This document is from a workshop on staying connected and being online. It provides information on connecting through social media, mobile devices, and the internet. Topics covered include setting privacy settings on Facebook and other platforms, using video calling apps, texting etiquette, online banking safety, and how technologies have changed the ways people communicate and share information over time. The purpose of the workshop is to help older adults understand and navigate the digital world.
Staying Connected Bateau Bay Workshop Nov 2015Brad Keeling
Technology workshop for Seniors at Australian Unity Retirement Living, Kiah Lodge, Bateau Bay, NSW Central Coast.
Helping Seniors bridge the digital divide.
Staying Connected Bateau Bay Workshop Nov 2015Brad Keeling
Technology workshop for Seniors at Australian Unity Retirement Living, Kiah Lodge, Bateau Bay, NSW Central Coast.
Helping Seniors bridge the digital divide.
This powerpoint presentation is created by Gyanbikash.com for the students of class nine to ten from their English first part NCTB textbook for multimedia class.
A quick overview of PHP's PDO. Aimed at beginners and those who use too many ORMs. This was done as a lightening talk at the PHP Melbourne User Group January 2014.
This powerpoint presentation is created by Gyanbikash.com for the students of class nine to ten from their English first part NCTB textbook for multimedia class.
A quick overview of PHP's PDO. Aimed at beginners and those who use too many ORMs. This was done as a lightening talk at the PHP Melbourne User Group January 2014.
This presentation is mostly about mobile working life style of an entrepreneur and how to use tools, resources, virtual offices, co-working space and technology.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Our Digital World - A look at E-safety issues for teenagersBrian Sharland
This is a presentation on esafety issues I give to parents at the school I work at. It covers common issues teenagers face as well as solutions and support for parents.
West Chester - Tech Training Session 11William Mann
Quarterly the Borough of West Chester staff gets together for technology training. The training is focused on both the professional and personal side of technology. This is the Fall 2013 training presentation.
Even though team collocation is strongly recommended in agile methodologies, a distributed team is often required in the real world today. What is so important about collocating anyway? Can you overcome the challenges of a distributed Scrum team and still remain agile? What are the solutions? Brian Saylor tackles these important questions and more. While Brian realizes that implementing Scrum and agile practices in a distributed team is not easy, he found that it is possible if you understand the inherent problems and work hard-every day-to overcome them. Brian walks you through the reasons collocating is important for agile teams and the extra challenges distributed agile teams face. Then he dives into practical, real-world tools, tips, and techniques that organizations should research and consider before jumping into distributed waters-and don’t forget your life jacket.
Internet Safety tips for Parents of Christian Childrennickswebtsv
The internet has evolved into a enormous beast that has revolutionized the computer and communications world like nothing before. But with this revolution comes safety concerns for children whose parents wish to keep a watchful eye on their child's browsing habits.
This presentation covers family safety tools that empower parents to easily manage their child's exposure to explicit websites. Such as gambling, social media and online dating websites which can be used for the wrong reasons by pedophiles and the like.
The solutions available to parents range from device based security to software or host ran applications like NetNanny.
Nice, France Talk. Working in the Cloud, 2011John Mayfield
This presentation is from a new seminar I am offering to Real Estate Associations on Working in the Cloud. For more information, please contact John Mayfield at John@RealEstateTechGuy.com
Brad Keeling has joined Newport Capital as a consulting specialist in emerging new media opportunities in the Telecommunications, Media and Technology (TMT) sector with specific focus on online, mobile and social media.
Seniors Tech Workshops Constitution Hill 2013Brad Keeling
Technology workshops for Seniors at Constitution Hill in Sydney on July 10 2013.
The workshops provide orientation and training for better use of mobile phones and social media for Senior Citizens
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
1. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
and
Being Online
Workshop
2015
2. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Photo credits: top Stanley Kubrick circa1940
Staying Connected
3. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Photo credits: top Stanley Kubrick circa1940 bottom Nancy Slome 1to1interactive blog
In about half a century…
plus ça change plus c'est la même chose
Staying Connected
What’s changed?
4. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
In about a quarter a century…
Staying Connected
What’s changed?
5. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
And in less than a decade…
Staying Connected
What’s changed?
6. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
This workshop’s purpose is to assist older
adults demystify a digital online world
The following slides are not meant to be a
definitive set of answers to all possible
questions but triggers and reminders
Staying Connected
Being online
7. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Our grandchildren have never known a
world without mobile phones, text
messaging and the internet
We used to gather in community halls
and engage in conversations over the
back fence
What do social clubs have in common
with things like Facebook?
Staying Connected
with each other
8. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• What do you want or need to know
• Be engaged
• Stay in touch
– Text the grandchildren
– Share photos
– Use the internet
– Email
– Apps
• Choose your platform
• Make it meaningful – to you
• Understand your options
• Perceptions
– Usefulness
– Ease of use
– Trust
Staying Connected
with each other and the world
9. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Get the Silver Surfers on Facebook
• Experts say using social media can help prevent
decline in older adult’s health
• Older people should use Facebook and other social
media websites to prevent their health declining
• People aged 65-95 took part in the study by the
University of Exeter
• The group felt more confident and sociable after using
the internet
• Using Skype and email to contact relatives were among
their favourite usages
• Experts said the results could help stunt loneliness
– Pensioners who spend time online do not feel as lonely as
others their age, which could stunt deterioration of physical
and mental health, according to the research.
http://www.dailymail.co.uk/news/article-2873604/Older-people-use-Facebook-social-media-prevent-decline-health-study-finds.html#ixzz3SKzq2tRV
Staying Connected
Avoiding social isolation
10. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
Being online
11. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Are you connected using a mobile device?
– I bet it doesn’t look like these
– It’s probably a bit more like these
Staying Connected
Using mobiles and other wireless devices
12. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
A few tips when using phones and tablets
1. Turn off Bluetooth unless you need it
2. Disable automatic updates when on WiFi
3. Clear your phone or tablet of any texts from your bank
4. Never disclose financial information via text or email
5. Don’t save PINs, logins or passwords on your device
6. Use different PINs or passwords for unlocking your device
7. Avoid public Wi-Fi for online banking or shopping
8. Contact your bank if you lose your smart phone or tablet if
you receive bank updates via SMS message
9. Keep your software and apps up to date
10. When disposing of devices give them to a technology
recycling service like Mobile Muster for safe, secure and
proper breaking down and recycling of the components
http://www.netsafe.org.nz/how-to-keep-your-mobile-devices-safe-and-secure/
Staying Connected
Using mobiles and other wireless devices
13. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Writing and sending a text message is basically
the same on all mobiles but the functionality will
vary from phone to phone
– From the phone’s menu select ‘messaging’ (the menu
item name may vary phone to phone)
– Select ‘new message’ or ‘compose’ or similar
– Enter the recipient’s phone number or select it from your
‘contacts’ or ‘address book’
– Type in the message
– Press ‘send’
• One text message or SMS is 160 characters
– If you type more than 160 characters it may send as one
message but it will be charged as two
• When replying to text messages, the procedure
may vary phone by phone. However, with the
original text message open …
– Click on ‘options’
– Click on reply
– Type in your answer/message
– Press send
Staying Connected
Text messaging
14. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Google Hangouts are
video calls or IM chat
and it’s very simple to
use. You just need
Gmail or Google+
Viber uses your phone
number and the phone
numbers of your
contacts in your phone
You create a Skype
addresses which finds
you just like your phone
number does
Use the Skype chat
window for IM chat
(Instant Messages )
Or use Viber or Kik for
IM on mobile. It looks
and works like text
messaging but its free
Staying Connected
Video calling and Instant Messaging
15. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Skype
1. Skype addresses find you just like a phone number
2. Use the Skype chat window for IM, Instant Messages
3. Parts of Skype profiles are seen by everyone on Skype.
4. Do not put details in your profile you don’t want public
5. You don’t have to fill in your profile if you do not want to
6. You can change your profile at any time
7. To update your settings on a PC open Skype click Tools
> Options > Privacy. On Mac it's > Preferences > Privacy
Viber
1. If you use Viber for IM on mobile. It looks and works like
text messaging and uses your phone number and the
phone numbers of your contacts in your phone
2. In Settings you adjust privacy, accessing contacts etc
Google Hangouts
1. Google Hangouts are video calls or IM chat and it’s very
simple to use. You just need Gmail or Google+
Staying Connected
Video calling and Instant Messaging
16. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Connect a wireless router to your internet at
home to create your own ‘private’ WiFi
network
Consider using your own portable WiFi
You can take it anywhere (including overseas)
It will work anywhere there is a mobile network
You can connect multiple devices to it
It is just as secure as your private WiFi
All network providers have them available
Staying Connected
WiFi: Private, Portable and Public
17. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Too many plans to choose from so…
– Keep the decision making simple
– Just ask for something basic
– A data plans vary in their price per Mb
– Consider pre-paid
Data plans and WiFi
– If you want to use your phone for email or internet you
need a data plan and / or use WiFi at home or while out
– Make sure you have data and MMS set up if you want to
send and receive pictures by message
– Ask how to switch data on and off when using the carrier
network
– When travelling overseas make sure you have the right
data plan
What to look for in a Service Provider / Carrier
– There is nothing tricky to look out for keep it simple
– Ask about coverage and check with friends in your area.
– You need to double check the coverage and the plan if
you travel a lot around Australia or overseas
Staying Connected
WiFi: Private, Portable and Public
18. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Using public wireless networks
1. Libraries, fast-food outlets, airports etc have safe WiFi
2. Avoid using WiFi run by people you don't know or trust
3. Always connect as 'public' when using public WiFi
4. Turn off sharing
5. Be aware of your surroundings
6. Be careful about what you do online
7. Avoid banking, shopping or using important passwords
8. If possible use secure URLs https:// instead of http://
9. Always log out and close your browser when finished
10. Disable wireless networking when you are not using it
Staying Connected
WiFi: Private, Portable and Public
19. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
‘The Cloud’
The Cloud is the use of remote servers
networked together to allow data storage
and online access to resources and
services. Things like:
– Google Drive, One Drive, iCloud, DropBox, etc
– Accounting like Xero and MYOB etc
– Photos stored for sharing - Flickr, Picasa etc
– Music - Spotify, Pandora, iTunes, Beats etc
20. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
‘The Cloud’
I have stored this set of slides
in the cloud
– It is in Dropbox so I can access
it while mobile if I want to
– And it can be downloaded from
Dropbox if I invite people to
share that particular Dropbox
folder
– It can also be downloaded from
the cloud by anyone who has
the link to it in SlideShare
• http://www.slideshare.net/bradatslice/st
aying-connected-tech-workshop-2015
21. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The Cloud
1. Backing up, storing and/or sharing via the cloud is
reasonably safe for files you don’t want to lose if your PC
is lost or destroyed
2. Do not back up sensitive information to the cloud
Sharing
1. Never open an attachment from a source you don't know
2. Peer-to-peer (P2P) file sharing carries risks including
potential breaches of copyright
Storing
1. Never insert a used removable storage device unless
you a) know where it came from and b) have up to date
ant-virus software installed
2. Backup your important personal and critical files (and
those photos you cherish) onto an external hard drive
Staying Connected
‘The Cloud’
22. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
Social Media
23. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
We’ve been writing on ‘walls’ for centuries
These are from Pompeii 79AD
Staying Connected
Social Media
24. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Sometimes called
Social Networking – in
fact that’s what you do
on Social Media
• People connect in
different ways on
different sites
• Some sites are
designed for special
purposes - like
sharing video or
pictures or just things
you like
Staying Connected
Social Media
25. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Which of these do you use?
OR you would like to use?
OR you would like to know more about?
Setting up accounts is very similar for any
online social platform all you need is an
email address
AND/OR Once you have Twitter or
Facebook you can usually use either to set
up and login to other platforms
Staying Connected
Social Media
26. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Facebook is about staying in touch with
people you know and for catching up with
friends you used to know
• Twitter is for following people you don’t
know, would like to know, or should know
• LinkedIn is a combination of both but
used for business and recruitment
• Instagram is primarily for sharing day-to-
day images and short videos
• Tumblr is a blogging platform that allows
you to do all of the above
• Pinterest is all about sharing things you
like on a virtual pin board . It’s a bit like
scrap-booking
Staying Connected
Social Media
27. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Snapchat
With this app you can take
photos, record videos, add
text, or draw things, then
send them to a controlled
list of friends. And the post
only stays up for a few
seconds
Kik
Kik Messenger is an instant
messaging app for most
mobile devices which
allows you to avoid the text
messaging system
And there are apps for fans of all sorts of things from
Celebrities to Music and Video
Staying Connected
Social Media
28. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The things you write and upload to the
internet, especially on social media
platforms, may not always be secure
• It’s important to understand how to use the privacy
features these social media sites have to offer
• Remember, each platform has its own settings, and some
are more complicated than others.
Let’s start with Facebook
Staying Connected
Social Media
29. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Facebook is probably the platform used by
most which requires a good initial privacy
set-up then an occasional check-up
Facebook Privacy Tab
1. Click the lock icon
2. Go to Privacy Settings and Tools
3. Check “Who can see my stuff?”
4. Adjust things like who can send friend requests, who can
tag you and how people can find you
5. Little known: you can limit the audience for old posts
Facebook Profile Settings
1. Next, update your privacy settings on your profile
2. Click About on your profile to view basic information
3. Click the icon left of ‘Edit’ You can set privacy for each
Facebook Photo Settings
1. You can go back to check settings by album or image
2. For albums: click audience indicator on the bottom right
3. For images uploaded individually click each image and
enter the privacy setting
Staying Connected
Social Media
30. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Instagram
1. Open your Instagram mobile app tap the user icon
2. Tap Edit Your Profile and scroll down
3. Toggle private profiles on and off
4. Private means only accepted followers see your photos
Twitter
1. Open the Settings menu. Click Security and Privacy
2. Select Protect my Tweets if you want to approve each
follower instead of allowing anyone to read your tweets
Pinterest
1. Click on your name, Select Account Settings
2. Change the Search Privacy to “yes” if you don’t want
your pins to show up in search engines
3. You can also create secret boards The option is at the
bottom of your board screen
LinkedIn
1. Go to Settings in the top right corner (your profile
picture) and select Review next to Privacy & Settings
Google+
1. The Settings menu is found on the left side of the screen
Staying Connected
Social Media
31. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Think of Twitter as being a bit like talk-
back radio… on steroids!
ABC Radio uses Twitter extensively now.
Take sport for example. ABC Grandstand
is on both Twitter and Facebook
Commercial TV News Variety and
Current Affairs programmes use them too
Staying Connected
Social Media
32. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• You can use Twitter on the Web or Mobile
• Or use a downloadable application which operates like
a dashboard making it easier filter topics
• You can also look at Twitter accounts without having an
account yourself
• Or you can set up at Twitter.com
– Use your own name or a nick name Upload a photo
and a bio
• Follow people
– Celebrities, politicians, anyone of personal interest
• Follow topics or events often grouped together by using
what is known as a hash tag
• Filter your timeline by creating lists of groups of people
you follow or topics you are interested in
• Your timeline is what you see when you log on
– It’s the tweets being posted by the people you
follow going up in real time
• Notifications, Mentions and Replies are public
engagements with others
• Direct Messages ‘DM’s are private
• Have your say: Write your first Tweet
Staying Connected
Social Media
33. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
The Trading Post is only online now and
others too like Gumtree and Craig’s List
Staying Connected
Banking Shopping and Apps
34. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
There are apps for almost anything…
– Your doctor or healthcare professional will
soon offer you Telehealth options using video
calling and a smart phone app
– You can make Medicare claims via your smart
phone or tablet (you’ll need a My.Gov login
but once done it’s pretty easy)
– You can do all your banking online and on
mobile with apps
– eBay and PayPal both have apps
Staying Connected
Banking Shopping and Apps
35. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Using Internet banking
1. It is safest to type the bank’s URL into the browser
2. It’s best to memorise your password
3. Banks using non-keystroke passcodes are safest
especially in public places or on shared PCs
4. Always log out when you are finished
Shopping
1. Use common sense. Trust your instincts
2. Know who you are dealing with
3. Know what you are buying
4. Know what currency you are using
5. On auction websites always deal within the site
6. Avoid private contact with sellers - scammers will often
use this ploy to 'offer a better deal'
7. Only pay on a secure web page https:// not http://
8. Avoid money transfers and direct debit
9. Use secure payment methods like PayPal or credit card
10. Consider ‘MasterCard SecureCode’ or ‘Verified by Visa’
Staying Connected
Banking Shopping and Apps
36. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Downloading apps…
1. Each device operating system (OS) has a way to
download apps – Google Play (Android) and iTunes
(Apple iOS) Windows Store (Windows 8) for example
2. This is not the app’s source The source is the developer
3. Check the app’s source, its ratings and reviews
4. You can download apps when you are online or mobile
5. For each ‘store’ you will need a login ID
6. Once you have selected an app you can download it
directly to your mobile device or to your PC/Mac and
then transfer it to your mobile device with a ‘sync’ - by
synchronising the device with your PC/Mac
Staying Connected
Banking Shopping and Apps
37. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
How many passwords do you have?
• How do you remember them?
• Make them easy to remember but not simple
• Never store them online
Is your screen locked?
• Should it be locked?
• If you often leave your device unattended and ‘on’ lock it
Staying Connected
Passwords
38. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Staying Connected
Identity theft. Myths and Mysteries
39. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
A few simple myths
1. Cybersecurity is unlike any challenge we have faced
Not so Imagine how it felt in the Victorian era with the
introduction of the motor vehicle and the telegraph
2. Every Day We Face “Millions of Cyber Attacks”
Maybe so. However, counting individual attacks is like
counting bacteria but all we really care about is the impact
and the source
3. This Is a Technology Problem
So, so. Technology, yes however all too often, the problem
exists between the chair and the keyboard
“Having a sense of history can guide our
responses to the novelties of our own era”
http://www.wired.com/2014/07/debunking-5-major-cyber-security-myths/
Staying Connected
Identity theft. Myths and Mysteries
40. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Install and activate anti-virus, anti-spyware
software and install or activate a firewall
Adware and Spyware
1. These are information gathering software typically used
for advertisers but they gather information secretly
2. Adware is the software used to assist advertisers place
relevant ads onto the pages you visit
3. These may not be as bad as they sound. They may be
annoying but they are rarely malicious viruses
4. Most top brand anti-virus software will prevent your PC
from being attacked by these
5. Never click on those pop-up ads that say things like your
computer may be at risk or run a scan now etc
Staying Connected
Online Safety and Security
41. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Spam clogs up your email inbox and can
include scams and phishing expeditions but
there’s little you can do other than be alert
and use common sense
Scams
1. If it sounds too good to be true…
Phishing
1. These are emails purporting to come from a valid source
like your bank or Australia Post
2. Do not open them.
3. Never click on links or provide information
Staying Connected
Online Safety and Security
42. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Online dating is just dating. However it is
important to treat it the same way you
treated meeting people in any social
environment
1. Keep your personal information private
2. Only meet offline when you are ready and not before
3. Do not get financially involved online
Staying Connected
Dating
43. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
As it sounds, they are photos of yourself
usually taken by yourself…
…or with others hence ‘selfie’
https://www.facebook.com/ellentv/photos/a.182755292239.124686.26012002239/10152299789332240/?type=1&theater
Staying Connected
Selfies
45. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Account harvesting
The illegal practice of collecting email accounts from information in the
public domain
Adware
Software that is covertly installed on your computer and designed to
deliver advertisements or other content which encourages you to
purchase goods or services.
Antivirus
Software that is designed to prevent infection from computer viruses.
Bot
A single compromised computer (a robot computer), sometimes called
a zombie.
Browser
A software application that enables the retrieval and presentation of
websites and other internet resources.
Browser hijacking
A symptom of a malware infection in which your browser persistently
redirects to fraudulent web sites, usually in an attempt to extort money
Cookie
A string of text stored by your web browser enabling a website to
remember you and your personal settings.
Staying Connected
Safety and Security
46. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Digital certificate
A way for browsers to verify the identity and authenticity of a website. A
digital certificate is issued to a website by a trusted third party
certificate authority.
Domain Name System (DNS)
A hierarchical naming system for resources connected to the internet.
The DNS translates domain names to numerical identifiers (IP
addresses) which are readable to networking equipment, allowing the
routing of data from one point on the internet to another.
Encryption
The process of transforming documents and files for safe transmission
over a public network. The information is then converted or deciphered
back into its original format.
Firewall
Hardware or software which monitors information going in and out of
your computer or network.
Freeware
Copyrighted computer software which is made available for use free of
charge, for an unlimited time.
Hacker
Someone who attempts to gain unauthorized access to a computer
system, often for fraudulent purposes.
Hotspot
An area in which Wi-Fi is available to the general public as a wireless
local area network, as in a coffee shop.
Staying Connected
Safety and Security
47. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Identity theft
Use of personal details by someone else to deceive, to support some
type of crime, or even just to play a joke. Identity theft is a form of
identity crime (where somebody uses a false identity to commit a
crime).
Internet Service Provider (ISP)
A company that provides access to the internet.
Keystroke logger
A malware program hidden on a computer that records and 'logs' each
key the you press. It is used to record your personal data, e.g.
usernames, passwords, credit card and bank account numbers which
is then sent to the malware operator without your knowledge.
Malicious software (malware)
A catch-all term used to describe software designed to be installed into
a computer system for the purpose of causing harm to the you or
others. This would include viruses, spyware, trojans, worms, etc.
NFC
Near Field Communications – the technology used for PayPass
Padlock
A padlock display in a browser is intended to indicate a secure
connection or website, although it may not always be a reliable
indicator. Users should look instead for 'HTTPS'.
Peer-to-peer file sharing network (P2P)
A decentralized file sharing system. Files are stored on and served by
the personal computers of the users.
Staying Connected
Safety and Security
48. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Pharming
A way of harvesting personal information, where a hacker puts a
malicious code on your computer that redirects you to a fake site.
Phishing (email/website)
Phishing refers to fraudulent email messages or web sites used to gain
access to personal information for illegal purposes such as transferring
funds or purchasing goods over the internet.
Pop-up
A pop-up is a small window, which suddenly appears (pops-up) in the
foreground of the normal screen.
Privacy settings
Settings which control how a user's data is shared with other people or
systems. Privacy settings apply to web browsers and social networking
services.
Ransomware
Malware which handicaps computer functionality, e.g. through browser
hijacking or encrypting personal data, and offers to restore the
functionality for a fee.
Remote access
Communication with a computer or network from a remote location
through a link such as the internet or mobile phone.
Scam
A commonly used term to describe a confidence trick, relying on email
or a website to deliver the trick to unsuspecting users.
Staying Connected
Safety and Security
49. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
Scareware
Malware that causes frightening messages to appear, e.g. that your
computer is infected with malware or that you are guilty of a crime, and
attempts to extort money from you to resolve the alleged issue. Similar
to ransomware.
Secure Socket Layer (SSL)
The most widely used security protocol on the internet, used for online
banking and shopping sites. Website digital certificates are commonly
implemented through SSL. The presence of 'https' in the
browseraddress bar demonstrates that the connection between the
your computer and the website is encrypted. However, 'https' can still
be present when connecting to a website with an invalid digital
certificate.
Spam
Unsolicited email. Most email spam is commercial advertising, often for
dubious products, get-rich-quick schemes, or illegal services. Users
are advised that if an offer in an email appears too good to be true then
it probably is and should not be actioned in any way.
Spyware
Software that is covertly installed on a computing device and takes
information from it without your the consent or knowledge of the user.
Trojan horse
Malicious code which is hidden in a computer program or file that may
appear to be useful, interesting, or at the very least harmless to you
when using your computer. When this computer program or file is run,
the malicious code is also triggered, resulting in the set up or
installation of malware.
Staying Connected
Safety and Security
50. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
URL
Universal Resource Locator is the technical term for the address
(location) of an internet resource on the internet such as a website or
image within a website.
USB stick
Universal Serial Bus. A small piece of hardware which stores data,
sometimes called a jump drive, thumb drive or flash drive.
Virus
Malware designed to infect and corrupt a computer and to copy itself.
Viruses can disrupt programs installed on a computer.
VoIP
The routing of real time voice conversations (telephone calls) over the
internet rather than over an analog or circuit switched network.
Wi-Fi
A set of wireless communication protocols that can transmit traffic to
Wi-Fi-enabled devices within a local area. A Wi-Fi-enabled device such
as a laptop or mobile device can connect to the internet when within
range of a wireless network connected to the internet. An area covered
by one or more Wi-Fi access points is commonly called a hotspot.
Worm
A self-replicating virus that does not alter files but resides in active
memory and duplicates itself.
Zombie
A compromised computer
Staying Connected
Safety and Security
51. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• 3G and 4G
– Generic term for most modern high speed mobile
networks
• # or “hash” key
– You are often asked to press the hash key after entering
numbers into automated systems
• Android
– A new phone & operating system from Google which
competes with iPhone
• Blackberry
– A type of mobile phone that is designed primarily for
sending and receiving email as its main feature
• Bluetooth
– Personal or close range radio frequency (RF) network
• Broadband
– High speed internet
• Cellular
– Generically it’s the current type of mobile phone network
• Cell-phone
– Just another term for a mobile phone
• Desk Top
– The main or home screen of your PC or phone
• GSM
– Generic term for mobile network (originally Groupe
Speciale Mobile then Global System for Mobile)
Staying Connected
Terminology
52. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• ICE
– In Case of Emergency
• iPad – also known as a tablet
– Apple Corporation’s touch-screen mobile computing
device with internet access
• Java
– A type of software often used in phones
• Multi-media
– Generic term for pictures and video as opposed to simple
text
• MMS
– A message with a picture in it sent from phone to phone
(Multi-Media Service)
•PDA
– Generic term for a phone with its main feature being a
diary/calendar, notes, and detailed contact list (Personal
Digital Assistant)
• Predictive Text & Auto-Correct
– A feature in most mobiles that predicts the word you are
typing in as you type
• Premium Text Message
– A normal text message that’s charged at a higher rate –
for example voting on TV shows usually costs 55c
• QWERTY
– Typewriter style key pad layout
Staying Connected
Terminology
53. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• RF
– Radio frequency
• SMS often called a Text
– A short message typed into a phone and sent to another
phone (Short Message Service)
• Smart Phone
– Generic term for a phone with advanced PDA and internet
services installed
• Texting
– Same as SMS (SMS-ing)
• URL
– The “www” address you type into an internet browser to
go to a web site (Uniform Resource Locator)
• Voicemail
– A message left on an automatic answering machine
usually built into the mobile network
• Wallpaper
– The background image on the ‘desk-top’ or screen of your
phone or PC
• WAP
– An old generic term for mobile internet – a WAP site is a
mobile internet site
Staying Connected
Terminology
54. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Avatar
– Usually the image you put up of yourself in your social
media site’s profile
• Blog (or web log)
– A blog is a frequently updated website consisting of dated
entries arranged in reverse chronological order - most
recent post first.
• Chat & Chat rooms
– Web-based text conversation - not always but often in
real time (often called IM & vice versa)
– Dedicated chat sites about a specific subject
• IM (Instant Message)
– A real-time personal message sent between two or more
users typically fast moving
– IM is possible withGmail, MSN, Skype, Viber and on many
sites like Facebook (called chat)
• Mashup
– Website or application that uses content from more than
one source to create a completely new service or
presentation of the content
• MSN Messenger
– An Instant Message service or application
Staying Connected
Terminology
55. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Podcast
– An audio blog or recording of (say) a radio programme.
You don't have to have an Apple, iPod to listen to a
podcast; you can also listen to podcasts on a PC, or many
mp3 players.
• Post or Posting
– A message added to an online discussion, or an update to
your social media site status, commenting on a blog,
writing on a Facebook ‘Wall’.
• Skype
– The worlds largest Voice over IP application which can be
used for instant messaging and file transfers between
users
• Status update
– A message you write about yourself on your own social
media site – like Facebook
• Tag or Tagging
– Tags are the keywords people add to articles or photos in
a blog or to web pages to assist in search and
identification (Photos can be tagged in Facebook to help
identifying people)
• Thread
– A series of posts on a single topic
Staying Connected
Terminology
56. Copyright Brad Keeling and Slice Wireless Pty Limited 2015
Workshop
• Tweet
– A posting to Twitter – must be 140 characters or less
• Upload
– Copying a file from a hard drive to a website or application
thus making the file available to other members of the
same site or application.
• VoIP - Voice over IP (Internet Protocol)
– Enabling people to use the internet as the transmission
medium for telephone calls
– One advantage of VoIP is that calls over the Internet do
not incur a surcharge beyond what the user is paying for
Internet access.
• Widget
– A little “Window Gadget” downloadable to your PC
allowing access to another programme or application
• Wiki
– A Wiki is a website that allows users to freely create and
edit the website content themselves.
• Wikipedia
– A website information service like an encyclopaedia
entirely created by users
Staying Connected
Terminology