Categories Carpentry, Electrical, Industrial, Painting, Plumber

SafeTeensOnline ambassador on music and online security

Simon enjoys music and practices piano for several hours a day and also exploring how computer science can help environmental issues like the dead spots that are growing in the ocean. He believes Computer science may hold the key to saving the planet; by programming a protocell that could add oxygen to the ocean.

As a SafeTeensOnline ambassador Simon is focused on raising awareness on Internet safety and privacy to other teenagers by creating How to Videos on various topics that are relevant for his generation. Based on his personal experience associated security he is raising awareness on various security measures on online safety, so you won’t have to experience what he

https://youtu.be/U_7zgIpJVuw

Categories Electrical, Home Maintenance

SafeTeensOnline is finalist at global Impact Challenge

Vineeth Veeramachaneni’s , a delegate at the 22nd session of The Youth Assembly, reached the final round of the UN Youth Assembly’s Impact Challenge. The Challenge is open for proposals from over hundred countries looks for social impact projects seeking sustainable solutions to social, economic, and environmental challenges. The 2018 Assembly was held August 10-13 in New York City.

The Youth Assembly was created in 2002 to amplify youth engagement and participation in international dialogues at the United Nations. It fosters mutual understanding and collaboration between youth and key stakeholders in global development to support the United Nations’ Sustainable Development Goals. More than 1,000 delegates from over hundred countries attended this year.

After several rounds of application and interviews 10 finalists were selected. Vineeth presented his SafeTeensOnline project at NYU . “I just wanted to add that I am really humbled by the opportunity to present my pitch at NYU Law School in front of distinguished judges. I am really thankful to my co-finalists from India, Nepal, Brazil, Sierra Leone, South Africa, Colombia, and Canada; We had great time supporting each other and learning about our cultures and communities.” Veeramachaneni, said

Categories Electrical, Industrial

Mobile Phones and Sleep Deprivation among Teenagers

Most of us are sleep deprived. Yes I understand all the classes, extracurricular activities and Social activities take most of the time for teenagers. But when we take a closer look at this concern, inevitably we conclude that biggest influencer at play is the smart phone. Given the ubiquitous nature and wide range of services it can perform such as – Web access, gaming, music, social interactions and more – that’s understandable. According to PEW research study on average teenagers spend 1/3 of their life using screens and that’s roughly 8 hours a day. According to Sandiago state university study on sleep deprived American teenagers concluded that smartphone is the major cause for their condition. National Sleep Foundation recommends teenagers get between 8 and 10 hours of sleep nightly. Meanwhile, those who spent 5 hours daily on their devices had a 50 percent greater chance of not getting the adequate sleep.

In this video SafeTeensOnline Ambassador Sara talks about How to use features on the mobile phones so that Teenagers are more focused during driving, home work and particularly sleeping.

https://youtu.be/9HGZP7MWM-U

Categories Electrical, Plumber

Mobile Phishing and Social Engineering

Even we lock down our devices, establish network security and encrypt our e-mails we are still vulnerable to Phishing and Social engineering attacks. Recently there is news about Phishing and Social Engineering vulnerabilities with latest Justice departments Indictments related to DNC hacks.

In our “Think before your click” How to video our ambassador Sahas Gelli talks about Social engineering. In the context of information security, Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.

https://youtu.be/kOg2_MEWyGo