<div dir="ltr"><div>Date() gives the system date in a query if this helps.</div><div>Ashley</div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On 22 April 2013 10:59, Guppy, Rachael J <span dir="ltr"><<a href="mailto:guppy.rachael.j@edumail.vic.gov.au" target="_blank">guppy.rachael.j@edumail.vic.gov.au</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div lang="EN-AU" vlink="purple" link="blue" bgcolor="white">
<div>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt">Good morning,
<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt">Just looking for some help with Microsoft Access. I’m having trouble calculating Age. I can’t seem to find the correct expression to use the systems current
date to date away the date of Birth. <u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt">Any help with this calculation would be great.
<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt">Cheers<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Bradley Hand ITC";font-size:18pt">Rachael Guppy<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Bradley Hand ITC";font-size:11pt">Year 11 Coordinator
<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Bradley Hand ITC";font-size:11pt">Information Technology and Drama Teacher<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Bradley Hand ITC";font-size:11pt">Yarrawonga College P-12<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Bradley Hand ITC";font-size:11pt">P: 5744 1751<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Bradley Hand ITC";font-size:11pt">F: 5744 2277<u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="color:rgb(31,73,125);font-family:"Calibri","sans-serif";font-size:11pt"><u></u> <u></u></span></p>
<div>
<div style="border-width:1pt medium medium;border-style:solid none none;border-color:rgb(181,196,223) currentColor currentColor;padding:3pt 0cm 0cm">
<p class="MsoNormal"><b><span style="font-family:"Tahoma","sans-serif";font-size:10pt" lang="EN-US">From:</span></b><span style="font-family:"Tahoma","sans-serif";font-size:10pt" lang="EN-US"> <a href="mailto:itapps-bounces@edulists.com.au" target="_blank">itapps-bounces@edulists.com.au</a> [mailto:<a href="mailto:itapps-bounces@edulists.com.au" target="_blank">itapps-bounces@edulists.com.au</a>]
<b>On Behalf Of </b>Robert Timmer-Arends<br>
<b>Sent:</b> Tuesday, 16 April 2013 9:16 PM<br>
<b>To:</b> Year 12 IT Applications Teachers' Mailing List<br>
<b>Subject:</b> [Year 12 IT Apps] privacy and data mining<u></u><u></u></span></p>
</div>
</div>
<p class="MsoNormal"><u></u> <u></u></p>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";font-size:10pt">Hello all</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";font-size:10pt">Excellent episode of the Check Out (Ep 4 ABC Thurs 11 April 8pm) at iView
<a href="http://www.abc.net.au/iview/#/program/32372" target="_blank">http://www.abc.net.au/iview/#/program/32372</a></span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";font-size:10pt">about 17 minutes in.</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";font-size:10pt">Looking at how data mining is able to target us, how good it is getting, and where the data comes from.</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";font-size:10pt">Regards</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";font-size:10pt">Robert T-A</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<blockquote style="border-width:medium medium medium 1.5pt;border-style:none none none solid;border-color:currentColor currentColor currentColor black;margin:5pt 0cm 5pt 3.75pt;padding:0cm 0cm 0cm 4pt">
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";font-size:10pt">----- Original Message -----
<u></u><u></u></span></p>
</div>
<div>
<p style="background:rgb(228,228,228)" class="MsoNormal"><b><span style="font-family:"Arial","sans-serif";font-size:10pt">From:</span></b><span style="font-family:"Arial","sans-serif";font-size:10pt">
<a title="mark@vceit.com" href="mailto:mark@vceit.com" target="_blank">Mark</a> <u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><b><span style="font-family:"Arial","sans-serif";font-size:10pt">To:</span></b><span style="font-family:"Arial","sans-serif";font-size:10pt">
<a title="itapps@edulists.com.au" href="mailto:itapps@edulists.com.au" target="_blank">Year 12 IT Applications Teachers' Mailing List</a>
<u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><b><span style="font-family:"Arial","sans-serif";font-size:10pt">Sent:</span></b><span style="font-family:"Arial","sans-serif";font-size:10pt"> Tuesday, April 16, 2013 1:59 PM<u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><b><span style="font-family:"Arial","sans-serif";font-size:10pt">Subject:</span></b><span style="font-family:"Arial","sans-serif";font-size:10pt"> Re: [Year 12 IT Apps] (no subject)<u></u><u></u></span></p>
</div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
<div>
<p class="MsoNormal">Hi Jackson. <u></u><u></u></p>
<div>
<p class="MsoNormal">I'd guess the main technique would be phishing - the human is always the quickest and easiest weak link in any technological security chain, and some modern phishing can be VERY convincing (e.g. embedding attack code into a legitimate webpage.)<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
<div>
<p class="MsoNormal">Why Yahoo? I'd say it was purely return on investment due to bulk targets. Attack the sites with the maximum number of potential victims... the same logic is used by virus/worm writers who attack Windows instead of Mac and Linux (leading
Mac users to crow smugly and erroneously about their perceived invulnerability: it's just that the Mac userbase has not until recently been big enough to justify good hacking time.) <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
<div>
<p class="MsoNormal">And maybe Yahoo's creaking old infrastructure is weak and more easily breached? Let's see what Marissa does about it.<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
<div>
<p class="MsoNormal">Cheers<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">Mark<u></u><u></u></p>
</div>
<div>
<p style="margin-bottom:12pt" class="MsoNormal"><u></u> <u></u></p>
<div>
<p class="MsoNormal">On 16 April 2013 12:52, Jackson Bates <<a href="mailto:bates.j@wcc.vic.edu.au" target="_blank">bates.j@wcc.vic.edu.au</a>> wrote:<u></u><u></u></p>
<p style="margin-bottom:12pt" class="MsoNormal">Oh wiser ones,<br>
<br>
I'm not much of a security buff, so I'm interested: what are the various methods spammers and crooks use to infiltrate our email addresses?<br>
<br>
My guesses are brute-force / dictionary attacks (but I imagine yahoo et al. block repeated guesses or use captcha), phishing, malware/Trojans (not sure what these would do - capture keystrokes?).<br>
<br>
And do <a href="http://www.seller-service.com/" target="_blank">http://www.seller-service.com/</a> (for example) know they are hosting whatever resides at '/qlsnthcd/1tni5/gyqid3oo/x71m/1695jqh' or has it been snuck on to their server (and again, how? SQL injection
leading to access to admin panel?)<br>
<br>
Slightly off-topic, but loosely relevant to U4O2...and asking here means I don't spend the rest of the afternoon Googling it :)<br>
<br>
Aside: Why does it always seem to be Yahoo?<br>
<br>
Thanks for anything that abates my curiousity,<br>
<br>
Jackson Bates<br>
Waverley Christian College<br>
<br>
<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">-- <u></u><u></u></p>
<div>
<p class="MsoNormal">Mark Kelly<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">mark AT vceit DOT com<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><a href="http://vceit.com" target="_blank">http://vceit.com</a><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
</div>
</div>
</div>
<div style="text-align:center" class="MsoNormal" align="center">
<hr align="center" size="2" width="100%">
</div>
<p class="MsoNormal">_______________________________________________<br>
<a href="http://www.edulists.com.au" target="_blank">http://www.edulists.com.au</a> - FAQ, resources, subscribe, unsubscribe<br>
IT Applications Mailing List kindly supported by<br>
<a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html" target="_blank">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority <br><br>
<a href="http://www.vitta.org.au" target="_blank">http://www.vitta.org.au</a> - VITTA Victorian Information Technology Teachers Association Inc <br><br>
<a href="http://www.swinburne.edu.au/ict/schools" target="_blank">http://www.swinburne.edu.au/ict/schools</a> - Swinburne University<u></u><u></u></p>
</blockquote>
</div>
<p></p><p><b>Important - </b>This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.</p>
</div>
<br>_______________________________________________<br>
<a href="http://www.edulists.com.au" target="_blank">http://www.edulists.com.au</a> - FAQ, resources, subscribe, unsubscribe<br>
IT Applications Mailing List kindly supported by<br>
<a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html" target="_blank">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority <br><br>
<a href="http://www.vitta.org.au" target="_blank">http://www.vitta.org.au</a> - VITTA Victorian Information Technology Teachers Association Inc <br><br>
<a href="http://www.swinburne.edu.au/ict/schools" target="_blank">http://www.swinburne.edu.au/ict/schools</a> - Swinburne University<br></blockquote></div><br><br clear="all"><br>-- <br>Ashley Foley<div>Assistant Director of Administration</div>
<div><br>Work: 9832 4957<br>Mobile: 0488 445 331<br></div><div><br></div>
</div>
<br>
This email message does not represent the view of St Kevins College, is intended only for the addressee(s) and contains information that may be confidential and/or copyright. If you are not the intended recipient please notify the sender by reply email and immediately delete this email. Use, disclosure or reproduction of this email by anyone other than the intended recipient(s) is strictly prohibited. No representation is made that this email or any attachments are free of viruses. Virus scanning is recommended and is the responsibility of the recipient.