The document provides tips for creating strong passwords to protect accounts from hackers. It recommends making passwords long, complex, and unique for each account by using a mix of uppercase and lowercase letters, numbers, and symbols. It also warns about common hacking techniques like guessing, dictionary attacks, phishing scams, and shoulder surfing. The tips stress the importance of changing passwords regularly, not saving or sharing passwords, and logging off shared devices.
Flip It! Flipped Learning for Teacher Librarianssraslim
Presentation on Flipped Learning by Marie Slim, Teacher Librarian and Spanish Teacher for the TL Virtual Cafe, 10/7/13 5PST
http://tlvirtualcafe.wikispaces.com/FlipItGood
Presentation created by Marie Slim, Teacher Librarian of the FJUHSD to convince her teachers to try a wiki or two! Animoto at: http://animoto.com/play/Yof0gtrow46YE4FGwSjkEg
Flip It! Flipped Learning for Teacher Librarianssraslim
Presentation on Flipped Learning by Marie Slim, Teacher Librarian and Spanish Teacher for the TL Virtual Cafe, 10/7/13 5PST
http://tlvirtualcafe.wikispaces.com/FlipItGood
Presentation created by Marie Slim, Teacher Librarian of the FJUHSD to convince her teachers to try a wiki or two! Animoto at: http://animoto.com/play/Yof0gtrow46YE4FGwSjkEg
Why is password protection a fallacy a point of viewYury Chemerkin
MAKE your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it – never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t.
http://hakin9.org/hakin9-extra-12011-exploiting-software/
Why is password protection a fallacy a point of viewYury Chemerkin
MAKE your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it – never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t.
http://hakin9.org/hakin9-extra-12011-exploiting-software/
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Digital Tools and AI for Teaching Learning and Research
Passwords and Digital Safety
1. presents:
Passwords
Information quoted directly and paraphrased from
“Security Awareness” from the University of Texas at
Austin’s Information Technology Services
http://www.utexas.edu/its/secure/articles/keep_safe_with_strong_passwords.php
2. To protect your computer, your data and
your online accounts, make a strong
password your first line of defense.
Flickr CC Photo by Bruno Santos: http://www.flickr.com/photos/bsantos/50283672
Info from University of Texas at Austin’s Information Technology Services
3. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1750378617
Most people
Info from University of Texas at Austin’s Information Technology Services
know that
strong
passwords
are a good
idea, but don’t
realize
hackers are
becoming
increasingly
sophisticated
at password
“cracking.”
4. Flickr CC Photo by Pieter Ouwerkerk: http://www.flickr.com/photos/pieterouwerkerk/699483014
Info from University of Texas at Austin’s Information Technology Services
You have to
change your
password
frequently, and
stay aware of
what techniques
hackers are
using to steal
passwords, if
you want to stay
ahead of the bad
guys.
5. Internet security is based on a “weakest link”
principle, and passwords are often the only
thing standing between a hacker and access to
your computer or a campus network.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338
Info from University of Texas at Austin’s Information Technology Services
6. If your password is weak, you make it easier for
someone to break in.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338
Info from University of Texas at Austin’s Information Technology Services
7. Hackers make their livelihood
by automating ways to
continually search out the
weakest link to gain access to a
network or computer.
Don’t let your password be the
weak link!
Flickr CC Photo by Treyvor Leyenhorst: http://www.flickr.com/photos/10213764@N02/1485773850Info from
University of Texas at Austin’s Information Technology Services
8. There are real consequences to not having a
strong password.
If someone steals your password, they may find
a way to access your e-mail or IM messages,
your bank accounts, your research, your contact
lists and whatever else you have on your
computer.
Flickr CC Photo by Angel Arcones: http://www.flickr.com/photos/freddy-click-boy/3303542092
Info from University of Texas at Austin’s Information Technology Services
9. Your files may be altered or destroyed.
Sometimes hackers even take over a
computer and turn it into a zombie,
using it to perform malicious tasks such
as sending out large amounts of spam.
Flickr CC Photo by Thomas Hawk: http://www.flickr.com/photos/thomashawk/362270357
Info from University of Texas at Austin’s Information Technology Services
10. How Passwords Are Stolen
When you are creating a strong
password, it can help to know the
tactics hackers use to steal them.
The following are some of the most
frequently used techniques:
11. Flickr CC Photo by Eric Schmuttenmaer: http://www.flickr.com/photos/akeg/2175038829
Info from University of Texas at Austin’s Information Technology Services
Guessing
Programs designed to guess a user’s password are
common. They often use personal information found
online—such as names, birth dates, names of friends or
significant others, pet names or license plate numbers—
as a starting point.
These programs can even search for a word spelled
backwards.
STOLEN
?
12. TIP: It’s best to
steer clear of any
personally
identifying
information when
creating a
password.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
13. Flickr CC Photo by David Glover: http://www.flickr.com/photos/davidglover/4269594949
Info from University of Texas at Austin’s Information Technology Services
Dictionary-based attacks
Programs and software also exist that
run every word in a dictionary or word
list against a user name in hopes of
finding a perfect match.
14. TIP: Staying away
from actual words,
even in a foreign
language, is
recommended.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
15. “Brute Force” attacks
By trying every
conceivable combination
of key strokes in tandem
with a user name, brute
force attacks often
discover the correct
password.
Programs can execute a
brute force attack very
quickly.
Flickr CC Photo by Alex Eylar: http://www.flickr.com/photos/hoyvinmayvin/4687336568
Info from University of Texas at Austin’s Information Technology Services
16. TIP: The best way
to beat such an
attack is with a
long, complex
password that
uses upper and
lower case letters,
numbers, special
characters and
punctuation
marks.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
17. Phishing
Phishing scams usually try to hook you with
an urgent IM or e-mail message designed to
alarm or excite you into responding.
These messages often appear to be from a
friend, bank or other legitimate source
directing you to phony Web sites designed to
trick you into providing personal information,
such as your user name and password.
Flickr CC Photo by Widjaya Ivan: http://www.flickr.com/photos/28288673@N07/6457165789
Info from University of Texas at Austin’s Information Technology Services
18. TIP: Don’t click a
link in any
suspicious e-
mails, and don’t
provide your
information
unless you trust
the source.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
19. “Shoulder surfing”
Passwords are not always
stolen online. A hacker
who is lurking around in a
computer lab, cybercafé
or library may be there for
the express purpose of
watching you enter your
user name and password
into a computer.
Flickr CC Photo by tanakawho: http://www.flickr.com/photos/28481088@N00/425099204
Info from University of Texas at Austin’s Information Technology Services
20. TIP: Try to enter
your passwords
quickly, without
looking at the
keyboard, as a
defense against
this type of theft.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
21. Tips for Creating and Using
Safe Passwords
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/688068169
Info from University of Texas at Austin’s Information Technology Services
22. Use BOTH
upper- and
lower-case
letters.
Flickr CC Photo by Nina Stössinger: http://www.flickr.com/photos/ninastoessinger/4179518104
Info from University of Texas at Austin’s Information Technology Services
23. Place numbers and punctuation marks
randomly in your password.
Flickr CC Photo by Lali Masriera: http://www.flickr.com/photos/visualpanic/856235055
Info from University of Texas at Austin’s Information Technology Services
24. Flickr CC Photo by Jason Pearce: http://www.flickr.com/photos/jasonpearce/4750110576
Info from University of Texas at Austin’s Information Technology Services
Make your password long and complex,
so it is hard to crack. Between 8 to 20
characters long is recommended.
25. Use one or more of these special
characters:
!@#$%*()-+=,<>::“‘
Info from University of Texas at Austin’s Information Technology Services
26. To help you easily remember your
password, consider using a phrase or a
song title as a password. For example,
“Somewhere Over the Rainbow”
becomes “Sw0tR8nBO” or “Smells Like
Teen Spirit” becomes “sMll10nspT.”
Flickr CC Photo by marc falardeau: http://www.flickr.com/photos/49889874@N05/6101434856
Info from University of Texas at Austin’s Information Technology Services
27. Make your password easy to type
quickly. This will make it harder for
someone looking over your shoulder to
steal it.
Flickr CC Photo by Chris Metcalf: http://www.flickr.com/photos/laffy4k/441037582
Info from University of Texas at Austin’s Information Technology Services
28. Using your password safely
Create different
passwords for
different
accounts and
applications.
That way, if one
account is
breached, your
other accounts
won’t be put at
risk too.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1454251440
Info from University of Texas at Austin’s Information Technology Services
29. Change your
passwords
regularly, about
once every six
months.
(Daylight
Savings Time?)
Flickr CC Photo by Eliazar Parra Cardenas: http://www.flickr.com/photos/eliazar/407591133
Info from University of Texas at Austin’s Information Technology Services
30. Flickr CC Photo by Mike Fernwood: http://www.flickr.com/photos/ultimateslug/326930489
Info from University of Texas at Austin’s Information Technology Services
Don’t share your password with
anyone else. Once it’s out of your
control, so is your security.
31. Never enable the “Save Password”
option, even if prompted to do so.
Pre-saved passwords make it easy for
anyone else using your computer to
access your accounts.
http://www.rhsmith.umd.edu/portal/portal_help.html
Info from University of Texas at Austin’s Information Technology Services
32. Be especially
careful about
saving
passwords in
web browsers.
http://www.webdevelopersnotes.com/how-do-i/clear-
browsing-data-google-chrome.php
33. Never walk away from
a shared computer
without logging off.
This will ensure no
other users can
access your accounts.
Flickr CC Photo by Totumweb: http://www.flickr.com/photos/totumweb/5601416590
Info from University of Texas at Austin’s Information Technology Services
34. Don’t use sample passwords given on
different Web sites, including this one.
“Somewhere Over the Rainbow”
becomes “Sw0tR8nBO” or
“Smells Like Teen Spirit” becomes
“sMll10nspT.”
Info from University of Texas at Austin’s Information Technology Services