21st Century Learning and Teaching
586.6K views | +1 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'CIRCL', 'English'. Clear
Scooped by Gust MEES
Scoop.it!

CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center

CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center | 21st Century Learning and Teaching | Scoop.it
CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center


Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center

Infected systems are often part of a botnet which can be controlled remotely by attackers to perform criminal activities like attacking other computers, send malicious emails or perform denial-of-service attack.

My PC is infected and I’m looking for support

If you have a strong suspicion that your machine is infected and you are looking for support to reinstall the system, you can check the PC-doctor list to find a SME to support you.

I received a malicious or suspicious link

Phishing link can be directly tested and reported via the CIRCL urlabuse interface.

I have a security incident in my company

If you have a security incident in your company, you can report it to CIRCL.

Gust MEES's insight:
CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center


Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center

Infected systems are often part of a botnet which can be controlled remotely by attackers to perform criminal activities like attacking other computers, send malicious emails or perform denial-of-service attack.

My PC is infected and I’m looking for support

If you have a strong suspicion that your machine is infected and you are looking for support to reinstall the system, you can check the PC-doctor list to find a SME to support you.

I received a malicious or suspicious link

Phishing link can be directly tested and reported via the CIRCL urlabuse interface.

I have a security incident in my company

If you have a security incident in your company, you can report it to CIRCL.


No comment yet.
Scooped by Gust MEES
Scoop.it!

CIRCL: Devices Lost? Stolen? Seized?

CIRCL: Devices Lost? Stolen? Seized? | 21st Century Learning and Teaching | Scoop.it

CIRCL: Devices Lost? Stolen? Seized? A GREAT guide, follow the advice!


Gust MEES's insight:

#CIRCL: Devices Lost? Stolen? Seized? A GREAT guide, follow the advice! 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CIRCL map - potential network attacks targeting IP addresses in Luxembourg

CIRCL map - potential network attacks targeting IP addresses in Luxembourg | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Gust MEES's curator insight, May 13, 2013 12:13 PM

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Gust MEES's curator insight, May 13, 2013 12:14 PM

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Scooped by Gust MEES
Scoop.it!

CIRCL » TR-26 Security Recommendations for Web Content Management Systems and Web Servers

CIRCL » TR-26 Security Recommendations for Web Content Management Systems and Web Servers | 21st Century Learning and Teaching | Scoop.it
TR-26 Security Recommendations for Web Content Management Systems and Web Servers
Gust MEES's insight:

TR-26 Security Recommendations for Web Content Management Systems and Web Servers


No comment yet.
Scooped by Gust MEES
Scoop.it!

Visual Cyber-Security: See Attacks On Real Time

Visual Cyber-Security: See Attacks On Real Time | 21st Century Learning and Teaching | Scoop.it

Introduction .In previous articles WE discussed already about the responsibility that everyone is responsible for a safer and more secure Internet, that the weakest link in the security chain is the human...

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/