Skip to main content

Home/ IB ITGS/ Group items tagged networks

Rss Feed Group items tagged

Jeff Ratliff

Google Grabs Personal Info Off Wi-Fi Networks (NPR) - 2 views

  •  
    Google acknowledged Friday that it inadvertently collected private information from the Wi-Fi networks inside people's homes. Google isn't the only company that uses cars to photograph neighborhoods for its mapping service, but it acknowledged its vehicles also contain receivers that pick up Wi-Fi signals. The receivers were supposedly just collecting the names and addresses of Wi-Fi networks to use in mapping programs for smart phones.
Jeff Ratliff

DARPA launches balloons - 1 views

  •  
    To mark the 40th anniversary of the Internet, DARPA has announced the DARPA Network Challenge, a competition that will explore the roles the Internet and social networking play in the timely communication, wide-area team-building, and urgent mobilization required to solve broad-scope, time-critical problems. The challenge is to be the first to submit the locations of 10 moored, 8-foot, red, weather balloons at 10 fixed locations in the continental United States. The balloons will be in readily accessible locations and visible from nearby roads.
Sanchit Jain

Virginia Politics on Social Networking (examples) - 0 views

  • Virginia political activity on social networking sites, Facebook, Twitter and Flickr. Included are social networking Web sites for candidates
Bassel Kanj

Monitoring web use at school - 19 views

I disagree, The teacher only has the right to view his history, or view the page he is currently on. Not continue viewing his Facebook, because they are taking advantage of him/her being logged i...

SOCIAL privacy anonymity

Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
Jeewon Yoon

BBC NEWS | Technology | MySpace to acquire music service - 0 views

  • MySpace will acquire the popular music discovery service iLike that allows users listen to and share music across social networks.
    • Jeewon Yoon
       
      Social Authenticity Impact Art
  • The company has 55 million registered users and has been prominent on most social networks apart from MySpace
    • Jeewon Yoon
       
      IT system Basic
Chalana Perera

Facebook privacy lawsuit & child protection - 1 views

  • a Facebook account that was opened without the knowledge or consent of his parents."
    • Chalana Perera
       
      SOCIAL --> Control & Privacy/Anonymity
  • the minor's medical information may have been stored
    • Chalana Perera
       
      IT SYSTEMS --> Comm. Systems/ SOCIAL --> Privacy & Control
  • Facebook makes reasonable efforts to remove accounts of children where there is evidence they are under 13,
    • Chalana Perera
       
      SOCIAL --> Equality
  • ...3 more annotations...
  • of an 11-year-old child because he disclosed that he had swine flu
    • Chalana Perera
       
      IMPACT --> Health / SOCIAL --> Privacy & Anonymity
  • Like all reputable social networking sites, Facebook complies with the Children's Online Privacy Protection Act (COPPA) by not allowing children under 13 to have accounts (COPPA does make provisions for accounts for children under 13 but imposes certain conditions including parental consent). The only way for this young man to obtain a Facebook account would be to lie about his date of birth.
    • Chalana Perera
       
      SOCIAL --> Policies
  • Once on Facebook, anything a person posts can, by default, be seen only by his friends or people in his network. If Xavier's profile was available to additional people, it was because he changed his default privacy settings.
    • Chalana Perera
       
      SOCIAL --.> Privacy & Control
Maliha Rahman

Users file privacy lawsuit against Facebook - 1 views

  • violating California privacy and online privacy laws by disseminating private information to third parties for commercial purposes.
    • Maliha Rahman
       
      Social ethicial issues: Violating privacy through social networks
  • alleges the social-networking site
    • Maliha Rahman
       
      charging a site that is represented through the internet(communication system)
  • The five plaintiffs are described as two children younger than 13,
    • Maliha Rahman
       
      impact-Educational
  • ...1 more annotation...
  • Facebook is no stranger to privacy controversy. In July, an investigation by Canada's privacy commissioner suggested Facebook is unconcerned with members' privacy and called on it to do more.
    • Maliha Rahman
       
      Impact- political issues, filling lawsuit can also affect government
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
Maliha Rahman

Protect Your Kids From Online Stalkers With Facebook's New "Panic Button" (Techgenie) - 5 views

  •  
    This article talks about the panic button itself. how it is useful and how it really isn't. It basically, as the title itself states, talks about the protection of kids from online social networking sits like facebook.
Maliha Rahman

Facebook Agrees to Install 'Panic Button' in UK (PCWorld) - 1 views

  •  
    This website basically discusses the way in which a panic button is involved and installed onto social networking sites. 
Jeff Ratliff

Google Buzz 'breaks privacy laws' (BBC News) - 0 views

  •  
    A leading privacy group has urged US regulators to investigate Google's new social networking service Buzz, one week after its launch. The Electronic Privacy Information Centre (Epic) has made its complaint to the US Federal Trade Commission (FTC) It says that Buzz - which is part of Google's Gmail service - is "deceptive" and breaks consumer protection law.
Eunice Vincent

Phishing Is Dangerous - impacts - 0 views

  •  
    Cisco Systems, Inc. (NASDAQ: CSCO), is the worldwide leader in networking for the Internet.
Jeff Ratliff

Apple + iPad + Huxley = Orwellian nightmare (Guardian) - 1 views

  •  
    "WATCHING STEVE JOBS unveil the Apple iPad, what came to mind was something that Neil Postman, the most influential media critic since Marshall McLuhan, once said. Our future possibilities, Postman thought, lay on a spectrum bounded by George Orwell at one end, and by Aldous Huxley at the other: Orwell because he believed that we would be destroyed by the things we fear; Huxley because he thought that we would be undone by the things we love. As the internet went mainstream, the Orwellian nightmare has evolved into a realistic possibility, because of the facilities the network offers for the comprehensive surveillance so vividly evoked in 1984. Governments everywhere have helped themselves to powers to read every email or text you've ever sent. And that's just the democracies; authoritarian regimes are far more intrusive."
Rafae Wathra

Twitter on Your Cell Phone (How Stuff Works) - 0 views

  •  
    Article about the technology behind using twitter from a scell phone.
Rafae Wathra

How Twitter Works (How Stuff Worrks) - 0 views

  •  
    About the API (application programming interface) used in twitter and other IT background
1 - 20 of 54 Next › Last »
Showing 20 items per page