Skip to main content

Home/ Globaltech/ Group items tagged iphone

Rss Feed Group items tagged

Jang Han

Are Facebook posts hurting your career? - 7 views

  •  
    How are Facebook posts hurting your career? Identify two types of posts that can hurt you.
  • ...4 more comments...
  •  
    Employment Internet
  •  
    May 23
  •  
    Cant watch the video
  •  
    can't watch either.
  •  
    try to find the video clip on the list below the site
  •  
    i can't either
Tick Kanjanamaneeroj

First look: iphone 5 ()just for fun - 3 views

  •  
    just for fun
anonymous

BBC News - US NSA and UK GCHQ 'can spy on smartphones' - 1 views

  •  
    summary jab
  •  
    On the September 8 article on "US NSA and UK GCHQ' can spy on smartphone" state that NSA (US National Security Agency) and British GCHQ have joint together and have cracked the smartphones such as IPhone, Blackberries and Android devices. The article said that this was a revelation by Edward Snowden who has been welcomed by Germany. This is why on Saturday; thousands of demonstrators in Berlin demand the NSA to stop monitory internet users. As Der Spiegel said, NSA and GCHQ have been able to read smartphone users contacts and lists of who had been called. This disclosure has ignited a heat of debate in Germany.
anonymous

http://www.macobserver.com/tmo/article/japanese_publishers_cry_foul_on_pirated_app_stor... - 6 views

  •  
    brief march 23 woo
  •  
    1. Identify the area of impact the scenario relates to. - Business and employment 2. Identify the main stakeholders to the IT system. - JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple. 3. Identify one ITGS social/ethical concern in the article - Intellectual property 4. Describe ITGS terminology and systems. - Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device. - Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose. Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents' rights. These pirated apps are Chinese -based language apps which plays a role in delaying the notice of the copyright infringement. 5. If possible, describe a solution to the concern (issue). Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies wor
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
‹ Previous 21 - 25 of 25
Showing 20 items per page