Skip to main content

Home/ Groups/ StJulians_ITGS
Mr Brooke

Password Recovery Speeds - 12 views

  • Classes of Attack
  •  
    "This document shows the approximate amount of time required for a computer or a cluster of computers to guess various passwords. The figures shown are approximate and are the maximum time required to guess each password using a simple brute force "key-search" attack, it may (and probably will) be possible to guess correctly without trying all the combinations shown using other methods of attack or by having a "lucky guess"."
Mr Brooke

BBC News - Apple launches e-textbook tools with new iBooks - 9 views

  •  
    1.11_people_machines 1.12_digital_citizenship 2.2_edu_training 2.2_hw_networks_classroom
  • ...1 more comment...
  •  
    1.11_people_machines 2.2_IT_teach_learn 3.4_internet
  •  
    1.11_people_machines 1.6_digital_div_equ_access 2.2_IT_teach_learn 3.2 _software
  •  
    Stakeholders: Students Advantages for students Productivity applications and textbooks are available to download online - easy global Access. the files are digital, so they can be transfered easily The online texbooks are safe from physical dangers, such as fires Convenience - being able to access iTunes U (university level resources) and the internet Saving time - files in an electronic format can be edited, searched and backed up easily. Disadvantages for students Although the files are safe, the iBook itself is still susceptible to physical damage The files may be corrupt Battery power failures and technical problems (they don't happen with physical notebooks) Access to internet and resources may depend on whether the space has wireless Access to games and rich interactive productivity applications can become the norm. Thence users' attention span may decrease The cost of product, of electronic textbooks and applications is the major issue From an evaluative point of view, I think that using a portable electronic device in place of a physical textbook would not benefit the students very much. The values a teacher is looking for are the ability to focus and listen, and the iBook could encourage the student to run parallel tasks at inappropriate times. The device would not be suitable for younger audiences, and in my opinion, it would contribute to a child being spoiled. Rather more mature users would benefit from this product, because they are more conscious of its function and, most importantly, the price they had to pay for it. Other stakeholders may include Apple, educators and digital course material publishers.
benjon hamal

E-waste: Recyclers, scrap haulers vie to keep U.S. computer trash home - The Washington... - 1 views

  •  
    Madness?
  •  
    Excellent find! Keep it up.
  •  
    E-waste
Fiche Galinha

Moses' Red Sea Parting Explained by Computer Model : Discovery News - 1 views

  • Moses' Red Sea Parting Explained by Computer Model
  •  
    Science 1 - 0 Religion
  •  
    Like ^
Jorge F1

BBC News - Trendnet security cam flaw exposes video feeds on net - 8 views

  • "We first became aware of this on 12 January," said Zak Wood, Trendnet's director of global marketing.
  •  
    SO scary!!!!!! After reading this shocking article I'll probably start covering my security cameras while I'm at home! A main social and ethical issue is SURELY privacy. I think that many people aren't aware that security is coming to bits by the second, privacy isn't what it was some years ago. And, in my opinion, it's the technology's fault. Even though computers, internet, phones etc have become useful, society's becoming too much dependent to technology and this is an issue as technology will continue to increase even more, meaning that society's privacy will continue to decrease even more. Can't we even have privacy at home?
  •  
    To some extent I agree with you Ines. But technology isn't all bad. Yes, we are losing privacy at a rapid pace. But these cameras provided us with security. Well, they would have if it wasn't for the breach in Trendnet's security they would have provided people with security. Our world has become much dependent on social networking etc. We do not have as much privacy as one would like, but this is not solely the technology fault in my opinion. It is as much human nature, the drive to have 15 minutes of fame. Just my two cents anyway : )
  •  
    The IT system in focus is the Trendnet home security camera. Here is how real-time, live video broadcasting works. This information originally referred to IP based cameras, which essentially work the same way. Image: http://www.ipcctv.com/images/learnMore/Single-Camera.gif The camera is installed and ran "The camera turns video & audio into binary data The camera connects to your the and transmits this data onto the network This data can then be viewed on a PC; on the local network, or over the internet." The remote viewer inputs the Internet addresses which link to the video streams and is able to see footage. source: http://www.ipcctv.com/article.php?xArt=13
Mr Brooke

Historical Timeline of Computable Knowledge: 20,000 BC-0 - 4 views

  •  
    Year 12s here is the timeline I thought may be of use to you
Mr Brooke

Apple (United Kingdom) - The Story Behind Apple's Environmental Footprint - 7 views

shared by Mr Brooke on 27 Jan 12 - Cached
  •  
    Year 13 please suggest tags
  • ...2 more comments...
  •  
    1.11_people_machines, 2.1_bus_emp, 2.3_environment, 2.3_ewaste, 3.1_hardware
  •  
    2.3_ewaste 3.1_hardware 1.11_people_machines
  •  
    Apple is my first choice for Mp3 players, laptops etc therefore it is good to see that they are concerned with the environment and has put in a lot of effort to reduce their greenhouse gas emissions especially now that Global warming is a major issue in society. However, it would also be nice to see Apple produce their products in a way which did not affect workers rights. I found a story which claims various Chinese workers are exploited, http://www.guardian.co.uk/technology/2011/apr/30/apple-chinese-factory-workers-suicides-humiliation
  •  
    Interesting link Jorge.
Mr Brooke

Ordering Pizza in 2015 | American Civil Liberties Union - 7 views

  •  
    "Ordering Pizza in 2015"
  • ...1 more comment...
  •  
    Scary! After this video I surely don't want to order another pizza. The social and ethical issue here is surely privacy. With only one phone call, people can "wire into the system" and be able to view this type of personal information. Plus, if this is in 2005, nowadays not only we can figure out this information, but also more! Privacy is becoming a great issue as we are seeing that as technology is increasing, the less privacy we have, more people are starting to be able to access people's personal information. Relating to this videos, solutions that could apply could be: 1. When ordering a pizza, instead of calling from your mobile phone or home phone, call from the nearest phone booth to your house an order to somewhere near your house. Yet, don't give any personal information such as home address or mobile phone number. 2. Don't order! Go to the pizzaria and buy your pizza straight from the restaurant. In this way, you surely don't have to give any personal information so that you'll have more privacy than if you called from your phone.
  •  
    The social and ethical issue here is surely privacy. We can see here that there are various databases which are interconnected and the pizza restaurant is able to access all of them. This is a major issue as the pizza restaurant can invade the customers privacy and use the data to exploit the customer e.g. the pizza restaurant may see that the customer is wealthy and charge a higher price. Furthermore, If anyone else can gains access to this information the customers safety can be put at risk for instance, the pizza service knows whether or not you are at home therefore this could increase home robberies.
  •  
    i think this can even be considered dangerous. There could be a scenario where a young and wealth girl places the pizza offer. what could happen then is the person on the phone would know all her private information where she lives, where she works/studies her income and would probably end up with a picture of her. the person on the phone might not be a very reliable person and decide to do something dangerous
Isy :)

'Anonymous' targets German far-right with Nazi-leaks.net - 7 views

  •  
    The social and ethical issues that relate to this article are that privacy and security and reliablility to a certain extent. What the Anonymous group are doing is basically taking people's personal information such as name, age, adress etc. and putting online for everyone to see, simply becuase they favoured nazi views. This is essentially the invasion of people's privacy as people's information is free for everyone to see. IT is also a security issue as people who feel very strongly against people who favour nazi views, have access to these peoples' adresses and could impose a danger. Reliability is also an issue, as it's mentioned in the article that none of the people that were mentioned in the website were actually confirmed to share Nazi ideals, meaing they are unjustly putting people in danger.
  • ...1 more comment...
  •  
    One of the problems here is the authenticity of data being released. ""This is a lot of data, but there are already some names where it's clear the people are not right-wing extremists." Some people identified in the data had merely been contacted by right-wing publications seeking interviews, she added." Some of the people on the list are not Nazis. What could be a solution to this?
  •  
    The article does raise some rather interesting social and ethical concerns. The main thing here is of course "Anonymous" breaking the Data Protection Act 1998 with their unlawful obtaining of personal information. While one can admire "Anonymous" fight against neo-nazism, the results they are producing are in fact not reliable. Though, as we've seen in the past, "Anonymous" are skilled proper encryption and security should have been able to fend them off and safeguard all information. Looking back, this would have the ideal to avoid the situation the websites are in now. I cannot see a plausible way of undoing this, and again give privacy to those who had it broken, as the information has been linked to multiple other sites - so perhaps this is only to serve as a lesson for others websites containing personal information.
  •  
    Well, to be honest the best solution would just to not post any private information online but seeing as that option wouldn't be considered by the 'anonymous' hacker group they could at least find a way and make sure that the only personal information posted online its authentic and from the main followers and contributors to this Nazi supporting website… but I don't really know how they would be able to do this, sooo if anyone knows please share because now I'm curious aha As much as I don't agree with the Nazi ideals and as much as I believe that supporting them is (sorry for being improper here) idiotic. I still don't agree with posting this private information online because as mentioned above, this does pose a major danger to the people whose information has been posted online by the people who have very strong feelings against these Nazi supporters.
Ines Simon

Study: Multitasking hinders youth social skills - CNN.com - 7 views

  • A few years ago, Nass worked on a study about how multitasking affects adults. He found that heavy multitaskers experience cognitive issues, such as difficulty focusing and remembering things. They were actually worse at juggling various activities, a skill crucial to many people's work lives, than those who spent less time multitasking, Nass said.
    • Ines Simon
       
      "Heavy multitaskers experience cognitive issues, such as difficulty focusing and remembering things."
  •  
    (CNN) -- FaceTime, the Apple video-chat application, is not a replacement for real human interaction, especially for children, according to a new study. Tween girls who spend much of their waking hours switching frantically between YouTube, Facebook, television and text messaging are more likely to develop social problems, says a Stanford University study published in a scientific journal on Wednesday.
  •  
    Employees of Silicon Valley giants like Google, Apple, Yahoo and Hewlett-Packard opt to send their children to computer-free Waldorf schools. These subscribe to a teaching philosophy focused on physical activity and learning through creative, hands-on tasks. They affirm that computers inhibit creative thinking, movement, human interaction and attention spans. Computers are not allowed in classrooms and "their use at home" is frowned upon. "Teaching is a human experience," says an associate professor of education at Furman University, "Technology is a distraction when we need literacy, numeracy and critical thinking." "And where advocates for stocking classrooms with technology say children need computer time to compete in the modern world, Waldorf parents counter: what's the rush, given how easy it is to pick up those skills?" http://www.nytimes.com/2011/10/23/technology/at-waldorf-school-in-silicon-valley-technology-can-wait.html?_r=4&pagewanted=all
  •  
    It's true that computers can give a person bad habits, I do not doubt that. But the article is not offering any numbers nor web page reference of any kind; so we cannot verify this easily. However, my point is that perhaps computers have not made anyone more antisocial, than what they would have been without computers. The articles says that "Young girls who spend the most time multitasking between various digital devices, communicating online or watching video are the least likely to develop normal social tendencies", but what is "normal social tendencies"? There will be some of these young girls without "normal social tendencies", but I doubt that the difference between these young girls, and the ones who does not multitask - is about the same amount of girls without these normal tendencies. Not all mice are gray, some are brown. Not all users of IT are antisocial, some who aren't will be antisocial as well.
Mr Brooke

CISCO Telepresence and Wikileaks | ITGS Online - 6 views

  •  
    This is the page from the school presenting the "pros" of wikileaks. The basis of the presentation is sound and you should think about the issues talked about on the page. Please make contributions to our wiki.
Fiche Galinha

BBC News - Google admits profiting from illegal Olympic ticket ads - 6 views

  •  
    This article has made clear that the AdWords advertising system is flawed, it is unacceptable for a large company like Google to lead users to believe that a website can be trusted using the 'sponsored links' and continues to make profit. This goes against the 6th point in Google's philosophy "You can make money without doing evil" although they are not doing it consciously. From the article I understood that the system is run using an automated filter to identify websites which break Google's policy and a manual assessment also takes place by a human. Instead of using just one human, a group of humans can assess the adverts to ensure nothing is missed. Furthermore, an update of Google's databases should regularly take place in order to catch illegal websites quicker.
  • ...3 more comments...
  •  
    Here is a list of all Google's philosophy, http://www.google.com/about/corporate/company/tenthings.html
  •  
    Good story this and nice link to Google's philosophy Jorge. This article is a good one for commenting on the relationship between the stakeholder and the IT system. Anyone want to step up and "Describe the relationship of one primary stakeholder to the IT system"?
  •  
    This article raises a huge reliability issue as people are being tricked to buying tickets from fake websites, which are advertised by Google. Due to its increasing reputation over the years, the average internet user will use and think of Google as the most reliable website to navigate, and therefore would trust most of the llinks that would appear when they search for something. The secure and reliable reputation Google has is what makes the fact that these illegal websites being sponsored ads such a large issue. It affects many web users and as they are likely to visit these websites, their personal information such as bank account details and personal details are made public. So security could also be seen as an issue as these people are put at risk as they have given their bank account data to fake websites, who could use the data gain access to bank accounts and steal money.
  •  
    Google's corrupt sponsored links affects nearly every digital citizen, as Google is by far the most popular and used search engine. There is alternatives to Google, but nevertheless Google is the most popular search engine(we're talking 70+% http://www.seoconsultants.com/search-engines/ ) I agree with Jorge's main ideas above. However, I do not think that increasing the number of people checking would make any large difference. It is their filters which needs an update - something I'm sure they're already doing. It does raise some reliability concerns, being the most popular search engine, you'd expect them not to endorse(even unknowingly) corrupt links.
  •  
    The social and ethical issues related to this news story are reliability, privacy and anonimity to an extent. Privacy as the information from the buyers credit card is given to what seems to be an unknown person or company. The multiple stakeholders seen would be the buyer, Google and the advertiser. Although it is via Google that the advertiser gets sell his product, it is important to understand that there are most likely thousands of advertisements added daily to the Google search engine and, referring back to Jorge's point, it would be very likely that humans would fail to see such mistakes as well after repeatedly going through hundreds of adds everyday. The trust and reliance that people have on Google can be misleading and it is evident that to solve such an issue people must be awared of the several scams that they are exposed to every single day in order to prevent this sort of problems.
Mr Brooke

Air France 447 Flight-Data Recorder Transcript - What Really Happened Aboard Air France... - 6 views

  •  
    "For more than two years, the disappearance of Air France Flight 447 over the mid-Atlantic in the early hours of June 1, 2009, remained one of aviation's great mysteries. How could a technologically state-of-the art airliner simply vanish? "
  •  
    This article presents us the feedback system of the airplane's autopilot. According to the reliable source of wikianswers, feedback is when The input is adjusted based on the output of the system so as to achieve a certain end, like minimizing disturbance, cancelling echo (in a speech system) and so on. http://wiki.answers.com/Q/What_is_a_feedback_system#ixzz1jUMOZkrU Here is how the autopilot system works: Through the various sensors and measuring instruments located in the body of the airplane, data such as "such as groundspeed, altitude, engine settings, and rate of climb" is logged in real-time. This data is sent to the processor of the pilot's computer It is then processed and the computer stipulates what controls to actuate in order to stabilise flight "The Airbus is a fly-by-wire plane; the control inputs are not fed directly to the control surfaces, but to a computer, which then in turn commands actuators that move the ailerons, rudder, elevator, and flaps." (the processor requests the output controls to be carried out)
benjon hamal

BBC News - Google China e-mail hack: FBI to investigate - 5 views

  •  
    The main social and ethical issue in this article is security and privacy. Using a method known as 'spear-phising', hackers were handed users' account information. I find it quite freightning how people, who are supposed to be some of the best minds in the world, as they work in sensitive parts of the US government, fall into the trap of giving their account information to hackers. In my opinion a greater awareness should be raised, on how to protect their privacy, among high-profile government officials in order to protect vital and classified information.
  • ...1 more comment...
  •  
    I agree with Andre as though the consequences of the hack can be dealt with in a relatively short amount of time, the incident reveals a bigger problem with the security of the government's files and questions just how safe confidential information really is from being accessed by the wrong people. The main social and ethical issue is security, as the security of US official's e-mails may have been breached by fishing. The fact that such an incident has occurred in such a place with such important information and with supposedly very high security measures is worrying, and ways to detect and combat the threat of phishing should be publicized.
  •  
    this is racism...
  •  
    In what way is this racism Zhan?
Fiche Galinha

Toshiba recalls 41,000 laptops for overheating | Circuit Breaker - CNET News - 5 views

  • The CPSC said 129 instances of "overheating and deforming the plastic casing area around the AC adapter plug" had been reported. Two of those reports resulted in "minor burn injuries that did not require medical attention" and two in minor property damage.
  •  
    This article demonstrates that there is a reliability issue with the Satellite T130 laptop production, the main problem is that the DC is faulty which leads to the melting of the AC adapter. Toshiba has recognised this problem and has posted a solution on their forum. http://www.csd.toshiba.com/cgi-bin/tais/support/jsp/bulletin.jsp?soid=2761378
Mr Brooke

Continued: Debating the Pros and Cons of Wikileaks' Afghan War Diary « ZERO A... - 5 views

  •  
    Some good arguments here and links to further reading
joey <3

jail breaking iphones - 1 views

shared by joey <3 on 20 Oct 11 - No Cached
Jorge F1 liked it
  •  
    Please add the appropriate tags. You can find them here: http://itgsopedia.wikispaces.com/Global+Tagging
  •  
    Nice, i also have this issue with my iPod Touch.
  •  
    Jail break! My brother has it on his phone, he can get loads of apps for free.
benjon hamal

BBC News - Facebook works with Websense to add phishing safety net - 5 views

  •  
    Don't forget the other tags. You are missing one from section 2 and one from section 3
  • ...1 more comment...
  •  
    Privacy is the main issue being presented as facebook users are exposed to phising. Phising involves 'stealing' a users username and passwords usually through emails or links leading to fake websites which seem to be trustworthy. Phishing attempts give the user a sense of urgency in order to convince them to give their information. (e.g. You need to provide us with your username and password as soon as possible. Not doing so will result in permanent deletion of your account) The relationship between the users and the IT system is that users often use facebook on a day to day basis to perform various activities. This makes facebook a 'profitable' target due to the large number of people that can be tricked at once. The risk is that the stakeholders may be susceptible to is the loss of their username and password, giving the hacker/phisher full acess to ones account which may then lead to other information to be divulged about the user. Facebook is attempting to solve this issue by warning users about suspicious links they may be accessing, although there are already some security options in facebook settings such as the use of HTTPS which provides "encrypted communication and secure identification of a network web server." http://en.wikipedia.org/wiki/HTTP_Secure
  •  
    Seems to be a good solution but what are the limits of this solution?
  •  
    In theory this would be a good solution, due to the fact that as soon as the user read the warning message in detail, they would feel encouraged not to follow the link. However, due to the facebook's nature, in practice, this solution isn't as effective as one would expect. Throughout Facebook's history, when a user clicks a link that leads to an application, a message appears stating that if the user accepts then information from their profile will be accessed. Because of this, when users see this message they will simply think it is one of the usual messages and skip to the link due to habit. Another obvious limitation is the fact that all it does is simply suggest that it MIGHT be malicious, and therefore most users that are unaware of the dangers of phishing might ignore it and choose to follow the link.
El Mexicano Pastiche

Hackers expose defence and intelligence officials in US and UK - 4 views

  •  
    This article presents intellectual property theft of civil servants. The article raises many ethical issues such as of privacy, anonymity, security etc. The hackers have accessed private information of government officials, (some of them who work in sensitive areas) their details and emails. Some officials fear that their e-mails can be quickly cracked using off the self software. Some companies client's credit card numbers and addresses were also hacked. The hackers, who are an anonymous groups have clearly violated the privacy rights of individuals. Exposing civil servants data can turn out to be of serious problem for the government. New methods should be developed to secure these confidential data.
  • ...2 more comments...
  •  
    Good overview of the issues there Benjon. Intellectual property is not the issue here however so be careful using terminology correctly. You have stated one of the problems can anyone be more specific about that problem and provide a solution?
  •  
    The article depicts how the personal information of various government organisations have been illegally accessed, furthermore these details have been posted on a vast amount of websites and details such as email passwords etc can be easily cracked using off the shelf software. This means that anyone who has seen the exposed data can easily gain further access to credit card details etc. Furthermore, this puts lives at risk for MI6 agents especially as their cover is supposed to maintain secret, if that sort of information gets into the wrong hands the cover of many agents will be blown and their lives will be at risk.
  •  
    There are various different ways in which security could be improved to prevent a similar incident from happening. It is mentioned in the article, and by Benjon that simple of the shelf software would be capable of decrypting the passwrords stored on the Stratfor database. This in my opinion is quite shocking as Stratfor offers its service to government officials all around the world, most likely for a monetary fee, and seem to not care whether or not the information they are MEANT to secure is infact secure. This issues could be easily solved by improving their encryption technology to or close to military grade encryption. It is most likely that the company's reputation has been severely damaged and rightly so.
  •  
    Nice link here explaining basics of military encryption: http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard Also I follow this guy's blog and he always has some interesting stories on security and has done a lot of work in the world of cryptography: http://www.schneier.com/
1 - 20 Next › Last »
Showing 20 items per page