{"id":3158,"date":"2016-09-01T10:57:31","date_gmt":"2016-09-01T14:57:31","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3158"},"modified":"2016-09-01T10:57:31","modified_gmt":"2016-09-01T14:57:31","slug":"3158","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/01\/3158\/","title":{"rendered":""},"content":{"rendered":"<p>Article:\u00a0<b>Students can use the dark web to cheat their way through school<\/b><\/p>\n<p>Link:\u00a0http:\/\/www.businessinsider.com\/students-can-use-the-dark-web-to-cheat-their-way-through-school-2016-8<\/p>\n<p><span style=\"font-weight: 400\">I work in education, K-12 and this article is a constant reminder to me on how students are constantly one step ahead of us. \u00a0\u00a0Sure, I know some of the kids in the schools who have a interested in computers, and some I have actually taken under my wing and worked to provide them proper resources to explore their passion. \u00a0\u00a0Years back I had a student who used a USB key to boot a teacher workstation and hack the SAM to get the local administrator password. \u00a0\u00a0The student didn\u2019t do anything with it, but showed the teacher what he had done. \u00a0\u00a0Kind of a, \u201chey, look how smart I am\u201d gesture. \u00a0\u00a0So, we put that student into an independent study program for computer networking, and to this day, I still keep in touch with the student who is now in college. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">But this offers a whole new level of hacking. \u00a0Not only am I on the lookout for those students who will tinker and hack themselves, but any student can pay for the service, if they want to take advantage of it. \u00a0\u00a0Security is a constant life of catch up. \u00a0\u00a0We can\u2019t fix an issue, until we know it\u2019s an issue and we are constantly chasing after the next generation of kids who know more then us. \u00a0\u00a0And kids sometimes have nothing better to do than sit in class and \u201ctinker\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This is just plain and simple fact. \u00a0At my school, we work very hard to educate students about the rights and wrongs of use. \u00a0\u00a0I can attempt to stop as much unethical behavior as I want, but the reality is that I can\u2019t. \u00a0\u00a0So, education on what is the proper use is paramount! \u00a0\u00a0\u00a0But at the end of the day, we can make it tough for students to cheat\/hack\/etc, but anyone intend on real harm can either do it themselves if they have the skill, or hire a professional to get it done!<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article:\u00a0Students can use the dark web to cheat their way through school Link:\u00a0http:\/\/www.businessinsider.com\/students-can-use-the-dark-web-to-cheat-their-way-through-school-2016-8 I work in education, K-12 and this article is a constant reminder to me on how students are constantly one step ahead of us. \u00a0\u00a0Sure, I know some of the kids in the schools who have a interested in computers, and some [&hellip;]<\/p>\n","protected":false},"author":12789,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3158","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/12789"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3158"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3158\/revisions"}],"predecessor-version":[{"id":3159,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3158\/revisions\/3159"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}