Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "IT" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
arnielal

How the modern world depends on encryption - BBC News - 0 views

  •  
    This article discusses how there needs to be advanced cryptography in many facets of life for a person in the modern era from credit cards to phone calls to ATMS. it also describes how encryption uses such a large number of combinations, a brute force attack will never worm
Derek Bruff

iPhone X's Face ID Inspires Privacy Worries - But Convenience May Trump Them : All Tech Considered : NPR - 1 views

  •  
    Also worrisome... If your password is compromised, you can change it. If your facial data is compromised, well...
shalinnaik17

kevin mitnick - Twitter Search - 1 views

  •  
    Can you update this link to point to Kevin Mitnick's Twitter page? it just goes to the search results right now.
selleml1

Justin Wu (@hackapreneur) | Twitter - 0 views

  •  
    Here is another one I found. I don't think this one is a bot, but if it is let me know and I'll try to find another one.
shalinnaik17

Documentation | Qubes OS - 0 views

  •  
    This provides information on a OS that is like paranoidlinux used my Marcus. It is also available to download.
yuthraju

Military Cryptanalysis- NSA/CSS - 3 views

  •  
    Now that the NSA has declassified this information about cryptanalysis, either they can no longer utilize these methods of cryptography, or must do so with caution, knowing that anyone has the resources to crack them. Was it ethical of the NSA to release this information, especially if other countries still use these methods to create ciphers?
ckona0130

Spying on Students: School-Issued Devices and Student Privacy | Electronic Frontier Foundation - 0 views

  •  
    Even when college students use computer or electronic devices that belong to the school, any websites they visit, links they download, and videos they watch can offer behavioral information and data that is directly tied to that student's profile, and thus them too. it's important to be aware of this fact, and realize that whatever privacy you think that Mac in the back of the library offers you is in reality nonexistent. That Mac is uploading your data to the Cloud every minute you use it, and it's important to track and understand that your online information is being sent, without your consent, to other entities. So, be careful with what you search up next time.
jacobsb

FERPA Compliance: Protecting Student Data through Encryption - Virtru - 0 views

  •  
    Schools have a responsibility to protect your information, but it can be vulnerable to release or data breaches. Be careful when giving out personal information and try to educate yourself on your rights as a student so that you can best protect yourself.
kellialove

Why colleges are prioritizing privacy - 0 views

  •  
    It is possible to have securIty, but not privacy, so although you believe your data may be secure, your privacy can be being invaded. You wouldn't know by who, so the best thing to do for now until privacy is better regulated is to be mindful of what you are doing on the internet.
chetchetchetchet

'Edward Snowden did this country a great service. Let him come home' | US news | The Guardian - 0 views

  •  
    It is important to consider whether Snowden is our enemy or our friend. Disobeying the rule of law and throwing turmoil into our system is harmful, but many still view him as a friend of the people.
« First ‹ Previous 121 - 140 of 142 Next ›
Showing 20 items per page