Privacy and Security Issues with Cloud Computing |
|
|
|
Written by Administrator
|
Saturday, 18 June 2011 20:16 |
For some time I've watched as New Zealand businesses have been seduced by the so called advantages of Cloud Computing.
In a manner similar to drug pushers, they dole out free "hits", they eschew free services that entice business owners to send their IT provisioning to places unknown overseas. The glamour of the websites, extolling these services, appears to induce a feeling of security, all the while containing many a fish hook.
|
Last Updated on Monday, 20 June 2011 00:18 |
Read more...
|
A Peek at Moodle 2.0 - Part 1 |
|
|
|
Written by Administrator
|
Saturday, 01 January 2011 07:08 |
Moodle 2.0 was recently released, and I'll try here to give some idea of what the transition from the Moodle 1.* releases to Moodle 2.0 will mean to everyone.
Now there will be different effects depending upon whether you are a student, a teacher, administrator, or developer. I'll try and keep it simple.
Major System Rewrite
Moodle 2.0 is a major rewrite of the base Moodle software, with changes to the Themes, Modules & Blocks, and consequently all areas of functionality.
This means that the themes that worked for version 1.* may most probably not work for version 2.0. So one of the major effects will be the need to rewrite any custom themes that have been created.
However, the theme upgrade has given Moodle a much more cleaner look, and a faster execution. So well worth the move.
|
Last Updated on Saturday, 01 January 2011 19:33 |
Read more...
|
|
A Peek at Moodle 2.0 - Part 2 |
|
|
|
Written by Administrator
|
Saturday, 01 January 2011 19:12 |
In this article I will look at the new ways in which Moodle 2.0 handles files and resources.
Moodle Resources
In Moodle "Resources" are the documents and files we use to present information, or content for our Courses. They may be text, graphics, or multi-media.
When selecting a resource in Moodle 1.* we had the following options

|
In Moodle 2.0 this is now updated to:

|
|
Last Updated on Saturday, 01 January 2011 20:22 |
Read more...
|
How to create a very strong password |
|
|
|
Written by Administrator
|
Monday, 20 September 2010 23:15 |
An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful because security is ultimately a numbers game. A hacker needs to guess the correct numbers to get to the encrypted data and security is all about the amount of time he will likely need to guess those numbers.
This article by Emmanuel Carabott explains the current state of play for hacking passwords.
Read More...
|
|