Episode 200 – Mining at School

Tony, Patrick and . . . OMAR are back! This is our 200th episode! Who could of thought that we would make it this far but here we are! There are plenty of stories and good topics to be had so check it out. As always you can subscribe to the IT Babble podcast using your favorite podcasting app.

  1. 200!
  2. Welcome back Omar!!
    1. What’s been going on with you and Dubai?
    2. Do you have long Covid?
  3. Patrick’s new recording set up
    1. Shure MV7 – https://www.shure.com/en-US/products/microphones/mv7 
    2. Rode PSA1 – https://www.rode.com/accessories/stands/psa1
  4. Y2K22 & Microsoft Exchange Servers – uh-oh
    1. https://www.onmsft.com/news/microsoft-working-to-fix-microsoft-exchange-bug 
    2. Thunderbird – https://www.thunderbird.net/en-US/
    3. SquirrelMail – https://squirrelmail.org/ 
  5. Amazon Alexa tells child to touch penny to live electrical plug
    1. https://www.cnet.com/home/smart-home/amazons-alexa-reportedly-suggested-10-year-old-stick-a-penny-near-an-outlet/
    2. https://nypost.com/2020/01/23/ridiculous-tiktok-penny-challenge-is-a-huge-fire-hazard/
    3. Timer test:
    4. https://hellochatterbox.com/ – A more educational focus for AI
    5. Buddha Box – https://en.wikipedia.org/wiki/Buddha_Box 
    6. Should teachers use these assistants in their classrooms?
  6. Omar’s new elective
    1. Blockchain and Cryptocurrency elective
    2. Lots of real world topics
      1. Decentralized vs. Centralized currency for example
      2. What is Blockchain
      3. Running miners for Crypto at school – be careful (lots of logistics)
        1. https://www.makeuseof.com/tag/gridseed-mini-asic-miner-review-and-giveaway/ 
        2. Not going to get rich here folks!
  7. Tony’s new network design (No More Server Room or Person Living in the Server Room)
    1. https://www.fortinet.com/

Controlling What Students Can Access

By: Tony DePrato | Follow me on Twitter @tdeprato

Recently I have been discussing multiple new security measures for academic networks. From these discussions with other schools, engineers, and suppliers, I have created set of goals to help keep the development of network security on track and within budget.

Physical Access

Physical access can be managed without a great deal of expense. The goals to reach for are:

  • We allow only the devices we have confirmed and labeled
  • We can control the number of concurrent devices a user is using on the network
  • We can identify by IP, Serial Number, or MAC Address (or a combination of the three) the owner of a device
  • We can remove a user from network access, and restrict their devices, with minimal effort
  • We have processes and procedures to register devices; users can switch devices through these processes
  • Users can only circumvent the processes by giving their login IDs, passwords, and hardware to another person

These goals do not imply the direct management of equipment; nor do they capture user data. These goals ensure that devices on the network are approved, registered, and can be clearly identified.

Achieving these goals is the first step towards the concept that accessing the network is a privilege not a right. Privileges can be revoked. If revocation is not possible, then the concept/policy cannot be enforced.


Read More @ The International Educator