Skip to main content

Home/ SASSIT/ Group items tagged networking

Rss Feed Group items tagged

Peter Ruwoldt

How to Secure Your Wireless Network - 0 views

  •  
    If you don't take steps to secure your wireless network, anyone within range of your router can easily connect to your network. With the latest high performance equipment, your Wi-Fi signal could reach clear down the block. In fact, a hacker could intercept your Wi-Fi signal as far as ten miles away, using a Wi-Fi antenna created with a Pringles can.
Peter Ruwoldt

Network Simulation Tool - Flash - 0 views

  •  
    You can have a network setup step by step and then observe how that network functions via a simulator. It is also possible to set up a network from scratch.
Peter Ruwoldt

Lifehacker, tips and downloads for getting things done - 0 views

  •  
    How to Stay Safe on Public Wi-Fi Networks
Peter Ruwoldt

YouGetSignal.com - Visual Trace Route Tool - 0 views

  •  
    Visual Trace Route
Peter Ruwoldt

Hackers find new way to cheat on Wall Street -- to everyone's peril | The Industry Stan... - 0 views

  •  
    High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts of latency into them. By doing so, they can subtly change the course of trading and pocket profits of millions of dollars in just a few seconds
Peter Ruwoldt

Volunteer Cyber Army Emerges In Estonia : NPR - 0 views

  •  
    In April 2007, the Baltic republic of Estonia became the first country in the world to experience cyberwar. Government, financial and media computer networks were paralyzed by a series of attacks, which authorities ultimately concluded originated in Russia. In the years since that cyberassault, Estonia has distinguished itself once again: Now it is a model for how a country might defend itself during a cyberwar. The responsibility would fall to a force of programmers, computer scientists and software engineers who make up a Cyber Defense League, a volunteer organization that in wartime would function under a unified military command.
Peter Ruwoldt

Evolution of the PC - PC World - 0 views

  •  
    Evolution of the PC Since the personal computer debuted in 1971, a Darwin-esque evolution process has lifted the PC from modest beginnings to its current role as an indispensable part of life in the 21st century. Jon Brodkin, Network World
Peter Ruwoldt

Every Click You Make - washingtonpost.com - 0 views

  • companies involved say customers' privacy is protected because no personally identifying details are released.
  • Although common tracking systems, known as cookies, have counted a consumer's visits to a network of sites, the new monitoring, known as "deep-packet inspection," enables a far wider view -- every Web page visited, every e-mail sent and every search entered. Every bit of data is divided into packets -- like electronic envelopes -- that the system can access and analyze for content.
  • There's a fear here that a user's ISP is going to betray them and turn their information over to a third party
  • ...1 more annotation...
  • uidelines for behavioral advertising have been outpaced by the technology and do not address the practice directly
    • Peter Ruwoldt
       
      Example of where law lags technology
  •  
    The online behavior of a small but growing number of computer users in the United States is monitored by their Internet service providers, who have access to every click and keystroke that comes down the line
Peter Ruwoldt

Cool Waste of Time - A History of the Internet - The Mac Observer - 0 views

  •  
    A History of the Internet, 8min and 10 sec video
Peter Ruwoldt

Virtual doctors about to be wheeled in - National - theage.com.au - 0 views

  •  
    FOUR hospitals in north-western Victoria are about to use "virtual doctors" to help treat emergency and critical-care patients.
Peter Ruwoldt

e-subjects.co.uk - 0 views

  •  
    Moodle based courses for download on various subjects including IT. Networking, databases, computer concepts, programming, ....
Peter Ruwoldt

Who is Hosting This? - 0 views

  •  
    Who is hosting a domain?
Peter Ruwoldt

Privacy and Security Fanatic: Lawsuit Claims Microsoft, McDonald's, Mazda & CBS Used Ad... - 0 views

  •  
    Microsoft, along with McDonald's, Mazda and CBS have been named in a class action suit filed in Federal Court for working in concert with behavioral advertising specialist Interclick. The companies allegedly used their ads as a "cover for data-mining, to identify the websites people visit, invading people's privacy, misappropriating their personal information and interfering with the operations of their computers."
Peter Ruwoldt

Zombie Tech: These Ceiling Lights Are Delivering the Web | Motherboard - 0 views

  •  
    It's simple: instead of radio waves or cables, these ceiling lights are transmitting information via flickering binary code (basically) at a special photosensitive modem.
Peter Ruwoldt

Cisco Explains the 7 Deadly Weaknesses of Social Network Users and More in Security Report - 0 views

  •  
    Cisco warns of the "seven deadly weaknesses" exploited by social engineers: Sex Appeal Greed Vanity Trust Sloth Compassion Urgency
1 - 18 of 18
Showing 20 items per page