Apr 18 2013

Contact Information

Jim KirbyJim Kirby

Manager, Internet Technologies, Design & Content
CCRI Web Services, Information Technology Department
Instructor, Computer Studies Department

E-Mail: jkirby@ccri.edu

Twitter: http://twitter.com/#!/JimKirby9

Office:
Knight Campus

Suite 2073, Room #2077

Office Hours
Days Times
Monday through Friday 10:00 am to 3:00 pm

Please email for an appointment.

Sep 26 2012

RoboForm Everywhere College Plan

Important!

Free for College Students

home_banner_iconAccess to All of Your Passwords, Everywhere and at Anytime.

At the library, computer lab, on your phone, in class, at work…

Take control of your logins and passwords with RoboForm Everywhere, which is completely free for students and professors with a valid college or university email address (normally $19.95/ year).

This isn’t one of those “Free Trial” or “Free Limited-Use” situations. We don’t even ask for your credit card! When you sign up for RoboFormU, you’ll get all the bells and whistles of RoboForm Everywhere, including:

  • Unlimited saved Logins and Passwords
  • Syncing across all of your PCs, Macs and mobile devices
  • The added security of Multifactor Authentication
  • 24/7 Technical Support
  • Unlimited Form Filling
  • No ads
    … and so much more!

Go to: http://www.roboform.com/college/  to get started.

Please Note: This product is posted here as an FYI only.  CCRI does not support this software.

Dec 11 2014

Protected: Installing a Linux OS on a flash drive

This content is password protected. To view it please enter your password below:

Dec 11 2014

How to boot Linux from a USB (Part 2a)

This is part 2a of the tutorial on downloading Linux to a flash drive.

Temporarily change the boot order of any PC

Screen shots made on a Dell Optiplex 9010 computer -your computer’s screens may look different.
  1. Shut down the Windows PC
  2. Insert your flash drive with the Linux OS on it into a USB port
  3. Make sure there are no other flash drives inserted
  4. Start the PC and immediately start hitting the “F12″ key repeatedly until you hear a beeping noise or the boot order screen appears (your home computer’s screen may look different but the same basic elements will be there):
    boot order screen shot
  5. PLEASE NOTE: On the computer from which the screen shot above was made, the boot order has already been permanently changed to the top position. Ordinarily, the USB port is the last item in the boot order.
  6. Wherever is is in the boot order, select the “USB Storage Device” (your PC may have a different wording but it will have “USB” in the wording).
  7. The next screen you should see, providing you are using the Ubunu distro of Linux, is pictured below:
    Ubuntu boot screen
  8. It can’t be seen in the above screen shot but the highlighted area at the top of the list say’s “Try Ubunto…“. Wait a few seconds and the “Try Ubunto” will automatically load. DO NOT INSTALL UBUNTU.
  9. The next screen will look like this:
    Ubuntu load screen
  10. When loaded, the Ubuntu desktop screen will look like this:
    Ubuntu desktop

Dec 04 2014

Best Online Password Manager Reviews

By Randall Sutherland

Why Online Password Managers?

password screenAlthough we call them “passwords,” the safest passwords should not contain any dictionary words from any language. Hackers buy dictionaries with all of the words from every culture on the planet to help them crack easy passwords. It does not help at all to add a number or special character to a word. All of the obvious combinations and substitutions are already well-known among hackers. You can create a strong password out of words if you create a sentence-long password. However, some sites enforce character limits that prevent you from generating a sentence-long password. Strong passwords use a random sequence of numerals, letters and special character, which makes them hard to memorize. Even if you do memorize one or two, then you might be tempted to use the same password for multiple sites, which is not a safe way to go. [See reviews]

Dec 04 2014

Web Research Project L: Security

security
  1. Go to ZDnet.com’s Security section: http://www.zdnet.com/topic-security/
  2. Choose any one of the topics there and find an article you find interesting.
  3. In the comments filed below, post about how the article relates to something in the VT textbook.
  4. Specify which article in VT, chapter 10 it compliments.
Due by Thursday, Dec. 11, 2012

Nov 20 2014

Web Project K: Networks

NetworkGo to ZDNet.com’s “Networking” section: http://www.zdnet.com/search?q=Networks&d=2 and pick an article that relates to one of the articles in VT, chapter 9 Write a short (1-3 paragraph) summary of that article in the comments field below. Be sure to point out which part of Chapter 9 to which it relates.

Due by 4:00 p.m. Thurs., Dec. 4, 2014
Be sure to cite your source using APA style

Reference List: Electronic Sources (Web Publications)

Please note: There are no spaces used with brackets in APA. When possible, include the year, month, and date in references. If the month and date are not available, use the year of publication.

Article From an Online Periodical

Online articles follow the same guidelines for printed articles. Include all information the online host makes available, including an issue number in parentheses.

Format:

Author, A. A., & Author, B. B. (Date of publication). Title of article. Title of Online Periodical, volume number(issue number if available). Retrieved from http://www.someaddress.com/full/url/

Example:

Bernstein, M. (2002). 10 tips on writing the living Web. A List Apart: For People Who Make Websites, 149. Retrieved from http://www.alistapart.com/articles/writeliving

Read more at Purdue Online Writing Lab: https://owl.english.purdue.edu/owl/resource/560/10/

Older posts «