TACTics Journal
A Publication for and by TOC for Education Practitioners
In this week’s issue:
Connections
(1) Protecting Yourself from Viruses, John Suerken
(2) TOCFE Presentation in
Editors’ Notes
(3)
CONNECTIONS
(1) Protecting Yourself from Viruses
From John
This is an article from our webmaster John. He thought it might be
of value
to the network to understand
how to protect your computer from viruses.
This weekend I received a “movie” from someone in the network that
contained a virus. Luckily John was on
the scene and told me to completely
delete without opening—he
recognized the file name from a warning list that
had been circulated at the base.
—Kathy <suerken@cox.net>
- The TOC network has recently seen an increase in malicious
e-mail
attachments.
- Malicious attachments may take the form of a virus, Trojan horse
or
worm.
- A virus is a small program that can alter how your computer
works
without your permission.
- Viruses replicate themselves and they usually replace other good
files on
your computer.
- Viruses can affect your video, data files and audio, possibly
causing loss
of data.
- A Trojan horse hides on your computer by claiming to be
something else.
- Trojans differ from viruses in they do not duplicate themselves.
- Trojans may cause loss of data or may even steal sensitive
information
from your computer.
- A worm is similar to a virus, but it spreads without requiring a
host file
(but it is just as dangerous).
- There are several ways to tell if your computer is infected:
• Your computer could be much slower than normal
• Programs or the computer itself might not work because important
files have been deleted.
• You may see information on the display that is unusual or
unexpected
(often humorous or vulgar).
• But the best way is to run your virus protection
software, detect the
infection, and clean it.
- Ways to prevent viruses from infecting your machine (and causing
you a
lot of trouble):
• Do not leave a floppy disk in the drive when you start or turn
off your
computer.
• Write-protect your floppy disks if you are not saving data to
them
(slide the little tab in the corner)
• Be suspicious of e-mail attachments from unknown sources (and do
not
open them).
• Learn to understand the types of attachments in your e-mail
- Would Kathy normally send you a movie?
- Would Kathy normally send you an Excel spread sheet?
- If no, send her an e-mail back to ask her before you open the
attachment.
• Don’t have your e-mail program automatically open attachments –
decide this yourself.
• Pass the word when you see something unusual in the network
• Install a good virus protection software package on your
computer and
keep it up to date.
• Scan for viruses regularly and stay alert – don’t let the bad
guys win.
(2) TOCFE Presentation in
From
I just received confirmation that I will make a peer-reviewed
presentation
at the International
Technology Education Association (ITEA) Annual
Conference in
20, 2004,
Decision Making Excellence: The TOC Model.
I have also been accepted to present at a three state regional Middle
Level
Education Association conference to be held in
2003. I have two sessions. One is on TOC and the other on Systematic
Creativity.
For more information contact:
Cal Halliburton
Phone: 515-232-8681
Fax: 515-232-0028
Cell: 515-450-0384
E-mail:
EDITORS’ NOTES
(3)
John Suerken and Cal Halliburton, thanks for sharing with us this
week!
We are eager to publish your responses to articles in TACTics, applications
of the thinking processes,
lessons, announcements, and etc. We can be
reached by mail to: Cheryl A.
Edwards,
You may also view TACTics in its
intended formatting, by visiting our web
site at www.tocforeducation.com. Click on “What’s New.”