Tag Archives: Internet Safety

Remove EXIF information from your pictures

Most people still don’t know that their tablet, camera or smartphone might be tagging their latitude and longitude.   Why is this dangerous?  It can show the location of where you or your family is at.  It can give away … Continue reading

Rate this:

Posted in Apple, Computer Security, Linux, Mobile Computing, Software, Technology, Wireless | Tagged , , , , | 1 Comment

How dangerous is geotagging? US Army Helicopters destroyed

Several times over the past year we have posted on how dangerous it is to leave geotagging on when taking pictures.  The US Army found out when someone took pictures of AH-64 Apaches which were later destroyed.  SC Magazine –Apaches … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , | Leave a comment

Cyber Terrorism – Al Qaeda Video Calls for Electronic Jihad

The National Terror Alert Response Center has an excellent article Al Qaeda may be turning its destructive attention to cyber-warfare against the United States. In a chilling video, an al Qaeda operative calls for “electronic jihad” against the United States, and … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment

A Cross-browser Worm that affects all operating systems?

PCWorld has reported that a cross-browser worm may be for sale in forums and on the net for as little as a $1000.   They go on to report that it may capable of infecting Windows, Apple and Linux based … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

Just click away – it’ll be ok…

Here’s 10 things the younger generation is doing online and how they can stop behavior that can lead to malicious theft of data and great food for thought about their online reputation. 10 things Gen Y do online.. and shouldn’t.  … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , , , , , | Leave a comment

Obfuscation – There’s more to the internet than you know

76 Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , | 1 Comment

State Security Breach Notification Laws

Alaska Alaska Stat. § 45.48.010 et seq. Arizona Ariz. Rev. Stat. § 44-7501 Arkansas Ark. Code § 4-110-101 et seq. California Cal. Civ. Code §§ 56.06, 1785.11.2, 1798.29, 1798.82 Colorado Colo. Rev. Stat. § 6-1-716 Connecticut Conn. Gen Stat. 36a-701(b) Delaware Del. Code tit. 6, § 12B-101 et seq. Florida Fla. Stat. … Continue reading

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

Data Privacy Day

It’s January 28th, 2011, and that means Data Privacy Day is here! The NCSA would like to celebrate this event by emphasizing ways that everyone can contribute to cybersecurity and data privacy. See which categories apply to you and check … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

Lengthen a shortened url

You can lengthen a shortened url before going to or clicking on a shortened url.  Never click unless you truly trust the website or the individual.  You can use LongURL to see where the shortened url is taking you. http://is.gd/wContinue reading

Rate this:

Posted in Computers | Tagged , , , , , , , | Leave a comment

Wisconsin bungles another data breach and ID theft threat to 60,000 – National Identity Theft

Wisconsin bungles another data breach and ID theft threat to 60,000 – National Identity Theft | Examiner.com Added by ShareThis

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

A Good Blog on Phishing and Internet Safety

Tech Paul has an excellent site on spam, security and email phishing.   With hundreds of posts of sample spam and phishing emails; he educates internet users on internet safety. Kudos to his site. Note: His site also contains tips … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | 1 Comment

Blackbox Security Monitor – Free for Personal Use

Blackbox Security Monitor is a freeware program for personal use that can be used on individual computers at home.  This comprehensive program monitors the following- User Activity report 10 Most popular programs 10 Most popular Web sites 10 Most popular … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

TTC Shelbyville endorses Stay Safe Online and the NCSA

Cyber Security Awareness is everyone’s responsibility.  Visit StaySafeOnline.org TTC Shelbyville with other universities, colleges, and organizations recognize the need to be safe online and recently endorsed the campaign to be safe online. See Full list on endorsing organizations at the … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment

Test Your Browser’s Security

We just posted a way to test your browser but you can’t beat Bill Mullins.  One of the best computer bloggers on the web along with Rick over at WhatsOnMyPC (excellent resource for freeware and reviews), Bill gives a thorough … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , | Leave a comment

McGruff SafeGuard – Protect Your Kids

Because we serve thousands of students and the community we are often asked how to protect children on the internet.   An early posting on this blog featured K9 Web Protection. Rick over at Whats On My PC just featured … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , | Leave a comment

Internet Safety – Windows4All

Rick has an excellent post for this website.  Link If you want total safety for the internet, Windows4All (Silverlight Required) gives you the ultimate sandbox experience.   The website uses Microsoft’s Silverlight meaning you should use Internet Explorer to access the … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , | Leave a comment

Internet Protection for Children

PCSecurity has a great review on DansGuardian.  DansGuardian is a freeware application that helps to protect children on the internet.  Link

Rate this:

Posted in Computers, freeware, Internet, Technology | Tagged , , , , , , , , | Leave a comment

The Bigger You Grow, The More You Relate to Microsoft

Compromise of SSL-protected communication – SSL <- Get it?- SSL secure communication – What application are we talking about? -> Link This made it possible for attackers to obtain certificates that would function for any site they wished to target. … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , | Leave a comment