http://www.makeuseof.com/tag/pwgen-for-firefox-the-quickest-way-to-create-secure-random-passwords/
Resources
Protect Yourself From The NSA With WireOver’s Encrypted File Sharing
Nothing is truly NSA-proof or hacker-proof, but WireOver wants to offer you more security than Dropbox, Google Drive, or Skydrive. The Y Combinator startup just emerged from stealth with a desktop app that lets you send files of any size for free. And for $10 a month, your transfers get end-to-end encryption so only the recipient can open them. WireOver can't even look at what you're sending.
Use Tech Challenges to Motivate Teachers with Andrea Keller [ECM #45] - @coolcatteacher
Andrea Keller @akbusybee is a former special ed teacher turned IT integrator who is using a gamified system of tech…
A Master Writer's Notebook in Evernote
A few years ago I thought I had a brilliant idea. I created a master writer’s notebook since my notebook writing, which I shared with students during writing conferences and in minilessons, …
Silent_Circle: Blackphone Sets Out To Uphold Objectives Of Privacy http://
VideoAt the Mobile World Congress in Barcelona, Feb, 24, a joint venture that appears to be somewhat covert in nature between Silent Circle and Geeksphone, will launch a new ultra secure smartphone that gives the user the ability to control privacy and security settings. The new venture between the two companies [...]
achurches: NSA maps pathway into computers http://t.co/iZ2GuuE5zh #privacy
Looking for Blackphone? | Silent Circle
You don't need special hardware for secure mobile communications. Use Silent Phone on your existing iOS and Android devices.
principals - legal
Educational Technology and Life » Blog Archive » Google Docs Does Not Viola
Kingtoptoto merupakan tempat bermain toto online terbaik yang menyediakan strategi kemenangan terbaik melalui smokymountains. Menang lebih aman dan nyaman setiap hari cuma ada di Kingtoptoto.
Education Week: The New Ed-Tech Leader Models by Digital Example
Superintendents and chief technology officers are modeling their commitment to use technology to improve schools by blogging and tweeting regularly about what works and what doesn’t work.
Governments have transformed the internet into a...
Cybersecurity: A Systemvault Primer, by D.P.
Kali Linux 1.0.6 released. Cryptsetup has “nuclear option” integrated | Lin
The Internet fights back against the NSA with the biggest protest since SOP
A blackout is coming.
Government Agencies Reported Record Number of Data Breaches in 2012
The federal government had a record number of data breaches in 2012, revealing sensitive personal information of its employees across multiple agencies, according to the Government Accountability Office (GAO).
How Can I Stay Anonymous with Tor?
Even with recent revelations that the NSA is listening, Tor is still probably the best way to anonymously surf the net. But to do it right, you've got
Online privacy demands global action, just as with apartheid
United Nations Human Rights Commissioner Navi Pillay has associated the global response to government mass surveillance with the collective uproar that eventually helped cripple South Africa's apartheid regime. Pillay, the UN's High Commissioner...
Why Privacy Matters Even if You Have ‘Nothing to Hide’ – The Chronicle Revi
500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dis
Target: Data breach caught up to 70M customers
Local news, sports, business, politics, entertainment, travel, restaurants and opinion for Seattle and the Pacific Northwest.
Great Leaders are Great Because They ... - Leadership Freak
Great leadership is more about others and less about you. Stop focusing on yourself.
Find out if your router is listening on backdoor port 32764
Some days ago it became public knowledge that some routers, that's devices used for establishing Internet connections among other things, are listening on the undocumented port 32764. ADVERTISEMENT First, it was only […]
What if Things are Great? | The Heroic Stoic
A Closer View | The Principal of Change
George Couros designs dynamic programs to infuse innovation into teaching and leadership, equipping educators with strategies for immediate impact and
World's Biggest Data Breaches & Hacks | Information Is Beautiful
Distilling the world's data, information & knowledge into beautiful infographics & visualizations
Install Rootkit hunter on RHEL/CentOS, Fedora and Debian/Ubuntu | lintut.co
CryptoLocker: What is it? And how do you protect against it?
The UK and US authorities have issued alerts about the CryptoLocker ransomware, infecting Windows computers. Here’s what you need to know.
Around the Corner-MGuhlin.org: Open Source Encryption Tools to Protect #Pri
I was totally unprepared for today’s bombshell revelations describing the NSA’s efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be…
An Open Letter to the Texas Education Agency Education Technology Staff - H
To: John Lopez Managing Director of Instructional Materials and Educational Technology Dear John, Recently, I have had the opportunity to review some new textbooks that are up for adoption across...
30c3 - YouTube