Thursday, December 4, 2014

Safe Practices for Life Online Group

  1. Twitter, Facebook, and Instagram




  1. Sexting: Sending of sexually explicit photos, images, text messages, or emails using a cell phone.


Cramming: Adding too many things to one technology device than possible.


Cookies: Small information about you saved in a small file on the computer.


Trojan horse: Small software programs that if they are run can do severe damage to your mobile device


Phishing: A way of trying to get your personal information through email for fraud purposes


Spyware: Tracking software that helps to get peoples information or where a bouts


Rootkit: Gives access to an administrators passwords without being detected.


Zombie: A cleaned out computer free of viruses
  1. Actual student screen names: Can be dangerous to your information that should be private
Trashmouth: This can be offensive to some people and is not appropriate
IHaveOnePairPants: Once again this can be taken the wrong way and is not appropriate
BoogerDude: This is not professional at all, it is very immature.
Pig: This is also not professional and you could not use this for work purposes


  1. All of these screen names attract negative attention.   They make the people who have these screen names look bad and they give others the chance to treat them poorly.  These screen names come off as desperate and these people are looking for attention from others.


  1. All of these screen names either give away the person’s name or what their hobby is.  They are unprofessional and make it easy for a stalker to come find them.
  • Tom_Evans34 reveals the persons name
  • Missy-13 reveals the girls first name and probably how old she is.
  • AndyKarateKid reveals that Andy like karate and makes it easy for someone to find him
  • ViolinGurl reveals that this girls like to play the violin
  • restlinmatch reveals that you can probably find this boy at a wrestling match


  1. Good Choices: These are all good because they do not reveal a name or gender, age, year born, any personal info., bad language, and anything negative.
  • Soccerstar
  • Bookworm
  • SimplyMe
  • AmrcanIdol2
  • 2BorNot2b
  • Choco-holic


Bad Choices: These are all bad because they reveal peoples names, year born, where they live, gender, and are just plain negative.
  • Puppygirl1234
  • KeKe1995
  • BellaIsabella
  • Karla-Love-1996
  • babyfaceLA
  • gUn4hiRE
  • Watup?
  • DarkAngel666
  • i8sushi2
  • CapitlOfens


  1. Three screen names:
  • History!
  • HungerGames4
  • Today93


  1. Emily) -3 (word from dictionary)
+2 (8 characters or more)
+2 (both letters and numbers)
+3 (one or more no number symbol)
+2 (mixture of upper case and lower case letters)
total = +6
Lindsey) +2 (8 characters or more)
+2 (mixture of upper case and lower case letters)
+3 (one or more no number symbols)
total= +7
Alyssa) +2 (8 or more characters)
 -3 (shared password with a friend)
 total= -1


  1. most common reason - students write their passwords down where others are able to see it
least common reason -  others students see the password as the student enters it on a keyboard


  1. A drive-by-download is downloaded on your computer without you realizing it. Attacker sites or clicking html emails can spark an instant download of malware onto your computer. When accessing a certain website that the malware threats are one, the site will load normally, but in the background, a “spyware” threat software will pop up, but that software has never be downloaded on the computer. The video explains that this “spyware software” wants you to “buy” the software, then it won’t fix the problems.
I do not think this is fair for the websites that you could simply Google Search and click on when searching can give you a virus that ruins your computer. You have to keep up with a current and proper anti- virus software. The fact that you can spend up to $2000 on a computer, the software, and the processors and someone can just “crash” that in a matter of minutes is not okay at all.


  1. Are You an Unwitting Accomplice in a Crime? - If you choose to pursue work from home employment, prevent yourself from being scammed by ensuring that the company you are dealing with is reputable and legit. Legitimate work-at-home employers should be willing and able to answer a variety of questions about their programs.
Are You at Risk to be Scammed Through an Internet Auction?- Excellent! But still exercise caution when dealing with individuals whom you don't know.
Is your Computer Protected? - Excellent! Making sure you have a back-up copy protects you from data loss.

  1. IC3 is the Internet Crime Complaint Center. They have gotten reports that StealthGenie, a mobile spyware app, is being used illegally. First, let’s talk about what a mobile device spyware app is used for our phones. This app lets the users to monitor a phone users communication and whereabouts. As for the StealthGenie, the app gives capability to have: call records, call interception, recorded surroundings, electronic mail, sms messages, voicemails, contacts, photos, videos, and calendar application. This app is also invisible to the people who are being hacked. There are apps that can be run in order to detect the program, but otherwise, the only answer is to reset the phone to factory settings.

No comments:

Post a Comment