Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged computers

Rss Feed Group items tagged

Derek Bruff

Firesheep Users May Be Breaking the Law - Kashmir Hill - The Not-So Private Parts - Forbes - 0 views

  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
chrisr22

Charles Babbage's Failed Computer from 1837 Will Be Built - 2 views

  •  
    Interesting article about Charles Baggage's computer designs finally being put to use! Found it interesting because we read about Charles Babbage and I was surprised to learn that the computer hadn't been built yet.
  •  
    For the latest on Plan 28, the initiative to build Babbage's analytic engine, visit http://plan28.org/.
Riley Dankovich

Deleting Ada Lovelace from the history of computing | Ada Initiative - 2 views

  •  
    This resource is interesting in light of our discussing Babbage and Lovelace, as well as Ada Lovelace Day. This article is particularly interesting to me as it deals with women's contributions to significant advancements in history, many of which are often ignored or excused.
  •  
    Riley, I mentioned in class that October 14th is Ada Lovelace Day, an international day for recognizing the contributions of women in science. Details: http://findingada.com/. I've wanted to organize an Ada Lovelace Day event here at Vanderbilt for a few years now, but never found the time. Let me know if you'd like to cook something up (an event? a blog series? a Wikipedia editing party?) for the 14th.
  •  
    I found it really interesting that people took the fact that Lovelace made a few mistakes as an excuse to try to remove her contribution to computer programming. Male scientists and programmers also make mistakes, but we rarely see those used in an attempt to discredit them. Also, she literally designed a computer program before the computer even existed. I think we can excuse a few past mathematical errors.
giordas

Ada Lovelace, the First Tech Visionary - The New Yorker - 1 views

  •  
    Here's just some more information about Ada Lovelace because she's pretty cool.
  •  
    I thought this article was interesting because it mentioned Ada's childhood imagination and inventions. It's interesting to consider what she could've done if she had grown up in a different place or at a different time. Also, the article mentioned that there was a computer program named "Ada" after her and I thought it was pretty cool that she's beginning to be recognized more and more. (Sorry, I don't know why this comment wasn't here earlier. It's in my original Diigo bookmark.)
Derek Bruff

NSA Plans for a Post-Quantum World - Schneier on Security - 0 views

  •  
    Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
Derek Bruff

Yet another pre-installed spyware app discovered on Lenovo computers / Boing Boing - 1 views

  •  
    "A factory refurbished Thinkpad shipped with Windows 7 and a scheduler app that ran once a day, collecting usage data about what you do with your computer and exfiltrating it to an analytics company. "
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Derek Bruff

Securing Medical Research: A Cybersecurity Point of View (Bruce Schneier) - 0 views

  •  
    "The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. "
Allison Molo

Vigenere cipher encryption | Ciphers | Khan Academy - 0 views

  •  
    Good link from Khan Academy that has good practice questions/explanation of the Vigenere cipher.
mattgu123

Celebrating Ada Lovelace: the 'world's first programmer' - 1 views

  •  
    Bernoulli numbers are a sequence of numbers important to the field of number theory, trigonometric expansions, and analysis. Ada Lovelace wrote a theoretical program to calculate these that would work on Charles Babbage's unfinished Analytical Engine. It's pretty interesting how Lovelace was a "leading figure" in the now massively male-dominated computer programming field, but didn't receive recognition for her work until fairly recently.
  •  
    See also Riley's bookmark and my comments on it.
rmusicant

Journey Into Cryptography - 1 views

  •  
    How have humans protected their secret messages through history? What has changed today?
nate_clause

The 5 biggest online privacy threats of 2013 | PCWorld - 6 views

  •  
    This article opened my eyes to many things, such as how many cookies can be stored on your computer from not going to many websites, how easy it is to track ones location, and how Facebook could easily recognize you in real life. It discussed ways that information is gathered and stored about someone online that I hadn't even thought of before and was very eye-opening.
  •  
    Facebook already knew you would feel that way about this news.
Derek Bruff

Researchers crack the world's toughest encryption by listening to the tiny sounds made ... - 0 views

  •  
    Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening - yes, with a microphone - to a computer as it decrypts some encrypted data.
Derek Bruff

Security In A Box | Tools and tactics for your digital security - 2 views

shared by Derek Bruff on 12 Nov 14 - No Cached
  •  
    Security in-a-box is a collection of guides and free tools to secure your computer, protect your information or maintain the privacy of your Internet communication. It was created to meet the digital security and privacy needs of advocates and human rights defenders.
Derek Bruff

Hospital Forced Back to Pre-Computer Era Shows the Power of Ransomware - 0 views

  •  
    Ransomware shuts down a hospital for more than a week. This time, there's a $3 million demand.
Derek Bruff

Encryption: The danger of exceptional access (Opinion) - CNN.com - 0 views

  •  
    Fairly easy to read argument from a crypto expert (Columbia University computer scientist Steven Bellovin) on the dangers of "back doors" in computer systems.
Siegfried Schlunk

Quantum processor's prime feat raises security issues | ZDNet - 0 views

  •  
    Summary: California researchers report a breakthrough with the creation of a solid-state quantum processor that could ultimately have a bearing on future cryptographic techniques. Researchers in California have designed and built a quantum processor capable of factoring 15 into its primes - with major implications for computer security.
Siegfried Schlunk

Quantum cryptography keys ride the lightning on existing fiber lines - 1 views

  •  
    Quantum computing has teased us with its potential for some time, but we won't be seeing qubits in our laptops anytime soon. However, science has also sought to leverage quantum physics in cryptography, and a recent breakthrough will allow for quantum encryption over fiber optic cables already in use.
1 - 20 of 37 Next ›
Showing 20 items per page