Skip to main content

Home/ Groups/ 91.113 Exploring the Internet
P Krolak

Computer Virus Hits U.S. Drone Fleet - 0 views

  •  
    A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military's Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech's computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military's most important weapons system.
P Krolak

List of Google products - 1 views

  •  
    This list of Google products includes all major desktop, mobile and online products released or acquired by Google Inc. They are either a gold release, or in beta development. This list also includes prior products, that have been merged, discarded or renamed. Features within products, such as web search features, are not listed.
P Krolak

Transparency Report - 0 views

  •  
    Like other technology and communications companies, Google regularly receives requests from government agencies and federal courts around the world to remove content from our services and hand over user data. Our Government Requests tool discloses the number of requests we receive from each government in six-month periods with certain limitations.
P Krolak

Google releases tool to show government censorship requests - 0 views

  •  
    Google has hit out at state attempts to clamp down on the internet by revealing governments' requests to remove data from the web and get information about users. Tonight it released a web page with a map showing country by country where it has had government requests or court orders to remove content from the YouTube video service or its search results, or to provide details about users of its services.
P Krolak

How US Government Spies Use Facebook (Updated) - 0 views

  •  
    The US Department of Justice this week released slides from a presentation deck titled Obtaining and Using Evidence from Social Networking Sites. The document was released in response to a Freedom of Information Act request by the Electronic Frontier Foundation (EFF). The DoJ presentation describes Facebook as much more co-operative with law enforcement requests for user information than Twitter and MySpace are. Update: Facebook's Barry Schnitt contests this interpretation of the document, says the company is resistant to illegitimate government requests for user information and offers one example of that resistance in a comment posted below. The document also explains to officers what the advantages of going undercover on social networking sites are. The EFF posted IRS training documents for using various internet tools as well, including Google Street View, but those were much tamer than the Justice file.
P Krolak

Social Media and Law Enforcement: Who Gets What Data and When? - 0 views

  •  
    We have been investigating how the government seeks information from social networking sites such as Twitter and how the sites respond to these requests in our ongoing social networking Freedom of Information Act (FOIA) request, filed with the help of UC Berkeley's Samuelson Law, Technology & Public Policy Clinic. As part of our request to the Department of Justice and other federal agencies, we asked for copies of the guides the sites themselves send out to law enforcement explaining how agents can obtain information about a site's users and what kinds of information are available. The information we got back enabled us to make an unprecedented comparison of these critical documents, as most of the information was not available publicly before now.
P Krolak

Your digital rights at work a FAQ guide - 0 views

  •  
    The office is an area of evolving legal issues for digital rights. What postings on social media can get you fired? Who owns the email and what are your rights to privacy? These are only a few legal issues faced by employees.
P Krolak

Robot wars 'still a long way off' - 0 views

  •  
    Despite the US Department of Defense once predicting that a third of US fighting strength would be composed of robots by 2015, experts warn that the machine wars seen in the movies will remain science fiction for quite some time yet.
P Krolak

Cleaning machines 'based on military robots' - 0 views

  •  
    Experts have been promising for decades to put a robot in everyone's home - and finally robots are beginning to make the transition from specialist to everyday use. Spencer Kelly discovers the similarities between robots used for cleaning and those used by soldiers in Afghanistan for a very different purpose.
P Krolak

Google 301 -- Uber Google - 0 views

  •  
    This covers some of the tools and services under development and how to use them. While it is a little bit behind the curve, it covers search blogger, newsgroups, and other tools. It also list sites for Google employee blogging and sites that speculate what Google's next big thing will be.
P Krolak

Summary of how a hacker creates and attack and tools to prevent or detect - 0 views

  •  
    This is more for reference and is a little dated. However, the basic approaches and techniques are still relevant and the diagrams are also useful. The approach is mostly UNIX,
P Krolak

Google 70 20 10 - 0 views

  •  
    A great Google portal overview that will satisfy all your needs for a class presentation. Covers all the basic tools and products.
P Krolak

7 Clever Google Tricks Worth Knowing - 0 views

  •  
    Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of. Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks and hacks. Although there are many others out there, these 7 tricks are my all-time favorite.
P Krolak

SAIC: Medical records for 4.9 million TRICARE beneficiaries were stolen - Nextgov - 0 views

  •  
    Science Applications International Corp. said backup computer tapes containing sensitive health information of 4.9 million Military Health Care System TRICARE beneficiaries treated in the San Antonio, Texas, area since 1992 were stolen from an employee's car Sept. 14.
P Krolak

Google hacking exposes large caches of personal data - 0 views

  •  
    Google hacking, which has been on the rise this summer, is a bit of a misnomer. Also known as Google dorking, Google hacking refers to cybercriminals' enterprising use of Google's advanced search functions to find caches of valuable data ripe for the taking.
P Krolak

Google Art Project -- A Visitor Guide - 1 views

  •  
    Google has put online some of the great art museums of the world. It has copied these museum's art collections. It also use it Street View approach use to create video tours of the associated museums. The site is located at -- http://www.googleartproject.com/
P Krolak

Exploring The Internet: 91- 113 Week 3 The Electronic Library and Advanced Searching th... - 1 views

  •  
    Week3  Using the Electronic Library and Finding Information on the Web The First Step, Readings: Read the 3rd Week of 91-113 Using the Electronic Library Searching for Material on the Web Hacking Google Searchs The Second Step Advanced Google Hacking Readings: The concept of Google hacking is to use Google's advanced search tools and data to find data in the "deep web".
P Krolak

Surveillence Society -- security and privacy in the Internet Age - 0 views

  •  
    The advance of wireless technology, smart sensors, and cloud computing have changed the government's approach to security in the face of 9-11 and global terrorism. The Internet is being used in ways we could not have imaged a decade ago. This powerpoint explores issues of surveillence, privacy, and evovling law in the context of world events.
P Krolak

Facebook U-turns on data sharing - 0 views

  •  
    Facebook appears to have U-turned on plans to allow external websites to see users' addresses and mobile phone numbers. Security experts pointed out that such a system would be ripe for exploitation from rogue app developers. The feature has been put on "temporary hold", the social networking firm said in its developers blog.
P Krolak

Facebook sorry over tags launch - 0 views

  •  
    Facebook has apologised for the way it rolled-out a new system that recognises users' faces. The social network said that it should have done more to notify members about the global launch. Its Tag Suggestions feature scans photos and automatically picks out existing friends.
‹ Previous 21 - 40 of 95 Next › Last »
Showing 20 items per page