%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 15 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240521174841+00'00') /ModDate (D:20240521174841+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 3080 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 347.239 521.469 399.495 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 347.614 520.719 398.745 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(PLAY AND LEARN: APPS FOR CHILDREN)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(After watching Barney, the dinosaur, or Lollos, the unidentifiable creature with the big ears, sing the same )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(song for the twenty-seventh time this week, most parents would be desperate to find something else. Even if )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(it's only to preserve their own sanity.)] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(Gone are the days when television and videos were the only available options for frustrated parents. Today )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(technology provides another platform for distractionand one which also has the ability to educate. Phones )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(and tablets can conveniently be loaded with apps, games, and movies.)] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(The biggest challenge for parents is choosing the best, most appropriate, safest and most educational apps, )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(which will alsohold their child's attention for as long as possible.)] TJ ET BT 61.016 449.121 Td /F3 9.0 Tf [(PC Advisor,)] TJ ET BT 111.029 449.121 Td /F3 9.0 Tf [(one of the United Kingdom's leading technology and media companies, attempted to make this )] TJ ET BT 61.016 438.132 Td /F3 9.0 Tf [(choice easier. With the help of a group of parents, they compiled and published a list of 46 apps on their )] TJ ET 0.373 0.169 0.255 rg BT 61.016 427.143 Td /F3 9.0 Tf [(website)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 425.992 m 91.526 425.992 l S 0.400 0.400 0.400 rg BT 91.526 427.143 Td /F3 9.0 Tf [(. The apps are divided into sections for babies, toddlers, primary school scholars and teenagers. )] TJ ET BT 61.016 416.154 Td /F3 9.0 Tf [(Don't feel left out, there's also a section for kids of all ages.That means you can also play along.)] TJ ET BT 61.016 396.165 Td /F3 9.0 Tf [(Do you have any suggestions for fun and educational apps? Let us know at )] TJ ET 0.373 0.169 0.255 rg BT 363.191 396.165 Td /F3 9.0 Tf [(bits.bytes@sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 363.191 395.014 m 448.862 395.014 l S 0.400 0.400 0.400 rg BT 448.862 396.165 Td /F3 9.0 Tf [( and we'll add your )] TJ ET BT 61.016 385.176 Td /F3 9.0 Tf [(suggestions to our next article.)] TJ ET BT 61.016 365.187 Td /F3 9.0 Tf [(Posted in:Apps,Communication | Tagged:Apps,Children,Education | With 0 comments)] TJ ET q 52.500 0 0 150.750 498.484 422.074 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 426.3106 91.5257 435.4681 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://www.pcadvisor.co.uk/test-centre/google-android/best-kids-apps-2016-best-apps-for-children-ipad-iphone-android-may-3464905/) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 363.1907 395.3326 448.8617 404.4901 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (mailto:bits.bytes@sun.ac.za) >> endobj 15 0 obj << /Type /XObject /Subtype /Image /Width 70 /Height 201 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 6440>> stream ExifII*Ducky<+http://ns.adobe.com/xap/1.0/ Adobed       F !1aAQ"2qBRr3b#s4U6VCc$!1AQaq"2RB#4br3 ?MDQDEDQDEEDGDGDGDGDGD@2t EeDXOODZd1"*@I& &*S2coaT5=U˲grzTcϤgu.FlRG=O: ׎nFl?%j!:.;w$??X~?ܽZ~!q*~?ܽmmٶ7M90,=+taQ8PSz꟒]ZɉW7B[,yQUeXmlܩLo`?D E*B<Ǎv֕ ;h-}-齮fLf/o'ih/i8_= KcFs*rs+zJw0 wvf_{b4@"X?ft#M|۾빳28q5\ZFJ/4u{[*/,${ݷxOXd| ӎ޽7Hu|C9.rzHW@rhTg]߸mȅHIUUzՅ^iLXOODJĄ4 V;QQ2/bNV>o*li|xgX{&;+.H pQda]Oڑ~O-ܦ:#:@}aұA=޶mq6WҼL5w#6)qIZejȚ:L\.Vk 26NV-tvlWQ9ٌ(3M24ˆ_ǎen{J:[qv}8hZE I+GEvMZ5Ť.-M"@ #J@vww p>JFGDžG/#<اqC ;Yrx"(՘0hd G2pnpk\O*C3Ocv{V = Oyo۵p[ \uov..B ^g;'R(Ok~ sX]n7o`tN bAUSY絆; ([)F^؅pݼO}sh#dfAOOJN&)ui)eaNki8@-󰾵`-3Oq;W]쫝v(-uiN`5Q1F_pd{[{m=$3JvrۧSqg;{P42$s8gHx>#Jgy<]ͅ־r9Jz VlqQn:7dT<&e?[Z?h#~ocxQõu϶ύٷ*o~J"R~(f{ŞRծO*,+!<h__v+PYZ ^;da'3_\FF.QU#*GL-n L8 Wcm-.]U`U@,*%)5Al^ւI'VmUƀ%NގkX❬KU\#rkl| f#_!TWs+6R%Wkcf ԇOK~W=ܣQ_ґ4}ަ+YvhuWB.B7HȂEURHj|+;tvK \$N.ĒM_|UXOODU>w^Ut 4N$̺7uoxr¡yeN/F1sh#\ut E^Jsb&++ώ[}7 }4gFXۃ/yr-wG1F WMjF]l4V_tݰ`sݘɽ+ no - [@|Wc+nOPɶ- t[Qr|ܫT^;{'u(Rlկ]^Sg5K5q[HVEc/3y}ͷkoAiT4=E΍D_9w\⑨QͧNn5qJwDsEǻDG1-DQb;E(']_ 9$31I5!)B٠:T_MMU.mXs8]A1A].険1h[[9bb&ye@>2 5>owi.f,5he1ЀGV{!q>>x-cQ!S3 -,y m(OTYc\~K)leZ4GYQU}` GeQJ0\ @Ⓚ)a}x'nL1r33*0, Uϭ1VqDڞ*Ͷ?tZg!T`.>?mmC=T^@i'e,2v_2 mn㝺5LJ #RH*Q'jK%Κi"|IX<>fcQc.nKṷ_8,Ԥ19\kY 8;h5i!~ݥ&A]/ɥ3'k) `+&YVMLcJ.yc*bc ;Fs'?Jk\ ;>\{ˠ\c^ %܎;(%jJ>e5A.Nmmө/<գxT5Ozaٻ^a%6q4H-y2WHF /Z;ߝK\R(%O^~o{޷XC@iC;#w ܽg"tH١$UUזl{<+pߓ̣Hݮ$*K"ߴ8( WEGv~cV1nrnސ\e.:X]HViy2zXܕOԴϚqU*Ҋ"Uus8 ?^~g*fuo"{u,>!y6O^BNgSj, jv|]AT>5,Tm*Ŵ[i[ 7,/`@fDX]G ۬Wq.~Bݭ&~EuIe}tUtn2ǩ9@7f" 28{Z2nud+ڂ> (QWncrU>oR>iTJ(vIkʣ#ʤyUс#RɎRF}@xS ո x>1]ݠ"<>"<>"<>"<>"<>"Έ"(""(""(""(""( endstream endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000321 00000 n 0000000358 00000 n 0000000493 00000 n 0000000582 00000 n 0000003714 00000 n 0000003826 00000 n 0000003933 00000 n 0000004049 00000 n 0000004175 00000 n 0000004356 00000 n 0000004484 00000 n 0000004563 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 11170 %%EOF Communication « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Communication

Whatsapp scams

Wednesday, November 23rd, 2016

WhatsApp is a popular communication tool, used by students and personnel every day. On the downside, it provides cyber criminals with another way to convince you to part with your well-earned money and unfortunately it’s usually quite convincing.

WhatsApp scams come in many different forms and are often very convincing. Just make sure that you stay vigilant and don’t fall for anything that seems too good or too worrying to be true. Just because a friend or a family member sends you something, it doesn’t mean that it is safe.

Voucher scams

A message arrives in your WhatsApp from someone who looks like your friend, recommending a deal they’ve found. The messages usually come with a link that actually takes you to another website and tricks you into giving your personal information. Don’t ever click a link you’re not sure of and certainly don’t ever hand over personal information to a website you haven’t checked.

WhatsApp shutting down

There are many fake messages claiming that WhatsApp is going to end unless enough people share a certain message. The messages often look convincing, claiming to come from the CEO or another official. They’re written using the right words and phrases and look like an official statement. Any official statement wouldn’t need users to send it to everyone like a round robin. You would either see it in the news or it’ll come up as a proper notification in the app from the actual WhatsApp team.

WhatsApp threatening to shut down your account

This is very similar to the previous scam. It looks like an official message that claims that people’s WhatsApp accounts are being shut down for being inactive. Sending the message on will prove that it’s actually being used and often instructs people to pass it along.

WhatsApp forcing you to pay

Similar to the previous scam, with the only difference being that the message supposedly exempts you from having to pay for your account – if you send it on to other people.

WhatsApp Gold or WhatsApp Premium

The claim suggests that people pay for or download a special version of WhatsApp, usually called Gold or Premium. It offers a range of exciting-sounding features, like the ability to send more pictures, use new emoji or add extra security features. The problem is that it is far from secure. Downloading the app infects people’s phones with malware that use the phone to send more fake messages at the cost of the original victim.

Emails from WhatsApp

Spam e-mails are bad enough. E-mails plus WhatsApp is even worse. There’s a range of scams out there that send people e-mails that look like they’ve come from WhatsApp, usually looking like a notification for a missed voice call or voicemail. But when you click through, you will end up getting tricked into giving over your information, passphrases etc. Don’t ever click on an e-mail from a questionable sender. WhatsApp doesn’t send you e-mails including information about missed calls or voicemails.

Fake WhatsApp spying apps

Currently, it is not possible to let people spy on other’s conversations on WhatsApp, because it has end-to-end encryption enabled, which ensures that messages can only be read by the phones that send and receive them. These scam apps encourage people to download something that isn’t actually real and force people to pay money for malware, or actually read your chats once they’ve got onto your phone.

Lastly – 

Hopefully, you have  already blocked sharing your WhatsApp details with Facebook (telephone number, name etc. and allowing Facebook to suggest phone contacts as friends) and Facebook will not be able to  make your WhatsApp account accessible to the 13 million South African Facebook users.

There are some details about this controversial policy change by WhatsApp on the following page: http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949

 

[ARTICLE BY DAVID WILES]

 

 

Beat the cyberbully

Friday, November 11th, 2016

bully-655659_960_720Cyberbullying is deliberately and repeatedly harming or harassing someone using electronic technology  – this includes devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social media sites, text messages, chat, and websites. 

With the increased use of communication technology, cyberbullying has become increasingly common, especially among teenagers. While the term cyberbullying is used predominantly for children or teenagers, cyberstalking or cyberharassment is when the same behaviour occurs in adults. 

What is cyberbullying or -stalking?

The main goal of this harassment is to threaten a person’s reputation, employment, earnings, safety or try to turn people against them. Cyberbullies aim to intimidate, hurt, control, manipulate, humiliate or falsely discredit someone. Their actions are deliberate, hostile, usually repeated and intended to harm.

Cyberstalkers use public forums, social media or online information sites to launch their attacks on. Online platforms provide anonymity and bullies can remain ignorant of the consequences their attacks have on the victims. According to the National Council on Crime Prevention’s survey, 81% of teenagers thought others cyberbully because it’s funny. 

Cyberbullying can come in various forms. It can be someone repeatedly sending e-mails or text messages even when the person clearly stated they don’t want them. It can include repeated threats, sexual remarks, hate speech, false accusations or ridiculing someone.

Some bullies/stalkers will even go so far as to hacking into a site and changing information or posting false statements to humiliate or discredit a person. They may also publicise a victim’s personal data or create a fake account to use to defame, discredit or humiliate them.

The 8 most common cyberbullying tactics used by teens according to www.wikipedia.org are the following:

  1. Exclusion: Teenagers intentionally exclude others from an online group.
  2. Cyberstalking: Teens will harass others by constantly sending emails, messages, or tagging others in posts they don’t want to be tagged in.
  3. Gossip: Post or send cruel messages that damage another’s reputation, relationships, or confidence.
  4. Outing/Trickery: Trick another teen into revealing secrets or embarrassing information which the cyberbully will then share online.
  5. Harassment: Post or send offensive, insulting, and mean messages repeatedly.
  6. Impersonation: Create fake accounts to exploit another teen’s trust. They may also hack into an account and post or send messages that are damaging to the person’s reputation or relationships.
  7. Cyber Threats: Threaten or imply violent behaviour toward others to make them feel uncomfortable.
  8. Flaming: Fights online that involve hateful or offensive messages that may be posted on various websites, forums, or blogs.

More definitions of cyberbullying can be found on The Centre for Justice and Crime Prevention’s website.

Who are the bullies?

The root of cyberbullying is the same as face-to-face bullying. The only difference is the convenience and anonymity of technology which makes it even easier.

Usually, a bully will know their victim and attack them because of their own prejudice, whether it’s race, religion or sexual orientation. Or merely because they’re “not cool” or they didn’t like something they said on social media. 

It’s important to keep in mind that, in general, a bully’s behaviour stems from their own problems or issues. According to Stopbullying.gov, there are two main groups who harass others. Popular kids or teens bully because they think it will make them more popular or hurting others give them a false perception of power. At the other end of the spectrum are those who bully because they are victims of bullying themselves and it’s their way to lash out. 

How to beat cyberbullying or cyberstalking

In most countries, cyberstalking has the same consequences as physical stalking. South Africa does not have specific legislation dealing with cyberbullying. The victims of cyberbullying, therefore, have to rely on criminal law and/or civil law. More information on these laws can be found on The Centre for Justice and Crime Prevention’s website.

For this reason, it’s important to deal with cyberbullying as soon as it rears its head. The video below provides some valuable hints in this regard.

 

[SOURCES: http://www.bullying.co.uk/cyberbullying/, http://www.deletecyberbullying.org/why-do-people-cyberbully/, http://www.cyberbullying.org.za/south-african-law.html]

 

Google says Allo

Friday, September 30th, 2016

alloWe’ve seen Google grow from a small company developing a search engine to one known for its groundbreaking work, developing not only technology for today but also self-driving cars and virtual reality platforms for the future. 

Rich Miller of Data Centre Knowledge estimated that in 2011 Google was running more than one million data centres around the world. Not bad for a company that started off as a research project by two PhD Stanford University students, Larry Page and Sergey Brin, in 1996.

On 21 September they added a new phone-based chat application, Allo, to their list of innovations. 

Much speculation has been made as to why Google would launch a stand-alone app that can only be used on mobile devices and can’t be integrated with other devices. Some claim Allo is their attempt at breaking into the Indian market, the 3rd largest in the world after China and the US. And as we all know, censorship in China doesn’t allow much in the line of western technology, hence Google’s focus on India. 

One of the advantages of using Google products is that it can be accessed over all platforms with your Google account. This is not the case with their latest brainchild.  Allo won’t recognise you as a Google user. In fact, you have to register anew, without an option to register with your Gmail address. Allo, like Whatapp, uses your mobile number as a form of recognition instead of an e-mail address. 

Allo does not replace the less-than-perfect Google Hangouts. It doesn’t do video chat or send SMSs. Another app, Duo, which is used exclusively for video, was released at the same time as Allo. So why install Allo at all? There are some positive points to be made. 

Google’s machine learning technology might be the main reason why Allo downloads passed the million mark this week. Allo introduces Google Assistant, an integrated, smart search bot embedded in your chat. It enables access to information without opening an additional tab or alternatively, you can start a private conversation by typing @google and asking a question. Think of it as Siri for Android, only more efficient. 

Other nice-to-haves include whisper/shout, a tool enabling you to change the size of your text by holding down the Send button and dragging your finger upwards. Not revolutionary, but possibly useful if you’re in a hurry. 

If verbal communication is not your strength, Allo has a large collection of sticker packs you use to express yourself with visually. The new Ink feature also allows you to draw on or add text to photos.

On a practical level, Allo uses Smart Replies, a tool which apparently thinks for you. By tracking your most used phrases and words, it predicts what your replies might be. Almost like autocorrect, only more clever and less embarrassing.

Lastly, there’s Incognito mode

Initially, when Allo was announced earlier this year, Google claimed that conversations would automatically be deleted after a specific time, as set by you. 

However, when Allo was released this week, Google changed their mind. They announced that the current version of Allo will store messages indefinitely on Google’s servers to enable them to collect data to improve their products. Unless you decide to delete your messages, they will stay on Google’s servers.  It’s this announcement that prompted Edward Snowden to warn the world against installing Google Allo.

The good news is you can still use Incognito Mode, which is end-to-end encrypted and will not store your messages. A good thing if you are sensitive about your data being potentially accessible to a third party or if you are Edward Snowden.

Google Allo can be downloaded from the Google Play store.

SOURCES:

https://en.wikipedia.org/wiki/Google_Allo
http://arstechnica.com/gadgets/2016/09/google-allo-is-incomplete-but-assistant-is-the-companys-future/
http://www.pcadvisor.co.uk/new-product/google-android/what-is-google-allo-what-is-google-duo-google-allo-available-now-3640590/
http://arstechnica.com/gadgets/2016/09/google-allos-limitations-explained-in-one-word-india/
http://www.androidauthority.com/google-allo-717745/
http://www.techradar.com/how-to/phone-and-communications/mobile-phones/how-to-use-google-allo-1329437

E-mail on the cloud

Thursday, September 29th, 2016

cloudAt the end of July we announced that university e-mail will soon be hosted in the cloud. Most of our Tygerberg staff were successfully migrated and are already active on Outlook via Office365. Next up is Stellenbosch.

Benefits of cloud e-mail include:
• Larger mailboxes and storage space.
• E-mail and storage space are accessible from anywhere in the world where there is internet access.
• E-mail and storage space are backed up in the cloud.

The only consideration is dependability on internet quality, as the service is hosted in the cloud. 

Mailboxes will be moved per department and each department will be notified via e-mail ahead of time when their e-mail will be moved. Little, if any disruption or downtime are anticipated during the migration period. 

After your mailbox has been moved, Outlook will prompt you to enter a password. Please enter your full e-mail address (e.g. username@sun.ac.za), password and select the Remember credentials option. There is a possibility that e-mail settings on your mobile device might have to be changed. We have also compiled a selection of FAQs if you have any problems. More technical instructions, if needed, are available on the IT self-help site.

User support might be necessary for devices with outdated software and our support team is ready to deal with these cases. However, please note that standard SU devices with Windows and asset numbers have to be attended to first and will be given priority. Non-standard devices, for example, Apple and Linux operating systems or private devices without asset numbers can only be attended to once we’re done with them.

If you have any questions or feedback, please contact the IT Service Desk at 021 808 4367 or help@sun.ac.za

Play and learn: apps for children

Friday, July 22nd, 2016

kids-appsAfter watching Barney, the dinosaur, or Lollos, the unidentifiable creature with the big ears, sing the same song for the twenty-seventh time this week, most parents would be desperate to find something else. Even if it’s only to preserve their own sanity. 

Gone are the days when television and videos were the only available options for frustrated parents. Today technology provides another platform for distraction and one which also has the ability to educate. Phones and tablets can conveniently be loaded with apps, games, and movies. 

The biggest challenge for parents is choosing the best, most appropriate, safest and most educational apps, which will also hold their child’s attention for as long as possible.

PC Advisor, one of the United Kingdom’s leading technology and media companies, attempted to make this choice easier. With the help of a group of parents, they compiled and published a list of 46 apps on their website. The apps are divided into sections for babies, toddlers, primary school scholars and teenagers. Don’t feel left out, there’s also a section for kids of all ages. That means you can also play along.

Do you have any suggestions for fun and educational apps? Let us know at bits.bytes@sun.ac.za and we’ll add your suggestions to our next article. 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.