Protect This House – Internet Safety for the Home

Total Page:16

File Type:pdf, Size:1020Kb

Protect This House – Internet Safety for the Home Protect This House: Internet Safety for the Home Introduction: ........................................................................................................................ 2 Why Should We Care?........................................................................................................ 3 Online Rule of Agreement .......................................................................................... 4 How do I know if a computer has been secured? ....................................................... 4 Example Rules: Online Ten Commandments ............................................................. 5 Who is in the Driver's Seat? - User Restrictions ................................................................. 7 Parental Controls – Keep that Baby Gate Up! .................................................................. 10 Keep the Garbage Out! – Web Filters ............................................................................... 12 Anti-Spyware and Anti-Virus – Does my Computer have a Cold? .................................. 14 Operating System and Application Updates – Is your Foundation Secure? ..................... 17 Cell Phone Parental Controls ............................................................................................ 19 Safe Web Surfing .............................................................................................................. 23 Get your computer protected! ................................................................................... 23 Keep your Passwords Strong .................................................................................... 23 What is a strong password? ....................................................................................... 23 Don't be Click Happy! .............................................................................................. 24 Shop Safely ............................................................................................................... 24 Nothing in Life is FREE ........................................................................................... 25 Social Networking – Do You Know Where Your Kids Are? ........................................... 26 1 Introduction: About the Author: I am a mother of four children. They are fairly young (all under six). Although they don‟t have cell phones, use the computer, or have an account on Facebook, I want to make sure I am prepared for when they start venturing out in this virtual world in which we live. I am also an ethical hacker. Before I was married and had kids, I worked for 3 years for a large public accounting firm as a security consultant. Many times I would work on consulting projects, which required me to sit on a company‟s network and try and hack into systems and obtain sensitive information. I would then present my findings, so that the company could make changes and have a more secure network. I now work for the Security department for a mid-sized bank. Because of my work experience, I have been the “technical support” for friends and family. I soon realized that although almost everyone has a Facebook account and a high speed Internet connection, most moms don‟t know the first thing about computer security. They are scared of their computers and don‟t want to “break” anything. About this Handout: The purpose of this handout is to educate you on how to PREVENT garbage from coming into your home through your computer, laptop, tablet, iPhone, etc. I built a website dedicated to this topic: www.securemama.com. I have multiple links to video tutorials on how to set up controls on the various devices. Here are some other websites that are helpful as well: http://www.theonlinemom.com http://www.ikeepsafe.org/ http://www.internetsafetyproject.org/ Making changes on a home computer can be scary. This is especially true when making security changes. Your blood rushes, your heart is beating, and in your head you are thinking, “What application will it break? Will I be able to go back to how it was before? What am I doing??!!” I know this can be overwhelming, but just see what will be the most beneficial to you and your family, and implement a change. Also, just like we say a prayer when we lose something. You can also say a prayer when you are confused in front of the computer especially when you are safeguarding your computer! 2 Why Should We Care? This is direct from LDS.org: http://www.lds.org/study/topics/internet?lang=eng The Internet can be a wonderful tool and resource for information, but caution must be exercised in order to protect families and individuals from the potential dangers that are present online. Church leaders repeatedly counsel members to avoid Internet pornography, gambling, and other evils that are available on the Web. The Church also provides links to many resources to help individuals and families use the Internet safely and wisely. “You live in a world of technological miracles. You have access through the Internet to resources one cannot begin to imagine. However, lurking there as well is a sinister evil, as deadly as a rapidly growing cancer. If you allow this pornographic disease a place in your heart, the Spirit withdraws itself and, ere you are aware, you are left alone and vulnerable (see D&C 121:37). You must avoid that pornographic playground. The same self-discipline is required relative to the materials you choose to read and the videos you may select to view. Pornography is poison!” (“Bring Your Mission Home with You,” Ensign, Dec. 2000, 18). Obviously, we cannot keep everything out, but we MUST provide direction and implement some controls for our kids, before they are inadvertently exposed to objectionable material. 3 Online Rule of Agreement Online Rule of Agreement This agreement is to promote a discussion of what is allowed and not allowed. Your child is exposed to so much and in so many different ways (home computer, school, cell phones, friends‟ cell phones, library computers, etc.). It is not realistic to assume that all of those devices have been secured. Discuss what types of sites are allowed and what is not allowed. Discuss what your child can and cannot do on the Internet, no matter what or where or how they are accessing the Internet. Use this agreement as a way to safeguard your child when they are accessing the Internet on computers or devices that have not been secured. How do I know if a computer has been secured? When I say secure, my main concern is whether or not restrictions are in place for a safe web surfing environment. Does the computer have a separate user account for kids with limited functionality? (See page 7). Does the Computer have a web filter in place? (See page 12). Does the computer have some kind of anti-virus or anti-spyware safeguards? (See page 13). Does the computer have the most recent operating system and application updates installed? (See page 15). In addition to the discussion of Internet Safety, you should spend time with your child on the Internet. You can build trust with your children and help them know that you are looking out for their best interest. Start as early as you can, before you have to turn into a “bad cop.” It is inevitable that your child will stumble on something inappropriate. They may have accidentally clicked on a link or an advertisement. Establish a „fire drill‟ routine so that your child can come to you if something inappropriate comes on the screen. Let‟s Teach “Stop, drop, and Tell.” Stop what they are doing on the computer, drop everything and go tell an adult. 4 Below is an example online agreement. The new “Strength of Youth” pamphlet has some good guidelines as well. https://www.lds.org/youth/for-the-strength-of-youth/entertainment-and- media?lang=eng Example Rules: Online Ten Commandments 1. Do not view inappropriate content including pornography, content with vulgar language, or anything that will take away the Spirit. “If there is anything virtuous, lovely, or of good report or praiseworthy, we seek after these things.” - Articles of Faith 1:13 2. Do not share any personal information on the Internet. (Pictures, Name, address, password, etc.) If you want to join a site that requires this information, you must first get permission. Do not purchase items or give out credit card information without your parents‟ permission. 3. Do not enter chat rooms. Chat Room: A chat room is a interactive website where people of similar interests can communicate at the same time. These are available through popular sites such as yahoo.com. The problem with chat rooms is that your child will be interacting with strangers, and you do not know the stranger‟s intentions. 4. Do not use social media or Instant Messaging applications without your parents permission. Social Media: Any website where you can interact with friends or acquaintances, example Facebook, Twitter. Instant Messaging: You can communicate live with other people over the Internet by typing into a specific application. Popular messangers: msn messanger, yahoo messanger, etc. 5. Do not post mean spirited comments or status updates online. THINKS! Is it True? Is it Helpful? Is it Inspiring? Is it Necessary? Is it Kind? Is it Secure? 6. Do not download any applications from the Internet. There are many free applications available but a lot of these free applications are loaded with malware. (malware: Short for „Malicious Software‟ is any software written with the intent disrupt computer operation, gather sensitive information, or gain unauthorized access
Recommended publications
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • 2008 New Media M&A Round-Up
    2008 New Media M&A Round‐Up The Year in Digital Media Mergers, Acquisitions & Capital Raises PEACHTREE MEDIA ADVISORS, INC. N EW M EDIA I NVESTMENT B ANKING EACHTREE EDIA DVISORS NC P M A , I . Better Service ▪ Lower Fees New Media Mergers & Acquisitions TABLE OF CONTENTS I. Internet/New Media M&A Transactions by Sector 1 II. M&A Transactions & Capital Raised in 2008 12 III. 2008 Interactive Media Valuations/Comps 31 IV. Conclusion/2009 Outlook 37 V. Out‐of‐Home/Alternative M&A Transactions 38 VI. Conclusion/2009 Outlook 38 VII. 2008 OOH Valuations/Comps 41 Peachtree Media Advisors, Inc. Peachtree Media Advisors, Inc. is a New York based investment bank serving the out‐of‐ home and interactive marketing sectors of media. The company provides mergers, acquisitions and capital raise advisory services to lower middle‐market companies in the two fastest growing sectors of media. John Doyle, Managing Director & Founder, has been a media investment banker for more than 12 years; closed and structured more than 22 deals; and has a strong knowledge‐base of financial and strategic buyers in these sectors. If you are interested in learning more about valuation, positioning, preparation or the merger and acquisition process, please go to www.PeachtreeMediaAdvisors.com or contact John Doyle at (212) 570‐1009. John H. Doyle II Managing Director & Founder Peachtree Media Advisors, Inc. 50 Vanderbilt Ave., #30 New York, NY 10017 PH. 212.570.1009 ▪ FAX 646.607.1786 www.peachtreemediaadvisors.com Table of Contents Better Service ▪ Lower Fees New Media Mergers & Acquisitions Online Media M&A Activity in 2008 Although the Enabling, Analytics and Ad Serving category had the fourth highest In 2008, there were 707 merger, acquisition level of reported transaction value in 2008, and capital raise transactions in the online this category had the largest percentage sector of media (92 more transactions than increase in capital flowing to it than any the 615 in 2007).
    [Show full text]
  • Kennedy Says Underground Nuclear Tests to Continue
    1 *•». temperate* «& fat* Distffbifttofl *>**. F«lr teafe*, tonenw Today- •ad today. High today, raw sad Sunday In the Ms, low 21,150 tonlgfct IM5. See Weather, Page DIAL 741-0010 VOL. 86, NO. 26 Iua*4 auiy' xo^v through rndir. gioma ciui P«UH __ **" ** Jl"1 B<at ••* •» Ad«U«ul Miillni Otticei. RED BANK, N. J., FRIDAY, AUGUST 2, 1963 7c PER COPY PAGE ONE Kennedy Says Underground Nuclear Tests to Continue WASHINGTON (AP) - Presi- our professional experts would Senate Republican Leader Ev Kennedy said he doesn't see you wait long enough and you see Mansfield said he hopes the dent Kennedy's announcement the help materially in reaching a de- erett M. Dirksen of Illinois, who anything wrong in senators' long enough you have to do some- treaty to be signed Monday in United States will continue un- cision on the treaty," he said. remains uncommitted on the adopting a wait and see attitude thing and you have to vote 'yes' Mosoow can be brought before the derground weapons testing may 1 Senate Democratic Leader Mike or "no. Senate before Labor Day. He aid his drive for Senate ratifica- treaty, said among the man; toward the treaty, as many Re- Mansfield of Montana said in a said he thinks various commit- tion of the limited nuclear treaty. things senators will want to learn publicans and some Democrats 'My judgment is when the tes- separate interview he believes tees ought to complete their hear- Kennedy told his news confer- underground tests will provide from military leaders is "whether have.
    [Show full text]
  • Resources for Parents, Grandparents and Caregivers
    Resources for parents, grandparents, and caregivers Many sites include resources suitable for multiple age groups, parents, and educators. http://www.deletepredators.com/ - A Tennessee Police Project. This is a project of the Tennessee Association of Chiefs of Police. It has materials for children, parents, schools, and law enforcement. It has links to some materials from the NetSmartz organization. http://connectsafely.org/ -Forum is for parents, teens, educators, advocates - everyone engaged in and interested in the impact of the social Web. The site has tips for teens and parents, as well as other resources for safe blogging and social networking. http://www.ikeepsafe.org/ -The Internet Keep Safe Coalition is a broad partnership of governors and/or first spouses, attorneys general, public health and educational professionals, law enforcement, and industry leaders working together for the health and safety of youth online. iKeepSafe uses these unique partnerships to disseminate safety resources to families worldwide. Website has links to materials for educators, parents, and children. http://safekids.com/ - Guidelines for Parents of Pre-Teens http://www.kidzui.com/joinus/safety?term=1885916 -The KidZui browser was designed to offer kids the same expansive experience adults have on the web. KidZui brought together a team of over 200 teachers and/or parents to scour the web in search of the best content for kids. http://www.commonsense.com/internet-safety-guide/index.php - Keeping your kids Internet safe and smart http://www.staysafeonline.info/basics/family.html - Internet Safety for families and children by the National Cyber Security Alliance http://www.getnetwise.org/ - Safety Tips for Families by the Internet Education Foundation œ includes video tutorials http://www.fbi.gov/publications/pguide/pguidee.htm - A Parent‘s Guide to Internet Safety http://www.netbullies.com/pages/7/index.htm - Resources about Net Bullies http://www.stopcyberbullying.org/parents/index.html - Stop CyberBullying.
    [Show full text]
  • Hulsart Figures In; Gram
    10SSOUTH CO. BISTWICW FBSEUOW* H»J» • This Week COVERING TUWNHUIP8 O f HOLMDEL. JJAUIKON One Section MARLBORO MATAWAN . " ; '■ AND :■--■ ' 16 PAGES MATAWAN. DOAOUOB Member - M«mbor • • ei»t YEAR — 51st W EEK National Editorial Association M ATAW AN, N .J; THURSDAY, JUNE 16rt96Q New Jersey Praia AnocUUon Single Copy Ten Cent* ■ Ree Program Opens Phillips Mills Matawan High School Seniors In National Houpr. Society The summer recreation pro­ Hulsart Figures In; gram . l o r Matawan Township . will (tart on Monday at I «-m. Recreation Park at the CUfhvood Park Recreation 25 Acres Sold For : Acre Sector Voted Field. - The program Is open lo Murlboio Township Planning residents of Matawan Township it In Holmdel Twp, ' Hoard was unanimous .In'one thing ' von!yanA anychlidiromt-to-13- Association To Meet Tursduy, Ihnl the township needs yea»4f4ge who has not regis­ - Hoimdel TownfhJp s6on7may gain a 25-acre recreation cenUjr Tlie Mutawnn Township Taxpny- u Master Plan nnd voted to'rec* tered, and wishes to do so, is eiumelid Hits to Ihe township. Un­ asked to report at 8 a, in. Mob* clubhouse In tho Palmer Aye.-Mid- era Association will meet Tuesday dle . Rd. area. Mayor James H._ der the ruling of Monmouth Count/ day,— r-^—■ ....... •night at a p.m. ot .the Oak Shades Judge J .‘Edward Ascher In tha Daniel J . ■■ Stanklewicz, rec- Ackerson could only inrorm spec­ Fjro Hwsw, A speaker will '.be tators at the tov^nshfp meeting Holmdel tnil-ncro lot'size cttsi', .tha ' reatlon dlrector. annoUnced lhe picscnt from the Ntny Jersey Tak- governing body could keep duvol-.
    [Show full text]
  • PC-Sztrájk? 2011 Legjobb Szoftverei 7 Így Találja
    DVD DVD Letöltés: legális vagy illegális? 2 Friss 9 GB 2011 A LEGÚJABB DRIVEREK, HASZNOS PROGRAMOK, 32 A HÓNAP JÁTÉKAI, EXKLUZÍV CSOMAgok… Szoftverek, filmek, zenék: a legjobb legális forrásokból, a legtitkosabb helyekről R A böngészője egy spion? Amit az Internet Explorer GO DIGITAL! és a Firefox elárul Önről R 46 2011/2 _ CHIPONLINE.HU PC-sztrájk? 2011 legjobb szoftverei 7 Így találja 45 friss teljes verzió mind magyar nyelven! meg a hibákat! Értékelés, elemzés, javítás: így oldja meg saját maga a PC-problémákat – lépésről lépésre R 24 Lassú DSL? Tíz tipp, CHIP 2010 A teljes évfolyam ami azonnal segít PDF-ben a DVD-n Exkluzív: tippjeink most gyűjthető formában R 56 EFI: az új szupergyors BIOS Az EFI-vel a PC-je: gyorsabb, biztonságosabb, hatékonyabb – részletesen bemutatjuk R 30 MICROSOFT, GOOGLE, APPLE 98 Újra firss registry R A profik kedvence most a CHIP DVD-jén. Hatékony és megbízható takarítás Ki gyártja a legjobb okostelefont? 1995 Ft, előfizetéssel 1395 Ft Teszt: Windows Phone 7, iPhone és tsai. XXIII. évfolyam, 2. szám, 2011. február >> PC >> sztrájk Az >> App-biznisz Az >> új szuper BIOS Letöltések: >> legális vagy illegális? Szörf >> a kanapéról Minden >> fáj megnyitható Kémkedik >> a böngészője? A legújabb>> LCD-tévék Gyermekek >> biztonságban Kiadja a Motor-Presse Budapest Lapkiadó Kft. Frankreich, Spanien, Portugal, Italien: EUR 6,80 Benelux: EUR 5,80 Griechenland: EUR 7,20 Dänemark: DKK 50,- Slowenien: EUR 6,70 Vezércikk HA ÖN EGY ANDROIDOS MOBILTELEFON VAGY EGY IPHONE TULAJDO- NOSA, bizonyára szembesült már azzal a ténnyel, hogy ha nem figyel, Szerkesztői ajánlat ezek az apró programok egész egyszerűen befurakodnak az életébe.
    [Show full text]
  • Download but Allow In-App Purchases
    FINDING CAMELITTLE: CHILDRENS TELEVISION IN A DIGITAL AGE ____________________________________________________ A Thesis Presented to The Honors Tutorial College Ohio University ____________________________________________________ In Partial Fulfillment Of the Requirements for Graduation From the Honors Tutorial College With the degree of Bachelor of Science in Media Arts and Studies ____________________________________________________ By Ryan H. Etter June 2011 FINDING CAMELITTE 2 This thesis is dedicated to all those who have worked in children’s entertainment before me. From the Saturday morning cartoons, to feature length movies, I would like to thank the people who not only gave me a childhood, but also gave me passion and direction as an adult. FINDING CAMELITTE 3 Table of Contents INTRODUCTION……………………………………………………………………4 CHAPTER 1: THE INDUSTRY………….………………………………………….8 CHAPTER 2: MAKING AN ANIMATED PROGRAM………………….………...16 CHAPTER 3: DEVELOPING CONTENT IN A DIGITAL AG…………………….24 CHAPTER 4: THE AUDIENCE………………..……………………………………43 CHAPTER 5: CAMELITTLE…………..……………………………………………51 REFERENCES………………….……………………………………………………73 CAMELITTLE PILOT DVD…………………………………………………Appendix FINDING CAMELITTE 4 Finding Camelittle: Children’s Television in a Digital Age Long ago and far away there was a land called Camelot. It was a kingdom ruled by the great king Arthur who was a virtuous and wise monarch. His reign was presented as idyllic and he was considered the model ruler. Many have used the imagery of Arthur’s Camelot to describe prosperous times in history, from the JFK presidency to the “Golden Age of Television.” For young children, the world is shaped by much smaller things than presidents or politics and, for myself; the world existed not only in my home or at school, but in the wonderfully imaginary places created in cartoons.
    [Show full text]
  • You Can Childproof Your Computer 27 February 2009, by Anne Krishnan
    You can childproof your computer 27 February 2009, By Anne Krishnan Every few months, I receive a question from a problems by restricting certain user accounts' reader whose computer was never the same after access to the control panel and designating safe a grandchild came to visit. Web sites for surfing. One computer's default language switched from Finally, the beauty of separate user accounts in English to German. Another could no longer Windows is that you can limit one or more people's launch Firefox. A third mysteriously lost its sound. access to the system resources, with no additional software required. For instance, by creating a user While it's difficult to figure out what buttons a child account for the kids, you can prevent your might have pressed or clicked to cause these grandchildren from being able to download problems, there are a number of ways that you can software to the system and protect your personal protect your computer while still allowing the kids files so the kids can't destroy them. to play on it. To open a new account in Windows XP, first log in Many computer problems can be attributed to kids' as "Administrator." Open the "Start" menu, click on indiscriminate Web surfing. Adults (hopefully) know "Control Panel" and double-click on "User to be careful in cyberspace, but children are more Accounts." Click on "Create New Account" and likely to invite any old malware home for dinner. enter a name for the account. KidZui is a Web interface that limits children's Now select the "Limited" radio button (the little surfing to a pre-approved set of Web sites, circle) at the top of the screen.
    [Show full text]
  • Horyzonty Anglistyki Praktyczne Czasopismo Dla Nauczycieli
    HORYZONTY ANGLISTYKI PRAKTYCZNE CZASOPISMO DLA NAUCZYCIELI CZASOPISMO DOSTĘPNE W PRENUMERACIE ISSN 2544-4239 ■ PAŹDZIERNIK-LISTOPAD 2018 (07) ■ NR. ART. 475407 TEMAT NUMERU GRAMMAR DRAMA, CZYLI MOI UCZNIOWIE NIE LUBIĄ GRAMATYKI BEFORE THE TEST KEEP CALM AND TEACH ON… CZY E8 TO EDUKACYJNY K2? STUDENT SKILLS LAB CO I GDZIE WARTO CZYTAĆ W SIECI? ROZMOWA Z PROF. HANNĄ KOMOROWSKĄ na temat nauczania, kształcenia nauczycieli oraz sposobów na szukanie motywacji OD REDAKCJI MÓWI SIĘ, ŻE WCZORAJSZY NAUCZYCIEL W PRZEDWCZORAJSZEJ SZKOLE UCZY DZISIEJSZEGO UCZNIA, JAK ROZWIĄZYWAĆ PROBLEMY JUTRA. BRZMI JAK PARADOKS, ALE NIM NIE JEST. TAK WYGLĄDAŁA EDUKACJA NA PRZEŁOMIE WIEKÓW. Zawsze starszy uczy młodszego. Ale czy daje mu odpowiednią ilość autonomii uczniowskiej? Już Maria Montessori radziła, by przyglądać się rozwojowi dziecka. By podążać za nim i niekoniecznie dogma- tycznie instruować go, o co właściwie w tym życiu chodzi. Każdy ma swój czas i każdy uczy się we własnym tempie. Technologie nie- samowicie sprzyjają tym filozofiom i podejściom metodologicznym. Czy 50-letnia nauczycielka może stać się liderem edukacji przyszło- ści dla młodego pokolenia, które uczy? I w końcu, czy pokolenie Z żyjące w świecie cyfr i komputerów, potrzebuje autorytetów? Amerykański pisarz Marc Prensky w artykule Digital Natives, Digi- tal Immigrants czyli cyfrowi tubylcy (młodzi ludzie wychowywani przez smartfony) i cyfrowi imigranci (ci, którzy poznali nowe tech- nologie w życiu dorosłym) opowiada o tej niesamowitej i odwiecz- nej dychotomii. Cyfrowi tubylcy czy cyfrowi imigranci – kto ma większe doświad- czenie? Kto gra główną rolę? I w końcu, kto tu kogo ma uczyć? Nauczycielka 50+, jest cyfrową imigrantką. Uczy w szkole, ale sama obsługi programów, takich jak: Paint, PowerPoint i Canvy, nauczyła się na szkoleniach.
    [Show full text]
  • World Tech M&A Report 2015
    WORLD TECH M&A REPORT 2015 www.corumgroup.com 2015 – ANOTHER RECORD YEAR? 2015 will continue the LUMINARY PANEL record pace established Thanks to our luminary panelists who took part in “Forecast 2015: last year in all 29 Global Tech M&A.” For more of their thoughts on the technology market sectors around landscape, view the original webcasts at www.corumgroup.com. the world, with Asia growing the fastest. This “I think the big disruption is going to come from report profiles those building ‘containers for trust’ for data, rethinking the sectors, who’s doing the way things are done so that identity and protection deals and valuations. and trust are the new defaults.” For the second year, we PETER COFFEE, SALESFORCE are profiling the Corum Top Ten Disruptive Technology Trends, with “Things become apps become services that individual reports by Corum’s top executives. become context available, which changes the way These trends are driving tech M&A, fueled by entertainment, social, work, transportation, and even nearly $2 trillion available to both strategic and reality function.” financial buyers. REESE JONES, SINGULARITY UNIVERSITY Special thanks to our panel of industry luminaries “We’re excited about software-enabled business models, for their insights and contribution to this report: not software or SaaS oriented, but consumer-related Peter Coffee from Salesforce, Reese Jones from services that allow an end user to subscribe to a solution Singularity University, Mukund Mohan from as opposed to buy or rent a piece of software.” Microsoft Ventures and Dr. Karl Popp from MUKUND MOHAN, MICROSOFT VENTURES SAP.
    [Show full text]