Friday, January 30, 2009
Friday's Work
IBA 2:
follow your DBA's
IBA 1:
Go to your H drive, and open Word Project 1 Lab Test A. Complete and Print on the color printer. Turn in for a grade.
Once finished, be sure you have finished all assignments from the past week. Play only approved games on the H drive or complete other homework frmo another class.
follow your DBA's
IBA 1:
Go to your H drive, and open Word Project 1 Lab Test A. Complete and Print on the color printer. Turn in for a grade.
Once finished, be sure you have finished all assignments from the past week. Play only approved games on the H drive or complete other homework frmo another class.
Thursday, January 29, 2009
No Blog Today
There will be no blog today as I am trying to catch my IBA 1 class up.
IBA 2 Class:
Continue with your DBA's for Thursday, if you are behind...be sure to catch up before moving to Thursday. DO NOT GO ON TO FRIDAY! Make sure directions are read as to what to print and not print!! Points will be taken off for improper printouts.
IBA1 Class:
1. Finish any Word Project one Labs or Applying your knowledge. Be sur eto only print lab 2 and the applying your knowledge. Save everything else.
2. If finished with all your labs, move on to cases and places on page WD71-72. Do the following assignments:
a. Case 1 - Do NOT print, save in your G drive
b. Case 3 - PRINT and save in your G drive
c. Case 4 - Do NOT print, save in your G drive.
If there are any questions, feel free to ask. The cases are more or less yuor creation using the information that they give you. Have FUN and be CREATIVE!!
IBA 2 Class:
Continue with your DBA's for Thursday, if you are behind...be sure to catch up before moving to Thursday. DO NOT GO ON TO FRIDAY! Make sure directions are read as to what to print and not print!! Points will be taken off for improper printouts.
IBA1 Class:
1. Finish any Word Project one Labs or Applying your knowledge. Be sur eto only print lab 2 and the applying your knowledge. Save everything else.
2. If finished with all your labs, move on to cases and places on page WD71-72. Do the following assignments:
a. Case 1 - Do NOT print, save in your G drive
b. Case 3 - PRINT and save in your G drive
c. Case 4 - Do NOT print, save in your G drive.
If there are any questions, feel free to ask. The cases are more or less yuor creation using the information that they give you. Have FUN and be CREATIVE!!
Wednesday, January 28, 2009
Begin Working on The following
1.Students who have not finished their Word Project One practice test need to do so.
2. Complete Word Project 1: Applying Your Knowledge(Print)
3. Complete Word Project 1: Labs 1-3. (Print Lab 2 and turn in) save the rest in your G Drive for further instructions later.
2. Complete Word Project 1: Applying Your Knowledge(Print)
3. Complete Word Project 1: Labs 1-3. (Print Lab 2 and turn in) save the rest in your G Drive for further instructions later.
Tuesday, January 27, 2009
Are you safe from Hackers??
We don't use E-gold very often since most of our online business and customer sales are conducted through our online merchant account. However, we occasionally have someone who will request paying by E-gold so we keep an account there for this reason. Once a month or so we withdraw the funds and decided to do so yesterday. Imagine our dismay when we logged into our E-gold account yesterday and found our balance to be a big fat ZERO! We had checked the balance just a few days ago so we knew this was not correct. After investigating the history of the account, we found that a spend had been made to another e-gold account user WITHOUT our knowledge or authorization. We had been hacked! Since we have up to date anti-virus and firewall software on our computer, we assumed we were safe. Not so! It seems this is not enough to keep away the hackers as the software does not prevent "Spyware" from being installed on your computer. "Spyware" is software that gets onto your computer and literally "spies" on your activities. The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer. Spyware gets on your computer in one of several different ways. First, it rides along with software you download from the 'Net and install on your system. Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message. Third, hackers find an open port on your computer and use the "back door" to install basically anything they want. And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing. So how do you protect yourself against these malicious hackers? You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily. Below are two programs which specifically check for and remove spyware from your system: "Spybot Search & Destroy" - www.safer-networking.org "Ad Aware" - www.lavasoft.de/software/adaware/ You may have spyware lurking on your computer right now so protect yourself today by downloading one of the above programs! As a point of reference, we contacted E-gold and informed them that we had been hacked. We provided them with the account number of the person who received the funds and asked for a contact e-mail address on the person. E-gold informed us that they could not provide that information without a "court order" and that basically there was no way of getting the money back! Take action today to protect yourself from this growing threat! The bottom line is: - Keep your anti-virus program current - Install a firewall- Carefully screen software before installing it- Scan specifically for spyware weekly- Stay current on this growing threat.
Comment on how this article makes you feel on your safety on the computer and your identity safety. Plus the safety of your money though out banks, websites, and stockmarkets.
Comment on how this article makes you feel on your safety on the computer and your identity safety. Plus the safety of your money though out banks, websites, and stockmarkets.
Monday, January 26, 2009
Begin DBA's
Pick up DBA's on Wednesday, and continue the work at the bottom, when finished with practice test, begin working on thursdays work!
Friday, January 23, 2009
Computer Worm Goes Out Of Control
Experts say the worm has "skyrocketed" in recent days.
It is sweeping through thousands of offices in the UK and has affected computers at the Ministry of Defence.
The virus - known variously as Conficker, Kido or Downadup - burrows deep into the operating system and tricks the machine into running the infected program.
Once the worm is running on the computer it automatically starts to download more malicious programs from hackers' websites, with devastating effects.
The majority of computers infected by the worm, which was first identified in October, are in Russia, China, Brazil and India. But the virus is now taking hold in the UK.
The worm has password cracking capabilities, often successful because company passwords sometimes match a predefined password list that it carries.
Eddy Willems, a security analyst with anti-virus firm Kaspersky Labs, said that a new strain of the worm was now causing additional problems.
This virus is mainly affecting offices, who have not kept their software up to date. Graham Cluley of computer security firm Sophos.
Computer users are advised to ensure their anti-virus software, operating system and firewall is up to date, and that they have installed a Microsoft patch designed to combat the problem.
Experts have also warned the virus could spread by copying itself to USB memory sticks shared between computers, and urged users to use caution.
1. What could be the problems if this worm infected computers in the United States?
2. Do you feel as though your personal computer is safe? What are some ways that you can protect your computer?
3. Do you feel as though your identity is safe when you are using your computer?
4. How can you protect your identity while shopping online?
It is sweeping through thousands of offices in the UK and has affected computers at the Ministry of Defence.
The virus - known variously as Conficker, Kido or Downadup - burrows deep into the operating system and tricks the machine into running the infected program.
Once the worm is running on the computer it automatically starts to download more malicious programs from hackers' websites, with devastating effects.
The majority of computers infected by the worm, which was first identified in October, are in Russia, China, Brazil and India. But the virus is now taking hold in the UK.
The worm has password cracking capabilities, often successful because company passwords sometimes match a predefined password list that it carries.
Eddy Willems, a security analyst with anti-virus firm Kaspersky Labs, said that a new strain of the worm was now causing additional problems.
This virus is mainly affecting offices, who have not kept their software up to date. Graham Cluley of computer security firm Sophos.
Computer users are advised to ensure their anti-virus software, operating system and firewall is up to date, and that they have installed a Microsoft patch designed to combat the problem.
Experts have also warned the virus could spread by copying itself to USB memory sticks shared between computers, and urged users to use caution.
1. What could be the problems if this worm infected computers in the United States?
2. Do you feel as though your personal computer is safe? What are some ways that you can protect your computer?
3. Do you feel as though your identity is safe when you are using your computer?
4. How can you protect your identity while shopping online?
Thursday, January 22, 2009
Upgrading to Office 2007 or Vista in Schools
"The British government's educational IT authority has issued a report advising schools in the country not to upgrade their classroom or office systems to Windows Vista or Office 2007. According to this InformationWeek story, the British Educational Communications and Technology Agency says costs for Vista and Office 2007 'are significant and the benefits remain unclear.' Instead, Becta is advising British schools to take a long look at Linux and open source suites like OpenOffice.org."
Remember to respond to these questions on your blog. Do not comment on mine. You may copy and paste the questions to your blog to help you. Write well thought responses that are at least a paragraph long. Then comment on at least three of your classmates posts.
1. Would you like to see WKHS upgrade to Vista or Office 2007? Why?
2. After doing a little more research, do you believe that the British government is correct in advising against updating to the new versions of the software?
3. What is Linux and Openoffice.org? Would these be better options for WKHS to go to? Why?
Remember to respond to these questions on your blog. Do not comment on mine. You may copy and paste the questions to your blog to help you. Write well thought responses that are at least a paragraph long. Then comment on at least three of your classmates posts.
1. Would you like to see WKHS upgrade to Vista or Office 2007? Why?
2. After doing a little more research, do you believe that the British government is correct in advising against updating to the new versions of the software?
3. What is Linux and Openoffice.org? Would these be better options for WKHS to go to? Why?
Wednesday, January 14, 2009
Welcome to IBA
Welcome to IBA class!! Along with your weekly assignments of creating projects, you will also be graded on participation in your blog. You will comment on various questions that I may have about class or a specific assignment I may give you to complete using the blog. You will also be responsible for responding to your classmates blogs each week. You will need to respond to at least 3 classmates a day which equals 15 a week. Responses should be thoughtful and well spoken! They should be at least a paragraph long and use no foul or poor language and not put down a fellow classmate! Use this as a fun way to discuss and learn about using computers and Microsoft Office!!
Assignment (Due Wednesday 1/21/09):
1. Go to blogspot.com and create your blog site.
2. Customize it to however yu would like
3. Add our class blog to a site that you follow
4. Get familiar with how to use it
Assignment (Due Wednesday 1/21/09):
1. Go to blogspot.com and create your blog site.
2. Customize it to however yu would like
3. Add our class blog to a site that you follow
4. Get familiar with how to use it
Subscribe to:
Posts (Atom)