Skip to main content

Home/ ITGSopedia/ Group items tagged networking

Rss Feed Group items tagged

Sandra Stark

Military bans disks after Wikileaks; Should you? | ZDNet - 1 views

  •  
    In the Wikileaks aftermath, the military has reportedly banned disks and USB drives and threw in the threat of a court martial for good measure. Should you do the same for your corporate network? Wired reported that the U.S. military is telling troops to ditch removable media. The problem is that these "sneaker networks"-actually combat boot networks-are an efficient way to get data from one point to another. The big question here is whether enterprises should also put some limits on removable drives. Let's face it, there are a lot of removable media that can tap into corporate networks. USB drives, iPods and phones are just some of the avenues where data can escape.
Barbara Stefanics

ConceptDraw Samples | Computer and networks - Wireless network diagrams - 1 views

  •  
    "Sample 2: Wireless network diagram - Satellite"
Madeleine Brookes

Tor: anonymity online - 0 views

  •  
    Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens. (Note: sometimes ITGS students need to be able to access sites that are sometimes blocked)
Barbara Stefanics

The insider's guide to mobile social networking: the 10 Ps | mobiThinking - 0 views

  •  
    "Mobile users spend more time on social networks than PC Web users. Now that we've got your attention… here are 10 things that marketers need to know about social networking from the experts. "
Barbara Stefanics

Topologies - Network Topologies - Types of Topology Examples - Bus Ring Star - 0 views

  •  
    "In computer networking, topology refers to the layout of connected devices. This article introduces the standard topologies of networking. "
Sandra Stark

Education Week's Digital Directions: Social Networking Goes to School - 1 views

  •  
    Though teachers and students are now pushing learning beyond the borders of the classroom through social networking, that move also comes with hurdles, including the fact that many schools still block access to such sites within their walls. School officials must also confront the uncertainties and questions surrounding privacy issues, proper management, and cyber security when they open their doors to social-networking sites.
Sandra Stark

Information Economy:Department - 0 views

  •  
    Too complex for students but useful background for the teacher. Smart sensor networks - technologies and applications for green growth 12-Jan-2010 Sensor networks play an important role in tackling environmental challenges. Sensor applications in smart power grids, smart buildings and smart industrial processes make significant contributions to more efficient resource use and reduce greenhouse gas emissions and other pollutants. This report gives an overview of sensor technologies and applications, and quantifies their environmental impacts.
Elizabeth Schloeffel

Bosses switch on antisocial network - 0 views

  •  
    "AN ANGRY red dot flashes at the top of your computer screen. As your mouse creeps over it, a message appears: ''Twitter use has exceeded the department average of 58.6 minutes per day - please self-regulate.'' A quick click and a display appears mapping your internet use, including a graph devoted to the social networking sites Facebook and Twitter. It may be Orwellian, but this scene, or some variation, is coming to a workplace near you."
Sandra Stark

The 'Worm' That Could Bring Down The Internet : NPR - 0 views

  •  
    Outstanding show, explains a lot about worms vs viruses as well as botnets. It's an interview with the author so it also illustrates how to ask good questions. (useful for the project) The gigantic networked system created by the Conficker worm is what's known as a "botnet." The Conficker botnet is powerful enough to take over computer networks that control banking, telephones, security systems, air traffic control and even the Internet itself, says Bowden. His new book, Worm: The First Digital World War, details how Conficker was discovered, how it works, and the ongoing programming battle to bring down the Conficker worm, which he says could have widespread consequences if used nefariously.
Madeleine Brookes

Wi-Fi hackings a warning to wireless users, businesses - seattlepi.com - 0 views

  •  
    "A key feature of several of the intrusions was the use of wardriving, a technique in which hackers mount a high-strength Wi-Fi receiver inside a vehicle and search for networks that can be penetrated. Once a Wi-Fi network is located through wardriving, hackers can remotely watch for information that may reveal the network's security setup and vulnerabilities."
  •  
    Interesting term 'wardriving'
Madeleine Brookes

iTWire - New WiFi standards support mesh networks & promise higher data rates - 0 views

  •  
    "The IEEE has published two important new standards for WiFi mesh networking and peer-to-peer communication between WiFi devices. It says the latter could produce a 10 fold increase in the data rate between connected devices."
Sandra Stark

How safe is your surfing? Few SMBs have social networking security policy | ZDNet - 0 views

  •  
    Approximately 40 percent of small and midsize businesses have suffered a breach because of malware picked up by employees while visiting the Web, social networking sites.
Madeleine Brookes

IPad management, security crucial in hospital tablet roll out - PC Advisor - 1 views

  •  
    Uses many technical terms to help understand MAC address and security of wireless network
Barbara Stefanics

Basel Action Network (BAN) - 1 views

  •  
    Photos of e-waste from Basel Action Network
Madeleine Brookes

Bradley Mitchell - About.com Wireless / Networking - 0 views

  •  
    Good for in-depth information on networking
Barbara Stefanics

Mobile social networking - the statistics are compelling | mobiThinking - 0 views

  •  
    "Mobile social networking - the statistics are compelling"
1 - 20 of 66 Next › Last »
Showing 20 items per page