Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Network

Rss Feed Group items tagged

ftiet21

China to launch hack-proof quantum communication network in 2016 - 2 views

  •  
    China will complete and put into service the world's longest quantum communication network stretching 2,000km from Beijing to Shanghai by 2016. By 2030, the Chinese network would be extended worldwide, Xinhua reported.
Ling Shi

Cryptography in Network Security - 2 views

  •  
    This is the e-text of a book that discusses online network encryption and application. The chapters cover various encryption methods for the transfer of data online, as well as the application of wireless, email, IP network security
eiyanrc

This tool boosts your privacy by opening your WI-FI to strangers - 0 views

  •  
    Getty In an age of surveillance anxiety, the notion of leaving your Wi-Fi network open and unprotected seems dangerously naive. But one group of activists says it can help you open up your wireless internet and not only maintain your privacy, but actually increase it in the process. At the Hackers on Planet Earth conference…
rmusicant

Report -- FBI investigating St. Louis Cardinals for hacking Houston Astros' database - 2 views

  •  
    The St. Louis Cardinals are being investigated by the FBI for allegedly hacking into networks and trying to steal information about the Houston Astros, The New York Times reported Tuesday.
Derek Bruff

Reporting Error Leads To Speculation That Terrorists Used PS4s To Plan Paris Attacks - 1 views

  •  
    No credible evidence that the PlayStation 4 network was used to coordinate the #ParisAttacks. #fywscrypto https://t.co/8g6Gki4QVj - Derek Bruff (@derekbruff) November 17, 2015
parker718

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

  •  
    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
Annie Vreeland

Walking on Eggshells: Anatomy of a Science Story | Cocktail Party Physics, Scientific A... - 0 views

  •  
    I like the way this is written because the author makes it a fun read. It is not a long boring article about the writing process of her story, but rather it breaks down her process into steps. Moreover, her writing is entertaining, which grasped my interest more so than many other posts. 
Hannah Lee

Knowing When To Fold 'Em: The Science of Poker | Cocktail Party Physics, Scientific Ame... - 0 views

  •  
    This article concerning the science behind poker and its categorization as either skill or luck is particularly well written in that it draws its audience in by presenting a recent event that concerned poker, and then proceeding to present information on the history of poker as well as the statistics that support its argument.  Furthermore, the author establishes credibility throughout her post by referencing credible studies done. Her voice throughout the post continues to be entertaining, keeping the reader's attention for the entirety of her post.
Derek Bruff

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | W... - 1 views

  •  
    "With end-to-end encryption in place, not even WhatsApp's employees can read the data that's sent across its network. In other words, WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service. Like Apple, WhatsApp is, in practice, stonewalling the federal government, but it's doing so on a larger front-one that spans roughly a billion devices."
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
Allison Molo

Physicists on Ice: Exploring the Physics of Curling | Cocktail Party Physics, Scientifi... - 0 views

  •  
    I felt that this article was particularly well written because of how conversational the author was with the reader. The conversational aspect allows the scientific aspect of the article to be better understood, in a way. The use of a video was also allowed for a better understanding of the physics.
  •  
    I was thinking about doing this one! I curled for a couple of winters, and always wondered about the weirdly illogical physics of curling stones. Unfortunately, the nearest curling club is 3 hours away in Knoxville...
nate_clause

Oppenheimer's Folly: On black holes, fundamental laws and pure and applied science | Th... - 0 views

  •  
    I feel this article is well written for a few reasons. If has the feel of telling a story but remains formal and in the style of academic writing at the same time. The flow of the post is very well done also as each paragraph logically leads into the next. Lastly, the post concludes very well tying in everything the post discusses and how they relate to science in the world today.
colleengill

UK Match.com site hit by malicious adverts - BBC News - 0 views

  •  
    Malicious adverts have been found on the UK version of the Match.com dating website. Anyone caught out by the booby-trapped ads could fall victim to ransomware, said security company Malwarebytes, which spotted the cyber-threat. The malicious ads appeared on pages of the dating site via an ad network that pipes content to Match and many other places.
oliver_zhu

A Student's Need-to-Know Guide to Web Security - OnlineUniversities.com - 1 views

  •  
    1. Don't download free media. 2. Don't overshare personal information on social media accounts. 3. Change passwords regularly. 4. Be cautious on public networks and computers.
krschroeder9

The Importance of Understanding Encryption in Cybersecurity - 0 views

  •  
    Any sensitive information that could be accessed by hackers should be encrypted, especially when communicating over wireless networks. Make sure to keep your private key confidential.
1 - 20 of 20
Showing 20 items per page