Digital Life Analysis: Undergrad Single

Size: px
Start display at page:

Download "Digital Life Analysis: Undergrad Single"

Transcription

1 Nathan Goulding November 21, 2006 CS 489 Digital Forensics Digital Life Analysis: Undergrad Single Executive Summary This paper analyzes the impact that people make in today's digital world. The use of the Internet and various websites is examined, including personal, social networking, music search, and general question-and-answer websites. The popular Google search engine is used to demonstrate the types of information available about the author, including various news articles, messages, and a short biography. Finally, a brief look at a person's impact in the "offline" digital world is also included, in addition to a list of possible areas of further research. Introduction Digital technology is everywhere. We use computers and other electronic devices daily for conducting business, for communication, for leisure, and for many other activities. Almost every time we send an , purchase something with a credit card, or browse the World Wide Web, we leave a trace. In this paper I will examine the imprint we leave in the digital world, and in particular I will focus on the impact we make through use of the Internet. The Internet and the World Wide Web The World Wide Web is composed of billions of websites for innumerable purposes. Examples include websites for distributing news, making financial transactions, playing games, sending , finding information, and connecting with other people. One of the biggest contributions to a person's "digital footprint" is his or her own personal website. With cheap and abundant web hosting readily available, more and more people are building their own web pages to share information with friends, family, and colleagues. Personal websites can include anything from family pictures to research

2 Goulding 2 publications. However, people should exercise caution with the information they publish. Contact information such as a telephone number, postal address, and address is easily captured by computer programs that scour the Web for such data, and this information can be used for malicious purposes. Another significant contribution to a person's digital imprint is participation in social networking websites. Social networking has become very popular in recent years, especially among high school and college students, but among other members of society as well. Some companies, such as Facebook [1], limit the scope of information that users can see; Facebook divides its website into different networks based on schools, businesses, or geographical areas. Other companies, like MySpace [2], allow much greater access to users' information. Many users of these social networking websites do not read each company's privacy policy, and unfortunately the policies often describe some less-than-scrupulous business practices. For example, Facebook previously included this statement in its privacy policy: "We may share your information with third parties, including responsible companies with which we have a relationship." The company has since removed this clause from the policy, but until it did, users had no right to privacy from third-party companies. There are many other types of websites in which people leave digital footprints. For example, Pandora is a popular website dedicated to music search [3]. The Pandora service allows users to create custom radio stations based on music they like, and they can then listen to these stations anywhere a broadband Internet connection is available. What most users don't realize is that the default setting is to publish your music stations and customizations for everyone else to see. Your embarrassing fondness for The Monkees becomes public if someone can associate your real name with your Pandora account, unless you search through a number of menus in the Pandora interface and find the option to disable your online profile. Ask MetaFilter [4] is a branch of the MetaFilter [5] website in which users can post questions about anything they wish, and answers to other users' questions that they feel

3 Goulding 3 comfortable providing information about. Questions range from asking for suggestions of things to do in specific towns, to requesting help with troubleshooting a faulty computer monitor, to providing a vague description of a story and asking where it came from. Users of MetaFilter, or "MeFites" as they are known, must be logged-in to post questions and answers, and this means that every user account forms a profile of that user. Much information can be gained about a user by looking at the questions he has asked and the replies to other questions he has posted. For example, if a user frequently asks questions about art galleries in Los Angeles, she is likely an art connoisseur in the Los Angeles area. Internet Search One very simple method for a digital forensics investigator to locate more information about a suspect is to search for the suspect's real name using an online search engine such as Google [6]. In addition to the suspect's real name, an investigator should also search for known online aliases that the suspect uses. Aliases and user names are commonly used in online discussion forums and other similar websites instead of real names. An important consideration to keep in mind when using an online search engine is that most engines cache content as they crawl the Web, and this means that since-updated information is frequently still available. This fact is useful if an investigator is looking for information that has recently been erased or modified. To determine part of my own digital footprint, I used Google to search for websites containing my name. A search for "Nathan Goulding" yielded several interesting results. For example, there are currently two other people named Nathan Goulding in addition to myself that return a significant number of web pages. Some of the results specific to me include news articles from New Mexico Tech's website and various newspapers, minutes from IEEE board meetings, messages I have ed to the Lyris lists for IEEE and Tau Beta Pi on campus, and a number of other miscellaneous web pages. Additionally, I found short biographies of myself on

4 Goulding 4 the websites of a few of my former employers. In my search I came across a web log (or "blog") belonging to a different Nathan Goulding [7]. This Nathan is a student at New York University who coincidentally is only a few months older than me and also shares my interest in technology. As I was browsing his website, I came across an entry titled "Not Me" [8], and I saw my own picture on the front page! The picture is a black-and-white reproduction printed in the Mountain Mail newspaper, and presumably Nathan stumbled across the online version [9]. I am now friends with Nathan after contacting him with Facebook. Information Security Despite growing concerns about privacy, a number of websites are not very secure in handling their users' information. I applied for a few different graduate fellowships this semester, and all of the applications were online. Most allow the applicant to set up a user name and password, but the National Physical Science Consortium uses a different, and shocking, approach. After the user registers, he is given a unique "access code" to return to his application after logging off. The shocking fact is that this access code is all that is needed to view and modify the application there is no password required. Although the access codes appear to be random numbers, the system is insecure against a brute-force attack, because there are thousands of valid codes. An attacker could compromise a large amount of data about fellowship applicants, including contact information, Social Security numbers, and financial status information. I have been surprised in a number of other instances when careless mistakes have led to a leak of information. For example, the professors of a number of my classes in this and previous semesters have frequently posted grade information to their class websites. Normally grades are posted in such a manner as to not identify each person; for example, one professor posts grades next to the last four digits of each student's ID number. However, there have been a few times

5 Goulding 5 when the names of students have accidentally been published right alongside the grades. Although the professors have always fixed the situation quickly after being alerted, the information is still public until someone notices, and there is always the possibility that it has been cached during a search engine's regular crawl. Also, there is nothing to stop a malicious intruder from saving the information to his hard drive. The Offline World I have discussed some concerns about our digital impact in the online world, but there are also considerations "offline" as well. With the widespread use of computers and other electronic devices, people leave offline digital imprints everywhere. The most notable example is a person's own computer hard disk drive. A hard drive is a central repository for much of an individual's life; it contains a cornucopia of personal information, including personal documents, financial information, music and video files, and instant message logs, and software that the owner has installed. In addition to computer hard drives, people also leave an audit trail whenever they conduct a credit card transaction. Some of the credit card companies openly monitor this information for the purpose of fraud prevention. For example, some companies will contact the customer if his or her card is used in two geographically distant locations within a short timespan. In this case the audit trail is beneficial, but we can never be sure what other information is being used by the credit card companies, and for what purposes they are using it. Future Work I have only touched on a few topics in this paper, and there are many other examples of locations in which we leave a digital trail: communication Discussion forums Community forums, such as Craigslist [10] Online auction transactions

6 Goulding 6 Online banking and investment websites Online data storage websites Online video-hosting websites, such as YouTube [11] Conclusions Although brief, this paper has discussed some of the aspects that shape our digital footprints, in both the online and offline worlds. With the explosion in use of the World Wide Web, people must be careful about their personal information and how it is handled. With the right tools, digital forensics investigators and anyone else with similar access can discover a significant amount of information about a suspect or target.

7 Goulding 7 Referenced Websites [1] Facebook, Inc. < [2] MySpace, Inc. < [3] Pandora Media, Inc. < [4] Ask MetaFilter < [5] MetaFilter Network, LLC < [6] Google, Inc. < [7] NathanGoulding.com < [8] "Not Me". NathanGoulding.com < not_me&more=1&c=1&tb=1&pb=1> [9] "Honor Society Gives Scholarship To Tech Student". Mountain Mail Newspaper < php> [10] Craigslist, Inc. < [11] YouTube, Inc. <

Social Networking Applied

Social Networking Applied Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday

More information

Ning Frequently Asked Questions

Ning Frequently Asked Questions Ning Frequently Asked Questions Ning is a Web tool that allows anyone to create a customizable social network, allowing users to share pictures and videos, maintain blogs, communicate in chat and discussion

More information

and the Forensic Science CC Spring 2007 Prof. Nehru

and the Forensic Science CC Spring 2007 Prof. Nehru and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Wimba Pronto. Version 2.0. User Guide

Wimba Pronto. Version 2.0. User Guide Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto

More information

Social Media and Masonry

Social Media and Masonry Social Media and Masonry What is social media? Social media describes the various ways of using technology to connect with an audience. Every Lodge should have a social media or outreach program that connects

More information

CRM Insights. User s Guide

CRM Insights. User s Guide CRM Insights User s Guide Copyright This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

ArcMap Online Tutorial Sarah Pierce How to map in ArcMap Online using the Fresh Prince of Bel Air as an example

ArcMap Online Tutorial Sarah Pierce How to map in ArcMap Online using the Fresh Prince of Bel Air as an example Fall GARP ArcMap Online Tutorial Sarah Pierce How to map in ArcMap Online using the Fresh Prince of Bel Air as an example Westfield State University Let s say you ve never used ArcGIS before and your professor

More information

Wimba Pronto. Version 2.1. User Guide

Wimba Pronto. Version 2.1. User Guide Wimba Pronto Version 2.1 User Guide Wimba Pronto 2.1 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto? 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto

More information

Getting Started Reliance Communications, Inc.

Getting Started Reliance Communications, Inc. Getting Started Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.com Contents Before you Begin... 3 Bookmark Your Login Page... 3 Setting your Password...

More information

More Interactive Service is Now Available

More Interactive Service is Now Available More Interactive Service is Now Available Are you a newcomer for the Colombia Aprende? Visit help center(http://colombiaaprende.edu.co/help), You can ask to the community and helpers how to find the content

More information

MEMBERSHIP & PARTICIPATION

MEMBERSHIP & PARTICIPATION MEMBERSHIP & PARTICIPATION What types of activities can I expect to participate in? There are a variety of activities for you to participate in such as discussion boards, idea exchanges, contests, surveys,

More information

Student E-Safety Induction

Student E-Safety Induction Central College Nottingham Student E-Safety Induction Academic Year 2015-16 Training & Learning Technologies September 2015 E-Safety It is important to the College that all students know how to stay safe

More information

ASTE 2016 Ning Network access our Ning on a mobile device, browsers FREE should NOT To join the ASTE 2016 Ning

ASTE 2016 Ning Network access our Ning on a mobile device, browsers FREE should NOT To join the ASTE 2016 Ning ASTE 2016 Ning Network Ning is a social networking site where groups of people can interact in a number of ways, including forums, photos, videos, and other options as the site expands. Ning also uses

More information

Protect Yourself From. Identify Theft

Protect Yourself From. Identify Theft Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain

More information

Yammer Product Manager Homework: LinkedІn Endorsements

Yammer Product Manager Homework: LinkedІn Endorsements BACKGROUND: Location: Mountain View, CA Industry: Social Networking Users: 300 Million PART 1 In September 2012, LinkedIn introduced the endorsements feature, which gives its users the ability to give

More information

Getting Started with Social Media

Getting Started with Social Media Getting Started with Social Media Step 1: Go to www.facebook.com Step 2: Fill out the Sign Up form located on the homepage, including full name, e-mail address, a password and birthday, to start a free

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Facebook Tutorial. An Introduction to Today s Most Popular Online Community

Facebook Tutorial. An Introduction to Today s Most Popular Online Community Facebook Tutorial An Introduction to Today s Most Popular Online Community Introduction to Facebook Facebook is the most popular social network, in the U.S. and internationally. In October 2011, more than

More information

District 5910 Website Quick Start Manual Let s Roll Rotarians!

District 5910 Website Quick Start Manual Let s Roll Rotarians! District 5910 Website Quick Start Manual Let s Roll Rotarians! All Rotarians in District 5910 have access to the Members Section of the District Website THE BASICS After logging on to the system, members

More information

The Smartphone Consumer June 2012

The Smartphone Consumer June 2012 The Smartphone Consumer 2012 June 2012 Methodology In January/February 2012, Edison Research and Arbitron conducted a national telephone survey offered in both English and Spanish language (landline and

More information

My Digital Footprint. A guide to digital footprint awareness and management

My Digital Footprint. A guide to digital footprint awareness and management My Digital Footprint A guide to digital footprint awareness and management 2017 Crown copyright 2017 You may re-use this information (excluding logos) free of charge in any format or medium, under the

More information

Social Media E-Safety Guide. For more help and advice visit:

Social Media E-Safety Guide. For more help and advice visit: Social Media E-Safety Guide For more help and advice visit: https://www.net-aware.org.uk/ https://www.thinkuknow.co.uk/ https://www.ceop.police.uk/ Twitter https://www.net-aware.org.uk/networks/twitter/

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What You Will Learn WHAT IS THE CLOUD? PAGE 03 Basic Vocabulary Advantages of the Cloud Disadvantages of the Cloud CLOUD STORAGE SERVICES

More information

SOLUTIONS GUIDE. I Don t Know What to or

SOLUTIONS GUIDE. I Don t Know What to  or SOLUTIONS GUIDE I Don t Know What to Email or How to Write My Email, Can I Have Some Ideas? We often hear from new students that one of their biggest challenges creating content for email campaigns. Not

More information

HIGH-IMPACT SEO DIY IN 5 MINUTES SEO OR LESS. Digital Marketer Increase Engagement Series

HIGH-IMPACT SEO DIY IN 5 MINUTES SEO OR LESS. Digital Marketer Increase Engagement Series DIY SEO HIGH-IMPACT SEO IN 5 MINUTES OR LESS Digital Marketer Increase Engagement Series DIY SEO: HIGH-IMPACT SEO IN 5 MINUTES OR LESS Brought To You By: Digital Marketer PUBLISHED BY: HOW TO SEO A WORDPRESS

More information

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia Creating and Protecting Your Online Identity for Job Search Contents 1. Creating a Positive Online Presence... 2 2. Your Digital Tattoo... 3 3. Your Professional Identity... 5 4. Social Media Advice...

More information

Chapter Review. 42 Chapter 1 Introduction to Computers

Chapter Review. 42 Chapter 1 Introduction to Computers 42 Chapter 1 Introduction to Computers Chapter Review 1. Why Is Computer Literacy Vital in Today s World? Computer literacy, or digital literacy, involves having current knowledge and understanding of

More information

LAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1

LAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1 LAWGIX LAWYERS, LLC External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, 2019 1 Document Summary Policy Title: Procedure Owner: External Privacy Policy Steering Committee Effective Date:

More information

Social Networking in Action

Social Networking in Action Social Networking In Action 1 Social Networking in Action I. Facebook Friends Friends are people on Facebook whom you know, which can run the range from your immediate family to that person from high school

More information

Google technology for teachers

Google technology for teachers Google technology for teachers Sandhya Digambar Shinde Assistant Professor, Department of Library and Information Science, Jayakar Library, University of Pune-411007 Pune, Maharashtra, India srmaharnor@unipune.ac.in

More information

Welcome to The Wise Woman University

Welcome to The Wise Woman University Welcome to The Wise Woman University Starting a Course The Wise Woman University consists of two websites: www.wisewomanuniversity.org and www.wisewomanuniversity.ning.com. These two websites serve different

More information

Memorandum Participants Method

Memorandum Participants Method Memorandum To: Elizabeth Pass, Associate Professor, School of Writing, Rhetoric and Technical Communication From: Andrew Carnes, WRTC 456 Section 1[ADC] Date: February 2, 2016 Re: Project 1 Competitor

More information

WALK MS Fundraise with. Guide To Fundraising with Facebook Created by the Georgia Chapter

WALK MS Fundraise with. Guide To Fundraising with Facebook Created by the Georgia Chapter WALK MS Fundraise with Fundraise with Facebook Using CharityDynamics new boundlessfundraising TM Application for Facebook, you can extent your fundraising efforts beyond the National MS Society s Participant

More information

Nespresso Consumer Privacy Notice

Nespresso Consumer Privacy Notice Nespresso Consumer Privacy Notice Effective: March 4, 2015 Last Updated On: March 4, 2015 Please read this Notice carefully to understand our policies and practices regarding your personal information

More information

Features Guide. Get the most from your BlackBerry Curve 8530 smartphone.

Features Guide. Get the most from your BlackBerry Curve 8530 smartphone. Features Guide Get the most from your BlackBerry Curve 8530 smartphone. It s all on the Now Network. This Features Guide has everything you need to get the most from your new Sprint device. Just go directly

More information

Dear Select Choir Students and Families,

Dear Select Choir Students and Families, Dear Select Choir Students and Families, Edmodo is a free, secure, social learning platform for teachers, students, schools and districts. Edmodo provides teachers and students with a secure and easy way

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

The blog tool can be used to support individual or group student projects or as a communication tool within a VITAL module.

The blog tool can be used to support individual or group student projects or as a communication tool within a VITAL module. VITAL how to guides elearning Unit Last updated: 25.02.11 Blog (Campus Pack) tool Blog (Campus Pack) tool... 1 Overview... 1 To add a blog to a VITAL module... 1 Change the look & feel of a blog... 5 Add

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Online Communication.  Chat Rooms Instant Messaging Blogging Social Media Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media { Advantages: { Reduces cost of postage Fast and convenient Need an email address to sign up for other online accounts. Eliminates

More information

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Online Communication.  Chat Rooms Instant Messaging Blogging Social Media Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media Advantages: Reduces cost of postage Fast and convenient Eliminates phone charges Disadvantages: May be difficult to understand

More information

Netvibes in the Classroom

Netvibes in the Classroom OpenStax-CNX module: m18336 1 Netvibes in the Classroom * Evelyn Jessie This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 Netvibes in the Classroom Save

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

Kenex (Electro-Medical) Limited. Privacy Statement. Kenex (Electro-Medical) Limited (Kenex) have been in business for over 40 years and have

Kenex (Electro-Medical) Limited. Privacy Statement. Kenex (Electro-Medical) Limited (Kenex) have been in business for over 40 years and have Kenex (Electro-Medical) Limited Privacy Statement Kenex (Electro-Medical) Limited (Kenex) have been in business for over 40 years and have established a reputation for providing high quality, well designed

More information

Learning and Development. UWE Staff Profiles (USP) User Guide

Learning and Development. UWE Staff Profiles (USP) User Guide Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference

More information

AAG Mobile App User Manual

AAG Mobile App User Manual AAG Mobile App User Manual Tired of carrying a large printed program around the AAG Annual Meeting? Want to easily organize your AAG session schedule in a digital calendar format? Looking to save some

More information

American Dream Weebly Assignment: Semester-long culminating assignment

American Dream Weebly Assignment: Semester-long culminating assignment American Dream Weebly Assignment: Semester-long culminating assignment Students complete in the classroom a character analysis comparing two characters they have learned about through literature read in

More information

Wimba Pronto. Version 3.1. User Guide

Wimba Pronto. Version 3.1. User Guide Wimba Pronto Version 3.1 User Guide Wimba Pronto 3.1 User Guide Welcome to Wimba Pronto 1 Top Wimba Pronto Features 1 What's New in Wimba Pronto? 3 Getting Started 4 Wimba Pronto System Requirements 4

More information

ProgressTestA Unit 5. Vocabulary. Grammar

ProgressTestA Unit 5. Vocabulary. Grammar ProgressTestA Unit Vocabulary 1 Completethesentenceswithappropriate words.thefirstlettersofthewordshavebeen given. a Can you believe it? She s getting married to a man she has met on a s networking site!

More information

Modern Cookie Stuffing

Modern Cookie Stuffing Modern Cookie Stuffing A step-by-step guide on modern cookie stuffing techniques that actually work Before you begin to read this, please be aware that this e-book is not for the lazy internet marketer.

More information

ELLUCIAN GO HOW-TO GUIDE

ELLUCIAN GO HOW-TO GUIDE ELLUCIAN GO HOW-TO GUIDE 03.31.17 CONTENTS GET THE ELLUCIAN GO APP... CHOOSE ACM AS YOUR SCHOOL... SIGN IN... ELLUCIAN GO MENU... REGISTER FOR COURSES... MY SCHEDULE... MY GRADES... MY FINANCIALS... ACADEMICS

More information

Getting Started Guide

Getting Started Guide Getting Started Guide for education accounts Setup Manual Edition 7 Last updated: September 15th, 2016 Note: Click on File and select Make a copy to save this to your Google Drive, or select Print, to

More information

Finance on mobile: Canada

Finance on mobile: Canada Finance on mobile: Canada Exploring how people use their smartphones for finance activities Commissioned: 2016 Q3 This is a title and it will Google has commissioned this study for Think with Google. We're

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

Getting Started in TRACS Version /1/09

Getting Started in TRACS Version /1/09 What is TRACS? TRACS (Teaching, Research, And Collaboration System) is a new open-source collaborative learning environment. TRACS is being built on a technology developed by a consortium of universities

More information

Getting Started with Moodle 2.0

Getting Started with Moodle 2.0 Getting Started with Moodle 2.0 Note: Please use Mozilla Firefox if you are working on a Mac 1. Login to Moodle 2. How to Access a Course 3 Edit your Profile Information 4. Add a Personal photo 5. Disable

More information

Out for Shopping-Understanding Linear Data Structures English

Out for Shopping-Understanding Linear Data Structures English Out for Shopping-Understanding Linear Data Structures English [MUSIC PLAYING] [MUSIC PLAYING] TANZEELA ALI: Hi, it's Tanzeela Ali. I'm a software engineer, and also a teacher at Superior University, which

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Featured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact

Featured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact Saturday, February 28, 2009 03:50:18 PM To search, type and hit ente SEARCH RSS Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact SUBSCRIBE TO OUR MAILING LIST First Name:

More information

DreamApps. WorkSpace. A Guide to Demo Site

DreamApps. WorkSpace. A Guide to Demo Site DreamApps WorkSpace A Guide to Demo Site DreamApps WorkSpace A Guide to Demo Site Published at Singapore on January 31, 2009 2009, Advanced ERP Projects, LLP. All rights reserved. Restricted circulation.

More information

Getting to know your ipad exploring the settings, App store, Mail

Getting to know your ipad exploring the settings, App store, Mail Getting to know your ipad exploring the settings, App store, Mail Exploring the settings Open the settings app from your homepage Wi-Fi Turn Wi-Fi on/off Add new Wi-Fi Connection Enter Network Name, any

More information

Yearbook Journalism Code of Ethics

Yearbook Journalism Code of Ethics CODE OF CONDUCT AND ETHICS Staff members must dress appropriately every day; students who do not dress appropriately will not be allowed to go off campus for errands. Whenever a student is working as a

More information

Welcome to the Next Level Purchasing Association. Next Level Purchasing is absolutely delighted to have you as a member.

Welcome to the Next Level Purchasing Association. Next Level Purchasing is absolutely delighted to have you as a member. 0 Table of Contents Introduction... 1 Logging In... 2 Courses... 3 Accessing & Enrolling in Courses... 3 Attending Courses... 4 SPSM Family of Certifications: Exams... 4 SPSM Family of Certifications:

More information

elg e oo Slides G Driv

elg e oo Slides G Driv Google Drive Slides Go to drive.google.com Google Drive Select Create an account Enter in your information Google Drive Google Slides Create and share your work online and access your documents from anywhere

More information

VIMS Individual Users Guide. How to access your VIMS site, login and use all the features!

VIMS Individual Users Guide. How to access your VIMS site, login and use all the features! VIMS Individual Users Guide www.myvims.com How to access your VIMS site, login and use all the features! Left Click Your Mouse to Advance Slides, Right click to back up one or press ESC to exit presentation.

More information

Office 365 provided by Hugh Baird College

Office 365 provided by Hugh Baird College Office 365 provided by Hugh Baird College What is Office 365? Office 365 is a series of online tools and resources that will assist you with your work and studies. All you need to access these resources

More information

Overview: Students explore how they can use to communicate with real people within their schools, families, and communities.

Overview: Students explore how they can use  to communicate with real people within their schools, families, and communities. Sending Email LESSON PLAN Essential Question: How do you connect with others through email? Learning Overview and Objectives Overview: Students explore how they can use email to communicate with real people

More information

(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail)

(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail) Specific instructions on how to compose a professional e-mail using send and reply options, basic e-mail components, appropriate wording, content, tone, and examples of what not to do. (Photos and Instructions

More information

Distribution Lists

Distribution Lists E-mail Distribution Lists Q1: What is an e-mail distribution list? A: An e-mail distribution list allows a user to send an e-mail message to a group of people. At HWS, the facultyannouncements@hws.edu,

More information

Edmodo for Teachers Guide (Taken directly from Edmodo s site.)

Edmodo for Teachers Guide (Taken directly from Edmodo s site.) Edmodo for Teachers Guide (Taken directly from Edmodo s site.) Table of Contents: 1. Teacher Sign Up 2. Create a Group 3. Manage Your Groups 4. Small Group 5. Co-Teaching 6. Student Sign up 7. Post a Message

More information

Tim Berners Lee and the World Wide Web. Author: Peter Rohrbach 7th Grade Website

Tim Berners Lee and the World Wide Web. Author: Peter Rohrbach 7th Grade Website Tim Berners Lee and the World Wide Web Author: Peter Rohrbach 7th Grade Website For my entry into the National History Day project, i chose my topic: Tim Berners Lee and the World Wide Web. The term World

More information

Signs of Financial Fraud of the Elderly. Brenda Charles-Edwards National Notary Association Ambassador for Washington State

Signs of Financial Fraud of the Elderly. Brenda Charles-Edwards National Notary Association Ambassador for Washington State Signs of Financial Fraud of the Elderly Brenda Charles-Edwards National Notary Association Ambassador for Washington State Topics of Discussion I. What is the Abuse and Who is Affected? II. What are the

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

The Internet and the World Wide Web Lesson 3 Communicating on the Internet

The Internet and the World Wide Web Lesson 3 Communicating on the Internet The Internet and the World Wide Web Lesson 3 Communicating on the Internet Edited by J. Howard, R. Scott & C. Rhodes 09/11 Lesson 3: Communicating on the Internet Objectives After completing this lesson,

More information

Everyday Digital Skills Projects Plus skills learned through the project

Everyday Digital Skills Projects Plus skills learned through the project Everyday Digital Skills Projects Plus skills learned through the project Embedded ICT skills printed on the back of each project. Compiled by Digital Learning Futures for NG Media Hints and tips Apps or

More information

The secure remote support, remote access and online meeting software that the world relies on.

The secure remote support, remote access and online meeting software that the world relies on. The secure remote support, remote access and online meeting software that the world relies on. TeamViewer, the market leader activated by users on 1.3 billion devices worldwide. The Right Solution for

More information

Lecture 41 Blockchain in Government III (Digital Identity)

Lecture 41 Blockchain in Government III (Digital Identity) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III

More information

SECURITY AND DATA REDUNDANCY. A White Paper

SECURITY AND DATA REDUNDANCY. A White Paper SECURITY AND DATA REDUNDANCY A White Paper Security and Data Redundancy Whitepaper 2 At MyCase, Security is Our Top Priority. Here at MyCase, we understand how important it is to keep our customer s data

More information

DIGITAL IDENTITY MANAGEMENT

DIGITAL IDENTITY MANAGEMENT DIGITAL IDENTITY MANAGEMENT Temple Community Platform Digital identity is what uniquely describes a person and their relationships online. Most of us today are experts in social identity management (e.g.,

More information

The Internet and World Wide Web. Chapter4

The Internet and World Wide Web. Chapter4 The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History

More information

INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE METHODS FOR REMAINING ANONYMOUS, PRIVATE, AND SECURE WHILE COMMUNICATING, PUBLISHING, BUYING,

INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE METHODS FOR REMAINING ANONYMOUS, PRIVATE, AND SECURE WHILE COMMUNICATING, PUBLISHING, BUYING, INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE METHODS FOR REMAINING ANONYMOUS, PRIVATE, AND SECURE WHILE COMMUNICATING, PUBLISHING, BUYING, DOWNLOAD EBOOK : INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE

More information

Norton Online Reputation Report: Why Millennials should manage their online footprint

Norton Online Reputation Report: Why Millennials should manage their online footprint Norton Online Reputation Report: Why Millennials should manage their online footprint UK May 2016 Methodology A quantitative survey was conducted online among 1,000 mobile users aged 18-34 years who own

More information

Parent Student Portal User Guide. Version 3.1,

Parent Student Portal User Guide. Version 3.1, Parent Student Portal User Guide Version 3.1, 3.21.14 Version 3.1, 3.21.14 Table of Contents 4 The Login Page Students Authorized Users Password Reset 5 The PSP Display Icons Header Side Navigation Panel

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Forms of communication in 21 st century. "Successful Communication-The future of Europe"

Forms of communication in 21 st century. Successful Communication-The future of Europe Forms of communication in 21 st century "Successful Communication-The future of Europe" Definition of Communication The roots of the word communication (communis, or common) accurately portray its purpose.

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information

Relationship of Mobile Phone Usage and GPA among the Undergraduate Students at the University of the West Indies - Mona Campus

Relationship of Mobile Phone Usage and GPA among the Undergraduate Students at the University of the West Indies - Mona Campus Relationship of Mobile Phone Usage and GPA among the Undergraduate Students at the University of the West Indies - Mona Campus Tashfeen Ahmad Researcher, Faculty of Social Sciences The University of the

More information

Security and Privacy

Security and Privacy E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila

More information

Features Guide. Get the most from your device.

Features Guide. Get the most from your device. Features Guide Get the most from your device. It s all on the Now Network. This Features Guide has everything you need to get the most from your new Sprint device. Just go directly to any feature that

More information

Staff User Guide PowerSchool Student Information System

Staff User Guide PowerSchool Student Information System PowerSchool Student Information System Document Properties Copyright Owner 2005 Apple Computer, Inc. All rights reserved. This document is the property of Apple Computer, Inc. and is for reference only.

More information

Facebook Basics. Agenda:

Facebook Basics. Agenda: Basics Agenda: 1. Introduction 2. The evolution of Facebook 3. Your profile 4. Finding friends 5. Saving and sharing 6. Chat and messages 7. Facebook privacy 8. Practice, Questions, Evaluation In order

More information

Getting Started with Moodle WEB: elearning.wit.ie PHONE:

Getting Started with Moodle WEB: elearning.wit.ie   PHONE: WIT Staff Guide: Getting Started with Moodle WEB: elearning.wit.ie EMAIL: PHONE: 051-834114 Visit elearning.wit.ie for details of workshops, screencasts and resources. GettingStartedWithMoodleLecturerGuide1.9

More information

UTILIZING THE NEW ALDA WEBSITE (CHAPTER LEADERS GROUP) PRESENTER: BRIAN JENSEN SEPTEMBER 16, 2016

UTILIZING THE NEW ALDA WEBSITE (CHAPTER LEADERS GROUP) PRESENTER: BRIAN JENSEN SEPTEMBER 16, 2016 UTILIZING THE NEW ALDA WEBSITE (CHAPTER LEADERS GROUP) PRESENTER: BRIAN JENSEN SEPTEMBER 16, 2016 Today I will be explaining the issues involved in fixing and upgrading our website, and how we can use

More information

Using Outlook Live

Using Outlook Live EMAIL Using Outlook Live Contents: What is?... 3 Using... 3 Address... 3 Password... 3 The Windows Live Hotmail Welcome Screen... 5 Online Notification Status... 6 Help... 6 Inbox... 7 The Mail Inbox Toolbar...

More information

CHAPTER 18: CLIENT COMMUNICATION

CHAPTER 18: CLIENT COMMUNICATION CHAPTER 18: CLIENT COMMUNICATION Chapter outline When to communicate with clients What modes of communication to use How much to communicate How to benefit from client communication Understanding your

More information

Welcome to INTRODUCTION TO WINDOWS 10. Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design

Welcome to INTRODUCTION TO WINDOWS 10. Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design Welcome to INTRODUCTION TO WINDOWS 10 Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design Email: cpu@cpu-onsite.com Phone: 209-296-0660 1 You are viewing the Student Version of the

More information

Walsall Adult and Community College

Walsall Adult and Community College Employer Engagement; use of on-line technology to reduce environmental impact and maximise social capital - Skype booklet Use of on-line Technology to Reduce Environmental Impact and Maximise Social Impact.

More information

Usability Testing Report: Lilly Library s Homepage 1

Usability Testing Report: Lilly Library s Homepage 1 Usability Testing Report: Lilly Library s Homepage 1 Summary On April 20, 2015, Emily Daly and Jaci Wilkinson conducted usability testing in the lobby of Lilly Library. Seven participants were interviewed

More information