 2 Part 1 Facebook API Hi everyone, welcome to the

More information

The Internet and World Wide Web. Chapter4

The Internet and World Wide Web. Chapter4 The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History

More information

The Activist Guide to Secure Communication on the Internet. Introduction

The Activist Guide to Secure Communication on the Internet. Introduction The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes

More information

Gathering Open Source Intelligence Anonymously Ntrepid Corporation. All rights reserved. PROPRIETARY

Gathering Open Source Intelligence Anonymously Ntrepid Corporation. All rights reserved. PROPRIETARY Gathering Open Source Intelligence Anonymously Background Founded Anonymizer in 1995 Creating Solutions Since 1992 Known for Consumer Privacy Service Major Corporate and Government Customers 2 Exposed

More information

Introduction to the Internet. Internet Basics. Back in time ARPANET 11/20/10 ENGG st semester, Hayden Kwok-Hay So

Introduction to the Internet. Internet Basics. Back in time ARPANET 11/20/10 ENGG st semester, Hayden Kwok-Hay So 11/20/10 Introduction to the Internet ENGG1015 1st Semester, 2010 Hayden Kwok-Hay So 2 Internet Basics The Internet is a that connects millions of of computing devices throughout the world. The Internet

More information

VIDEO 1: WHAT ARE THE SMART CONTENT TOOLS? VIDEO 2: HOW DO YOU CREATE A SMART CTA?

VIDEO 1: WHAT ARE THE SMART CONTENT TOOLS? VIDEO 2: HOW DO YOU CREATE A SMART CTA? VIDEO 1: WHAT ARE THE SMART CONTENT TOOLS? Hello again! I m Angela with HubSpot Academy. Now that you have a contextual marketing strategy in place with segmentation and personalization, you re ready to

More information

FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE

FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE CONTENTFAC.COM As an FYI, this document is designed to go along with our video by the same name. If you haven t checked that out yet, you

More information

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a

More information

Getting Started with Moodle

Getting Started with Moodle Getting Started with Moodle Moodle is the Virtual Learning Environment (VLE) for the University of Kent. Your teachers will use Moodle to provide course materials such as handouts, lecture notes and PowerPoint

More information

INTRODUCTION TO SOCIAL MEDIA Part 1

INTRODUCTION TO SOCIAL MEDIA Part 1 TECH SAVVY SENIORS The NSW Tech Savvy Seniors program is a key initiative of the NSW Ageing Strategy and the Telstra Digital Literacy Strategy. Victorian Tech Savvy Seniors is a Seniors Card Age Friendly

More information

Welcome to Moodle! How To Moodle

Welcome to Moodle! How To Moodle Welcome to Moodle! The MH Vicars School Moodle site is where you ll find all the online components of your Vicars curriculum. For the following year, this will include quizzes and access to multimedia

More information

How to Get a Free Account

How to Get a Free  Account 1 How to Get a Free Email Account This is a free service. You will not be charged in any way to use this service. If you choose this option and signup you can get your email anywhere at home, work, on

More information

Using the Staff Directory Portlet

Using the Staff Directory Portlet Using the Staff Directory Portlet Table of Contents Introduction... 3 Who Should Use This Guide... 3 Setting Up Roles... 3 Adding a Staff Directory Portlet... 4 Setting up the Staff Directory... 4 Tabs

More information

A Step by Step Guide to Postcard Marketing Success

A Step by Step Guide to Postcard Marketing Success A Step by Step Guide to Postcard Marketing Success Table of Contents Why VerticalResponse?...3 Why Postcards?...4 So why use postcards in this modern era?...4 Quickstart Guide...6 Step 1: Setup Your Account...8

More information

Certificate-based authentication for data security

Certificate-based authentication for data security Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important

More information

Internet Crimes Against Children:

Internet Crimes Against Children: Internet Crimes Against Children: Web, 2011 PROGRAM MATERIALS Presented By Professor Donald R. Mason Associate Director & Research Professor The National Center for Justice & the Rule of Law at The University

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Meeting 40. CEH Networking

Meeting 40. CEH Networking Cyber@UC Meeting 40 CEH Networking If You re New! Join our Slack ucyber.slack.com SIGN IN! Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach, Recruitment

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through

More information

Michael Phelps Foundation: Privacy Policy

Michael Phelps Foundation: Privacy Policy Effective November 7, 2018 Michael Phelps Foundation: Privacy Policy General Understanding of Our Privacy Policy The Michael Phelps Foundation ( the Foundation, We, Us, or Our ) understands and respects

More information

Key questions to ask before commissioning any web designer to build your website.

Key questions to ask before commissioning any web designer to build your website. Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,

More information

How to Read AWStats. Why it s important to know your stats

How to Read AWStats. Why it s important to know your stats How to Read AWStats Welcome to the world of owning a website. One of the things that both newbie and even old time website owners get overwhelmed by is their analytics and understanding the data. One of

More information

Map & Locations 16 Using Google Maps Using HTC Footprints

Map & Locations 16 Using Google Maps Using HTC Footprints Map & Locations 16 Using Google Maps...16-2 Turning on Location Services... 16-2 Opening Maps... 16-2 Searching for a Location... 16-3 Getting Directions... 16-3 Finding Friends with Google Latitude...

More information

NORTON WI-FI RISK REPORT: U.S. Results

NORTON WI-FI RISK REPORT: U.S. Results NORTON WI-FI RISK REPORT: U.S. Results Research Objective Norton by Symantec commissioned its second annual online survey, this year expanded to 15 global markets, in order to better understand consumers

More information

Parent. Portal. User. Manual

Parent. Portal. User. Manual EDUCATIONAL SERVICES Parent Portal User Manual Version 3.0 GENESIS STUDENT INFORMATION SYSTEM PARENT PORTAL Introduction 3 Logging In & Logging Out 4 Student Summary Dashboard The Dashboard Selecting a

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information

Azon Master Class. By Ryan Stevenson Guidebook #10 Google and YouTube Marketing

Azon Master Class. By Ryan Stevenson   Guidebook #10 Google and YouTube Marketing Azon Master Class By Ryan Stevenson https://ryanstevensonplugins.com/ Guidebook #10 Google and YouTube Marketing Table of Contents 1. Google Analytics 2. Google Webmaster Tools 3. Google Plus 4. YouTube

More information

Website Designs Australia

Website Designs Australia Proudly Brought To You By: Website Designs Australia Contents Disclaimer... 4 Why Your Local Business Needs Google Plus... 5 1 How Google Plus Can Improve Your Search Engine Rankings... 6 1. Google Search

More information

Prayerful Living Singles User s Manual

Prayerful Living Singles User s Manual Prayerful Living Singles User s Manual Rev. 7/30/15 1 Contents Welcome... 2 Join for free! (Register)... 2 Setting up your profile... 3 Click on Home... 5 Adding Pics... 5 Editing your profile... 6 Understanding

More information

Student Guide INTRODUCTION TO ONLINE RESOURCES

Student Guide INTRODUCTION TO ONLINE RESOURCES Student Guide INTRODUCTION TO ONLINE RESOURCES Date: 12. March. 2018 By: Technical Support Team Table of Contents 1) Introduction 3 2) Student Panel (SIS) 3 2.1) Student Panel (SIS) Login 3 2.1.1) Definitions

More information

I Shopping on mobile / RU

I Shopping on mobile / RU I Shopping on mobile / RU Exploring how people use their smartphones for shopping activities Q3 2016 I About this study Background: Objective: Mobile apps and sites are a vital channel for advertisers

More information

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette

More information

Facebook Tutorial. An Introduction to Today s Most Popular Online Community

Facebook Tutorial. An Introduction to Today s Most Popular Online Community Facebook Tutorial An Introduction to Today s Most Popular Online Community Introduction to Facebook Facebook is the most popular social network, in the U.S. and internationally. In October 2011, more than

More information

So, you re child wants to sign up for Myspace...

So, you re child wants to sign up for Myspace... So, you re child wants to sign up for Myspace... Social networking is a brilliant concept that has sadly been tainted by several nefarious individuals. The term simply means a website that allows its users

More information

Week - 01 Lecture - 04 Downloading and installing Python

Week - 01 Lecture - 04 Downloading and installing Python Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and

More information

Pinterest. What is Pinterest?

Pinterest. What is Pinterest? Pinterest What is Pinterest? Pinterest is like an electronic bulletin board that allows users to save and share photos they find on the internet. Usually when a user pins a photo it is linked to a blog

More information

Hardening Network Routing. Kevin Brady ICTN 4040 April, 2006

Hardening Network Routing. Kevin Brady ICTN 4040 April, 2006 Hardening Network Routing Kevin Brady ICTN April, 6 7 NETWO RK P ROCES SI NG ENG INE- 7 NETWO RK P ROCES SI NG ENG INE- 7 NETWO RK P ROCES SI NG ENG INE- In today s world we are constantly reminded of

More information

I Shopping on mobile / KSA

I Shopping on mobile / KSA I Shopping on mobile / KSA Exploring how people use their smartphones for shopping activities Q3 2016 I About this study Background: Objective: Mobile apps and sites are a vital channel for advertisers

More information

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer

More information

Introduction to MySQL. Database Systems

Introduction to MySQL. Database Systems Introduction to MySQL Database Systems 1 Agenda Bureaucracy Database architecture overview SSH Tunneling Intro to MySQL Comments on homework 2 Homework #1 Submission date is on the website.. (No late arrivals

More information

Why isn t your chapter on Facebook?

Why isn t your chapter on Facebook? Why isn t your chapter on Facebook? Last Updated February 2011 Why Facebook? Interact with other Women of Today members Recruit members for your chapter Connect with younger generation Facebook is the

More information

Welcome to Facebook. Presented by Suzi Huisman

Welcome to Facebook. Presented by Suzi Huisman Welcome to Facebook Presented by Suzi Huisman PRESENTATION GUIDELINES No cell phones, please turn the sound off. Questions at the end, but at the presenter s discretion. See hhiccbb.org for link to slides

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 04 Tutorial 1, Part 1 Ubuntu Hi everyone, welcome to the first

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

How to Stay Safe on Public Wi-Fi Networks

How to Stay Safe on Public Wi-Fi Networks How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi

More information

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines: FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,

More information

Session Booklet Facebook part 2

Session Booklet Facebook part 2 Session Booklet Facebook part 2 Facebook, like any online or offline meeting place, carries with it some risks. Remember that you should apply the same common sense and safety rules as you do when you

More information

Logging In & Logging Out

Logging In & Logging Out Logging In & Logging Out Logging In Logging into Genesis is very simple: 1. Go to the Web Access URL supplied with your district welcome packet. 2. Enter your Email Address in the Username field 3. Enter

More information

Online Marketng Checklist

Online Marketng Checklist Online Marketng Checklist By Claude Bailey PUBLISHED BY: Weston Bailey, LLC Copyright 2016 Weston Bailey, LLC Contents Is My Website Mobile-Friendly?... 3 Is My Website Indexed By The Big 3 Search Engines?...

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

What s Working Now. October YouTube Optimization

What s Working Now. October YouTube Optimization What s Working Now October 2015 YouTube Optimization Software Updates Today s Content Crowd Force & Bounce Breaker Why use YouTube? Video content strategy Uploading your videos the right way Optimization

More information

Focused on locking down and monitoring a child s computer/cell phone use. Created for use by Canal Computer Services

Focused on locking down and monitoring a child s computer/cell phone use. Created for use by Canal Computer Services Focused on locking down and monitoring a child s computer/cell phone use. Education Background -Bachelors in Information Technology Security -Certified: A+ Network+ Security+ Microsoft Professional Microsoft

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet

More information

CS 240 Fall Mike Lam, Professor. Just-for-fun survey:

CS 240 Fall Mike Lam, Professor. Just-for-fun survey: CS 240 Fall 2014 Mike Lam, Professor Just-for-fun survey: http://strawpoll.me/2421207 Today Course overview Course policies Python Motivation Computers are digital Data is stored in binary format (1's

More information

Facebook Basics (for individuals)

Facebook Basics (for individuals) P a g e 1 Facebook Basics (for individuals) ABOUT THIS CLASS This class is designed to give a basic introduction into Facebook Basics. Throughout the class, we will progress from learning how to create

More information

THE HISTORY & EVOLUTION OF SEARCH

THE HISTORY & EVOLUTION OF SEARCH THE HISTORY & EVOLUTION OF SEARCH Duration : 1 Hour 30 Minutes Let s talk about The History Of Search Crawling & Indexing Crawlers / Spiders Datacenters Answer Machine Relevancy (200+ Factors)

More information

CS 4349 Lecture August 21st, 2017

CS 4349 Lecture August 21st, 2017 CS 4349 Lecture August 21st, 2017 Main topics for #lecture include #administrivia, #algorithms, #asymptotic_notation. Welcome and Administrivia Hi, I m Kyle! Welcome to CS 4349. This a class about algorithms.

More information

Blackberry Addiction in Sekolah Bogor Raya

Blackberry Addiction in Sekolah Bogor Raya Blackberry Addiction in Sekolah Bogor Raya By Kellya Sociology Sekolah Bogor Raya Academic Year 2011-2012 TABLE OF CONTENT Introduction 3 Reviewing the literature.5 Hypothesis...7 Research design.8 Research

More information

Website Training Part 2. Administration of the Website

Website Training Part 2. Administration of the Website Rotary Websites: Websites Club, Website Training Part 2 Administration of the Website Club Admin To login first click here Enter your username and password and then click Log In If you have forgotten your

More information

Bowie Senior Center Surfing the Web

Bowie Senior Center Surfing the Web Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful

More information

My Digital Footprint. A guide to digital footprint awareness and management

My Digital Footprint. A guide to digital footprint awareness and management My Digital Footprint A guide to digital footprint awareness and management 2017 Crown copyright 2017 You may re-use this information (excluding logos) free of charge in any format or medium, under the

More information