TACTics Journal

A Publication for and by TOC for Education Practitioners

July 11, 2003

In this week’s issue:

Connections

(1) Protecting Yourself from Viruses, John Suerken

(2) TOCFE Presentation in Iowa, Cal Halliburton

Editors’ Notes

(3) Kay Buckner-Seal, Cheryl A. Edwards

CONNECTIONS

(1) Protecting Yourself from Viruses

From John Suerken, Florida, USA

This is an article from our webmaster John. He thought it might be of value

to the network to understand how to protect your computer from viruses.

This weekend I received a “movie” from someone in the network that

contained a virus. Luckily John was on the scene and told me to completely

delete without opening—he recognized the file name from a warning list that

had been circulated at the base. Kathy <suerken@cox.net>

- The TOC network has recently seen an increase in malicious e-mail

attachments.

- Malicious attachments may take the form of a virus, Trojan horse or

worm.

- A virus is a small program that can alter how your computer works

without your permission.

- Viruses replicate themselves and they usually replace other good files on

your computer.

- Viruses can affect your video, data files and audio, possibly causing loss

of data.

- A Trojan horse hides on your computer by claiming to be something else.

- Trojans differ from viruses in they do not duplicate themselves.

- Trojans may cause loss of data or may even steal sensitive information

from your computer.

- A worm is similar to a virus, but it spreads without requiring a host file

(but it is just as dangerous).

- There are several ways to tell if your computer is infected:

• Your computer could be much slower than normal

• Programs or the computer itself might not work because important

files have been deleted.

• You may see information on the display that is unusual or unexpected

(often humorous or vulgar).

• But the best way is to run your virus protection software, detect the

infection, and clean it.

- Ways to prevent viruses from infecting your machine (and causing you a

lot of trouble):

• Do not leave a floppy disk in the drive when you start or turn off your

computer.

• Write-protect your floppy disks if you are not saving data to them

(slide the little tab in the corner)

• Be suspicious of e-mail attachments from unknown sources (and do not

open them).

• Learn to understand the types of attachments in your e-mail

- Would Kathy normally send you a movie?

- Would Kathy normally send you an Excel spread sheet?

- If no, send her an e-mail back to ask her before you open the

attachment.

• Don’t have your e-mail program automatically open attachments –

decide this yourself.

• Pass the word when you see something unusual in the network

• Install a good virus protection software package on your computer and

keep it up to date.

• Scan for viruses regularly and stay alert – don’t let the bad guys win.

(2) TOCFE Presentation in Iowa

From Cal Halliburton, Iowa, USA

I just received confirmation that I will make a peer-reviewed presentation

at the International Technology Education Association (ITEA) Annual

Conference in Albuquerque, NM. The presentation will be Saturday, March

20, 2004, 10:30-11:45 AM. The presentation title is:

Decision Making Excellence: The TOC Model.

I have also been accepted to present at a three state regional Middle Level

Education Association conference to be held in Ames, Iowa in October,

2003. I have two sessions. One is on TOC and the other on Systematic

Creativity.

For more information contact:

Cal Halliburton

1128 Roosevelt Ave.

Ames, IA 50010-5874

Phone: 515-232-8681

Fax: 515-232-0028

Cell: 515-450-0384

E-mail: CalH42@aol.com

EDITORS’ NOTES

(3) Kay Buckner-Seal, Cheryl A. Edwards

John Suerken and Cal Halliburton, thanks for sharing with us this week!

We are eager to publish your responses to articles in TACTics, applications

of the thinking processes, lessons, announcements, and etc. We can be

reached by mail to: Cheryl A. Edwards, 2253 S. Hill Island Rd., Cedarville,

Michigan 49719, USA. Or send hyperlink to cedwards@cedarville.net or

bucknek@earthlink.net.

You may also view TACTics in its intended formatting, by visiting our web

site at www.tocforeducation.com. Click on “What’s New.”