21st Century Learning and Teaching
586.3K views | +14 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'ENCRYPTION', 'Learning basics of Cyber-Security'. Clear
Scooped by Gust MEES
Scoop.it!

Let's Encrypt : Liberté, fraternité, sécurité (TLS) - Cases | ICT | EDUcation

Let's Encrypt : Liberté, fraternité, sécurité (TLS) -  Cases | ICT | EDUcation | 21st Century Learning and Teaching | Scoop.it
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


Gust MEES's insight:
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Notebook-Daten vor Diebstahl schützen – So geht’s

Notebook-Daten vor Diebstahl schützen – So geht’s | 21st Century Learning and Teaching | Scoop.it
Der Diebstahl eines Laptops lässt sich leider nicht immer verhindern - sehr wohl aber, dass damit alle Daten in fremde Hände fallen.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/ict-security-tools/?tag=Encryption

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Reasons to Encrypt Your Data

Reasons to Encrypt Your Data | 21st Century Learning and Teaching | Scoop.it
Mankind has invented many ways to keep secrets. To send a private letter in Ancient Rome, nobles could shave a slave’s head, write the letter on the skin, wait for the hair to grow and then send a ...

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Gust MEES's insight:

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's curator insight, May 24, 2013 5:00 PM

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 
Scooped by Gust MEES
Scoop.it!

IT professionals do not display enough concern for data encryption

IT professionals do not display enough concern for data encryption | 21st Century Learning and Teaching | Scoop.it

Nearly two-thirds of IT professionals have admitted that they do not encrypt data stored on portable storage devices.

 

According to a survey of 106 delegates at IP Expo 2012 by iStorage, 64 per cent admitted to not encrypting data held on portable storage devices, while fewer (than those surveyed in 2011) believed that data loss was a serious concern. (!!!???)

 

============================================

 

Gust MEES

 

I am actually preparing a new FREE course about the "Cyber-Security Practice-the basics" which everyone can and should learn, very easy actually... There will be also included a FREE solution for encrypting the complete Hard Disk, stay tuned... It will be published here (soon):

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

============================================

 

 

Read more, a MUST:

http://www.scmagazineuk.com/it-professionals-do-not-display-enough-concern-for-data-encryption/article/270509/?utm_source=dlvr.it&utm_medium=twitter

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Three Steps You Can Take to Protect Yourself From Online Spying

Three Steps You Can Take to Protect Yourself From Online Spying | 21st Century Learning and Teaching | Scoop.it
The recent PRISM scandal has validated both the general public's growing unease with federal law enforcement agencies, and many of the fringe element's accusations about Big Brother's online behavior.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

No comment yet.
Rescooped by Gust MEES from Time to Learn
Scoop.it!

How to Encrypt Sensitive Data on Flash Drive

How to Encrypt Sensitive Data on Flash Drive | 21st Century Learning and Teaching | Scoop.it

Do you ever worry what would happen if your files fell into the wrong hands, especially those files that you kept on your external flash drive? Thankfully there are many options to encrypt sensitive data. Protectorion ToGo is one such application. While the free version is meant for private use only, it does allow you to encrypt up to two external devices. An added bonus is that the application is compatible with Windows XP/Vista/7/8 (32bit + 64bit).


Via Frédéric DEBAILLEUL
Gust MEES's insight:

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

Gust MEES's curator insight, June 2, 2013 6:25 AM

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

173 Sud's curator insight, June 2, 2013 9:01 AM

 

The free version of Protectorion is limited, as you can only encrypt two external drives and it is for personal use only.

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

New Ransomware Encrypts Victim Data

New Ransomware Encrypts Victim Data | 21st Century Learning and Teaching | Scoop.it
An unusual new strain of ransomware makes good on its threat, doing what the majority of other varieties only claim to do.

 

In this case however, Blinka has witnessed the Trojan encrypting images, documents and executables in an attempt to hinder any removal attempts. Whomever is responsible for the malware is not in the business of completely crippling machines, so Windows system files are not included in the forced encryption. Infected computers will still function for the most part, but data will be lost and many third-party programs will not work.

 

Gust MEES's insight:

                  ===> BEWARE of the MALWARE!!! <===

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 31, 2013 9:27 AM

                     ===> BEWARE of the MALWARE!!! <===

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/