Addison Northwest School District

Technology Department

Protecting Against Malicious Code

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.

    • Viruses have the ability to damage or destroy files on a computer system and are spread by sharing an already infected removable media, opening malicious email attachments, and visiting malicious web pages.
    • Worms are a type of virus that self-propagates from computer to computer. Its functionality is to use all of your computer’s resources, which can cause your computer to stop responding.
    • Trojan Horses are computer programs that are hiding a virus or a potentially damaging program. It is not uncommon that free software contains a Trojan horse making a user think they are using legitimate software, instead the program is performing malicious actions on your computer.

Read the entire Security Tip (ST18-004) from US-CERT:


May 22 - New Maker Pages Added!

Let's combine math and food! Delicious!

Also check out the new Internet Safety page


May 17 - GApps Spring Cleaning Tips!

Great tips from John R Sowash -


May 16 - Linux Commands Cheat Sheet!

Great short list of Linux Commands


Updates and links you Should Know About by John R Sowash

  • Pocket lab on Splash Mountain: Pocket Lab is a Chromebook-friendly tool for collecting data for science projects. In this post a science teacher road Disney's most popular rides and collected acceleration data for his students.
  • The NEW Gmail has arrived! If you are a IT admin, here's how to enable the preview for your G Suite users.
  • Talk to Books: This is a pretty cool application of Google AI technology. Ask a "real language" question and get an answer from a book. Just try it!
  • What's wrong with this word problem?: This is a great blog post / video from educator Ben Rimes that demonstrates how multimedia can be used to create challenging, real-world question for students.
  • The Ultimate Guide to Google Certification: This is a free 30+ page ebook I released during my April webinar.
  • Attend a Google Certification Academy: This summer I am leading 14 Google Certification bootcamps across the country starting in May. Find an event near you!
  • Learn to Code with Grasshopper: this is a super easy and fun coding app developed by Google. I'm 83% done with the lessons! Join me!
  • The Suite Talk: This past week I was a guest on "The Suite Talk" with Kimberly Mattina to talk about Google Certifications.

For more regular updates, you can follow me on Twitter! I do my best to send out important updates as they happen.


February 12 - Virtual Training - VoiceThread

Session for School Managers and Trainers 1:00 p.m

-VoiceThread Groups and Galleries -

-Plus Free Asynchronous Anytime Online VoiceThread PD -



February 9 - Vita Learn Northwest Meeting

Exploration of Chrome Extensions (screen readers, voice to Tech, and more)

With Chris Cichoskikelly

The Web and our Civil Rights

With Jess Wisloski, Ellen Thompson, and Arik Mortenson

Here is a link to the RSVP form:

February 9. Rm 144, Essex Middle School

60 Founders Rd, Essex Junction, VT 05452


Alpine Training Slide Show


Looking for something fun to do with the kids that includes technology, and activities in class? Check it out!

6 Wintertime Activities for Kids


New (First) Edition of the Video Edition of Knowledge is Power


National Cyber Awareness System:

Multiple Ransomware Infections Reported

10/24/2017 01:16 PM EDT

Original release date: October 24, 2017

US-CERT has received multiple reports of Bad Rabbit ransomware infections in many countries around the world. This suspected variant of Petya ransomware is malicious software that infects a computer and restricts user access to the infected machine until a ransom is paid to unlock it. US-CERT discourages individuals and organizations from paying the ransom, as this does not guarantee that access will be restored. Using unpatched and unsupported software may increase the risk of proliferation of cybersecurity threats, such as ransomware.

US-CERT encourages users and administrators to review US-CERT Alerts TA16-181A and TA17-132A that describe recent ransomware events. Please report ransomware incidents to the Internet Crime Complaint Center (IC3). US-CERT will provide updated information as it becomes available.


Digital Citizenship and Safety Course

Google for Education has some great training courses on how to keep yourself safer on the internet.

Check them out! Each one is 10 - 15 minutes in length and easy to follow.

or go here for just the Videos


Want to know more tips and tricks about Chromebooks?

Check out the ChromeBook Tips page under the Knowledge is Power tab!


A great Power Teacher Pro Training Presentation including a video at the end:

Power Teacher Pro Training

Power Teacher Pro Quick Reference Card


Stay Informed: Follow this link to the Homeland Security's

"A Parent's Guide to Protecting Your Kids Online":


Cyber Quiz

Test your cyber IQ with the quiz question below.

Question: If you receive a new friend request on social media from someone you don't know, what should you do? Why?

Answer: If you receive a ‘friend’ request from someone you do not know on social media, do NOT immediately approve their request. To protect your online privacy and safety, limit your online "friends" to people you know in real life. Do some fact checking to see if this friend request is a legitimate friend or business. As nice as it is to have more "friends" and followers, consider how sensitive some of your posts and pictures may be and remember how personal some of the information may be like family names/pictures, street addresses and license plates, just to name a few. When you add unknown people to your account(s), you are potentially providing strangers with access to personally identifiable information. In turn, these new “friends” can possibly use this information against you for crimes such as identity theft or online stalking.