Word Processor

This page primarily focuses on a selective history of significant word processing software developed for personal computers.

1979, AppleWriter 1.0 for Apple II: Developed by Apple, AppleWriter was the first popular PC word processing program, though it had its quirks. It displayed text entirely in uppercase. Characters that the user signified as uppercase appeared in inverse color capitals, while characters in lowercase appeared as standard capitals.

Resultado de imagen para apple ii

1981, Bank Street Writer 1.0 for Apple II: Developed by the Bank Street College of Education in New York City, BSW went on to become the leading word processing program for the Apple II. It included displaying lower case letters!

 

1981, AppleWriter II for Apple II: Displayed lower case letters

1982, WordStar 3.0 for DOS: Originally developed by MicroPro for CP/M in 1978. It became a de facto standard. By 1984 sales hit $70 million.

1982, WordPerfect 2.2 for DOS: Originally developed for the City of Orem, Utah by Brigham Young University (BYU) in 1979, WordPerfect was first ported to DOS and sold to the general public in 1982.

1983, Word 1.0 for DOS: Originally named Multi-Tool Word.

1984, Word 1.0 for Macintosh: Released for the Macintosh.

1984, StarOffice 1.0 for DOS: StarOffice was released by the German student Marco Boerries, then 16 years old, living as an exchange student in Silicon Valley. StarOffice would later become OpenOffice.

1984, AppleWorks 1.0 for Apple II: AppleWorks was one of the first integrated office suites for personal computers, featuring a word processor, spreadsheet, and database merged into a single program.

1985, WordPerfect 1.0 for Apple II: WordPerfect was initially ported to the rising Apple II.

1986, WordPerfect 4.2 for DOS: WordPerfect surpassed WordStar as the leading word processor.

1987, Microsoft Works 1.05 for DOS: Its core functionality included a Word Processor, a spreadsheet and a database.

1989, WordPerfect 5.1 for DOS: WordPerfect released the hugely popular version of its product. The WordPerfect 5.1 file format, still on DOS, became the de facto standard for the word processing industry for many years.

1989, Word 1.0 for Windows: Released for Windows.

1991, Microsoft Works 2.0 for Windows: MS Works moved to Windows.

1991, WordPerfect 5.1 for Windows: WordPerfect’s popular DOS version was ported into Windows.

1993, Word 6.0 for Windows: Included everyone’s favorite feature – autocorrect!

1994, Novell acquires WordPerfect Corporation

1995, Word 95 for Windows: Released for Windows 95.

1996, Corel acquires WordPerfect from Novell

1999, Sun acquires StarDivision: In 2000, Sun Microsystems announced that it would make the source code of StarOffice available for download with the intention of building an open-source development community around the software and providing a free and open alternative to Microsoft Office named OpenOffice.org

1999, Word 2000 for Windows: Released part of Office 2000, Word 2000 gave Microsoft, who already led the WP sector, 90+% market share.

2005, Writely: Writely was a web-based word processor created by the software company Upstartle.

2006, Google acquires Upstartle Google integrates Writely into its software suite online, calling it Google Docs.

2010, Oracle acquires OpenOffice from Sun

2011, Oracle releases OpenOffice to Apache Software Foundation

Internet Security

Recommendations

1
Choose strong passwords. Passwords are like the key to your accounts – only the person with the key can access them. When choosing a password, you want to make sure you choose one that is unique, strong, and not easily guessed by strangers or those close to you. Choose a password that uses letters, numbers, lowercase, uppercase, and characters.
2
Be mindful when installing programs or agreeing to terms. When you sign up for newsletters, install programs, or agree to anything, read the fine print. If you do not want to receive junk mail or get put on a telemarketer list, look for a small box near the bottom of the page that asks if you want to receive information and offers from other companies.
3
Do not give out personal details to strangers. Don’t give your full name, address, or phone number to anyone online that you don’t trust or know. This is especially important in chat rooms, when negotiating jobs or deals, or making plans through meet-up sites.
4
Don’t fall prey to phishing scams. Phishing e-mails are messages that appear to be from legitimate companies, such as your bank or stores where you’ve shopped, that provide links to fake websites and ask for personal information
5
Keep your eyes peeled for online scams.Online scams crop up everywhere. These scams can pop up in e-mails, tweets, Facebook posts, and many other places. Don’t click on links that don’t look like a real address or contains a lot of letters and characters that look like gibberish.
6
Limit the information you share on social media. Facebook, Twitter, Google+, Instagram, LinkedIn, and other social media sites are part of most people’s every day lives.
These are some recommendations to follow while using the internet.
Stay safe c:

How to create a group in Yammer

Here is a tutorial to create a group with your office 365 acount.

Steps

1.- Enter to your account

2.- At the upper corner of the window, there is an icon. Click it. And also the YAMMER button.

captura2

3.- Click the ‘Create a group’.

captura3

You’ll be directed to this page.

captura4

 

4.- Choose a name for the group you want to create. The page will automatically tell you if that name is available

5

5.- Then, add the people you want to be in that group.

6

6.- You can add more friends.

 

7

7.- And also you’re allowed to make the group visible for everybody, or make it private.

8

8.- Click the CREATE button

 

And you’re done. You can personalize it if you want to.

 

 

COMPUTER SAFETY: Internet Risks

A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computerviruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all availablememory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networksand bypassing security systems

.types-of-computer-virus

1. ILOVEYOU

The ILOVEYOU virus comes in an e-mail note with “I LOVE YOU” in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient’s Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient’s hard disk.

 

 

2. Code Red

The worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system. It leaves very little trace on the hard disk as it is able to run entirely on memory, with a size of 3,569 bytes. Once infected, it will proceed to make a hundred copies of itself but due to a bug in the programming, it will duplicate even more and ends up eating a lot of the systems resources.

via F-Secure

The most memorable symptom is the message it leaves behind on affected web pages, “Hacked By Chinese!”,

3. Melissa

Named after an exotic dancer from Florida, it was created by David L. Smith in 1999. It started as an infected Word document that was posted up on the alt.sex usenet group, claiming to be a list of passwords for pornographic sites. This got people curious and when it was downloaded and opened, it would trigger the macro inside and unleash its payload. The virus will mail itself to the top 50 people in the user’s email address book and this caused an increase of email traffic, disrupting the email services of governments and corporations. It also sometimes corrupted documents by inserting a Simpsons reference into them.

melissa

4. Sasser

The worm took advantage of a buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS), which controls the security policy of local accounts causing crashes to the computer. It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically.

 

.

5. Zeus

Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man-in-the-browser keylogging and form grabbing. First identified in 2009, it managed to compromise thousands of FTP accounts and computers from large multinational corporations and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts.

 

6. Conficker

Also known as Downup or Downadup, Conficker is a worm of unknown authorship. It infects computers using flaws in the OS to create a botnet. The malware was able to infect more than 9 millions computers all around the world, affecting governments, businesses and individuals.

 

The worm works by exploiting a network service vulnerability that was present and unpatched in Windows. Once infected, the worm will then reset account lockout policies, block access to Windows update and antivirus sites, turn off certain services and lock out user accounts among many. Then, itproceeds to install software that will turn the computer into a botnet slave and scareware to scam money off the user. Microsoft later provided a fix and patch with many antivirus vendors providing updates to their definitions.

7. Stuxnet

A virus created for the purpose of cyberwarfare, as it was intended to disrupt the nuclear efforts of the Iranians. It was estimated that Stuxnet has managed to ruin one fifth of Iran’s nuclear centrifuges and that nearly 60% of infections were concentrated in Iran.

The computer worm was designed to attack industrial Programmable Logic Controllers (PLC), which allows for automation of processes in machinery. It specifically aimed at those created by Siemens and was spread through infected USB drives. If the infected computer didn’t contain Siemens software, it would lay dormant and infect others in a limited fashion as to not give itself away. If the software is there, it will then proceed to alter the speed of the machinery, causing it to tear apart. Siemens eventually found a way to remove the malware from their software.

8. Mydoom

Surfacing in 2004, Mydoom was a worm for Windows that became one of thefastest spreading email worm since ILOVEYOU.

It contains the text message, “andy; I’m just doing my job, nothing personal, sorry,”

via Virus.Wikidot.com

The worm spreads itself by appearing as an email transmission error and contains an attachment of itself. Once executed, it will send itself to email addresses that are in a user’s address book and copies itself to any P2P program’s folder to propagate itself through that network. The payload itself is twofold: first it opens up a backdoor to allow remote access and second it launches a denial of service attack on the controversial SCO Group. It was believed that the worm was created to disrupt SCO due to conflict over ownership of some Linux code.

9. CryptoLocker

 

 

The ransom operation was eventually stopped when law enforcement agencies and security companies managed to take control part of the botnet operating CryptoLocker and Zeus. Evgeniy Bogachev, the ring leader, wascharged and the encryption keys were released to the affected computers. From data collected from the raid, the number of infections is estimated to be 500,000, with the number of those who paid the ransom to be at 1.3%, amounting to $3 million.

10. Flashback

Though not as damaging as the rest of the malware on this list, this is one of the few Mac malware to have gain notoriety as it showed that Macs are not immune. The Trojan was first discovered in 2011 by antivirus company Intego as a fake Flash install. In its newer incarnation, a user simply needs to have Java enabled (which is likely the majority of us). It propagates itself by using compromised websites containing JavaScript code that will download the payload. Once installed, the Mac becomes part of a botnet of other infected Macs.

 

ANTIVIRUS

Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.

Resultado de imagen para antivirus virtual

SOURCES:

http://www.hongkiat.com/blog/famous-malicious-computer-viruses/

https://www.webroot.com/us/en/home/resources/tips/pc-security/security-what-is-anti-virus-software

http://www.webopedia.com/TERM/V/virus.html

http://searchsecurity.techtarget.com/definition/ILOVEYOU-virus

http://virus.wikia.com/wiki/CodeRed

Cloud Storage

 

private-cloud

It refers to saving data to an off-site storage system maintained by a third party. Instead of storing information to your computer’s hard drive or other local storage device, you save it to a remote database. The Internet provides the connection between your computer and the database.

The origins of the word “cloud” in relation to computers is obscure, it appears that the use of stylised clouds in early network diagrams made some users call networks clouds. As the internet is a large network, some early adopters in the 90’s called the internet “the cloud”. This phrase was then given to today’s online storage solutions.

There are three main cloud-based storage architecture models: public, private and hybrid.

 

Uses for cloud storage

1. Access your documents – anywhere

Cloud storage enables you to open a document on any of your devices and in any location.  No longer are your documents in the wrong place; providing you have internet access, you have your documents. This universal access gives you the flexibility to work where and when you want. Gone are the days of having to use email to transfer documents between home and work (with the inevitable issues associated with version control).

a378d5e2f7163cc91ffd776d8cdcb022

2. Work with others – anywhere

The capability allowing multiple people to collaborate and work on a document at the same time is revolutionising how teams work. This new affordance can deliver terrific improvements in efficiency. Typically, writing bids or tender documents can takes weeks to prepare as the document is passed between departments and authors; this can be reduced to a few days when all parties can work on the same document at the same time.

3. Take advantage of unlimited space

The cloud has virtually unlimited storage. Furthermore, services such as Amazon Web Services S3 storage can be set up with policies to control and automate access and archiving. No matter how large your local storage is, it seems to fill up – this isn’t a surprise as we are storing more and more multimedia data in the form of video, image and audio files. From a business efficiency perspective, storing your documents in the cloud removes the need for every user to hold a personal copy of documents, consequently saving disk space, and all users know they have the current version.

 

4. Enjoy business continuity – and backups that work

Having a copy of documents, systems and software keys backed up onto cloud storage typically costs less than burning it onto a DVD, and makes it all accessible from anywhere on the internet. Making an off-site copy of your data on a daily basis gives you more than a backup; it should be considered the cornerstone of your business continuity planning.

In the event of fire, theft or hardware failure, having your data stored in the cloud could get your business up and running again for the cost of a new computer.

5. Data security is a priority

Storing your data in the cloud introduces a new set of risks, but you can mitigate them using techniques such as data encryption, automation and password devices on your smart phone. The result is that cloud storage typically has a lower risk profile than the server in the back of your office.

Like taxes and growing old, data loss is not a question of if, but when. Data security is about protecting your data from loss, corruption and inappropriate access. Reducing the number of copies of documents, holding them off site and enforcing encryption can only help.

Benefits and Disadvantages of Cloud Storage

There are many benefits to using cloud storage, most notable is file accessibility. Files stored in the cloud can be accessed at any time from any place so long as you have Internet access. Another benefit is that cloud storage provides organizations with off-site (remote) backups of data which reduces costs associated with disaster recovery .

Unfortunately, the biggest disadvantage to cloud storage is that users are limited by bandwidth. If your Internet connection is slow or unstable, you might have problems accessing or sharing your files. Organizations that require a large amount of storage may also find costs increase significantly after the first few gigabytes of data stored.

 

SOURCES:

http://www.webopedia.com/TERM/C/cloud_storage.html

http://searchcloudstorage.techtarget.com/definition/cloud-storage

http://computer.howstuffworks.com/cloud-computing/cloud-storage.htm

http://www.barclays.co.uk/Startupsupport/Five-killer-reasons-to-use-cloud-storage

http://blog.livedrive.com/2012/08/what-is-cloud-storage/

How to make a video blog?

Hey there! I’m me(?, the person running this blog.

Well, I particulary don’t know how to make a video blog, but with internet, everything is possible!

Here is a video that is sort of useful. And it works if you are a beginner at this-probably you are, otherwise, you wouldn’t be reading this, but maybe you are the teacher(?-

 

 

And here’s part II

The Fun They Had…

Click to access thefuntheyhad.pdf

The story is unreal, for our times, at least, but, who knows, the future holds tons of different things, from education, hobbies, bussines. Perhaps the school will no longer a building, full of kids that don’t wanna study, instead, become a ‘home learning’ thing.

The story is related to social media because it doesn’t exist there.

If social media wouldn’t exist, -apparently, that’s what happens in the story- the teachers wouldn’t be like that, just a computer that doesn’t even treat you with love. Although a lot of teachers neither do it.

If social media existed, the kids maybe still wouldn’t go to school, but at least, they’d have online teachers, still via ‘technology’, at least humans.

If I was Margie, I wouldnt like that kind of ‘school’, they are not learning the same things as today, talking about social life, even knowledge. There are a lot of kids that don’t like going to school, but still, I prefer going than do it at home.

 

Social Media in Education and learning.A real tool, or a time waste?

 

dae2410a8c2e8e7347ccbb48d7891a55c9de6227_hqNo one can deny the impact social media sites have had on the everyday internet user.

Using and updating Facebook, Twitter, YouTube, LinkedIn, Pinterest and Spotify is now everyone’s second nature. Many users view social media as a way to connect and make friends, and as a valuable marketing tool. Others view time spent on social media sites as voyeurism, and worse, a complete waste of time. However, no one can deny the potential and real-world usefulness of social media tools.

 

I would not consider it a waste of time. I have never heard someone say so. It makes education more complete and easier.

 

Learning management systems such as Moodle and Blackboard have become immensely popular in universities in recent years as a means to distribute lecture notes and other course information, as a portal for students to upload assignments and check them for plagiarism, and as a chat forum where students can communicate with their lecturers, and with each other.

It can be a distractor, but the pros win.

mqdefault

Sources:


http://www.bbcactive.com/BBCActiveIdeasandResources/Howsocialmediaischangingeducation.aspx

http://www.ispringsolutions.com/blog/10-social-media-tools-ideal-for-e-learning/