Skip to main content

Home/ Groups/ 91.113 Exploring the Internet
Beibei Yang

Nowhere To Run Know Where To Hide - 1 views

  •  
    "What is WikiLeaks? Who is Julian Assange? What's happening and how does one access WikiLeaks? Find all answers here! "
  •  
    Found this on slideshare.net. Personally, I think the slides are good enough for the class.
P Krolak

Dead Sea Scrolls available online - 1 views

  •  
    Ultra-high resolution images of several Dead Sea Scrolls are now available on the web, after Google helped digitise the ancient texts. The search firm lent its expertise in scanning documents to the Israel Museum in Jerusalem. Both amateur and professional scholars will now have access to 1,200 megapixel images.
  •  
    Ultra-high resolution images of several Dead Sea Scrolls are now available on the web, after Google helped digitise the ancient texts. The search firm lent its expertise in scanning documents to the Israel Museum in Jerusalem. Both amateur and professional scholars will now have access to 1,200 megapixel images.
P Krolak

Google Art Project -- A Visitor Guide - 1 views

  •  
    Google has put online some of the great art museums of the world. It has copied these museum's art collections. It also use it Street View approach use to create video tours of the associated museums. The site is located at -- http://www.googleartproject.com/
P Krolak

List of Google products - 1 views

  •  
    This list of Google products includes all major desktop, mobile and online products released or acquired by Google Inc. They are either a gold release, or in beta development. This list also includes prior products, that have been merged, discarded or renamed. Features within products, such as web search features, are not listed.
P Krolak

Exploring The Internet: 91- 113 Week 3 The Electronic Library and Advanced Searching th... - 1 views

  •  
    Week3  Using the Electronic Library and Finding Information on the Web The First Step, Readings: Read the 3rd Week of 91-113 Using the Electronic Library Searching for Material on the Web Hacking Google Searchs The Second Step Advanced Google Hacking Readings: The concept of Google hacking is to use Google's advanced search tools and data to find data in the "deep web".
Beibei Yang

This Super Mario Bros. Mashup Gives Mario A Portal Gun - 1 views

  •  
    gaming mashup
P Krolak

SAIC: Medical records for 4.9 million TRICARE beneficiaries were stolen - Nextgov - 0 views

  •  
    Science Applications International Corp. said backup computer tapes containing sensitive health information of 4.9 million Military Health Care System TRICARE beneficiaries treated in the San Antonio, Texas, area since 1992 were stolen from an employee's car Sept. 14.
P Krolak

Google hacking exposes large caches of personal data - 0 views

  •  
    Google hacking, which has been on the rise this summer, is a bit of a misnomer. Also known as Google dorking, Google hacking refers to cybercriminals' enterprising use of Google's advanced search functions to find caches of valuable data ripe for the taking.
P Krolak

7 Clever Google Tricks Worth Knowing - 0 views

  •  
    Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of. Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks and hacks. Although there are many others out there, these 7 tricks are my all-time favorite.
P Krolak

Google 70 20 10 - 0 views

  •  
    A great Google portal overview that will satisfy all your needs for a class presentation. Covers all the basic tools and products.
P Krolak

Summary of how a hacker creates and attack and tools to prevent or detect - 0 views

  •  
    This is more for reference and is a little dated. However, the basic approaches and techniques are still relevant and the diagrams are also useful. The approach is mostly UNIX,
P Krolak

Facebook U-turns on data sharing - 0 views

  •  
    Facebook appears to have U-turned on plans to allow external websites to see users' addresses and mobile phone numbers. Security experts pointed out that such a system would be ripe for exploitation from rogue app developers. The feature has been put on "temporary hold", the social networking firm said in its developers blog.
P Krolak

Facebook sorry over tags launch - 0 views

  •  
    Facebook has apologised for the way it rolled-out a new system that recognises users' faces. The social network said that it should have done more to notify members about the global launch. Its Tag Suggestions feature scans photos and automatically picks out existing friends.
P Krolak

Surveillence Society -- security and privacy in the Internet Age - 0 views

  •  
    The advance of wireless technology, smart sensors, and cloud computing have changed the government's approach to security in the face of 9-11 and global terrorism. The Internet is being used in ways we could not have imaged a decade ago. This powerpoint explores issues of surveillence, privacy, and evovling law in the context of world events.
P Krolak

What is the future of the Internet - 0 views

  •  
    What is the future of the Internet? Where will the bandwidth be in 5 -10 years be and how will it effect the convergence of mobile devices? What apps will it allow not possible at today's communication networks? With the advent of cloud computing and storage capability rapidly expanding what information and or data bases become possible.
Beibei Yang

Teaching App Inventor - AppInventor.org: Building Apps with App Inventor For Android - 0 views

  •  
    Thanks to Michael
P Krolak

Online photos can expose identity - 0 views

  •  
    Face recognition technology can be used to gain access to a person's private data, according to a new study. Researchers at Carnegie Mellon University combined image scanning, cloud computing and public profiles from social network sites to identify individuals in the offline world. Data captured even included a user's social security number.
P Krolak

Emotion sensor catches out liars - 0 views

  •  
    A sophisticated new camera system can detect lies just by watching our faces as we talk, experts say. The computerised system uses a simple video camera, a high-resolution thermal imaging sensor and a suite of algorithms. Researchers say the system could be a powerful aid to security services.
P Krolak

'Nitro' Hackers Reportedly Attack Dozens of Companies in Chemical, Defense Industries ... - 0 views

  •  
    Hackers reportedly used an off-the-shelf computer attack created in China to compromise the computers of at least 48 companies, including in the chemical and defense industries -- an attack described as being similar to the notorious Stuxnet virus, if not as severe. The goal of the attacks, reported Monday by security software company Symantec, "appears to be to collect intellectual property such as design documents, formulas, and manufacturing processes." The purpose: "industrial espionage, collecting intellectual property for competitive advantage." Symantec dubbed the attack "Nitro" and said a total of 29 companies in the chemical industry were targeted, in addition to 19 in other sectors, starting in late July. Among the companies were some that develop materials used primarily in military vehicles. Read more: http://www.foxnews.com/scitech/2011/10/31/nitro-hackers-reportedly-attack-dozens-companies-in-chemical-defense-industries/?test=latestnews#ixzz1cTIClsp4
P Krolak

Facial scanner breach at airport - 0 views

  •  
    Facial recognition gates at Manchester Airport were temporarily taken out of use after a couple walked through the scanners after swapping passports. It is believed the pair passed through the gates in Terminal One on the morning of 8 February. The UK Border Agency said they were stopped by the immigration officer supervising the gates afterwards.
1 - 20 Next › Last »
Showing 20 items per page