Skip to main content

Home/ Groups/ CSIA 459
Michael Austin

How a Google Headhunter's E-Mail Unraveled a Massive Net Security Hole | Threat Level |... - 0 views

  •  
    A fun read about a former Google vulnerability. Of note is the "attacker's" use of Amazon Web Services to aid in cracking certificates.
Amy Harding

Tools of the Trade: Exploit Kits - 1 views

  •  
    Here is a recent article that discusses additional exploit kits besides the Blackhole kit discussed in the video.
Amy Harding

Ransomware: A growing Menance - 1 views

  •  
    This malware is highly profitable, with as many as 2.9 percent of compromised users paying out.
Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Trevor Pyle

Google Fiber Coming To Austin, TX? - 0 views

  •  
    Just a heads up for anyone living in Austin, TX.
James Thomas

11 best best practices for mobile device management - 0 views

  •  
    This article discusses 11 best best practices for mobile device management of mobile devices and identifies ways an organization can use these practices to improve network security while using mobile devices.
James Thomas

The future of business collaboration - 0 views

  •  
    This article discusses how businesses relate to mobile collaboration and issues that address its use in the mobile community
James Thomas

Using-SIM-for-threat-monitoring - 0 views

  •  
    This web site offers a lot of valuable information. I like it because it keeps current with emerging technologies. SIEM systems and technology enable more dynamic detection than some of the more traditional defenses.
Phil Kemp

From Black Hat to Blackouts: Storms in the Cloud - 1 views

  •  
    Interesting slideshow with some short discussions which relate to this weeks project, as well as the final class project.
alan savage

How to Stop Saying Um, Uh, and Other Filler Words - 1 views

  •  
    After listening to one of my posts to voicethread, that I thought was pretty solid, I did what my old English teacher did and counted the "um"'s one my fingers. It was bad. I didn't even know I was doing it. But I was doing 2 'um's about every sentence...it's so distracting from your point. I will work on this.
  •  
    Its funny you posted this. My fiance was listening to me comment and he pointed out that almost everyone says um uh and other filler words i thought he was wrong but then i started to notice i was saying it alot and couldnt help but try and stop.
Seth Molin

Telemedicine: communication technologies that revolutionize healthcare services - 0 views

shared by Seth Molin on 01 Apr 13 - No Cached
  •  
    Article 3 from UMUC library
James Thomas

Contracts for Information Sharing in Collaborative Networks - 0 views

  •  
    This article discusses the formation of collaborative networks in crisis management and its importance.
Ben Garey

3D printing - 0 views

  •  
    I put this in my Bibilography.
Ben Garey

US military gets into the 3D printing business - 0 views

  •  
    This is great and the Army is on to something.
  •  
    Ben, I was listening to a story on the radio the other day can you imagine someone having the capability to print a gun with all its components. Wow scary…. Article: 3D-Printed Guns and Violent Video Games Tuesday, January 29, 2013 http://www.wnyc.org/shows/newtechcity/2013/jan/29/ Additional Article on 3D printing copyright concerns: As 3-D Printing Becomes More Accessible, Copyright Questions Arise by Steve Henn February 19, 2013 3:01 AM http://www.npr.org/blogs/alltechconsidered/2013/02/19/171912826/as-3-d-printing-become-more-accessible-copyright-questions-arise Sam Rios
« First ‹ Previous 281 - 300 Next › Last »
Showing 20 items per page