Skip to main content

Home/ 91.113 Exploring the Internet/ Group items tagged html

Rss Feed Group items tagged

P Krolak

Foreign hackers targeted U.S. water plant in apparent malicious cyber attack, expert says - 0 views

  •  
    And so it begins in the real world and not in a movie, or lab demo. This is a real attack on US infrastructure via the internet. Foreign hackers broke into a water plant control system in Illinois last week and damaged a water pump in what appears to be the first reported case of a malicious cyber attack damaging a critical computer system in the United States, according to an industry expert. On Nov. 8, a municipal water district employee in Illinois noticed problems with the city's water pump control system, and a technician determined the system had been remotely hacked into from a computer located in Russia, said Joe Weiss, an industry security expert who obtained a copy of an Illinois state fusion center report describing the incident. "This is a big deal," said Weiss. The report stated it is unknown how many other systems might be affected.
juveranas

Social media @ the front line in Egypt - 0 views

  •  
    There is as much misinformation as information, and social websites are the perfect supporting tools
P Krolak

Exploring The Internet: 91- 113 Week 3 The Electronic Library and Advanced Searching th... - 1 views

  •  
    Week3  Using the Electronic Library and Finding Information on the Web The First Step, Readings: Read the 3rd Week of 91-113 Using the Electronic Library Searching for Material on the Web Hacking Google Searchs The Second Step Advanced Google Hacking Readings: The concept of Google hacking is to use Google's advanced search tools and data to find data in the "deep web".
michaelpenta

Amanda Palmer uses technology to promote her music - 3 views

Here is a email about making money using twitter http://www.hypebot.com/hypebot/2009/06/amanda-palmer.html and a video about using email and twitter to connect to her fans http://www.wired.com/und...

twitter socialnetwork SocialMedia 91.113 internet

started by michaelpenta on 02 Sep 11 no follow-up yet
P Krolak

Your digital rights at work a FAQ guide - 0 views

  •  
    The office is an area of evolving legal issues for digital rights. What postings on social media can get you fired? Who owns the email and what are your rights to privacy? These are only a few legal issues faced by employees.
P Krolak

Foundations of security: what every programmer needs to know (Google eBook) - 0 views

  •  
    Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once youre enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book. For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices. It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks. The lead author cofounded the Stanford Center for Professional Development Computer Security Certification. This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities. Youll receive hands-on code examples for a deep and practical understanding of security. Youll learn enough about security to get the job done.
P Krolak

GCHQ chief reports 'disturbing' cyber-attacks on UK - 0 views

  •  
    yber attacks on the UK are at "disturbing" levels, according to the director of Britain's biggest intelligence agency. Government computers, along with defence, technology and engineering firms' designs have been targeted, Iain Lobban, the head of GCHQ, has said. China and Russia are thought to be among the worst culprits involved in cyber attacks. On Tuesday, the government hosts a two-day conference on the issue. Foreign Secretary William Hague convened the London Conference on Cyberspace after criticism that ministers are failing to take the threat from cyberwarfare seriously enough.
1 - 13 of 13
Showing 20 items per page