Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Contents contributed and discussions participated by yc c

Contents contributed and discussions participated by yc c

yc c

Scrubly - Remove Duplicate Contacts (and give them away!!!) - 0 views

  •  
    If you want your friends to be spammed.. Terms of use: "Scrubly shall own all right, title and interest in and to all derivative works and compilations of User Content that are created by Scrubly, including all worldwide intellectual property rights therein... "
yc c

Illumio Homepage - 0 views

  •  
    How Exposed Is Your Data Center? Your custom report will show you: A map of application communications, including those that are unauthorized Which of your high-value applications are vulnerable An action plan to quickly eliminate the attack surface inside your data center and cloud
yc c

Single Sign On & Token Based Authentication - Auth0 - 0 views

  •  
    We're a team of developers that got tired of the friction caused by complex identity environments. So we built a zero-friction, infinitely extensible, enterprise-class web-scale cloud solution that makes identity easy.
yc c

Jigsaw - 0 views

  •  
    Most of the world lives in countries that censor the internet. uProxy, seeded by Jigsaw and owned by the University of Washington, provides people access to the free and open internet by letting anyone who lives in a repressive society share the connection of someone who lives in a country with open internet access. uProxy works on an internet browser, with the option to set up a cloud server to provide constant access to the open internet. Perspective is an API that uses machine learning to spot abuse and harassment online.
yc c

Digital Attack Map - 0 views

  •  
    Digital Attack Map One of the easiest ways to silence someone online is a distributed denial of service attack (DDoS). But it's difficult to solve a problem you can't see. Digital Attack Map visualizes the most powerful DDoS attacks happening in the world right now, using data from our partner Arbor Networks. DDoS attacks sometimes relate directly to events in the real world such as conflicts or political disputes. A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
yc c

Amazon Kindle - Wikipedia, the free encyclopedia - 0 views

  • Kindle devices may report information about their users' reading data such as last page read, annotations, bookmarks, notes, highlights, or similar markings to Amazon.[132] The Kindle stores this information on all Amazon e-books but it is unclear if this data is stored for non-Amazon e-books.[133] There is a lack of e-reader data privacy — Amazon knows who the user's identity, what the user is reading, whether the user has finished the book, what page the user is on, how long the user has spent on each page, and which passages the user may have highlighted
1 - 0 of 0
Showing 20 items per page