Web_Support_Task_saviour19'x - CIIIWebSupport - Wikispaces

kingfishblacksmithΚινητά – Ασύρματες Τεχνολογίες

14 Δεκ 2013 (πριν από 3 χρόνια και 5 μήνες)

112 εμφανίσεις












Artworks by Nyree Reynolds, sourced from Aboriginal Art Directory Online

eatatdixiebelles.blogspot.com

Activity

View the following:

Music:

Geoffrey Gurrumul Yunupingu is an aborigine singer and guitar player. He's blind from
birth. Djarimirri

is a very sweet song in Yolngu's language.

http://www.youtube.com/watch?v=i
-
i0FQBbO8E

Video

Bangarra Dance Theatre is an Indigenous Australian contemporary dance company, taking
Aboriginal concern
s to a wider audience.

http://www.youtube.com/watch?v=GuDA6yeZe0k

Discussion of Intellectual Property various IT roles in above.

Q1:

Review the following web hosts



WordPress at
http://wordpress.org/



Blogger at:
https://www.google.com/accounts/ServiceLogin?service=blogger&passive=12096
00&continue=http://www.blogger.com/home&followup=http://www.blogger.com/
home&ltmpl=start#s01

Answer the following for each host:

1.

What are their features, advantages and any
disadvantages?

2.

What are the prohibited items for your site or get linked to from your site (things
like spam, viruses, or hate content)?

3.

What are the terms of the agreement in respect to intellectual property?

A: WordPress




F
eatures, advantages and any di
sadvantages:

WordPress.com, the free blogging platform and hosting service


Advantages
.


Highly customizable. Dozens of widgets. Best blogging
interface. Paid option to have a unique domain through WordPress. More
than 100 free themes. Gives bloggers very
deep control.


Disadvantage.


Some learning curve; requires up
-
front time investment.



P
rohibited items for your site:

The members are responsible for their content.
Uploading of unlawful material is prohibited





What are the terms of the agreement in respe
ct to intellectual property:


A copyright notice with teeth! Prove ownership, protect your copyright, and
copy protect. Obtain a digitally signed and time
-
stamped certificate of content
of each wordpress post (for proof of copyright). Inserts combined
cert
ification. copyright, licensing, and attribution notice at end of post. At
your option, your post's url will be shown on digiprove.com (will be a hyperlink
for Digiprove subscribers) to your post. Optional anti
-
theft feature to copy
protect your content

B
:

Blogger



"
Blog" is an abbreviated version of "weblog," which is a term used to
describe web sites that maintain an ongoing chronicle of information. A blog features
diary
-
type commentary and links to articles on other Web sites, usually presented as
a
list of entries in reverse chronological order. Blogs range from the personal to the
political, and can focus on one narrow subject or a whole range of subjects.





F
eatures, advantages and any disadvantages:



Advantages
Very easy to use. Best
design
-
customization tools of any free blogging
software. Custom domains for $10 per year. Can access Google Analytics statistics
directly in user dashboard. Rich text editor. Mobile
-
optimized versions included




Disadvantages
Google Earnings and monetizati
on tools not quite finalized. New
interface may be too radical a change for some users. Import and export abilities
are not one
-
touch..

http://www.pcmag.com/article2/0,2817,2081842,00.asp




P
rohibited items for your site:



Our content policies play an important role in maintaining a positive experience for
you, the users. Please respect these guidelines.




http://www.blogger.com/content.g








What are the terms of the agreement in respect to intellectual property
:



Google’s privacy policies explain how we treat your personal data and protect your
privacy when you use our Services. By using our Services, you agree that Google can
use such data in

accordance with our privacy policies.






We respond to notices of alleged copyright infringement and terminate accounts of
repeat infringers according to the process set out in the U.S. Digital Millennium
Copyright Act.






We provide information to help cop
yright holders manage their intellectual
property online. If you think somebody is violating your copyrights and want to
notify us, you can find information about submitting notices and Google’s policy
about responding to notices in our Help Center

http://www.google.com/intl/en/policies/terms/




Q2:

Safety Online


One of the most contentious issues we face as we steer our way into the digital future
surrounds privacy. But when we talk about
privacy aren’t we also talking about trust and
vulnerability? We know that private companies exercise more and more control over what
we do online. They’re motivated by profit, of course, but at what point should they also
focus on social responsibility?

R
eferences:

http://www.abc.net.au/radionational/programs/futuretense/

http://www.gcflearnfree.org/internetsafety


Explain t
he following
common internet safety

terms:

Phishing

Phishing is the act of attempting to acquire information such as usernames,
passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic
communication


http://en.wikipedia.org/wiki/Phishing


Malware

Malware, short for malicious software, is software used or created to disrupt
computer operation, gather sensitive information, or gain acce
ss to private computer
systems.


http://en.wikipedia.org/wiki/Malware


Browser Hijacking


is

a form of malware, spyware or virus that replaces the existing internet browser home
page, error page, or search page with its own
.

http://www.google.com.au/search?q=Browser+Hijacking&sourceid=ie7&rls=com.microsoft:e
n
-
au:IE
-
Address&ie=&oe=&safe=on&redir_esc=&ei=IqB8UNS1G6eUiAedvYCgCw


Pharming


is a hacker's attack intended to redirect a we
bsite's traffic to another, bogus site.
Pharming can be conducted either by changing the hosts file on a victim's computer or by
exploitation of a vulnerability in DNS server software. DNS servers are computers
responsible for resolving Internet names into

their real IP addresses. Compromised DNS
servers are sometimes referred to as "poisoned". Pharming requires unprotected access to
target a computer, such as altering a customer's home computer, rather than a corporate
business server.


http://en.wikipedia.org/wiki/Pharming


Clickjacking


(User Interface redress attack, UI redress attack, UI redressing) is a malicious technique
of tricking a Web user into clicking on something different to what the user
perceives
they are clicking on, thus potentially revealing confidential information or taking control of
their computer while clicking on seemingly innocuous web pages.[1][2][3][4] It is a browser
security issue that is a vulnerability across a variety of
browsers and platforms, a
clickjack takes the form of embedded code or a script that can execute without the
user's knowledge, such as clicking on a button that appears to perform another function


http://en.wikipedia.org/wiki/Clickjacking

.

Mousetrapping


is a technique used by some websites (usually pornographic websites) to keep visitors from
leaving their website, either by launching an endless series of pop
-
up ads

known
colloquially as a circle
jerk

or by re
-
launching their website in a window that cannot be
closed (sometimes this window runs like a stand
-
alone application, and the taskbar and the
browser's menu become inaccessible). Many websites that do this also employ browser
hijackers to res
et the user's default homepage. Other definitions of mousetrapping and
related practices are found at Mousetrapping and Pagejacking.

http://en.wikipedia.org/wiki/Mousetrapping


Hoax


A hoax is a
deliberately fabricated falsehood made to masquerade as truth.[1] It is
distinguishable from errors in observation or judgment,[1] or rumors, urban legends,
pseudosciences or April Fools' Day events that are passed along in good faith by believers
or as jo
kes

http://en.wikipedia.org/wiki/Hoax



Explain the following
social networking

terms:

Troll


a troll is someone who posts inflammatory,[3] extraneous, or off
-
topic messages in an
online community, such as
a forum, chat room, or blog, with the primary intent of provoking
readers into an emotional response[4] or of otherwise disrupting normal on
-
topic
discussion.[5] The noun troll may refer to the provocative message itself, as in: "That was
an excellent trol
l you posted


http://en.wikipedia.org/wiki/Troll_(Internet)


Post

refers to routines which run immediately after many digital electronic devices are
powered on. Perhaps the most widely
-
known usa
ge pertains to computing devices (personal
computers, PDAs, networking devices such as routers, switches, intrusion detection
systems and other monitoring devices). Other devices include kitchen appliances, avionics,
medical equipment, laboratory test equi
pment

all embedded devices. The routines are
part of a device's pre
-
boot sequence. Once POST completes successfully, bootstrap loader
code is invoked.

http://en.wikipedia.org/wiki/Power
-
on_sel
f
-
test


Flamewar


also known as bashing, is hostile and insulting interaction between Internet users, often
involving the use of profanity. Flaming usually occurs in the social context of an Internet
forum, Internet Relay Chat (IRC), Usenet, by e
-
mail, gam
e servers such as Xbox Live or
PlayStation Network, and on video
-
sharing websites. It is frequently the result of the
discussion of heated real
-
world issues such as politics, religion, and philosophy, or of issues
that polarise subpopulations, but can also

be provoked by seemingly trivial differences
.

http://en.wikipedia.org/wiki/Flamewar


Flamebait

also known as bashing, is hostile and insulting interaction between Internet users, often
involving the us
e of profanity. Flaming usually occurs in the social context of an Internet
forum, Internet Relay Chat (IRC), Usenet, by e
-
mail, game servers such as Xbox Live or
PlayStation Network, and on video
-
sharing websites. It is frequently the result of the
discus
sion of heated real
-
world issues such as politics, religion, and philosophy, or of issues
that polarise subpopulations, but can also be provoked by seemingly trivial differences

http://en.wikipedia.org/wiki/Flamewar

.

Chat


Online chat between two or occasionally more users of a display
-
based communications
system, e.g. Internet chat room or instant messaging system, communication between
users connected to a remote and a host sys
tem


http://en.wikipedia.org/wiki/Chat


Dooced


Getting fired because of something that you wrote in your weblog

http://www.urbandictionary.com/define.php?term=dooced

.

Meme


is "an idea, behavior or style that spreads from person to person within a culture."[2] A
meme acts as a unit for carrying cultural ideas, symbols or practices, which can be
transmitted from one

mind to another through writing, speech, gestures, rituals or other
imitable phenomena. Supporters of the concept regard memes as cultural analogues to
genes in that they self
-
replicate, mutate and respond to selective pressures.
[3]

http://en.wikipedia.org/wiki/Meme




Sockpuppet


is a puppet made from a sock or similar garment. The puppeteer wears the sock on their
hand and lower arm as if it were a glove, with the puppet's mouth being formed by the
region

between the sock's heel and toe, and the puppeteer's thumb acting as the jaw. The
arrangement of the fingers naturally forms the shape of a mouth, which is sometimes
padded with a hard piece of felt, often with a tongue glued inside.


http://en.wikipedia.org/wiki/Sockpuppet



You are to provide web

support to live music
-
and
-
theatre performing troupe which is
to go on tour to remote Indigenous community schools. Explain w
hat
they

can
do to be
safe
online?

1

.
Use secure Passwords

2
.

Up to date Anti Virus software

3
.
Use a Firewall

4

Maintaine


Privacy

d
o no
t share more than that you need

to
.

Do not post anything online that you would not want made public.

Minimize details that identify you or your wh
ereabouts.

Keep your account numbers, user names, and passwords secret.

Only share your primary email address or Instant Message (IM) name with people who you
know or with reputable organizations. Avoid listing your address or name on Internet
directories

and job
-
posting sites.

Enter only required information

often marked with an asterisk (*)

on registration and
other forms.


http://www.microsoft.com/security/online
-
privacy/preve
nt.aspx



Q
3
:

Create a
n

online
safety information webpage

e.g. wiki with an image, mp3, and link
s

to a
youtube
video for
the
live music
-
and
-
theatre performing troupe.

http://savvysonlinesafety.wikispaces.com/


Include:





a glossary of terms
-

explain
ing

a term’s meaning,

-

how it arises in situations; draw pictures to explain it;







-

examples of its use; and ideas it relates to.



http://company.findlaw.com/pr/2011/090811.kidsweb.html

http://blog.whoismrmister.com/


A: address of your web page








ScreenShot:



Q
4
:

Install

and optimise software

Applications

in Windows

Find 5

free
Screen Capture Software For Windows

1.

Shotty

2.

SnapCrap

3.


Greenshot

4.


Webinaria.

5.


Snapdraw.



Install
and printscreen each:













1.

SnapCrab










2.

Greenshot


3.


Snap Draw



4.


Greenshot


5.


Webinaria



Review
two

software for a
pplication to
a small

school and advise your recommendation:


Review
recommended Screen Capture
Application
:


Shotty
cause it is simple to use.


Very easy to work with, free and portable, these are the main qualities of Shotty. It can
upload the image to TwitPic and also allows you to post a message in the process.


The image editor comes with crop function as well as text adding. Additionally, you

can use
it to highlight specific areas in the canvas.

Shotty is very thin in options but stands for
definite purpose, that of taking pictures of application windows and uploading them to an
image hosting website. It does have its share of shortcomings, bu
t it is still usable
.

Review
Tunein Radio
:


Radio aficionados who want to expand their listening beyond what's offered by their local
radio stations will find a lot to like in the TuneIn Radio Pro. This 99 cent iPad app (also
compatible with Android, Black
berry, Palm, Samsung Bada, and Windows Phone devices)
lets you tune into over 50,000 global AM and FM stations that run the gamut from sports
talk to J
-
pop. Even better, you can record programming to your iPad's storage, dig through
archived programs, make

music purchases, and connect with Last.fm (Free, 4 stars) to
further tailor your listening experience there. It's a remarkably ambitious app that,
thankfully, manages to execute well on nearly every level.