21st Century Learning and Teaching
586.7K views | +11 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'ENCRYPTION', 'Education-Evolution'. Clear
Scooped by Gust MEES
Scoop.it!

Yahoo unveils sneak peek at end-to-end email encryption plugin | Privacy |

Yahoo unveils sneak peek at end-to-end email encryption plugin | Privacy | | 21st Century Learning and Teaching | Scoop.it
The web portal giant wants encryption in everyone's hands by the end of the year.
Gust MEES's insight:

The web portal giant wants encryption in everyone's hands by the end of the year.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Let's Encrypt : Liberté, fraternité, sécurité (TLS) - Cases | ICT | EDUcation

Let's Encrypt : Liberté, fraternité, sécurité (TLS) -  Cases | ICT | EDUcation | 21st Century Learning and Teaching | Scoop.it
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


Gust MEES's insight:
Nos précieuses informations personnelles et professionnelles circulent couramment sur Internet. Idéalement il faudrait qu’elles soient chiffrées...


En savoir plus :


https://letsencrypt.org/howitworks/technology/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Revealed: how Microsoft handed the NSA access to encrypted messages

Revealed: how Microsoft handed the NSA access to encrypted messages | 21st Century Learning and Teaching | Scoop.it
Documents show company collaborated closely with NSA and FBI to help agencies intercept data
Gust MEES's insight:

 

Learn more:

 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

 

Scooped by Gust MEES
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | 21st Century Learning and Teaching | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:42 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 26, 2013 5:50 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from Time to Learn
Scoop.it!

How to Encrypt Sensitive Data on Flash Drive

How to Encrypt Sensitive Data on Flash Drive | 21st Century Learning and Teaching | Scoop.it

Do you ever worry what would happen if your files fell into the wrong hands, especially those files that you kept on your external flash drive? Thankfully there are many options to encrypt sensitive data. Protectorion ToGo is one such application. While the free version is meant for private use only, it does allow you to encrypt up to two external devices. An added bonus is that the application is compatible with Windows XP/Vista/7/8 (32bit + 64bit).


Via Frédéric DEBAILLEUL
Gust MEES's insight:

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

Gust MEES's curator insight, June 2, 2013 6:25 AM

 

A MUST 4 everyone!!! Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

173 Sud's curator insight, June 2, 2013 9:01 AM

 

The free version of Protectorion is limited, as you can only encrypt two external drives and it is for personal use only.

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

New Ransomware Encrypts Victim Data

New Ransomware Encrypts Victim Data | 21st Century Learning and Teaching | Scoop.it
An unusual new strain of ransomware makes good on its threat, doing what the majority of other varieties only claim to do.

 

In this case however, Blinka has witnessed the Trojan encrypting images, documents and executables in an attempt to hinder any removal attempts. Whomever is responsible for the malware is not in the business of completely crippling machines, so Windows system files are not included in the forced encryption. Infected computers will still function for the most part, but data will be lost and many third-party programs will not work.

 

Gust MEES's insight:

                  ===> BEWARE of the MALWARE!!! <===

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 31, 2013 9:27 AM

                     ===> BEWARE of the MALWARE!!! <===

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Lernstationen zur Kryptographie [pdf]

Mehr erfahren, das SpionCamp:


-  http://ddi.uni-wuppertal.de/material/spioncamp.html


Rechte

Alle Materialien unterliegen der Creative-Commonce-Lizenz CC BY-NC-SA.
.

Für nichtkommerzielle Nutzung darf alles vervielfältigt und weitergegeben werden. 
Auch eine Bearbeitung ist möglich. Download der Quell-Dateien weiter unten.
Nutzungsbedingung ist die Namensnennung und Weitergabe unter exakt den gleichen Lizenz-Bedingungen.


Gust MEES's insight:

Mehr erfahren, das SpionCamp:


-  http://ddi.uni-wuppertal.de/material/spioncamp.html


No comment yet.
Scooped by Gust MEES
Scoop.it!

Inventor of world wide web criticises NSA over privacy breaches

Inventor of world wide web criticises NSA over privacy breaches | 21st Century Learning and Teaching | Scoop.it
Sir Tim Berners-Lee says NSA has weakened online security

 

 

 

 

 

===> It's naïve to imagine that if you introduce a weakness into a system you will be the only one to use it." <===

 

As well as the dangers of exposing private data to hacker gangs and hostile states, cracking encryptions was also unethical, he said.

Gust MEES's insight:

 

===> It's naïve to imagine that if you introduce a weakness into a system you will be the only one to use it." <===

 

As well as the dangers of exposing private data to hacker gangs and hostile states, cracking encryptions was also unethical, he said.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=PRISM

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Three Steps You Can Take to Protect Yourself From Online Spying

Three Steps You Can Take to Protect Yourself From Online Spying | 21st Century Learning and Teaching | Scoop.it
The recent PRISM scandal has validated both the general public's growing unease with federal law enforcement agencies, and many of the fringe element's accusations about Big Brother's online behavior.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Notebook-Daten vor Diebstahl schützen – So geht’s

Notebook-Daten vor Diebstahl schützen – So geht’s | 21st Century Learning and Teaching | Scoop.it
Der Diebstahl eines Laptops lässt sich leider nicht immer verhindern - sehr wohl aber, dass damit alle Daten in fremde Hände fallen.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/ict-security-tools/?tag=Encryption

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Reasons to Encrypt Your Data

Reasons to Encrypt Your Data | 21st Century Learning and Teaching | Scoop.it
Mankind has invented many ways to keep secrets. To send a private letter in Ancient Rome, nobles could shave a slave’s head, write the letter on the skin, wait for the hair to grow and then send a ...

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Gust MEES's insight:

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's curator insight, May 24, 2013 5:00 PM

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Encryption on your HD: How to Break Into a Windows PC, easy without...

Encryption on your HD: How to Break Into a Windows PC, easy without... | 21st Century Learning and Teaching | Scoop.it
If you're trying to break into a Windows computer—whether you've forgotten your password or are hatching a more sinster plan—you have quite a few options.

 

Gust MEES: Encryption of your HD is a MUST!

 

Read more why...:

http://lifehacker.com/5674972/how-to-break-into-a-windows-pc-and-prevent-it-from-happening-to-you

 

No comment yet.