Google has updated its online safety curriculum for youngsters with new lectures on gaming, video, and other topics

Google said today that it is upgrading and extending its Be Internet Awesome digital safety and citizenship programme, which is targeted at teaching school-aged children how to safely surf the internet. 

According to Google, the curriculum, which was first presented four years ago, now covers 30 nations and millions of children. Google has added over a dozen new lessons for parents and educators in today’s update, covering topics such as online gaming, search engines, video consumption, online empathy, cyberbullying, and more. 

The firm claims it hired the Crimes Against Children Research Center at the University of New Hampshire to assess its existing curriculum, which was last updated in 2019, when it introduced lessons aimed at teaching youngsters how to recognize misinformation and fake news. 

The evaluation concluded that the programme aided youngsters in areas such as cyberbullying, online civility, and website security, but that it needed to be improved in other areas. 

Google then revised their training materials in collaboration with internet safety specialists including Committee for Children and The Net Safety Collaborative. As a result, it now offers courses customized to certain age groups and grade levels, as well as a wider range of topics and family resources. 

Online gaming, search engines, and video consumption are among the new courses, as are social-emotional learning courses geared at helping kids deal with cyberbullying and online abuse. 

As part of an update to the program’s current media literacy resources, some of the new courses cover search media literacy — that is, knowing how to utilize search engines like Google and assessing the links and results it provides. 

Other courses include topics such as online empathy, compassion, and what to do if you come across anything distressing or improper, such as cyberbullying. 

Online gaming concepts are also woven into the new teachings, as today’s youngsters spend a lot of their time playing online games that frequently include opportunities to connect with other players in real time and communicate. 

Here, youngsters are provided with options about how to check an online gamer’s identity — for example, are they actually another kid? The papers also go through what kind of personal information should not be shared with strangers on the internet. 

The modified curriculum also directs parents to the newly created web center, families. Google, which provides a variety of advice and information about tools to assist families control their technology usage. 

For example, Google recently upgraded its Family Link app, which allows parents to set limits on which applications and when they may be used, as well as monitor screen-time activity statistics. It also launched parental control tools on YouTube earlier this year, targeting at families with tweens and adolescents who are too old for a YouTube Kids account but not yet old enough for an unsupervised experience. 

The new curriculum is now accessible on Google’s Be Internet Awesome website for parents, families, teachers, and educators. 

Share it on Social Media:

How to Combine Several Gmail Accounts?

Now you don’t need to juggle multiple email accounts when you can combine them into one. 

Each Gmail account has its own email address, contacts, and calendar. You’ve tried juggling both accounts and now want to combine them into a larger, more stable account. What are the alternatives? 

While Google does not have a way to combine two or more accounts, there are workarounds. Between the two accounts, you can forward emails, upload stored emails and addresses, and transfer your calendar appointments. Here’s how to get started. 

Forward Emails 

First, determine which Google account and Gmail address you want to hold as your main and which you don’t want to use anymore. Gmail accounts can be deleted, so you’ll probably want emails sent to that address to continue to reach you, as well as the ability to transfer messages from it. 

The first thing you can do is set up email forwarding. For the sake of clarity, I’ll point to the account you want to use as your current account and the account you don’t want to use as your old account. Go to your old Gmail account and sign up. 

Select See all settings from the Settings icon in the upper right. Select the Forwarding and POP/IMAP tab from the configuration pad. Attach a forwarding address by clicking the Add a forwarding address button and entering your current Gmail account’s address in the box. Then press the Next button. 

After that, a window will appear telling you to validate the update. When you press the Proceed button, you’ll see a message stating that a confirmation code has been sent to the other account to confirm approval. Open the confirmation email from your current Gmail account. On the next tab, click the Confirm button after clicking the confirmation key. 

You must determine what Google can do with the forwarded emails of your old account before you can completely activate email forwarding. Click the Forward a copy of incoming mail button in the Forwarding and POP/IMAP area of your old account’s Settings screen. 

To begin, choose choice 1 or 2. You can still return to this menu and pick option 3 or 4 until you know the forwarding is working properly. When you’re done, press the Save Changes button at the bottom of the page. All that’s left to do now is verify that email forwarding works. 

Send Old Emails 

You will also send emails from your old account since setting up forwarding. Go to Settings > Accounts and Import in your latest Gmail account. Click the Add another email address connection in the Send mail as line. 

Fill in the Email address section in the pop-up window with your old email address. Leave the Treat as an alias choice selected. Next Step can be accessed by clicking the button. To send a verification request, click the Send Verification button. 

Go to your old Gmail account and sign up. Copy the authentication email’s number and paste it into the relevant area in the pop-up window, then press Verify. 

When you’re ready to send an update, go to the From field and choose your old or new account as the sender address. 

Import Emails and Contacts 

Then, from your old Gmail account, you may want to import all of your stored emails and contacts to the new one. By going to Settings > Accounts and Import in your current account, you can take care of both at once. Select Import mail and contacts from the drop-down menu. 

Type your old Gmail account’s address in the pop-up window and hit Continue. Select Continue once more in the next browser. Confirm your old email address in the next window and then press Next. Go to your old Gmail account and sign up. Enable the Gmail ShuttleCloud Migration to view your old account’s emails and contacts by clicking the Allow button. The present window should be closed. 

Your import options can then appear in the other browser. The method imports your addresses, mail, and new mail for the next 30 days by default. All of these choices can be unchecked. Uncheck the ability to import new mail for the next 30 days if you’ve already allowed email forwarding. When you’re set, press the Import Now button. 

The window informs you that your messages and connections are being imported, but it also warns you that it could be several hours, or even two days, before you see any of your imported messages. Click the OK button. 

To make it easier to locate your imported addresses, your new account creates a sticker with the name of your old email address. After the import is done, go through the emails and uninstall all that you don’t like. Any imported emails can also be moved or renamed to further fit them with your current account. 

Then, in the upper right, press the Google Apps icon and pick Contacts to ensure that all of your contacts from your old account have been imported. 

Import Calendar 

Finally, you’ll also want to move your old account’s calendar meetings and activities to the current one. Login with your old account to do so. Pick Calendar from the Google Apps menu. Click the Settings icon on the calendar page and choose Settings. 

Click the Import & export setting in the left pane, then the Export tab. The export is imported to your server as an iCalendar ICS file stored in a zip file. To get to the ICS file, unzip the zip file. 

Return to your latest Google account and click on the calendar settings tab. Select a file from your computer by clicking Import & export, then Select file from your computer. Click the Import button after selecting the exported ICS format. 

The Import button will be greyed out when the calendar is being imported. Wait for the button to become active again, then update your new account’s calendar to ensure that all of your meetings and events have been imported. 

Share it on Social Media:

Dell has just fixed a 2009 driver security bug.

Five different defects in Dell’s DBUtil BIOS driver have been discovered.

After a security researcher discovered that the driver in question could be abused by an attacker to gain increased system privileges, Dell has released a patch that addresses multiple vulnerabilities in its DBUtil BIOS driver.

SentinelLabs security researcher Kasif Dekel discovered the vulnerable driver, and the team informed the PC giant of its findings in December of last year. The driver has been vulnerable since 2009, according to the US-based cybersecurity firm, though there is no evidence that its flaws have been exploited in the wild at this time.

The DBUtil BIOS driver is pre-installed on many Dell Windows laptops and desktops and is in charge of Dell Firmware Updates via the Dell BIOS Utility. It is estimated that the vulnerable driver was distributed to hundreds of millions of devices by the company via BIOS updates.

There are five distinct flaws.

Dekel discovered a collection of five flaws in the DBUtil driver, currently tracked as CVE-2021-21551 by Dell, that can be exploited to “escalate privileges from non-administrator users to kernel mode privileges.”

Two of the five flaws discovered in Dell’s driver are memory corruption issues, two are security failures caused by a lack of input validation, and one is a logic flaw that could potentially be exploited to cause a denial-of-service.

In addition to discovering these flaws, Dekel has developed Proof-of-Concept (PoC) code, which he plans to release on June 1 to allow Dell users time to apply the company’s patch.

Dekel explained Sentinel Lab’s decision to make its research public in a new blog post, saying:

“While we have not seen any evidence that these vulnerabilities have been exploited in the wild as of yet, with hundreds of millions of enterprises and users currently vulnerable, it is unavoidable that attackers will seek out those who do not take the necessary precautions. Our motivation for publishing this research is to assist not only our customers, but also the community, in understanding the risk and taking appropriate precautions.

Users should review Dell’s latest advisory and FAQ document, which contain remediation instructions for these flaws. Users should, as Dekel mentioned, install Dell’s updated DBUtil driver as soon as possible to avoid falling victim to any potential attacks attempting to exploit these security flaws.

Share it on Social Media:

Adobe help companies with third-party cookies

Why use third-party cookies when first-party data is available

As Google Chrome and other browsers prepare to end support for third-party cookies, Adobe announced the next-generation real-time customer data platform (CDP) to help brands activate known and unknown customer data.

The company’s real-time CDP allows brands to manage the entire customer profile and run seamlessly in one system without the need for third-party cookies.

As consumers become more aware of the value of the data they share online, privacy regulations such as GDPR become more and more complex.

However, at the same time, organizations are still committed to providing personalized brand experiences, usually created by tracking them from third-party cookies.

Now that Google has introduced its new tracking technology  in Chrome, brands will reduce the knowledge of unknown visitors about their digital assets, which will damage their ability to provide compelling customer experiences.

Adobe Real-Time CDP

Adobe’s real-time CDP provides brands with a centralized hub that combines different types of first-party event and attribute data to help them understand their customers more completely.

The platform allows brands to combine first-party networks, applications, and media data from publishers to build richer customer profiles. They can then use Adobe Target to create a personalized experience for visitors.

As it becomes increasingly difficult for unknown visitors to use their email or phone number to register on a brand’s website, Adobe Real-time CDP allows brands to build profiles of potential customers based on brand interaction.

This data will then be ingested by Adobe Target and used to arrange the next best content, offer or experience for them.

Adobe has also added a new feature called “segment matching” to its platform, which allows brands to expand their first-party data through partnerships.

On the other hand, lookalike audience segments allow the brand to identify other customers with similar attributes to the most well-known customers.

Through Adobe Real-time CDP, we work with brands to provide relevant, responsive and respectable through first-party data Experience.”

Brands interested in testing Adobe Real-time CDP on their own can request a demonstration of Adobe Experience Cloud on the company’s website.

Share it on Social Media:

How to use a timer to shut down Windows 10

You don’t need fancy apps in Windows 10 to shut down the machine at a specific time, but the buttons on the keyboard are perfectly secure.

 You normally need to quickly insert the command prompt after the set time period has passed so that the device automatically shuts down, but you can also get an application that will do all of the “hard work” for you.

Regardless of the solution (which I will discuss later in this article), shutting down your PC by time is a handy trick to have on hand. Let’s say you want to copy a large number of files or download some large games.

 If you’re going to sleep or leaving your desk to disturb the process, you probably don’t want the machine to run for a few hours after it’s finished.

You can schedule it to go to sleep after a certain amount of time has passed, or you can switch off the monitor’s power, but this is not the same thing.

This is assuming that the hibernation device will not cause any more problems than I’ve seen in the past.

To start using the basic method, pull up a regular command prompt and type the following:

Clearly, the [seconds] bit should be replaced with the number of seconds to wait before shutting down the device.

This means you’ll have to do some calculations. For instance:

  • 5 minutes: 300 seconds
  • 30 minutes: 1,800 seconds
  • 1 hour: 3600 seconds
  • 6 hours: 21,600 seconds

If the calculation is wrong, or you no longer need to turn off the timer, you can cancel it at any time by typing the following:

Shutdown-a

If you replace the “-s” flag with the “-r” flag, it will restart your PC instead of shutting it down, just in case you choose that route for some reason. Moreover, you can also dump commands into Windows shortcuts to avoid making a fuss again.

If you need other options, you can even create multiple shortcuts with different times.

Screenshot: David Murphy

Otherwise, I recommend checking out the open source Shutdown Timer Classic on the Windows Store if you want a quick application that can do all of this work for you. Install it and you’ll have a handy little interface for setting the countdown timer (in hours, minutes, and seconds, not just seconds):

Screenshot: David Murphy

If you try to use the shutdown timer as a very absurdly effective way to get your kids out of Mine craft while going to bed, then you can even lock the shutdown timer behind a password:

Screenshot: David Murphy

However, my favorite is the app’s unfishable countdown timer. When you need to restart the system, you will not be surprised at all. This is different from the command prompt method, which can compress the system with just a little exaggeration.

You can choose between a standalone version of Shutdown Timer Classic and a version based on the installer for Shutdown Timer Classic. I generally recommend using the former because it is more of a “as needed” application; you may not need to instal it on your device, and you may not need to start and set a shutdown timer in rare cases. When you need a period of time.

To put it another way, the Window In other words, the application’s Windows Store version can ensure that it is still up-to-date and functional—both versions are important parameters.

Share it on Social Media: