One major Hacker Highschool lesson we projected was Lesson 22, Cyberbullying. At SchoolforHackers.com we'll move forward at a much faster pace on this issue, particularly if we keep getting good submissions.
Material dealing with cyberbullying is available by the ton on the Internet, but as with all subjects, separating the wheat from the chaff is difficult.
Some authorities suggest reporting bullying immediately; here in New Mexico, that will get you branded as a snitch, which will not be good for your future health. Others suggest turning the tables and finding ways to turn the brutality back on the bully. While this may be satisfying, it also simply perpetuates bullying.
How about one of the popular trends in training, "game-ification?" WiredSafety.org is trying this approach, as Hope Gillette reports on Voxxi.com:
Alex Wonder Kid Cyberdetective is a new game introduced by WiredSafety.org designed to help children safely navigate the Internet. Children follow the adventures of Alex Wonder as he helps children learn to identify the warning signs of cyberbullying and learn how to responsibly use the Internet.
The basic technique is "stop, block and tell." I personally become immediately skeptical, for the reason I mention above. But the game-based learning style may be effective. You can download the game from StopCyberbullying.org; it requires that Adobe Air be installed.
If you give it a try please drop me a line and tell me what you think.
The people at CallerSmart.com have an interesting piece, "What is Cyberbullying and How to Stop It" (https://www.callersmart.com/articles/49/What-Is-Cyberbullying-and-How-to-Stop-It). There are some excellent charts about the laws on bullying and sexting in the different US states, and my particular interest, some discussion of tactics for dealing with bullying.
My question to my readers is: Will these methods work? Do you know of any, or of better ones? Register to comment on SchoolforHackers.com and tell us what you think.
This guest article is brought to you by Leonardo Calvo / NEUVOO
Nowadays, technology is such a big part of our lives that we do not even notice how much we rely on it. Technology affects us and helps us almost every minute of every day. From the minute our alarm wakes us up to the moment we read our favorite book on our tablet before going to sleep. No one can escape the barricade of innovation and the way it has affected how we live our lives. We are currently positioned in the threshold of gadgets, Internet and Artificial Intelligence.
The last generation was used to spending their days stuck in a cubicle without almost no social interaction, obligated to commute every day from home to the office. However, due to this new digital era, both the conception of workplace and how we develop our careers have changed drastically, at least for the vast majority.
People working from home is a trend that is rising, thanks to the Internet and new startup initiatives that are taking advantage of new and very productive working protocols that adapt into people’s comfort and the company’s needs, which is a rather beneficial agreement for both employer and employee. But if you are one of those people who does not like working for an employer, the Internet has provided us with global online outsourcing marketplaces like Fiverr where people can offer their freelance services, depending on their skills and field of study.
Comedians, musicians, filmmakers, bloggers and artists have found different ways to earn good money through platforms such as Youtube or Vimeo, which have demonstrated that working in these new networks is entirely profitable, especially when a top ranking Youtuber makes around 3.2 million dollars annually.
What if you do not have a job? That could also be easily solved by technology these days. Job search engines like neuvoo index jobs from different sources and companies; it filters all offers through their system and classifies them by location and industry. So yes, those days of browsing through the newspaper employment classifieds are entirely over, being that the Internet is a much more practical source for a job search.
Has technology changed or influenced the way you work? I am sure it has, in one way or another, the future is now and it is taking over. Eventually, Artificial Intelligence might start taking our place in different entry level jobs, let’s hope it is a very far away possibility and let’s focus on taking advantage of it while we can. Hopefully, technology will always have a positive influence on our society.
Your job search starts here: | | | | | | | | | Colombia | | | | | | | | | | | | India| | Ireland | | | Japan | | | Luxembourg| | Mexico| | | New Zealand| Nigeria | | Oman | | | | | Portugal | | Qatar | Romania | Russia | | | | | | | | | Thailand | | | | | | | Venezuela |
* * *
I've been discussing the Institute for Security and Open Methodologies (http://www.isecom.org/) with my students and clients, with quite a bit of interest. Here's a short list of links for further information.
The Open Source Security Testing Methodology Manual - http://www.isecom.org/osstmm/
This is the essential methodology handbook for ISECOM security practitioners, or from the horse's mouth: "The OSSTMM is a formal methodology for breaking any security and attacking anything the most thorough way possible."
An Introduction to OSSTMM Version 3, by Michael Menefee - https://www.infosecisland.com/blogview/7797-An-Introduction-to-OSSTMM-Version-3.html
Menefee, who based his security consultancy around the OSSTMM, gives us the short list of Key Concepts.
Implementing OSSTMM Strategies Creates Value, also by Michael Menefee - https://www.infosecisland.com/blogview/8340-Implementing-OSSTMM-Strategies-Creates-Value.html
Menefee's interview with Christoph Baumgartner, CEO of OneConsult, a security firm using the OSSTMM: "Relying on the OSSTMM has been one of the most important strategic decisions of my professional life - and I have never regretted it."
Healthcare Risk Assessment Essentials, by Jack Daniel - https://www.infosecisland.com/blogview/6937-Healthcare-Risk-Assessment-Essentials.html
The four-step process of Discovery, Assessment, Recommendation and Review.
Risk assessment tips for smaller companies, by Dejan Kosutic - https://www.infosecisland.com/blogview/4499-Risk-assessment-tips-for-smaller-companies.html
An interesting summary of four basic steps in assessment.
This is an excellent in-depth look at cyber hacking and security resources: http://www.cybersecurityeducation.org/resources/ by David Parker | CyberSecurityEducation.org
Business Networking 101
by Vanessa FardiWe have seen the word a million times in articles, magazines, blogs, even Facebook, but it is very likely we do not have the slightest idea of what ‚ÄúNetworking‚Äù actually means. We might relate it directly to Facebook and we definitely know it is an important tool when it comes to doing business. But, do we know its actual objective? Networking can be defined as the exchange of information or services among individuals, groups, or institutions, and it specifically refers to the cultivation of productive relationships for employment or business. Now that we finally know what it means, how do we get it done? Should we just go to parties, meetings, benefits and events, talk to people about our company or business, exchange business cards and be sociable? Yes, that is exactly what a networker does. The main idea is to make new contacts with the objective of forming mutually beneficial business relationships. That is it! Now you are an expert on the subject.There is another aspect we have to consider, why go ahead and do business networking? Some entrepreneurs and business owners actually think business networking is a more cost-effective method of getting new clients than advertising or public relations. Business networking can be conducted in a local business community, or on a larger scale on the Internet. Social networks play a very important role for companies nowadays. Even law firms and oil companies have Facebook and Twitter in order to attract more clients and be able to get the word out there about what they do. Social networks make companies more approachable to the general public and potential future clients. That is the reason why the position of Community Manager has boomed over the last five years. If it is not on Facebook, Twitter, Instagram or LinkedIn, your company literally does not exist.To be the greatest networker known to man, just follow these simple, yet life changing, tips:
- Always be honest. No one likes a liar.
- Carry your business cards with you at all times.
- Try to meet at least five or more new people at an event.
- Be friendly.
- You will need to give to be able to receive. The business relationship works both ways.
- Go get them!
- [ Book Review ] :: A+ Exam Cram from David Prowse, eBook Version
- [ Book Review ] :: Pearson IT Certification CompTIA A+ 220-901 Complete Video Course
- [ Book Review ] :: CISSP Training Kit (Microsoft Press Training Kit) 1st Edition
- [ Hacking Tools ] : sqlmap
- A dictionary of Unix commands
- Playing with the Raspberry Pi
- Book Review: CISSP Cert Guide (Pearson IT Certification, 1st Edition)
- Book Review: CompTIA Healthcare IT Technician HIT-001 Cert Guide, by Joy Dark and Jean Andrews
- Book Review: Just about to fade away: thoughts on the CompTIA A+ Authorized Cert Guide, Third Edition
- When Security Is Too Hard For Your Mother: a Dark Matters article