Educational Video Resource Available Online
The Internet is full of information useful for instructional purposes, but it's disorganized and too often unreliable. Despite its problems, the potential of the Internet for education is especially huge. This section of the Valley Stream High School District's website is devoted to posting reviewed web resources specifically useful for the classroom.
In this issue we are highlighting the site located at: http://www.watchknow.com/
This site has collected the a number of educational videos made for children, and made them findable and watchable on one resource. Watchknow contains virtually every topic taught in schools, in every major language on Earth. The subjects are categorized according to academic area, education level, and placed in the order in which topics are typically taught.
WatchKnow is evolving as both a resource for users and also a non-profit, online community that encourages educators to collect, create, and share free, innovative, educational videos.
Info About Internet Security
A computer infected by malicious software (a virus or worm) is referred to as a BOT. The BOT acts like a robotic device under the remote command of a distant server, without the computer owner's knowledge. Typically, the malicious software installs as a "kit" on the infected machine. This kit often includes hacking utilities, a spam engine and a means of communication back to the remote command server for receiving commands and new software.
A bot network can marshal tens of thousands of computers, all controlled by a single server. The much-maligned Storm Worm of 2007, for instance, created a bot network estimated at more than 2 million host computers. The creator of a bot network can then use this army of computers to launch attacks on third-party websites, send out spam or use the bot as a staging point for any customized attacks within the network on which the bot resides.
You can protect your computer from BOTs by keeping antivirus software up to date and accept periodic online updates. Where possible use web proxy and e-mail gateway services that block spam and unwanted content by web reputation at the network edge.