Ads 468x60px

Labels

Wednesday, November 21, 2012

YouTube for Schools

Comprehensive 

YouTube for Schools provides schools access to hundreds of thousands of free educational videos from YouTube EDU. These videos come from well-known organizations like Stanford, PBS and TED as well as from up-and-coming YouTube partners with millions of views, like Khan Academy, Steve Spangler Science and Numberphile

School-appropriate 

School admins and teachers can log in and watch any video, but students cannot log in and can only watch YouTube EDU videos plus videos their school has added. All comments and related videos are disabled and search is limited to YouTube EDU videos Customizable You can customize the content available in your school. All schools get access to all of the YouTube EDU content, but teachers and administrators can also create playlists of videos that are viewable only within their school's network. 

Teacher-friendly 

YouTube.com/Teachers has hundreds of playlists of videos that align with common educational standards, organized by subject and grade. These playlists were created by teachers for teachers so you can spend more time teaching and less time searching.

Thursday, September 27, 2012

Top 10 Tips to Protect Yourself Against Computer Viruses



  • 50
    Share

When your computer gets infected with a virus it can be a devastating experience and this is exactly why you need to protect your computer from viruses. A virus can consume your precious computer files and even damage your computer hardware. Is this worth ignoring? I don’t think so!  Anything you can do when protecting your computer from viruses has to be a good thing and is well worth spending your time on. We all know prevention is better than a cure so I am going to share my top 10 tips on how to protect your computer from viruses.

10 Tips to Protect Your Computer From Viruses


There are many ways to protect your computer from nasty viruses invading. Protecting your computer is a number one concern for every computer user on earth. I do not know anyone that wants to have their computer crash due to a virus invasion. Here are 10 ways to protect your computer  from viruses and keep your files and data safe.

1. Learn about viruses

The first thing that I recommend is to research and become knowledgeable about viruses. How can you protect your computer from viruses if you don’t even know what they are. Here are some previous tutorials I have written about viruses. See What is a Virus and how do I know if I have one? and What is the difference between a virus, spyware, Malware, and adware? How can you protect your computer from viruses if you don’t know what it is?

2. Arm yourself with the best Anti-virus software to suit your needs.

Not everyone can get away with using free Anti-virus software because it depends what you do on your computer. It depends on factors such as if you download files or not, if you open email attachments, and if you surf suspicious websites. See my reviews for the best Virus Removal Software. Lets face it, if you do not have protection against viruses installed on your computer, you will without a doubt, get a virus within the first hour of surfing the internet. It is that easy. For years I would remove a virus from my dads computer at least once a year, until finally I realized that he needed a paid Anti-virus program. He wasn’t good with computers and if a windows popped up and said he needed to take a scan, he would just do it. He would just presume it was the program I had installed to protect his computer. Now I have installed PC Matic on this computer and there has not been one problem since. This program offers full protection along with full computer maintenance. It never asks him to do anything and just works in the background silently.

3. Regular Updates

Having a great Anti-virus program installed on your computer to protect your computer from viruses is great, however if you do not regularly update the virus definitions, then the program is useless. New viruses are produced daily and this is why we constantly have to update the viruses definitions and stay ahead of the bad guys. Most programs will update by itself as long as you haven’t turned this option off by accident. This is definitely something you should check.

4. Downloading

When surfing the internet avoid websites that contain illegal software downloads, sexual references, free screensavers, cracks or serials, etc. I am sure you get the picture. If you go near these sites you are immediately asking for trouble. Some other websites that you should stay away from include foreign websites where you cannot understand the language on them. This is because you cannot tell what is on the website. This is definitely included in the top 10 internet safety tips.

5. Windows Updates

Always update Windows when protecting your computer. These updates contain security updates that will help in your fight against viruses. If you do not perform regular Windows updates you are leaving your computer in a vulnerable state. You can simple check to see if your computer needs updates by going to he start menu and typing in “windows update”. See the screen shot below. You can also view recent Windows update history so you can be in control of the whole situation.

tips to protect your computer from viruses

6. Opening Emails

Be careful when opening emails. There are obvious emails that you know you shouldn’t open, however what about the ones you get from people you know? What if your friend has a virus and it is spreading itself through emails? An email cannot be important enough to risk getting a virus. Delete the email and send a fresh email to your friend asking them if they actually did send you the email. It is better to be safe than sorry.
:(
You can also create a whitelist so only certain emails get through. You will still have to be careful though, as you do not know what security the sender has installed on their computer. It’s like driving on the road, you need to watch how others are driving to stay safe.

7. Change your settings to protect your computer from viruses

If you are really serious about protecting your computer you can change your email settings and receive text emails only. You can also disable the ability to open email attachments. Virus travel in HTML enabled emails and file attachments. They cannot travel in text email messages. I know this sounds very boring, however, I would rather be boring and protect my computer from viruses.

8. Peer to Peer file sharing – ways to protect your computer

Do not use peer to peer (p2p) file sharing programs. These include programs such as Limewire, Bearshare, Gnutella, Morpheus, Torrents, etc. These programs let you download files from other computer users connected to their program network. You have no way of knowing what you are actually downloading until it is on your computer.
Even if you share files from a cd from a friend, it may have a virus. Protecting your computer from viruses is the most important priority for you and you do not want to risk your computer safety just because you trust your friend.

9. Do not download files from websites

Again, there is no way of knowing what you are downloading. The file can appear to be named like the file you want, however it could be anything. Most of the time, this is how a virus is unleashed, it usually seems like a harmless, familiar object. If you are looking for a driver for a certain brand of computer then make sure you are getting the download from the genuine website. Many websites on the Internet offer free driver downloads, however, many of them contain viruses. Everything is not what it seems, so be very careful. I would rather use a program to scan my drivers and update them for me. I would not risk downloading a device driver from just any old website.

10. Have Firewall Protection

Make sure you have a firewall enabled on your computer. Windows comes with an inbuilt firewall or you can use a third party firewall program like Zone Alarm. Either way, make sure the firewall is on…To check the Windows Firewall go to the security settings in your control panel.
If you are careful and are serious about learning how to protect your computer from viruses, it is possible to stay safe. My top 10 tips will help you keep your computer running smoothly, and virus free.

Notes on tips to protect your computer from viruses:

  • These 10 ways to protect your computer from viruses are extremely important tips to follow. If you have had a virus in the past you would know how devastating it is when you lose all of your files and your computer crashes.
  • People often try to install more than one anti-virus program to protect their computers from viruses. This is not how to protect your computer from viruses as installing more than one program always causes a problem. You can only install one virus removal program at any one time.
 From tipsforpc.com

 

Friday, September 21, 2012

VOTE VOTE VOTE!

 
Visit your local US Cellular Store from
September 14 - October 21 to get a voting code and
support Belmond-Klemme Junior/Senior High School ONLINE!
The campaign is open to all K-12 Schools - big or small, public or private.  The math is simple but the rewards are big;  the school with the most votes wins $150,000 and the next 17 schools with the most votes each win $50,000
 
The Belmond-Klemme JH/SH School needs additional networking infrastructrure to support future improvements and establish a 1:1 and Bring  Your Own Device initiative for grades 7-12.  Help us by voting for our building!! 
 

Tuesday, September 4, 2012

Making Citing Sources Easier





Son of a Citation Machine - this site is very easy to use.  You click on the type of formatting you want to use (MLA, APA, Turabian, or Chicago) then the type of resource (email, website, book, encyclopedia, and many more) then fill out the web form with the info required and it will create the citation for you.   Very powerful and easy to use





Bibme is another easy to use citation resource.  You can search for a book, website, etc or enter the information yourself and even create a bibliography on the site and then download it in one of four formates (MLA, APA, Turabian, or Chicago).  It supports many types of resources like books, websites, films, newspapers and more




Purdue University Owl -  The Owl Online Writing Lab from Purdue University has help and instructions for citing different resources in different formats (MLA, APA and Chicago) as well as help in conducting research and using the research.  It does not create your citations, but shows you the correct format.




Zotero is another nice tool for research and citation.  It allows you to collect, organize, cite, and share your resources in different formats.  It is a download that is integrated into Word  and OpenOffice.  It does sync your data online so you have access from any computer or mobile device.









Thursday, August 2, 2012

REGISTRATION Documents!

Registration is just around the corner!  Below are important documents you can print and bring with you to make the registration process quicker and easier!
        

Friday, June 22, 2012

Phishing Scams ...


More often than not, your bank will not suddenly send you an email regarding an issue with your account that requests you to click on a link and enter personal information, bank account information, social security number or any other personal identifying information. If you receive such an email, and it is a concern for you, call your bank! Do not click on the link, or if you do, please do not enter any personal information.


 Please do not become a victim of a Phishing Scam...




 




The following information is from the FBI E-Scams & Warnings     


Phishing and Smishing Schemes
In phishing schemes, a fraudster poses as a legitimate entity and uses e-mail and scam websites to obtain victims’ personal information, such as account numbers, user names, passwords, etc. Smishing is the act of sending fraudulent text messages to bait a victim into revealing personal information.

Be leery of e-mails or text messages that indicate a problem or question regarding your financial accounts. In this scam, fraudsters direct victims to follow a link or call a number to update an account or correct a purported problem. The link directs the victim to a fraudulent website or message that appears legitimate. Instead, the site allows the fraudster to steal any personal information the victim provides.

Current smishing schemes involve fraudsters calling victims’ cell phones offering to lower the interest rates for credit cards the victims do not even possess. If a victim asserts that they do not own the credit card, the caller hangs up. These fraudsters call from TRAC cell phones that do not have voicemail, or the phone provides a constant busy signal when called, rendering these calls virtually untraceable.

Another scam involves fraudsters directing victims, via e-mail, to a spoofed website. A spoofed website is a fake site that misleads the victim into providing personal information, which is routed to the scammer’s computer.

Phishing schemes related to deliveries are also rampant. Legitimate delivery service providers neither e-mail shippers regarding scheduled deliveries nor state when a package is intercepted or being temporarily held. Consequently, e-mails informing of such delivery issues are phishing scams that can lead to personal information breaches and financial losses. 

Tips
Here are some tips you can use to avoid becoming a victim of cyber fraud:
  • Do not respond to unsolicited (spam) e-mail.
  • Do not click on links contained within an unsolicited e-mail.
  • Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.
  • Avoid filling out forms contained in e-mail messages that ask for personal information.
  • Always compare the link in the e-mail with the link to which you are directed and determine if they match and will lead you to a legitimate site.
  • Log directly onto the official website for the business identified in the e-mail, instead of “linking” to it from an unsolicited e-mail. If the e-mail appears to be from your bank, credit card issuer, or other company you deal with frequently, your statements or official correspondence from the business will provide the proper contact information.
  • Contact the actual business that supposedly sent the e-mail to verify if the e-mail is genuine.
  • If you are asked to act quickly, or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.
  • Verify any requests for personal information from any business or financial institution by contacting them using the main contact information.
  • Remember if it looks too good to be true, it probably is.

To receive the latest information about cyber scams, sign up for e-mail alerts on this website. If you have received a scam e-mail, please notify the IC3 by filing a complaint at www.ic3.gov.



Tuesday, February 7, 2012

The EAGLES are Coming! The EAGLES are Coming!

Not only does the new year bring resolutions, so does it bring the Decorah Eagles!  


I have posted about the eagles last year, showing how this information can be incorporated into a blog post to be used as a learning opportunity for students, and noticed that the same pair of eagles have started to nest again!  How interesting it is to learn about and watch these two graceful, beautiful and fierce birds.

Through the genius of the Raptor Resource Project a 24 hour webcam has been placed so that the world may watch the growth and lives of a family of bald eagles.  Decorah Eagle Cam Alerts have embraced this amazing opportunity and have put together content from across the world wide web in one place for your convenience. In addition, they have set up a system of alerts to let you know when the real action takes place.  Check it out!   The Raptor Resource Project also has a YouTube Channel! 



Live Video streaming by Ustream

Information from the Decorah Eagles Upstream Site about the pair.

FAQs

How high is the nest?

About 80 feet.

How big is the nest?

5-6 feet across, about the same deep; it weighs about 1½ tons.

How old is the nest?

The eagles built it in 2007. A previous nest close by fell when a windstorm broke one of the branches.

Are these eagles banded?

No.

Which is the male and which is the female?

It is hard to tell the difference unless they are both on the nest. The female is larger than the male. This female has a ridge above her eyes that goes further back than on the male, and her eyes are surrounded by a greyish shadow; the male has a line around his eyes that makes them look “beadier.” Some think that the male’s head is “sleeker” than the female’s.

What is the history of this pair?

They have been together since the winter of 2007-2008. Her markings at that time indicated that she was about 4 years old. They successfully hatched and fledged 2 eaglets in 2008, then 3 in 2009, and 3 more in 2010.

When were the eggs laid in 2010, and when did they hatch?

First egg was February 25, second on February 28, third on March 5. First hatch was April 3, second on April 6, third on April 9. All three eaglets fledged and are now on the wing but are not being tracked.

What is the area around the nest like?

The nest is in a cottonwood tree on private property near the Decorah Fish Hatchery (operated by the Iowa Department of Natural Resources), on the banks of the babbling waters of Trout Run in extreme northeast Iowa. The nest can be seen from the hatchery, but visitors to the hatchery should keep their distance from the nest tree, both to respect the private property where the tree is located and to avoid disturbing the eagles.

Here is a ground-level video of the surroundings, taken in March 2010.

This video shows the eagles’ point of view.


Where can I see pictures and videos of these eagles?

RRP provides an archive of daily views of the nest over the immediate 24-hour period, taken every 2 minutes. Click on Eagle Dailies.

RRP’s Youtube site has many videos.

Who operates and maintains this cam?

The Raptor Resource Project (RRP) maintains the cams, of which there are two, and the feed is streamed online 24/7. Both are positioned on one of the nest’s supporting limbs about 4-5 feet above the nest. The main cam is automated and is trained on the nest. The other cam has pan-tilt-zoom capabilities (PTZ). At dark the main cam switches to infrared (invisible to the eagles) night-time view. Here is a slide show of the cam installation in fall 2010.

Who does the panning, tilting, and zooming, and when does that happen?

Bob Anderson, Executive Director of RRP, switches to the PTZ cam when time and weather permit, and especially when there appears to be interesting activity in the nest. He will be especially attentive when hatching begins.

What is the Raptor Resource Project?

Established in 1988, the non-profit Raptor Resource Project specializes in the preservation of falcons, eagles, ospreys, hawks, and owls. We establish and strengthen breeding populations of these raptors by creating, improving, and maintaining nests and nest sites. In addition to directly managing over twenty-three falcon, eagle, and owl nest sites, we provide training in nest site creation and management across the United States, reach more than 85,000 people each year through lectures, education programs, and our website, and develop innovations in nest site management and viewing that bring people closer to the world around them.

Our mission is to preserve and strengthen raptor populations, to expand participation in raptor preservation, and to help foster the next generation of preservationists. Our work deepens the connection between people and the natural world, bringing benefits to both.

Check out the links to cams of many of the raptor nests that RRP manages.

RRP also has a Facebook page.

How can I read or participate in a forum about this and other RRP cams?

Go to the RRP Forum.


Social Stream


Thursday, January 26, 2012

Scammers, Spammers and Virus Distributors

Here we go again!  Spam, Spoofs, Phishing - OH MY!

Looks like the scammers, spammers and virus distributors are at it again.  Please read a few of the alerts that are prevelant in our area below from Scam Trends dot com.

Category Archives: Virus / Malware

Status of your transaction: pending

Subject: Status of your transaction: pending Body: Dear Sir or Madam, This message includes an important information regarding your recent ACH debit transfer, that was kept back by our bank: ACH transfer ID: 741905279949162 Status of the transaction: pending In order to resolve this matter, please use the link ** Link removed ** below to read more »

ACH rejection due to system malfunctioning

Subject: ACH rejection due to system malfunctioning Body: The ACH transaction ID: 377800468648, that had beeneffectuated from your checking account recently, was suspended by therecipient. ACH transferreport Transaction ID: 377800468648Reason for rejection:please refer to the report below for moreinformationTransaction Report report_377800468648.doc (Microsoft Word Document) ** Link removed ** 13450 Sunrise Valley Drive, Suite 100 Herndon, read more »

Transaction failure report

Transaction failure report
Subject: Transaction failure report Body: The ACH transaction ID: 456862652658, that had been sent from your checking account lately, was declined by the recipient. ACH cancellation report Transaction ID: 456862652658 Details: please see the report below for details Transaction Report report_456862652658.doc (Microsoft Word Document) ** Link removed ** 13450 Sunrise Valley Drive, Suite 100 Herndon, read more »

Amazon Corp Giveaway’s

Subject: Amazon Corp Giveaway’s Body: Everyone, Amazon Corporation is giving away 100% free gift cards! Rush, Do not waste a moment. Check out the link Amazon Online New Year’s Promotion 2012 ** Link removed ** There only 376 available!!! For an instant his eyes closed, not with pain or sleep but even though this be read more »

I’m in trouble!

Subject: Fwd: Re: I’m in trouble! Body: I was at a party yesterday, got drunk, couldn’t drive the car, somebody gave me a lift on my car, and crossed on the red light! I’ve just got the pictures, maybe you know him??? Here is the photo ** Link removed ** I need to find him read more »

FedEx, Shipment Notification

From: ‘FedEx” Subject: FedEx, Shipment Notification File attached: Yes Body: Ship (P/U) Date: 01/23/2012 Tracking Nbr Est. Delvry Svc Recipient Company Name ST Ctry Nbr Pcs Status + 283693160672 Jan23 Please refer to attached report for more details US 1 At FedEx destination facility Total Pieces: 1 Total Weight: 2.00 lb. (1.00 kg.) Please do read more »

U-Haul Contract 80819840

Subject: U-Haul Contract 80819840 File attached: Receipt_80819840_1.gif (16 KB) Body: Your U-Haul contract is attached. Please call us if we can answer any questions or address any concerns about the attached receipt. Please let us know how we are doing. Just go to uhaul*com/review to review your U-Haul experience. Are empty boxes still piled up read more »

Are you aware of some bad things/rumors someone is making about you here?

This malware targets Twitter users. Do not click on links in the message. Learn how to avoid Twitter phishing scams.

Seattle Traffic Ticket

Seattle Traffic Ticket
Subject: SEATTLE TRAFFIC TICKET Body: Seattle — Department of Motor Vehicles TRAFFIC TICKET SEATTLE POLICE DEPARTMENT THE PERSON CHARGED AS FOLLOWS Time: 7:12 AM Date of Offense: 26/12/2011 SPEED OVER 50 ZONE TO PLEAD CLICK HERE AND FILL OUT THE FORM ** Link removed ** SHA2 check sum: 7d9af5dbebeb46ceb46c41807d9a5d9726cebe9afff52607d9a5db46ceb46ce9 Sample:

Wednesday, January 18, 2012

Don't Censor the Internet

There is nothing wrong with our internet, we aren’t having issues on our servers re: internet sites.  What is going on is a protest by many US internet companies in response to two bills currently being considered by Congress.

If you have accessed Google, this is what you will see –



Below is a post on the Google Blog.  Included in the article are links that explain more and give more examples of what other websites are doing to protest what is being considered.

Don't censor the web

1/17/2012 09:40:00 PM
You might notice many of your favorite websites look different today. Wikipedia is down. WordPress is dark. We’re censoring our homepage logo and asking you to petition Congress. So what’s the big deal?

Right now in Washington D.C., Congress is considering two bills that would censor the web and impose burdensome regulations on American businesses. They’re known as the PROTECT IP Act (PIPA) in the Senate and the Stop Online Piracy Act (SOPA) in the House. Here’s what they’d do:
  • PIPA & SOPA will censor the web. These bills would grant new powers to law enforcement to filter the Internet and block access to tools to get around those filters. We know from experience that these powers are on the wish list of oppressive regimes throughout the world. SOPA and PIPA also eliminate due process. They provide incentives for American companies to shut down, block access to and stop servicing U.S. and foreign websites that copyright and trademark owners allege are illegal without any due process or ability of a wrongfully targeted website to seek restitution.
  • PIPA & SOPA will risk our industry’s track record of innovation and job creation. These bills would make it easier to sue law-abiding U.S. companies. Law-abiding payment processors and Internet advertising services can be subject to these private rights of action. SOPA and PIPA would also create harmful (and uncertain) technology mandates on U.S. Internet companies, as federal judges second-guess technological measures used by these companies to stop bad actors, and potentially impose inconsistent injunctions on them.
  • PIPA & SOPA will not stop piracy. These bills wouldn’t get rid of pirate sites. Pirate sites would just change their addresses in order to continue their criminal activities. There are better ways to address piracy than to ask U.S. companies to censor the Internet. The foreign rogue sites are in it for the money, and we believe the best way to shut them down is to cut off their sources of funding. As a result, Google supports alternative approaches like the OPEN Act.
Fighting online piracy is extremely important. We are investing a lot of time and money in that fight. Last year alone we acted on copyright takedown notices for more than 5 million webpages and invested more than $60 million in the fight against ads appearing on bad sites. And we think there is more that can be done here—like targeted and focused steps to cut off the money supply to foreign pirate sites. If you cut off the money flow, you cut the incentive to steal.

Because we think there’s a good way forward that doesn’t cause collateral damage to the web, we’re joining Wikipedia, Twitter, Tumblr, Reddit, Mozilla and other Internet companies in speaking out against SOPA and PIPA. And we’re asking you to sign a petition and join the millions who have already reached out to Congress through phone calls, letters and petitions asking them to rethink SOPA and PIPA.