Using Monetization

For this week Monetization topic I decided to discuss using Crowdfunding using Kickstarter in a Google slideshow format. I found my information by using the Kickstarter website, the Kicktraq website, Richard Bliss’ Kickstarter Crowdfunding Essential Training course which I found on the Lynda website.


Using Wikis

A Wiki is a website that has a collaboration of people that can add, edit and save to a document online.  You can adjust the setting on the Wiki page so anyone to can contribute or just a certain group of people.  Popular websites such as PBWorks, WikiHow, and Wikipedia are all examples of different Wiki pages.  My current workplace is using PBWorks to share information with different groups of people within our library system.  We use it to check on current programs, work assignments, and assessment statistics.  I can see this as a useful tool in an educational setting for group projects in elementary schools, middle schools, and high schools but teachers would have to teach their students how to create to Wiki page.

Using Google Maps

The Symantec corporation is probably best known for there Norton Security Antivirus and Malware software products. There is a number of Symantec products which all deal with web security for computers, smartphones, tablets, and cloud data via software. Although I know this software is not cheap. I know that having a unprotected devices is not a good idea for anyone especially if you are a small business. I personally have tried the freeware versions of antivirus/malware software but find these products lacking consistent updates.


Using RSS Feeds

RSS Feeds do make reading your favorite newspapers, articles or blogs easier because you can locate everything you want in one place by using it with a RSS Aggregator such as feedly. I found some very interesting articles in regards to web security as well as videos and podcasts in related topics. I’m currently been reading Schneier on Security, Krebs On Security and The Hacker News although I do find myself wondering about how much of my personal information is being used by companies as a result of reading these articles, but it is all part of using the internet in today’s society.

Using Twitter

I found Twitter a bit difficult to use to locate information quickly that related to my topic, although it make it easy to locate information the had the keywords in your search the information varied greatly. When I search for cybersecurity, or web security the results could be companies selling security products, security conferences, security issues, to Homeland Security and everything in between. I finally found some useful information but I did involve a lot of searching through many different tweets. I used #cybersecurity but it still took some time to find the information that interested me.

Using EFF.org

The Electronic Frontier Foundation is one of the sources I use to get information about Security issues as well as Privacy issues. The Electronic Frontier Foundation Facebook page is broken down into their home page, about page, posts page, video page, photo page, events page, join EFF page, community page and info and ads page. Although I do like that their seem to post on 3 to 5 issues a day. I find myself searching on their video page more often to scroll until I find a topic I find interesting. I do this because I can avoid reading some of the comments that people tend to leave on the post page. I generally believe that most people do seem to have thoughtful insights but I do come across some that are very shocking. I do like that EFF folks are very concise on their posting of topics. It makes it very easy for me to locate the topic that interests me quickly. I also like that they have a suggest edits button next to the like and share buttons. I love the search box option. I would like to see more videos in the video page, but for the most part I do find the navigating through their website to be easy to do without me getting frustrated because I cannot find something I am looking for.

Using Flickr

This week I posted some edited pictures using my Flickr account that I thought represented Cybersecurity, although it took my a while to find some royality free/copyright free images I finally was able to find some that I approved of. I personally liked the multi color security picture myself. Editing photo using Lunapic was entertaining and therapeutic. I had a blasted playing with all the different options.


Using digg

Today I started to use digg.com for social bookmarking. Although I still learning about how the trafficking people to my blog site aspect works to, I do like the articles using my Digg account. I particularly liked the articles about why ji32k7au4a83 is common password and how to delete things properly because it deals with web and personal information security. If you get the chance read the article about Tim Berners-Lee thoughts about today’s internet.

Suggestions for a strong password

Never give out your password to anyone.* Never give it to friends, even if they’re really good friends. A friend can – maybe even accidentally – pass your password along to others or even become an ex-friend and abuse it.

Don’t just use one password. It’s possible that someone working at a site where you use that password could pass it on or use it to break into your accounts at other sites.

Newest advice: Use a pass phrase.Security experts are now recommending a  “pass phrase” rather than simply a password. Such a phrase should be relatively long – perhaps 20 characters or so and consist of seemingly random words strung together along with numbers, symbols and upper and lower case letters. Think of something that you can remember but others couldn’t guess such as YellowChocolate#56CadillacFi$h. that’s relatively long – perhaps 20 characters or so — using seemingly random words strung together along with numbers, symbols and upper and lower case letters. Think of something that you can remember but others couldn’t guess such as YellowChocolate#56CadillacFi$h.  Avoid using famous quotations that might be easy to guess.

Make the password at least 12 characters long. The longer the better. Longer passwords are harder for thieves to crack.

Include numbers, capital letters and symbols. Consider using a $ instead of an S or a 1 instead of an L, or including an & or % – but note that $1ngle is NOT a good password. Password thieves are onto this. But Mf$J1ravng (short for “My friend Sam Jones is really a very nice guy) is an excellent password.

Don’t post it in plain sight.This might seem obvious but studies have found that a lot of people post their password on their monitor with a sticky note. Bad idea. If you must write it down, hide the note somewhere where no one can find it.

Consider using a password manager. Programs or web services like RoboForm (Windows only) or Lastpass (Windows and Mac) let you create a different very strong password for each of your sites. But you only have to remember the one password to access the program or secure site that stores your passwords for you.

Consider using multi-factor authentication. Many services offer an option to verify your identity if someone logs on to your account from an unrecognized device. The typical method is to send a text or other type of message to a mobile device registered to you with a code you need to type in to verity it’s really you. In most cases, you will not be required to use this code when logging on from a known device such as your own computer, tablet or phone.

Don’t fall for “phishing” attacks. Be very careful before clicking on a link (even if it appears to be from a legitimate site) asking you to log in, change your password or provide any other personal information. It might be legit or it might be a “phishing” scam where the information you enter goes to a hacker. When in doubt, log on manually by typing what you know to be the site’s URL into your browser window.

Make sure your devices are secure. The best password in the world might not do you any good if someone is looking over your shoulder while you type or if you forget to log out on a cybercafe computer. Malicious software, including “keyboard loggers” that record all of your keystrokes, has been used to steal passwords and other information. To increase security, make sure you’re using up-to-date anti-malware software and that your operating system is up-to-date.

Use a “password” or fingerprints for your phone too. Most phones can be locked so that the only way to use them is to type in a code, typically a string of numbers or maybe a pattern you draw on the screen. Some new phones allow you to register fingerprints, which are quite secure. Sometimes when people with bad intentions find unlocked phones, they use them to steal the owners’ information, make a lot of calls, or send texts that look like they’re coming from the owner. Someone posing as you could send texts that make it look like you’re bullying or harassing someone in your address book with inappropriate images or words.

Information was found at Connect Safely