Skip to main content

Home/ Groups/ IB ITGS
1More

BU Student fined $ 675,000 for illegal music downloads (Newsbank) - 2 views

  •  
    A graduate student from Boston University got caught for ilegally downloading music and was in court ordered to destroy all the files that had been received this way. The judge said she could have envisioned a fair use defendant for someone who had downloaded these songs before the law was created but Joel Tenenbaum was fully aware of the fact that was he was doing was wrong.
1More

Internet Censorship (Wikipedia) - 1 views

  •  
    Article includes a list of ways to get around censorship bans
1More

Effect of Twitter on Politics (Corporate-Eye) - 2 views

  •  
    About the political significance of Twitter
1More

Twitter's Architecture (Digital Beat) - 0 views

  •  
    Article about how improvements have and could be made to Twitter's technology
1More

Twitter on Your Cell Phone (How Stuff Works) - 0 views

  •  
    Article about the technology behind using twitter from a scell phone.
1More

The Ruby Programming Language (Slashdot) - 0 views

  •  
    Information about the ruby programming language which is what Ruby On Rails is based on which is partly responsible for twitter's user interface.
1More

How Twitter Works (How Stuff Worrks) - 0 views

  •  
    About the API (application programming interface) used in twitter and other IT background
1More

Nigeria Islamic court 'bans Twitter feed' (BBC News) - 2 views

  •  
    A rights group can no longer host debates on twitter because of the court.
1More

BBC News - Mobiles signal future of money? - 0 views

  •  
    "keys, wallet, phone" mantra before leaving home for work to make sure they have not forgotten anything."
1More

How It Works: Online Gaming (PCWorld) - 0 views

  •  
    How online gaming works. Servers
1More

Strategic Impact of Cyber Attacks (IRL Estonia) - 0 views

  •  
    This article discusses the Russian cyber-attacks on Estonia and how it affected the country and what the country did to "Counter-attack" and prevent further attacks. It features several different opinions on cyber-attacks.
1More

Cyber-attack Trends in US Corporations - Statistics (Biz Forum) - 1 views

  •  
    This document gives an in-depth analysis into the impacts on US Corporations and non-government businesses/private firms and contractors. It includes many statistics and reviews as well as collected data from a variety of sources.
4More

US plans for cyber attacks (News24) - 1 views

  • disabled US cell phone networks, slowed internet traffic to a crawl and crippled America's power grid
  • stealth cyber attack and a pair of bombings, cutting electricity to tens of millions of homes.
  • has the authority to use the full powers at his disposal
  •  
    This article discusses the simulated cyber "shockwave" exercise that was carried out in Washington DC as to practice in preparation for predicted cyber-attacks against the US. It looks at the impacts on power systems, politics and the use of military intervention.
3More

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
« First ‹ Previous 121 - 140 of 726 Next › Last »
Showing 20 items per page