Skip to main content

Home/ Globaltech/ Group items tagged anonymous

Rss Feed Group items tagged

anonymous

JAP -- ANONYMITY & PRIVACY - 3 views

  •  
    What is Anonymization and how does it work? march 11 cream
  •  
    Anonymization can be defined as the act of making anonymous onto a person who accesses to the Internet. According JAP as it describes in the article, JAP makes it possible the Internet anonymously. The system is like how you wont get tracked by hackers.
anonymous

HowStuffWorks "How to Surf the Web Anonymously" - 1 views

  •  
    Is this a good guide? may 19 kuni
  •  
    I would say that it can be a good guide. However, it might be possible that you can't be 100% anonymous because it is not easy as removing the recent history. It is automatically recorded on server by the IP address.
Azman Fadhilah

Bangkok Post : Every breath you take ... - 0 views

  •  
    1. The area of impact that the scenario relates to the Prgivacies that people can visit to the other people's profiles and view histories to find what the other person done in the past. 2. This is related to the Databases where Google stores the information on profile and history that what they had done. It is also related to surveillance 3. There is the problem with the privacy and anonymity that people can have access to the other persons profile to see their actions in the past. Most companies do this in career test for finding some inappropriate action that the person has done. 4.The database is a collection of information stored in an organized form in a computer. Program helps keep track of corporate passengers 5. For sollution, it might be helpfult to use proxy to get away from google tracking accounts.
anonymous

http://www.eweek.com/c/a/Security/WikiLeaks-Hit-With-DoS-Attack-Before-Documents-Leaked... - 9 views

  •  
    brief dec 9 cream
  •  
    WikiLeaks Hit with DoS Attack Before Documents Leaked 1. Identify the area of impact the scenario relates to. Politics and Employment 2. Identify the main stakeholders to the IT system. WikiLeaks, Government, users 3. Identify one ITGS social/ethical concern in the article Privacy 4. Describe ITGS terminology and systems. Wikileaks is simply a website that spread the hidden news to the public so it is like a non-profit website. They spread the news throughout the Internet. WikiLeaks knew and predicted such DoS attacks, they have been switching various IP address in order to keep running the website. 5. If possible, describe a solution to the concern (issue). Users need to use encryption for preventing hackers. Using secure private network in order to protect your private network or make it even more authorized. Using firewall to protect your computer form unauthorized access
  •  
    1.3 Privacy and anonymity 2.6 Politics and government 3.5 Personal and public communications
anonymous

Honestly.com (formerly Unvarnished) - Community-contributed reviews for business profes... - 4 views

  •  
    Describe the service this site provides. Explain a potential problem that could arise from the use of this site. dec 2 JH
  •  
    Diigo misses JH
  •  
    Diigo misses JH
anonymous

Egypt's net ruled by phone, not kill switch > DDoS > Vulnerabilities & Exploits > News ... - 4 views

  • Google operated a crisis response page and a "Speak to Tweet" service that allowed Egyptians to communicate online via voice telephone in the face of the internet blackout. Others, like net activist group Telecomix, were monitoring amateur radio channels and provided virtual private networks and proxies to Egyptian activists who required online anonymity.
  •  
    Feb 8 Ginnie What did people use when the net was down?
  •  
    1.7_surveillance 2.6_gov_control_use_info 3.4_internet
  •  
    The people used voice telephone to communicate with each other while the net was down. Amateur radio channels and virtual private networks and proxies were provided and used by Egyptian activists in order to communicate with each other.
anonymous

WikiLeaks Julian Assange Arrested in London: Is it a Conspiracy? - 4 views

  •  
    High cholesterol milk Feb 8 Who is Julian? What is wikileaks? Describe cyber attacks. How did politics impact wikileaks? How did wikileaks fight back?
  •  
     Who is Julian? - Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.  What is WikiLeaks? - WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.  Describe cyber attacks - A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.  How did politics impact WikiLeaks? - Protect citizens from knowing the secrets about politics - They keep find track on information -  How did WikiLeaks fight back? - Protesting way back Julian being treated (Letting attacks to each other)
  •  
    1.5 Intellectual property 1.9 Policies 2.6 Politics and government 3.5 Personal and public communications
anonymous

Judge Hands Over IP Logs of Several Geohot Sites to Sony - 4 views

  •  
    brief analysis march 11 nat
  •  
    Identify the area of impact the scenario relates to. Business Identify the main stakeholders to the IT system. Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Sources : http://en.wikipedia.org/wiki/IP_address iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV. Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers. 5. If possible, describe a solution to the concern (issue). There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
anonymous

How to Keep Your Computer Secure Video - 5min.com - 9 views

  •  
    M13 List and describe the guidelines for PC security. M12 Describe additional guidelines that should be considered for PC security. August 31 Chut Jenny
  •  
    Additional Guidelines: Password locking/encrypting important, sensitive information containing files and folders. Using a proxy or a VPN, to access the internet through the tunnel that can also include encryption. A Proxy and a VPN can scramble your IP address so the website cannot track you.
  •  
    Types of Securities. Firewall is a program that protects against intrusions and it helps ensure privacy. Anti-virus protects against computer viruses. A computer virus is a program that can multiply itself and infect a computer without the owner of the computer knowing or permissions. Anti-whatever else, malware, adware, spyware, Trojans etc. Why do you need it? People should have security programs to protect their computer from viruses or hackers. If you don't have any type of protection for your computer for your computer, your valuable information maybe stolen by hackers or erased by viruses. If you get viruses on your computer, you may need to take it to shops to repair it and need to pay for it. When do I need to use security programs? It depends on the activities that you do on your computer. How can I get viruses? There are several ways that you can get viruses. Opening attachments from anonymous emails, downloading torrents, movies, pictures, music and porn can give you viruses. Where can I get the right programs for my computer? download.com sourceforge.net majorgeeks.com Computer forums
anonymous

IPhone Users in South Korea Sue Apple for Collecting Data Without Consent - Bloomberg - 3 views

  •  
    Brief Aug 24 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Government 2. Identify the main stakeholders to the IT system. Apple, Google, iOS device users 3. Identify one ITGS social/ethical concern in the article. Privacy, Anonymity 4. Describe ITGS terminology and systems. iPhone smartphone - Apple's iPhone smartphone that includes various smart features such as receiving e-mail, and application, more than just the average phone. Location recognition - the feature on the iPhone that allows the users to be recognized by their location near wifi hubs. Apple was ordered to encrypt location data of people using iPhones to address privacy concerns but the users claim that the device secretly collected information of the users' whereabouts. 5. If possible, describe a solution to the concern (issue). A solution to the privacy issue would be for users to turn off the location-recognition features on their iPhones so that Apple doesn't have access to your phone. Apple needs to be more careful with their data collection process, as well as encrypting the data so there is no breach of privacy of its users, or completely get rid of the whole system itself.
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

Identity Theft Resource Center ITRC Fact Sheet 118 - 0 views

  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. may 9 cream
  •  
    Explain the meaning of the following guidelines: Do you check the validity of site certificates when sending sensitive information to another website? It is about checking the validity of site certificates for guarantee myself that I sent sensitive information to real and Safety Company. Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site? This action is when you see a green lock in the URL space of web browser such as hotmail.com, which it says about US privacy and stuff. Https codes help you know that you are transmitting via a safe system. If the padlock is open, do not transmit sensitive information! You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary. It is best to ere on the side of caution and use encryption to not only protect the data but also protect yourself
  •  
    1.3 Privacy and anonymity 3.3 Networks 3.4 Internet 3.5 Personal and public communications
1 - 13 of 13
Showing 20 items per page