<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[EDU: Digital CitiZENship, CyberSecurity, eSkills, Modern EDU  by Gust MEES]]></provider_name><provider_url><![CDATA[https://gustmees.wordpress.com]]></provider_url><author_name><![CDATA[Gust MEES]]></author_name><author_url><![CDATA[https://gustmees.wordpress.com/author/luxwebwizard/]]></author_url><title><![CDATA[How Can Education Help To Lower&nbsp;Cybercrime?]]></title><type><![CDATA[link]]></type><html><![CDATA[<p><span style="color: #ffffff;">.</span><br />
<a href="https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg"><img loading="lazy" data-attachment-id="5518" data-permalink="https://gustmees.wordpress.com/?attachment_id=5518" data-orig-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg" data-orig-size="823,513" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Evolution of Education: Wordle Logo" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg?w=823" class="aligncenter wp-image-5518" src="https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg?w=600&#038;h=374" alt="Evolution of Education: Wordle Logo" width="600" height="374" srcset="https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg?w=600&amp;h=374 600w, https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg?w=150&amp;h=93 150w, https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg?w=300&amp;h=187 300w, https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg?w=768&amp;h=479 768w, https://gustmees.files.wordpress.com/2014/10/screenhunter_03-aug-05-15-24.jpg 823w" sizes="(max-width: 600px) 100vw, 600px" /></a><br />
<span style="color: #ffffff;">.</span></p>
<hr />
<p><span style="color: #ffffff;">.</span></p>
<p><a href="https://www.bee-secure.lu/de/tools/eu-events/safer-internet-day/safer-internet-day-2015" target="_blank"><img loading="lazy" data-attachment-id="5985" data-permalink="https://gustmees.wordpress.com/2015/01/06/sid2015-safer-internet-day-2015-participation/sid15_banner_anim/" data-orig-file="https://gustmees.files.wordpress.com/2015/01/sid15_banner_anim.gif" data-orig-size="468,60" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="SID15_Banner_anim" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2015/01/sid15_banner_anim.gif?w=300" data-large-file="https://gustmees.files.wordpress.com/2015/01/sid15_banner_anim.gif?w=468" class="aligncenter wp-image-5985 size-full" src="https://gustmees.files.wordpress.com/2015/01/sid15_banner_anim.gif?w=468&#038;h=60" alt="SID15_Banner_anim" width="468" height="60" /></a></p>
<p><span style="color: #ffffff;">.</span></p>
<h1><strong><span style="color: #000000;">How Can Education Help To Lower Cybercrime?</span></strong></h1>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif"><img loading="lazy" data-attachment-id="5522" data-permalink="https://gustmees.wordpress.com/?attachment_id=5522" data-orig-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif" data-orig-size="107,98" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="programmerman-animated" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107" data-large-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107" class="alignleft size-full wp-image-5522" src="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107&#038;h=98" alt="programmerman-animated" width="107" height="98" /></a>A <strong><span style="color: #000000;">GOOD</span></strong> &#8220;<a title="Digital Citizen" href="https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/" target="_blank"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong>Digital Citizen</strong></span></span></a>&#8221; knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===&gt; <strong><span style="color: #000000;">Awareness</span></strong> &lt;=== when meeting the <strong><span style="color: #000000;">working force</span></strong>. Thus meaning, THEY will be <strong><span style="color: #000000;">prepared NOT to fall into the traps from the cybercriminals</span></strong> on their <strong><span style="color: #000000;">office</span></strong>, <strong><span style="color: #000000;">reducing so the attack surface for their employer</span></strong>. Thus meaning: <strong><span style="color: #000000;">Teaching</span></strong> about ===&gt; <span style="color: #000000;"><strong>Digital CitizenShip</strong></span> &lt;=== is a <strong><span style="color: #000000;">MUST</span></strong>, where <strong><span style="color: #000000;">Internet Safety</span></strong>, basic knowledge of <strong><span style="color: #000000;">Cyber Security and Privacy MUST be included!</span></strong></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<h1 style="text-align: center;"><span style="color: #000000;"><em>« Good habits formed at youth make all the difference. »</em> <strong>Aristotle</strong></span></h1>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<table border="2" width="100%" cellspacing="2" cellpadding="1">
<tbody>
<tr valign="top" bgcolor="#FFFF99">
<td><span style="color: #ffff99;">.</span></p>
<p style="text-align: justify;"><strong><span style="color: #000000;"><a href="http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html" target="_blank"><img loading="lazy" data-attachment-id="5419" data-permalink="https://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/screenhunter_01-sep-19-17-11/" data-orig-file="https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg" data-orig-size="460,333" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="We are ALL responsible for the internet" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg?w=460" class="aligncenter wp-image-5419" src="https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg?w=570&#038;h=413" alt="We are ALL responsible for the internet" width="570" height="413" srcset="https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg 460w, https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg?w=150&amp;h=109 150w, https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg?w=300&amp;h=217 300w" sizes="(max-width: 570px) 100vw, 570px" /></a></span></strong></p>
<p style="text-align: center;"><strong> Image credit ===&gt; <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html" href="http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html" target="_blank">http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html</a></span></span> &lt;===</strong></p>
<p style="text-align: justify;"><strong><span style="color: #000000;">Here below the main links about WHAT to learn about:</span></strong></p>
<ul>
<li style="text-align: justify;"><strong><span style="color: #000000;">Digital CitizenShip (Internet Safety AND Cyber Security are included!)</span></strong>
<ul>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Learning To Become a GOOD Digital Citizen | Digital CitizenShip" href="https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/" target="_blank" rel="bookmark">Learning To Become a GOOD Digital Citizen | Digital CitizenShip</a></span></span></strong></p>
</li>
</ul>
</li>
<li style="text-align: justify;"><strong><span style="color: #000000;">LEARNing the basics of Cyber Security</span></strong>
<ul>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Learning basics of Cyber-Security" href="https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/" target="_blank" rel="bookmark">Learning basics of Cyber-Security</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Security Practice: Learn it in one week" href="https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/" target="_blank" rel="bookmark">Cyber-Security Practice: Learn it in one week</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Security is easy / Get THE right reflexes!" href="https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/" target="_blank" rel="bookmark">Cyber-Security is easy / Get THE right reflexes!</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Get smart with 5 minutes tutorials/IT-Security/Part 3: Update your Third Party Applications!" href="https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/" target="_blank" rel="bookmark">Get smart with 5 minutes tutorials/IT-Security/Part 3: Update your Third Party Applications!</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="ICT Awareness: What YOU SHOULD KNOW!" href="https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/" target="_blank" rel="bookmark">ICT Awareness: What YOU SHOULD KNOW!</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Visual Cyber-Security: See Attacks On Real Time" href="https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/" target="_blank" rel="bookmark">Visual Cyber-Security: See Attacks On Real Time</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Security: The Weakest Link In The Security Chain Is The Human" href="https://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/" target="_blank" rel="bookmark">Cyber-Security: The Weakest Link In The Security Chain Is The Human</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Naivety in the Digital Age?" href="https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/" target="_blank" rel="bookmark">Naivety in the Digital Age?</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Visual IT-Security/Worksheet-Secure Surfing" href="https://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/" target="_blank" rel="bookmark">Visual IT-Security/Worksheet-Secure Surfing</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Visual IT-Security/Learn with videos" href="https://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/" target="_blank" rel="bookmark">Visual IT-Security/Learn with videos</a></span></span></strong></p>
</li>
</ul>
</li>
<li style="text-align: justify;"><strong><span style="color: #000000;">Cyber Hygiene</span></strong></li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Hygiene: ICT Hygiene for Population, Education and Business" href="https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/" target="_blank" rel="bookmark">Cyber-Hygiene: ICT Hygiene for Population, Education and Business</a></span></span></strong></p>
</li>
<li style="text-align: justify;"><strong><span style="color: #000000;">Apps, Privacy AND Cyber Security</span></strong>
<ul>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Are There Cyber-Security Dangers With Apps And What’s About Privacy?" href="https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/" target="_blank" rel="bookmark">Are There Cyber-Security Dangers With Apps And What’s About Privacy?</a></span></span></strong></p>
</li>
</ul>
</li>
<li><strong><span style="color: #000000;">Bring Your Own Device (BYOD)</span></strong>
<ul>
<li>
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure" href="https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/" target="_blank" rel="bookmark">Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure</a></span></span></strong></p>
</li>
</ul>
</li>
<li style="text-align: justify;"><strong><span style="color: #000000;">LEARNing about Privacy</span></strong>
<ul>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Smartphone pictures pose privacy risks" href="https://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/" target="_blank" rel="bookmark">Smartphone pictures pose privacy risks</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Privacy In The Digital World-SHOULDN’T We Talk About It!?" href="https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/" target="_blank" rel="bookmark">Privacy In The Digital World-SHOULDN’T We Talk About It!?</a></span></span></strong></p>
</li>
</ul>
</li>
</ul>
<h3 style="text-align: center;"><strong><span style="color: #000000;">TEACH the kids, students and learners ALSO about ===&gt; Responsibility, Laws, Prison &amp; Jail for NO respect of the laws!</span></strong></h3>
<h3 style="text-align: center;"><strong><span style="color: #000000;">The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!</span></strong></h3>
<p>&nbsp;</p>
<p style="text-align: justify;"><span style="color: #000000;"><strong>Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall, </strong></span></p>
<p style="text-align: justify;">Read below please, for more detailed instructions and information, thanks.</p>
</td>
</tr>
</tbody>
</table>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1 style="text-align: justify;"><strong><span style="color: #000000;">THE Facts</span></strong></h1>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/10/screenhunter_05-nov-02-22-35.jpg"><img loading="lazy" data-attachment-id="5634" data-permalink="https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/screenhunter_05-nov-02-22-35/" data-orig-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_05-nov-02-22-35.jpg" data-orig-size="284,377" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="cybercrime-$400 billion-2013" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_05-nov-02-22-35.jpg?w=226" data-large-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_05-nov-02-22-35.jpg?w=284" class="alignleft wp-image-5634 " src="https://gustmees.files.wordpress.com/2014/10/screenhunter_05-nov-02-22-35.jpg?w=284&#038;h=377" alt="cybercrime-$400 billion-2013" width="284" height="377" srcset="https://gustmees.files.wordpress.com/2014/10/screenhunter_05-nov-02-22-35.jpg 284w, https://gustmees.files.wordpress.com/2014/10/screenhunter_05-nov-02-22-35.jpg?w=113&amp;h=150 113w" sizes="(max-width: 284px) 100vw, 284px" /></a></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">Good to know, check the image left-hand sided. Check also the articles below for more <strong><span style="color: #000000;">deeper information</span></strong>, please:</p>
<ul>
<li class="hover" style="text-align: justify;"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Impact: espionage-Intellectual Property" href="http://blogs.mcafee.com/business/impact-espionage-intellectual-property" target="_blank"><strong>http://blogs.mcafee.com/business/impact-espionage-intellectual-property</strong></a></span></span></li>
<li class="" style="text-align: justify;"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Impact-CyberCrime (PDF)" href="http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf" target="_blank"><strong>http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf</strong></a></span></span></li>
<li class="">…</li>
</ul>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;"><strong>.</strong></span></p>
<p style="text-align: justify;"><span style="color: #ffffff;"><strong>.</strong></span></p>
<hr />
<h1 style="text-align: justify;"><strong><span style="color: #000000;">Awareness And Naivety, WHAT!?</span></strong></h1>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2012/05/1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01.png"><img loading="lazy" data-attachment-id="704" data-permalink="https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01/" data-orig-file="https://gustmees.files.wordpress.com/2012/05/1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01.png" data-orig-size="80,72" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2012/05/1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01.png?w=80" data-large-file="https://gustmees.files.wordpress.com/2012/05/1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01.png?w=80" class="alignleft size-full wp-image-704" src="https://gustmees.files.wordpress.com/2012/05/1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01.png?w=80&#038;h=72" alt="1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01" width="80" height="72" /></a>First of ALL ===&gt; <strong><span style="color: #000000;">WE MUST ACCEPT</span></strong> (<strong><span style="color: #000000;">its a fact</span></strong>) &lt;=== that ===&gt; <strong><span style="color: #000000;">Nobody Is Perfect!!!</span></strong> &lt;=== <strong><span style="color: #000000;">Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets&#8230;)</span></strong>. <strong><span style="color: #000000;">NOR is there a completely ===&gt; anonymity and privacy &lt;=== possible!</span></strong> Check below please:</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<ul>
<li class=""><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Apple vulnerabilities and malware" href="http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security" target="_blank"><strong>Apple vulnerabilities and malware</strong></a></span></span></li>
<li class=""><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Linux vulnerabilities and malware" href="http://www.scoop.it/t/securite-pc-et-internet?q=Linux" target="_blank"><strong>Linux vulnerabilities and malware</strong></a></span></span></li>
<li class=""><strong><span style="color: #000000;">Windows, everybody knows this already <span class="wp-smiley wp-emoji wp-emoji-wink" title=";)">😉</span></span></strong></li>
<li class=""><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="ICT Awareness: What YOU SHOULD KNOW!" href="https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/" target="_blank">ICT Awareness: What YOU SHOULD KNOW!</a></strong></span></span></li>
</ul>
<p>.</p>
<p style="text-align: justify;">There is “<strong>Over Confidence</strong>” as it is exactly that! I don’t make a war of different OS, but one must be aware today that <strong>Nobody Is Perfect</strong>, <strong>attacks</strong> and <strong>vulnerabilities</strong> are showing us that, see here please:</p>
<ul>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="http://www.scoop.it/t/securite-pc-et-internet?tag=Linux-Vulnerabilities" href="http://www.scoop.it/t/securite-pc-et-internet?tag=Linux-Vulnerabilities" target="_blank">http://www.scoop.it/t/securite-pc-et-internet?tag=Linux-Vulnerabilities</a></strong></span></span></li>
<li class=""><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security" href="http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security" target="_blank">http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security</a></strong></span></span></li>
</ul>
<p><strong>Concerning the Mac</strong>, check the Report from, <strong>SYMANTEC</strong> here:</p>
<ul>
<li class=""><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internet+Security+Threat+Report+April+13" href="http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internet+Security+Threat+Report+April+13" target="_blank">http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internet+Security+Threat+Report+April+13</a></strong></span></span></li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="https://gustmees.files.wordpress.com/2013/04/mac-insecurity-threats-symantec-2012.jpg"><img class="aligncenter" src="https://gustmees.files.wordpress.com/2013/04/mac-insecurity-threats-symantec-2012.jpg?w=455&#038;h=332" alt="Mac-Insecurity-Threats-Symantec-2012" width="455" height="332" /></a></p>
<p><span style="color: #ffffff;">.</span></p>
<p>Don’t forget also about mobile phones, <strong>Android is also based on Linux as OS</strong>! Check here:</p>
<ul>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="https://en.wikipedia.org/wiki/Android_(operating_system)" href="https://en.wikipedia.org/wiki/Android_%28operating_system%29" target="_blank">https://en.wikipedia.org/wiki/Android_(operating_system)</a></strong></span></span></li>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Android" href="http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Android" target="_blank">http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Android</a></strong></span></span></li>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="http://www.scoop.it/t/securite-pc-et-internet?tag=Android" href="http://www.scoop.it/t/securite-pc-et-internet?tag=Android" target="_blank">http://www.scoop.it/t/securite-pc-et-internet?tag=Android</a></strong></span></span></li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<p style="text-align: center;"><span style="color: #000000;"><strong>======&gt; A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: &lt;======</strong></span></p>
<ul>
<li class=""><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Data-Breaches in Education" href="http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES" target="_blank">http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES</a></strong></span></span></li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg"><img loading="lazy" data-attachment-id="3276" data-permalink="https://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/screenhunter_01-jun-26-14-02/" data-orig-file="https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg" data-orig-size="423,631" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Cyberattacks the greatest threat to nations" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg?w=201" data-large-file="https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg?w=423" class="aligncenter size-full wp-image-3276" src="https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg?w=423&#038;h=631" alt="Cyberattacks the greatest threat to nations" width="423" height="631" srcset="https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg 423w, https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg?w=101&amp;h=150 101w, https://gustmees.files.wordpress.com/2012/12/screenhunter_01-jun-26-14-02.jpg?w=201&amp;h=300 201w" sizes="(max-width: 423px) 100vw, 423px" /></a></p>
<p><strong>A MUST READ:</strong></p>
<ul>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Cyberattacks the greatest threat to nations, say global execs" href="http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks+the+greatest+threat+to+nat." target="_blank">http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks+the+greatest+threat+to+nat.</a></strong></span></span></li>
<li><a title="https://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/" href="https://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">https://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/</span></span></strong></a></li>
<li>&#8230;</li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><span style="color: #000000;">OK, I hear YOU already saying: <strong>WHAT do WE have to do with THAT!?</strong> Actually a lot! A lot of <strong>cybercrime</strong> is done by using so called ===&gt; <strong>Zombies</strong> &lt;===, <strong>infected computers and smartphones</strong> who are connected together in a so called ===&gt; <strong>Botnet</strong> &lt;===. But read more below in the proposed articles, please:</span></p>
<ul>
<li style="text-align: justify;"><a title="Curation about botnets" href="http://www.scoop.it/t/21st-century-learning-and-teaching/?q=botnet" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://www.scoop.it/t/21st-century-learning-and-teaching/?q=botnet</span></span></strong></a></li>
<li style="text-align: justify;"><strong><span style="color: #000000;">Botnets using Mac and iPhones</span></strong>
<ul>
<li style="text-align: justify;"><a title="Botnets using Mac and iPhones" href="http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=botnet" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=botnet</span></span></strong></a></li>
</ul>
</li>
<li style="text-align: justify;"></li>
</ul>
<p style="text-align: justify;"><a href="https://www.youtube.com/watch?v=iopLKQinSQc" target="_blank"><img loading="lazy" data-attachment-id="5639" data-permalink="https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/screenhunter_06-nov-02-23-18/" data-orig-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_06-nov-02-23-18-e1414966870626.jpg" data-orig-size="600,359" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="What is a botnet?" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_06-nov-02-23-18-e1414966870626.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_06-nov-02-23-18-e1414966870626.jpg?w=600" class="aligncenter wp-image-5639" src="https://gustmees.files.wordpress.com/2014/10/screenhunter_06-nov-02-23-18.jpg?w=600&#038;h=359" alt="What is a botnet?" width="600" height="359" /></a></p>
<p style="text-align: center;"><strong><span style="color: #000000;">Click the image above to access the video, please.</span></strong></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<h1 style="text-align: justify;"><span style="color: #000000;">WHO Are The Countries Who Host The Most Botnets!?</span></h1>
<p style="text-align: justify;">It is <strong><span style="color: #000000;">IMPORTANT</span></strong> to know who are the countries who host the MOST <strong>botnets</strong> (<strong><span style="color: #000000;">Botnet Control Servers</span></strong>), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make <strong><span style="color: #000000;">MORE efforts in Education</span> <span style="color: #000000;">to teach people about</span> <span style="color: #000000;">Cyber Security</span></strong>.</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><a href="http://blogs.mcafee.com/mcafee-labs/botnet-control-servers-span-the-globe" target="_blank"><img loading="lazy" data-attachment-id="5647" data-permalink="https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/screenhunter_01-nov-03-13-38/" data-orig-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_01-nov-03-13-38.jpg" data-orig-size="461,579" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Botnet Control Servers In The World" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_01-nov-03-13-38.jpg?w=239" data-large-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_01-nov-03-13-38.jpg?w=461" class="aligncenter wp-image-5647 " src="https://gustmees.files.wordpress.com/2014/10/screenhunter_01-nov-03-13-38.jpg?w=600&#038;h=754" alt="Botnet Control Servers In The World" width="600" height="754" srcset="https://gustmees.files.wordpress.com/2014/10/screenhunter_01-nov-03-13-38.jpg 461w, https://gustmees.files.wordpress.com/2014/10/screenhunter_01-nov-03-13-38.jpg?w=119&amp;h=150 119w, https://gustmees.files.wordpress.com/2014/10/screenhunter_01-nov-03-13-38.jpg?w=239&amp;h=300 239w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p style="text-align: center;"><strong><span style="color: #000000;">Click the above image, please, to access the article who explains in detail.</span></strong></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<hr />
<h1><span style="color: #ffffff;"><span style="color: #000000;">How A Botnet Is Created</span></span></h1>
<h3></h3>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif"><img loading="lazy" data-attachment-id="5522" data-permalink="https://gustmees.wordpress.com/?attachment_id=5522" data-orig-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif" data-orig-size="107,98" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="programmerman-animated" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107" data-large-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107" class="alignleft size-full wp-image-5522" src="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107&#038;h=98" alt="programmerman-animated" width="107" height="98" /></a>[Start TEXT from <a title="Botnets / F-Secure" href="http://www.f-secure.com/en/web/labs_global/botnets" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">F-Secure</span></span></strong></a>] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘<strong><span style="color: #000000;">bots</span></strong>&#8216; themselves, or ‘<strong><span style="color: #000000;">zombies</span></strong>&#8216;.</p>
<p style="text-align: justify;"><strong><span style="color: #000000;">One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user&#8217;s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.</span></strong></p>
<p style="text-align: justify;">Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the <strong><span style="color: #000000;">botherder</span></strong>. This site or server is known as the <strong><span style="color: #000000;">command-and-control (C&amp;C) server</span></strong>.</p>
<p style="text-align: justify;">An attacker with access to the <strong><span style="color: #000000;">C&amp;C servers</span></strong> uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user&#8217;s actions and so on.</p>
<p style="text-align: justify;">Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘<strong><span style="color: #000000;">botherder</span></strong>&#8216;, ‘operator&#8217; or ‘controller&#8217;. [End TEXT from <a title="Botnets / F-Secure" href="http://www.f-secure.com/en/web/labs_global/botnets" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">F-Secure</span></span></strong></a>]</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">Learn more:</p>
<ul>
<li style="text-align: justify;">
<p class="entry-title"><a title="Botnets: What are They, and How can You Protect Your Computer?" href="http://blogs.intralinks.com/collaborista/2014/08/botnets-what-are-they-how-can-you-protect-computer/" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">Botnets: What are They, and How can You Protect Your Computer?</span></span></strong></a></p>
</li>
<li style="text-align: justify;"><a title="Botnets / F-Secure" href="http://www.f-secure.com/en/web/labs_global/botnets" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">Botnets / F-Secure</span></span></strong></a></li>
<li style="text-align: justify;"><a title="Curation about Botnets / Gust MEES" href="http://www.scoop.it/t/securite-pc-et-internet?q=botnet" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">Curation about Botnets</span></span></strong></a> (EN, FR, DE)</li>
<li style="text-align: justify;">&#8230;</li>
<li style="text-align: justify;">&#8230;</li>
</ul>
<hr />
<h1><strong><span style="color: #000000;">How To Protect To NOT Become A Zombie!?</span></strong></h1>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif"><img loading="lazy" data-attachment-id="5522" data-permalink="https://gustmees.wordpress.com/?attachment_id=5522" data-orig-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif" data-orig-size="107,98" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="programmerman-animated" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107" data-large-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107" class="alignleft size-full wp-image-5522" src="https://gustmees.files.wordpress.com/2014/10/programmerman-animated3.gif?w=107&#038;h=98" alt="programmerman-animated" width="107" height="98" /></a>As already mentioned above, &#8220;<strong><span style="color: #000000;">Zombies</span></strong>&#8221; are infected devices (<strong><span style="color: #000000;">any OS</span></strong>). Computers, smartphones and <strong><span style="color: #000000;">any device</span></strong> running an &#8220;<strong><span style="color: #000000;">Operating System</span></strong> (OS)&#8221; can have <strong><span style="color: #000000;">vulnerabilities</span></strong> and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an <strong><span style="color: #000000;">Antivirus</span></strong> program. Please follow the advice below:</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<ul>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Learning basics of Cyber-Security" href="https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/" target="_blank" rel="bookmark">Learning basics of Cyber-Security</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Security Practice: Learn it in one week" href="https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/" target="_blank" rel="bookmark">Cyber-Security Practice: Learn it in one week</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Security is easy / Get THE right reflexes!" href="https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/" target="_blank" rel="bookmark">Cyber-Security is easy / Get THE right reflexes!</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Get smart with 5 minutes tutorials/IT-Security/Part 3: Update your Third Party Applications!" href="https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/" target="_blank" rel="bookmark">Get smart with 5 minutes tutorials/IT-Security/Part 3: Update your Third Party Applications!</a></span></span></strong></p>
</li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1><strong>TOR And Anonymity!???</strong></h1>
<p><span style="color: #ffffff;">.</span></p>
<p>&nbsp;</p>
<p><a href="https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg"><img loading="lazy" data-attachment-id="5694" data-permalink="https://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/tor-2014/" data-orig-file="https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg" data-orig-size="704,510" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="TOR-2014-cybercrime" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg?w=704" class="aligncenter  wp-image-5694" src="https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg?w=598&#038;h=433" alt="TOR-2014-cybercrime" width="598" height="433" srcset="https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg?w=598&amp;h=433 598w, https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg?w=150&amp;h=109 150w, https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg?w=300&amp;h=217 300w, https://gustmees.files.wordpress.com/2014/11/tor-2014.jpg 704w" sizes="(max-width: 598px) 100vw, 598px" /></a></p>
<p>&nbsp;</p>
<p><span style="color: #ffffff;">.</span></p>
<p><strong><span style="color: #000000;">Learn more:</span></strong></p>
<ul>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Naivety in the Digital Age?" href="https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/" target="_blank" rel="bookmark">Naivety in the Digital Age?</a></strong></span></span></li>
<li> <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="jail / cybercrime" href="http://www.scoop.it/t/securite-pc-et-internet/?tag=Jail..." target="_blank"><strong>Jail</strong></a></span></span>
<ul>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Jail / cybercrime" href="http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Jail..." target="_blank"><strong>Jail 2</strong></a></span></span></li>
</ul>
</li>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Prison / cybercrime" href="http://www.scoop.it/t/securite-pc-et-internet/?tag=Prison" target="_blank"><strong>Prison</strong></a></span></span></li>
<li><strong>Laws about ICT</strong>
<ul>
<li><strong>Luxembourg</strong>
<ul>
<li><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Luxembourg / Code Pénal / Articles 509" href="http://www.vocats.com/en/publications/information-technology/la-fraude-informatique-en-droit-luxembourgeois.html" target="_blank"><strong>Code Pénal, articles 509</strong></a></span></span></li>
</ul>
</li>
</ul>
</li>
<li>&#8230;</li>
</ul>
<p style="text-align: justify;">It is IMPORTANT, actually <strong><span style="color: #000000;">imperative to teach the kids about</span> responsibility</strong>, about the <strong>existing laws</strong>, about WHAT is right and <strong>what is forbidden AND illegal</strong>!!! Laws were (and STILL are) created to <strong>protect the society</strong>&#8230; <strong>Anarchy isn&#8217;t reality in the real world and neither on the internet! </strong></p>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1 style="text-align: justify;"><span style="color: #000000;"><strong>Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)</strong></span></h1>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/10/programmerman-animated1.gif"><img loading="lazy" data-attachment-id="5519" data-permalink="https://gustmees.wordpress.com/?attachment_id=5519" data-orig-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated1.gif" data-orig-size="107,98" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="programmerman-animated" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated1.gif?w=107" data-large-file="https://gustmees.files.wordpress.com/2014/10/programmerman-animated1.gif?w=107" class="alignleft size-full wp-image-5519" src="https://gustmees.files.wordpress.com/2014/10/programmerman-animated1.gif?w=107&#038;h=98" alt="programmerman-animated" width="107" height="98" /></a>The month of October is by tradition since years already the “<strong>Cyber Security Month</strong>” (<span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="#CyberSecMonth" href="https://twitter.com/search?f=realtime&amp;q=%23CyberSecMonth&amp;src=tyah" target="_blank"><strong>#CyberSecMonth</strong></a></span></span>) in <strong>Europe</strong> and ALSO the “<strong>National Cyber Security Awareness Month</strong>” (<span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="NCSAM" href="https://twitter.com/search?f=realtime&amp;q=%23NCSAM&amp;src=tyah" target="_blank"><strong>#NCSAM</strong></a></span></span>) in the <strong>USA</strong>. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the <strong>importance of</strong> <strong>GOOD knowledge about Cyber Security</strong> then…</p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="http://www.theinquirer.net/inquirer/news/2263890/fbi-says-cyber-crime-is-emerging-as-a-threat-to-surpass-terrorism" target="_blank"><img loading="lazy" data-attachment-id="2657" data-permalink="https://gustmees.wordpress.com/2013/04/22/i-got-interviewed-feeling-honored/screenhunter_06-apr-24-23-16/" data-orig-file="https://gustmees.files.wordpress.com/2013/04/screenhunter_06-apr-24-23-16.jpg" data-orig-size="469,434" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="FBI-US-Cybersecurity is National Priority" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2013/04/screenhunter_06-apr-24-23-16.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2013/04/screenhunter_06-apr-24-23-16.jpg?w=469" class="aligncenter wp-image-2657" src="https://gustmees.files.wordpress.com/2013/04/screenhunter_06-apr-24-23-16.jpg?w=601&#038;h=556" alt="FBI-US-Cybersecurity is National Priority" width="601" height="556" srcset="https://gustmees.files.wordpress.com/2013/04/screenhunter_06-apr-24-23-16.jpg 469w, https://gustmees.files.wordpress.com/2013/04/screenhunter_06-apr-24-23-16.jpg?w=150&amp;h=139 150w, https://gustmees.files.wordpress.com/2013/04/screenhunter_06-apr-24-23-16.jpg?w=300&amp;h=278 300w" sizes="(max-width: 601px) 100vw, 601px" /></a></p>
<p style="text-align: center;"><strong>Click the above image to access the article, please.</strong></p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="http://europa.eu/rapid/press-release_SPEECH-12-774_en.htm?locale=en" target="_blank"><img loading="lazy" data-attachment-id="5620" data-permalink="https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/cybersecurity-shared-responsibility-2012-eu/" data-orig-file="https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg" data-orig-size="701,410" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="CyberSecurity-Shared-Responsibility-2012-EU" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg?w=701" class="aligncenter wp-image-5620" src="https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg?w=601&#038;h=352" alt="CyberSecurity-Shared-Responsibility-2012-EU" width="601" height="352" srcset="https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg?w=601&amp;h=352 601w, https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg?w=150&amp;h=88 150w, https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg?w=300&amp;h=175 300w, https://gustmees.files.wordpress.com/2014/10/cybersecurity-shared-responsibility-2012-eu.jpg 701w" sizes="(max-width: 601px) 100vw, 601px" /></a></p>
<p style="text-align: center;"><strong>Click the above image to access the article, please.</strong></p>
<p><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">I am getting often asked WHAT are the best ways about <strong>learning</strong> ===&gt; <strong>Internet Safety and Cyber Security</strong> &lt;===, well, here below my <strong>recommendations and advice</strong>. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY <span class="wp-smiley wp-emoji wp-emoji-wink" title=";)">😉</span> <strong>Click the image below to access the FREE game.</strong></p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="http://www.pbs.org/wgbh/nova/labs/lab/cyber/" target="_blank"><img loading="lazy" data-attachment-id="5561" data-permalink="https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/screenhunter_11-oct-20-21-35/" data-orig-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_11-oct-20-21-35-e1413968350732.jpg" data-orig-size="600,449" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="NOVALABS CyberSecurity Game" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_11-oct-20-21-35-e1413968350732.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/10/screenhunter_11-oct-20-21-35-e1413968350732.jpg?w=600" class="aligncenter wp-image-5561" src="https://gustmees.files.wordpress.com/2014/10/screenhunter_11-oct-20-21-35.jpg?w=639&#038;h=479" alt="VOVALABS CyberSecurity Game" width="639" height="479" /></a></p>
<p style="text-align: center;"><strong>Click the image above to access the FREE game.</strong></p>
<p><span style="color: #ffffff;">.</span></p>
<p>Learn more:</p>
<ul>
<li>
<p class="title"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Learning basics of Cyber-Security" href="https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/" target="_blank" rel="bookmark">Learning basics of Cyber-Security</a></strong></span></span></p>
</li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Security PracTICE-Learn it in one week" href="https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/" target="_blank"><strong>Cyber-Security PracTICE-Learn it in one week</strong></a></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Visual Cyber-Security: See Attacks On Real Time" href="https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/" target="_blank">Visual Cyber-Security: See Attacks On Real Time</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Dangers of WiFi in public places" href="https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/" target="_blank">Dangers of WiFi in public places</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="ICT Awareness: What YOU SHOULD KNOW!" href="https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/" target="_blank">ICT Awareness: What YOU SHOULD KNOW!</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?" href="https://gustmees.wordpress.com/2014/02/08/often-asked-questions-are-we-becoming-too-paranoid-about-cyber-security/" target="_blank">Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?" href="https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/" target="_blank">Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?" href="https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/" target="_blank">Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?" href="https://gustmees.wordpress.com/2014/02/09/often-asked-questions-i-have-installed-an-anti-virus-and-a-firewall-am-i-protected-now/" target="_blank">Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Digital CitizenShip | Internet Safety And Cyber Security Advisory Board Run by Students" href="https://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/" target="_blank">Digital CitizenShip | Internet Safety And Cyber Security Advisory Board Run by Students</a></strong></span></span></li>
<li class="hover"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Cyber-Security is easy / Get THE right reflexes!" href="https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/" target="_blank">Cyber-Security is easy / Get THE right reflexes!</a></strong></span></span></li>
<li class="hover">…</li>
<li class="hover">…</li>
<li class="hover">…</li>
</ul>
<p>&nbsp;</p>
<hr />
<h1><strong><span style="color: #000000;">WHAT Actions Could Get Taken WHO Are Student Centered?</span></strong></h1>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2012/12/sharing-icon.png"><img loading="lazy" data-attachment-id="2073" data-permalink="https://gustmees.wordpress.com/2012/12/19/happy-holidays-seasons-greetings-merry-xmas-and-a-happy-new-year/sharing-icon/" data-orig-file="https://gustmees.files.wordpress.com/2012/12/sharing-icon.png" data-orig-size="80,80" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="sharing-icon" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2012/12/sharing-icon.png?w=80" data-large-file="https://gustmees.files.wordpress.com/2012/12/sharing-icon.png?w=80" class="alignleft size-full wp-image-2073" src="https://gustmees.files.wordpress.com/2012/12/sharing-icon.png?w=80&#038;h=80" alt="sharing-icon" width="80" height="80" /></a>WHAT could be better than <strong><span style="color: #000000;">put the students in the drivers seat</span></strong> and let them <strong><span style="color: #000000;">learn responsibility</span></strong>, let them <strong><span style="color: #000000;">create a community of responsibility</span></strong> such as:</p>
<ul>
<li>
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Ideas for a more secure Internet-part2/IT-Security Scouts" href="https://gustmees.wordpress.com/2012/05/16/ideas-for-a-more-secure-internet-part2it-security-scouts-in-schools/" target="_blank" rel="bookmark">Ideas for a more secure Internet-part2/IT-Security Scouts</a></span></span></strong></p>
</li>
<li>
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Digital CitizenShip | Internet Safety And Cyber Security Advisory Board Run by Students" href="https://gustmees.wordpress.com/2014/09/06/digital-citizenship-internet-safety-and-cyber-security-advisory-board-run-by-students/" target="_blank" rel="bookmark">Digital CitizenShip | Internet Safety And Cyber Security Advisory Board Run by Students</a></span></span></strong></p>
</li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<p>&nbsp;</p>
<p><span style="color: #ffffff;">.</span></p>
<p><span style="color: #ffffff;">.</span></p>
<table border="1" width="100%">
<tbody>
<tr>
<td>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/10/gust-avril2014-800px-21.jpg"><img loading="lazy" data-attachment-id="5523" data-permalink="https://gustmees.wordpress.com/?attachment_id=5523" data-orig-file="https://gustmees.files.wordpress.com/2014/10/gust-avril2014-800px-21.jpg" data-orig-size="120,149" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="GUST-AVRIL2014-800px-2" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/10/gust-avril2014-800px-21.jpg?w=120" data-large-file="https://gustmees.files.wordpress.com/2014/10/gust-avril2014-800px-21.jpg?w=120" class="alignleft size-full wp-image-5523" src="https://gustmees.files.wordpress.com/2014/10/gust-avril2014-800px-21.jpg?w=120&#038;h=149" alt="GUST-AVRIL2014-800px-2" width="120" height="149" /></a>L’auteur <strong>Gust MEES</strong> est <strong>Formateur andragogique / pédagogique TIC</strong>, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant <strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a title="BEESECURE (LU)" href="http://www.bee-secure.lu/" target="_blank"><span style="color: #0000ff; text-decoration: underline;">BEESECURE</span></a></span></span>, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”</strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a title="MySecureIT (LU)" href="http://www.myschool.lu/home/mS/publications_fiches.asp" target="_blank"><span style="color: #0000ff; text-decoration: underline;">MySecureIT</span></a></strong></span></span>“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”<span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a title="CASES (LU)" href="http://www.cases.lu/" target="_blank"><span style="color: #0000ff; text-decoration: underline;"><strong>CASES</strong></span></a></span></span>” (<strong>C</strong>yberworld<strong> A</strong>wareness and<strong> </strong><strong>S</strong>ecurity<strong> </strong><strong>E</strong>nhancement<strong> </strong><strong>S</strong>tructure).</p>
<hr />
<p style="text-align: justify;">The author <strong>Gust MEES</strong> is <strong>ICT Course Instructor</strong>, ”<strong>Member of the Advisory Board</strong>” from <strong>“Luxembourg Safer Internet</strong>” (LuSI), <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a title="BEESECURE (LU)" href="http://www.bee-secure.lu/" target="_blank"><span style="color: #0000ff; text-decoration: underline;"><strong>BEESECURE</strong></span></a></span></span>, Official Partner (Consultant) from the <strong>Ministry of Education in Luxembourg</strong>, project “<span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a title="MySecureIT (LU)" href="http://www.myschool.lu/home/mS/publications_fiches.asp" target="_blank"><span style="color: #0000ff; text-decoration: underline;">MySecureIT</span></a></strong></span></span>“, Official Partner from the <strong>Ministry of Commerce in Luxembourg</strong>, project “<span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a title="CASES (LU)" href="http://www.cases.lu/" target="_blank"><span style="color: #0000ff; text-decoration: underline;"><strong>CASES</strong></span></a></span></span>” (<strong>C</strong>yberworld<strong> A</strong>wareness and <strong>S</strong>ecurity <strong>E</strong>nhancement <strong>S</strong>tructure).</p>
</td>
</tr>
</tbody>
</table>
<p><span style="color: #ffffff;">.</span></p>
<p><strong><span style="color: #000000;">Stay tuned for next blog posts 😉</span></strong></p>
<p><span style="color: #ffffff;">.</span></p>
<p><span style="color: #ffffff;">.</span></p>
<p>&nbsp;</p>
]]></html><thumbnail_url><![CDATA[https://gustmees.files.wordpress.com/2014/09/screenhunter_01-sep-19-17-11.jpg?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[440]]></thumbnail_width><thumbnail_height><![CDATA[319]]></thumbnail_height></oembed>