Monday, May 16, 2011

Organizing Information

Keeping organized is very important. I organize my computer by using folders and labels. For each class I have a separate folder labeled with the class name. Then whenever we have an assignment, I save it to its corresponding folder and everything is neat and organized. Photos are saved in my iPhoto program on my mac. Videos are saved in a video folder as well. I do not use a hierarchical system. I use a nonhierarchical system in which things are saved and placed in their corresponding folder and not in an important order.
Tagging is a computer organization system that attaches labels to the grammatical constituents of textual matter.
Social Bookmarking is a method for storing and managing bookmarks of Web pages with individually chosen keywords.
These two terms are important because they help keep your computer, documents, and media organized.

Thursday, May 5, 2011

Tech Article 5/6


Bin Laden Causes Hell From the Dead

After the news of Bin Laden's corpse pictures being withheld from the public, many spammers have been creating fake links on many websites. The main spam host has been through Facebook. People have been creating pages and links that once clicked, will cause your profile to be hacked and spread their link to other people via the Facebook friends system. Facebook Security posted a message encouraging users to be careful when clicking questionable links and to use the site's "Mark As Spam" links to report that content.
The FBI has released a few tips:
• Adjust privacy settings on your social-networking sites, like Facebook, to make it harder for friends or non-friends to post items to your wall.
• Do not agree to download new software in order to view a video. This often masks applications that can infect your computer.
• Read e-mails and social-media posts carefully. Malicious messages often contain poor grammar, misspellings and "nonstandard English."
• Report messages that claim to be from the FBI or other security agencies. Their names are often used to try to establish legitimacy.

Tech Article 5/6