<HTML>
<HEAD>
<TITLE>Re: [Year 12 IT Apps] Need ideas!</TITLE>
</HEAD>
<BODY>
<FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'>e. Spoofing to Obtain Data for Criminal Purposes?<BR>
<BR>
Zach Alexakos<BR>
<BR>
<BR>
<BR>
<BR>
On 29/10/10 12:10 PM, "Mark KELLY" <<a href="kel@mckinnonsc.vic.edu.au">kel@mckinnonsc.vic.edu.au</a>> wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE="Calibri, Verdana, Helvetica, Arial"><SPAN STYLE='font-size:11pt'>Hi all. Part of U3O2 next year is "</SPAN><FONT SIZE="2"><SPAN STYLE='font-size:10pt'>Techniques for acquiring data via websites" and I'm getting brain drain trying to work out a variety of </SPAN></FONT><SPAN STYLE='font-size:11pt'>methods.<BR>
<BR>
All I can think of is:<BR>
<BR>
<BR>
a. Further information about an item on sale at an auction site.<BR>
<BR>
b. A PDF brochure with specifications on a new car.<BR>
<BR>
c. Information on the best time to plant cabbages from a wiki.<BR>
<BR>
d. Get a large movie file from a trusted co-worker’s website.<BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
<p></p><p><b>Important - </b>This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.</p>
</BODY>
</HTML>