Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items matching "Probability" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Corey Gyger

Linda Stein slay trial begins: Lawyers for Natavia Lowery say she's no killer - NY Daily News - 0 views

    • Corey Gyger
       
      Looks like a thief in the wrong place at the wrong time. And a smarter person is using that as ammo on her. I'd look into who hired her. Who hired a woman who robbed a church? They knew. She probably didnt do it and doesnt know who did.
    • Corey Gyger
       
      They say she didn't run. Means she was either frozen with fear..or knew the person well enough for them to get that close.
    • Corey Gyger
       
      no dna?
  • ...1 more annotation...
    • Corey Gyger
       
      Thiefs normally don't move from stealing to killing. They just want the money...not the prison time. Danny Ocean..mentality.
Lucas Pergler

Collaboration Security - Cisco on Cisco - Cisco Systems - 1 views

    • Lucas Pergler
       
      1)Article contains content of a serious nature that directly relates to my research.. 2)No author mentioned, public statement by company. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)No author posted, copyright belongs to company. 5)Information is created by company, no citation necessary. 6)Being a public statement from a well renowned company, updates will happen as relevant information changes. 7)Public company statement, so censor ship is probably only done if needed to protect company assets. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    From leading company in online collaboration tools, risk created by employees.
Joey Martinez

Malware - 0 views

  • So what is Malware? Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software.
  • Malware exists in many forms, most of which you’ve probably already heard of. The most common types of malware are viruses, trojans, worms, spyware and zombies.
  • In the early days of software, programmers wrote malware mostly to prank one another, or to show off their technical skills.
  • ...4 more annotations...
  • Some of these programmers learned that they can make thousands of dollars a day if they successfully exploit malware to their advantage.
  • These people went on to become cyber-crooks, defrauding individuals and organizations for financial gain.
  • A cyber-war between countries is raging. Some countries such as China, Syria, and America are rumored to be state-sponsoring cyber-gangs whose only purpose is to research and develop new malware techniques capable of infiltrating government agencies and infrastructures.
  • The malware problem is huge and is growing fast. By the end of 2010 the counter for unique malware programs stood at 14 million, with a staggering 60,000 pieces of new malicious code detected every day.
  •  
    Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software.
1 - 7 of 7
Showing 20 items per page