Skip to main content

Home/ 91.113 Exploring the Internet/ Group items tagged detection

Rss Feed Group items tagged

P Krolak

Summary of how a hacker creates and attack and tools to prevent or detect - 0 views

  •  
    This is more for reference and is a little dated. However, the basic approaches and techniques are still relevant and the diagrams are also useful. The approach is mostly UNIX,
Beibei Yang

The untouchable Mean Girls - The Boston Globe - 0 views

  • Phoebe kept walking, past the abuse, past the can, past the white picket fence, into her house. Then she walked into a closet and hanged herself. Her 12-year-old sister found her.You would think this would give the bullies who hounded Phoebe some pause. Instead, they went on Facebook and mocked her in death.They told State Police detectives they did nothing wrong, had nothing to do with Phoebe killing herself.
  • “Things like this aren’t supposed to happen in South Hadley,’’ said Darby O’Brien, a high school parent, wondering why the bullies who tormented Phoebe are still in school. “And so instead of confronting the evil among us, the reality that there are bullies roaming the corridors at South Hadley High, people are blaming the victim, looking for excuses why a 15-year-old girl would do this. People are in denial.’’
P Krolak

Emotion sensor catches out liars - 0 views

  •  
    A sophisticated new camera system can detect lies just by watching our faces as we talk, experts say. The computerised system uses a simple video camera, a high-resolution thermal imaging sensor and a suite of algorithms. Researchers say the system could be a powerful aid to security services.
P Krolak

Computer Virus Hits U.S. Drone Fleet - 0 views

  •  
    A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military's Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech's computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military's most important weapons system.
P Krolak

Foundations of security: what every programmer needs to know (Google eBook) - 0 views

  •  
    Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once youre enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book. For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices. It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks. The lead author cofounded the Stanford Center for Professional Development Computer Security Certification. This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities. Youll receive hands-on code examples for a deep and practical understanding of security. Youll learn enough about security to get the job done.
1 - 5 of 5
Showing 20 items per page