With only about a month left between now and the final day of classes, I hope my students are getting visits from that misunderstood muse, Panic. She might be the last hope for some people. Taken from imgur.
idtprof.com
There are 12 posts filed in idtprof.com (this is page 1 of 2).
A cybersecurity glossary
Antivirus software Computer programs that can block, detect, and remove viruses and other malware.
Backups/backing up files Extra copies of computer files that can be used to restore files that are lost or damaged.
Bandwidth The amount of data that can pass through a network or part of a network per second.
Botnet Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
Computer network Two or more interconnected devices that can exchange data.
Computer virus A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
DDoS A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
Doxnet A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical infrastructure.
Encryption The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
Firewall Software designed to block malware from entering protected networks.
Hacktivist Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Internet service provider (ISP) A company or organization that gives users and devices access to the Internet.
Keylogger malware A program that records every key struck on a keyboard and sends that information to an attacker.
Malware Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
Phishing Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Ransomware A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
Server A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
Software Consists of code written in a programming language that instructs computers to perform specific tasks.
Software patch A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
Software vulnerability A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Spam Unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft.
USB drive A data storage device that is used to store, back up, and transfer computer files.
USB port A type of connection between devices that can exchange information and power supply.
Taken from the Khan Academy’s brief cybersecurity presentation.
The more you know: More IT Girls
Why encourage girls to go into a science, tech, engineering or math career? The U.S. will need more than 1.5 million engineers and computing professionals in the next 10 years. Enough “it girls.” More IT Girls!
Would you like to play a game?
In this game of high adventure, your objective is to travel 200 miles across the great Gobi Desert while being chased by a tribe of knock-kneed pygmies. High adventure, indeed!
One does not simply learn how to Code
Get comfortable with abstraction. If you try to understand how everything works, you’ll get nothing done. pic.twitter.com/jfsXtdIySk
— Quincy Larson (@ossia) February 12, 2015
Web Design Resources
Free Resources for Learning Python
A short, but hopefully growing list of free online resources that may help you learn Python. The default for these links is Python 3, unless noted.
Tutorials and Books
- Program Arcade Games with Python and Pygame
- Learn Python the Hard Way
- Learn X in Y Minutes (where X=python3)
- How to Think Like a Computer Scientist
- Full Stack Python
- The Python Tutorial
- Test-Driven Development with Python
- learnpython.org
Videos
- Berkeley EE61A – Computer Science
- TheNewBoston (Python 2)
New school year, new password
Hello, Monday (Wednesday — actually, Friday)!
As we all get ready for the new year, and then again 90 days from now, and in yet another three months, ad nauseum — the computer system will ask you to pick a new password to access the information you so desperately need right now.
Although this may seem like a burden — and by all means, maybe it is — you should take a couple of minutes to take care of the computer’s request to change your password and pick a secure code that is hard to decipher and easy for you to remember.
There are applications available that will remember passwords for you (like LastPass or KeePass) although some of us (not me) have survived for decades writing down passwords on small pieces of paper and storing them somewhere “safe.”
When considering your new password, be sure to read the system’s requirements for new passwords, choose a strong passwordbased on those specifications, and make sure your new entry key is not one of 2015’s worst passwords. Here’s the top 10:
- 123456
- password
- 12345678
- qwerty
- 12345
- 123456789
- football
- 1234
- 1234567
- baseball
It’s the new style
It’s new to me, anyway.
Starting with the Spring 2016 semester, I’ll be moving toward more open-source software options in my classes, ergo my Photoshop may include some GIMP, my Dreamweaver will have some bootstrap, etc.
Gotta get some reading done.
2018 EDIT: I can’t believe I never saw these guys live:
The Day Github Came to Town
So Python is now in the books; by which I mean, we got it into the dual-credit curriculum, we have it on our machines, and we had a lot of fun making it work.
Next, CSS frameworks will replace Dreamweaver in Web Design II. And what better way to implement them than this?