Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged of

Rss Feed Group items tagged

1More

How internet encryption works - 0 views

  •  
    This is a nice intro to public-key cryptography, and a bit of the math behind the "classic" public-key algorithms.
1More

Blogging Like a Connected Courses Champion | Connected Courses - 0 views

  •  
    Some great advice on blogging as part of a learning community, like we're doing in this course.
2More

Review: Blackphone Trades Some Convenience for Security - 1 views

  •  
    This article is about a smartphone that's designed specifically to help you keep your personal information secure--it lets you easily encrypt your calls and texts and search the internet privately. There's also a video about ways to encrypt your email.
  •  
    Nice find. I'm reminded of DuckDuckGo, https://duckduckgo.com/, the search engine that doesn't track you. At all.
1More

Yik Yak « vanderbilt hustler - 3 views

  •  
    So no controversy yet, but Yik Yak makes the front page of the Hustler...
1More

Unifying the Global Response to Cybercrime | APWG - 0 views

shared by jcs215 on 12 Nov 14 - Cached
  •  
    The APWG is the global industry, law enforcement, and government coalition focused on unifying the global response to electronic crime through development of data resources, data standards and model response protocols and systems for private and public sectors.
1More

How to Access the BBC iPlayer (and TV Like Doctor Who) from Outside the U.K. - 0 views

  •  
    Non-U.S. users frequently encounter the annoyance of geo-blocked content when trying to access popular sites like Hulu, but every now and then we feel the burn in the States, too. Reader hengehog details how to access BBC's iPlayer from outside the U.K.
1More

Google Glass Police: NYPD Cops Testing Google Camera | TIME.com - 0 views

  •  
    "A few months ago, an officer for the Byron Police Department in Georgia made a routine traffic stop equipped with an unusual piece of technology: Google Glass."
1More

New Tech City: Bill Binney and Ladar Levison Talk Cryptography - WNYC - 0 views

  •  
    Here's a podcast interview with Bill Binney and Ladar Levison, both featured in Citizenfour. Binney was the former NSA crypto expert we saw testifying in the film a couple of times, and Levison was the guy who ran the secure email service Lavabit that he felt compelled to shut down.
1More

Researchers crack the world's toughest encryption by listening to the tiny sounds made ... - 0 views

  •  
    Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening - yes, with a microphone - to a computer as it decrypts some encrypted data.
1More

With Tech Taking Over in Schools, Worries Rise - 2 views

  •  
    At a New York state elementary school, teachers can use a behavior-monitoring app to compile information on which children have positive attitudes and which act out. In Georgia, some high school cafeterias are using a biometric identification system to let students pay for lunch by scanning the palms of their hands at the checkout line.
1More

Tips for Downloading Safe Apps | Norton - 1 views

  •  
    This website provides a few instructions on how to increase your safety downloading apps from the app store. It also provides links to other websites which show the safety score of an app. Since most people (including myself) don't think twice about downloading any app that looks interesting, this is useful information to have.
1More

Credit Card Tokenization 101 - And Why it's Better than Encryption - 1 views

  •  
    This article explains a way that credit card information is stored safely without encryption. Tokenization is a completely different way of securing credit card information than encryption because it completely removes the credit card information and replaces it with a "token" that cannot be retraced to retrieve the credit card information. Encryption has the credit card information hidden somewhere, but tokenization erases it completely which makes it very secure.
1More

Modern Cryptography: Theory and Practice - 0 views

  •  
    E-text for a book detailing the fundamentals behind modern cryptography and how they are applied in practice. Lots of detailed information about various underlying theorems and mathematical properties and how they work, as well as various encryption techniques and cryptographic processes.
1More

Indiana, Louisiana governors latest to oppose Syrian refugees - 0 views

  •  
    Here's some background on the Obama administration's decision to admit Syrian refugees to the US, and Republican governors who want to refuse entry. Alabama governor Robert Bentley: "I will not place Alabamians at even the slightest, possible risk of an attack on our people."
1More

Tim Cook says Apple won't break into iPhone for the FBI | Fusion - 0 views

  •  
    Apple's response to the court order directing them to comply with the FBI's request for a backdoor into the iPhone owned by one of the San Bernardino shooters.
1More

Gimlet Media | » #46 Yik Yak Returns - 0 views

  •  
    That Reply All podcast episode about Yik Yak I mentioned in class the other day? They've just updated their January story (which focused on events at Colgate University) putting in context of recent events at Missouri and Yale.
1More

Your Online Reputation Doesn't Take the Holidays Off - 0 views

  •  
    Whether it is on Facebook, Twitter or a text on your cell phone, many will see photos and videos flying through cyberspace over the holiday season. Maybe some of these pictures and videos won't be so joyous; this is when digital decisions may have been made in haste.
« First ‹ Previous 221 - 240 of 294 Next › Last »
Showing 20 items per page