[Year 12 IT Apps] Current Date calculation

Guppy, Rachael J guppy.rachael.j at edumail.vic.gov.au
Mon Apr 22 10:59:23 EST 2013


Good morning,

Just looking for some help with Microsoft Access. I'm having trouble calculating Age. I can't seem to find the correct expression to use the systems current date to date away the date of Birth.
Any help with this calculation would be great.

Cheers

Rachael Guppy
Year 11 Coordinator
Information Technology and Drama Teacher
Yarrawonga College P-12
P: 5744 1751
F: 5744 2277



From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au] On Behalf Of Robert Timmer-Arends
Sent: Tuesday, 16 April 2013 9:16 PM
To: Year 12 IT Applications Teachers' Mailing List
Subject: [Year 12 IT Apps] privacy and data mining

Hello all

Excellent episode of the Check Out (Ep 4 ABC Thurs 11 April 8pm) at iView http://www.abc.net.au/iview/#/program/32372
about 17 minutes in.

Looking at how data mining is able to target us, how good it is getting, and where the data comes from.

Regards
Robert T-A


----- Original Message -----
From: Mark<mailto:mark at vceit.com>
To: Year 12 IT Applications Teachers' Mailing List<mailto:itapps at edulists.com.au>
Sent: Tuesday, April 16, 2013 1:59 PM
Subject: Re: [Year 12 IT Apps] (no subject)

Hi Jackson.
I'd guess the main technique would be phishing - the human is always the quickest and easiest weak link in any technological security chain, and some modern phishing can be VERY convincing (e.g. embedding attack code into a legitimate webpage.)

Why Yahoo?  I'd say it was purely return on investment due to bulk targets. Attack the sites with the maximum number of potential victims... the same logic is used by virus/worm writers who attack Windows instead of Mac and Linux (leading Mac users to crow smugly and erroneously about their perceived invulnerability: it's just that the Mac userbase has not until recently been big enough to justify good hacking time.)

And maybe Yahoo's creaking old infrastructure is weak and more easily breached?  Let's see what Marissa does about it.

Cheers
Mark

On 16 April 2013 12:52, Jackson Bates <bates.j at wcc.vic.edu.au<mailto:bates.j at wcc.vic.edu.au>> wrote:
Oh wiser ones,

I'm not much of a security buff, so I'm interested: what are the various methods spammers and crooks use to infiltrate our email addresses?

My guesses are brute-force / dictionary attacks (but I imagine yahoo et al. block repeated guesses or use captcha), phishing, malware/Trojans (not sure what these would do - capture keystrokes?).

And do http://www.seller-service.com/ (for example) know they are hosting whatever resides at '/qlsnthcd/1tni5/gyqid3oo/x71m/1695jqh' or has it been snuck on to their server (and again, how? SQL injection leading to access to admin panel?)

Slightly off-topic, but loosely relevant to U4O2...and asking here means I don't spend the rest of the afternoon Googling it :)

Aside: Why does it always seem to be Yahoo?

Thanks for anything that abates my curiousity,

Jackson Bates
Waverley Christian College

--
Mark Kelly
mark AT vceit DOT com
http://vceit.com

________________________________
_______________________________________________
http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
IT Applications Mailing List kindly supported by
http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html - Victorian Curriculum and Assessment Authority <br>
http://www.vitta.org.au  - VITTA Victorian Information Technology Teachers Association Inc <br>
http://www.swinburne.edu.au/ict/schools - Swinburne University

Important - This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/itapps/attachments/20130422/2ed2ce95/attachment.html 


More information about the itapps mailing list