Don’t Make it Worse! | The Heroic Stoic
!Cool Resources
When You Fail, I Fail – Approach To Leadership
SchoolCIO Blogs - DAILY INSIGHT: It's the leadership, stupid!
SchoolCIO Blogs - DAILY INSIGHT: The undiscussables of tech leadership
Russian teen was author of malware behind Target, Neiman Marcus, other atta
According to security firm IntelCrawler, a Russian teenager was the author of the malware that was used in attacks on Target, Neiman Marcus and other retailers
The challenges of mobile application security
6 easy ways to protect your technology - Quibly
Check out the domain name Quib.ly and inquire today.
Immobilise :: The National Property Register, for phones, gadgets, bicycles
http://www.makeuseof.com/tag/pwgen-for-firefox-the-quickest-way-to-create-secure-random-passwords/
Protect Yourself From The NSA With WireOver’s Encrypted File Sharing
Nothing is truly NSA-proof or hacker-proof, but WireOver wants to offer you more security than Dropbox, Google Drive, or Skydrive. The Y Combinator startup just emerged from stealth with a desktop app that lets you send files of any size for free. And for $10 a month, your transfers get end-to-end encryption so only the recipient can open them. WireOver can't even look at what you're sending.
Use Tech Challenges to Motivate Teachers with Andrea Keller [ECM #45] - @coolcatteacher
Andrea Keller @akbusybee is a former special ed teacher turned IT integrator who is using a gamified system of tech…
A Master Writer's Notebook in Evernote
A few years ago I thought I had a brilliant idea. I created a master writer’s notebook since my notebook writing, which I shared with students during writing conferences and in minilessons, …
Silent_Circle: Blackphone Sets Out To Uphold Objectives Of Privacy http://
VideoAt the Mobile World Congress in Barcelona, Feb, 24, a joint venture that appears to be somewhat covert in nature between Silent Circle and Geeksphone, will launch a new ultra secure smartphone that gives the user the ability to control privacy and security settings. The new venture between the two companies [...]
achurches: NSA maps pathway into computers http://t.co/iZ2GuuE5zh #privacy
Looking for Blackphone? | Silent Circle
You don't need special hardware for secure mobile communications. Use Silent Phone on your existing iOS and Android devices.
principals - legal
Educational Technology and Life » Blog Archive » Google Docs Does Not Viola
Kingtoptoto merupakan tempat bermain toto online terbaik yang menyediakan strategi kemenangan terbaik melalui smokymountains. Menang lebih aman dan nyaman setiap hari cuma ada di Kingtoptoto.
Education Week: The New Ed-Tech Leader Models by Digital Example
Superintendents and chief technology officers are modeling their commitment to use technology to improve schools by blogging and tweeting regularly about what works and what doesn’t work.
Governments have transformed the internet into a...
Cybersecurity: A Systemvault Primer, by D.P.
Kali Linux 1.0.6 released. Cryptsetup has “nuclear option” integrated | Lin
The Internet fights back against the NSA with the biggest protest since SOP
A blackout is coming.
Government Agencies Reported Record Number of Data Breaches in 2012
The federal government had a record number of data breaches in 2012, revealing sensitive personal information of its employees across multiple agencies, according to the Government Accountability Office (GAO).
How Can I Stay Anonymous with Tor?
Even with recent revelations that the NSA is listening, Tor is still probably the best way to anonymously surf the net. But to do it right, you've got
Online privacy demands global action, just as with apartheid
United Nations Human Rights Commissioner Navi Pillay has associated the global response to government mass surveillance with the collective uproar that eventually helped cripple South Africa's apartheid regime. Pillay, the UN's High Commissioner...
Why Privacy Matters Even if You Have ‘Nothing to Hide’ – The Chronicle Revi
500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dis
Target: Data breach caught up to 70M customers
Local news, sports, business, politics, entertainment, travel, restaurants and opinion for Seattle and the Pacific Northwest.
Great Leaders are Great Because They ... - Leadership Freak
Great leadership is more about others and less about you. Stop focusing on yourself.
Find out if your router is listening on backdoor port 32764
Some days ago it became public knowledge that some routers, that's devices used for establishing Internet connections among other things, are listening on the undocumented port 32764. ADVERTISEMENT First, it was only […]