Emily Volnoff - 2, 5, 8, 12
Anna Rawls - 3, 6, 10, 13
Madeline Saucier - 1, 4, 7, 11
Everyone does 9
- Match.com, eHarmony.com, Zoosk.com (Madeline)
- I found where many students were expelled from school, but also other things happen to students. I found were a student was arrested and charged when posting a threat on Yik Yak. If anything is posted threatening to a school or faculty member the person who posted it will be found and arrested. (Emily)
- Define in your own words… (Anna)
- Sexting- Sending provocative pictures or text messages (http://www.teachthought.com/technology/the-definition-of-sexting/)
- Cramming- The addition of unexpected or unauthorized charges to a phone bill (http://whatis.techtarget.com/definition/cramming)
- Cookies- Either a sweet snack or a small piece of data that is generated by a website and saved by your web browser to remember information about you (http://www.techterms.com/definition/cookie)
- Trojan Horse- Either a trick used by the Greeks to enter Troy or a very bad virus that attacks your computer under the guise of being harmless programming (http://searchsecurity.techtarget.com/definition/Trojan-horse)
- Phishing- An email form of fraud when there is an attempt to get sensitive and important information from your computer by pretending to be something trustworthy (http://searchsecurity.techtarget.com/definition/phishing)
- Spyware- Software that gathers information about a person or organization without their knowledge or can take over a computer (http://searchsecurity.techtarget.com/definition/spyware)
- Rookit- A stealthy software that attempts to hide from detection while giving someone (not the owner) access to the computer (http://searchmidmarketsecurity.techtarget.com/definition/rootkit)
- Zombie- A computer becomes a zombie through the use of malware and is then controlled by standards based on networking protocol (http://www.techopedia.com/definition/27201/zombie-network)
- These screen names are poor choices because some of them can be the target for ridicule. Trashmouth can give off the idea that you have a dirty mouth; IHaveOnePairPants may be the target of ridicule because if the student really does only have one pair of pants, other students may make fun. It is also a good idea to include keyboard symbols and/or numbers in a screen name to make it more original. Also, if future employers are able to see certain screen names, they may not appreciate them and that could be a hiring decision(Madeline).
- Some of these screen names can make students target them because of their screen names. For instance, FatMama the student might be just a little overweight but since her screen name is FatMama students see that she might accept it, and then students start calling her name until it gets out of control. Also, some of these screen names can send the wrong impression like IMAHottie this can attract not good boys or girls that will make fun. Another thing is if someone has this screen name and they are not the most popular student it can cause major problems at school. (Emily)
- Too much information revealed through screen names… (Anna)
- The person is probably a male and his first and last name are available
- This is probably a younger girl who might have graduated in 2013 or that could be a sports number
- It reveals that Andy probably takes Karate lessons and is a younger person
- It reveals that the person is female and enjoys to play the violin
- The person is most likely male and younger because of the spelling and he enjoys wrestling and may even be on a wrestling team
- good or bad screen names and why? (Madeline)
- good, uses numbers and letters
- bad, likely to attract bad attention
- bad, gives away gender, numbers in sequence
- bad, possibly gives away age and name
- bad, likely to attract bad attention
- good, letters and numbers, no bad attention or personal information
- bad, likely to attract bad attention
- good, no bad attention or personal information
- good, no bad attention or personal information
- bad, gives away name
- bad, likely to attract negative attention
- bad, gives away name and age
- good, no bad attention or personal information
- bad, likely to attract bad attention
- bad, likely to attract bad attention
- good, no bad attention or personal information
- Gatlinburg321, Design_22, and EVancouver2 (Emily)
- Emily’s
- no
- no
- no
- yes
- yes
- yes
- no
- yes
- no
- no
- no
- yes
- no
- no
- yes
- yes
- #4Michelle12 (Anna)
- Yes
- No
- No
- Yes
- Yes
- Yes
- No
- Yes
- No
- No
- No
- Yes
- No
- No
- Yes
- No
9. Madeline’s
- no
- no
- yes
- yes
- yes
- yes
- no
- no
- no
- no
- no
- no
- no
- no
- no
- yes
- Select reasons for students’ online accounts are broken into… (Anna)
- Most Common- Students give their password to their friends, who then decide to use it or give it to others who use it
- Least Common- A password cracking program is used to crack their password
- I really liked this video but I thought it was a little long. I lost interest after a while and it also seemed outdated. I think that this video should is very important contains information that everyone should be aware of, however, many or not. In order to make sure these kind of things avoid computers proper virus protectors and “patches” should be installed onto the computer as soon as possible. Without these a computer is bound to attract a virus.
These viruses can infect a computer very easily. Just by clicking on a website link or an email a virus can make its’ way into the system. A common target is probably children. Kids are on the computer all the time and can easily click on sites that contain viruses and spyware programs. I think it is important to inform children of these risks and problems. Make sure that they know not to visit suspicious web pages, or simply monitor their computer time.(Madeline)
- Identity Thief: I have a low risk of identity thief. Risk to be Scammed: I have a low risk of being scammed. Computer Protection: I am almost at high for my computer not being protected. (Emily)
- This article focuses on a mobile device spyware application called StealthGenie. It is an app that requires a person to have physical access to the phone in order to install the software, but after installation it is undetectable to most individuals. It does all types of monitoring including call recording, call interception, recorded surroundings,and monitoring of emails, sms messages, voicemails, contacts, photos, videos, and appointments. One reason this app is difficult to detect is because it is designed to look like another application, such as a photo editor. If you believe that there may be a malicious spyware app on your mobile device, it is best to complete a “factory reset.” Be sure to back up all important information before completing this reset though because all data and apps will be removed from the phone. (Anna)
No comments:
Post a Comment