Skip to main content

Home/ Groups/ SASSIT
Greg Willcocks

Future Student numbers in IT - 12 views

The statistics are leading us to the fact - we are shrinking! Is it true? What can we do at school level? What facts will convince students and parents that we can provide an excellent career path

started by Greg Willcocks on 01 Apr 08 no follow-up yet
Peter Ruwoldt

This is why you need CPU cooling - Snotr - 0 views

  •  
    See what happens when you remove the CPU cooler while playing Quake 3
Peter Ruwoldt

User talk:203.122.254.26 - Wikipedia, the free encyclopedia - 0 views

  •  
    DECS issues with Wikipedia
Peter Ruwoldt

Keep your financial identity secure - 0 views

  •  
    A pdf produced by the Australian Bankers Society outlining methods for individuals to reduce the risk of identity theft
Peter Ruwoldt

Technology Enabled Crime Types - Australian High Tech Crime Centre - 0 views

  •  
    The left hand menu provides links to pages on various technology enabled crime types.
Peter Ruwoldt

Network Simulation Tool - Flash - 0 views

  •  
    You can have a network setup step by step and then observe how that network functions via a simulator. It is also possible to set up a network from scratch.
Peter Ruwoldt

IT Lecture Notes - 0 views

  •  
    Resources that may be useful for ITS
Peter Ruwoldt

Bettscomputers Computers providing free tutorials lessons on Computers - 0 views

  •  
    Graham Betts - IT teacher - IT learning resouces. Hell of a good job
Peter Ruwoldt

Husband facing five years in jail after hacking wife's email - Telegraph - 0 views

  •  
    A husband who suspected his wife was having an affair faces up to five years in jail after reading her emails without her permission.
Peter Ruwoldt

Every Click You Make - washingtonpost.com - 0 views

  • companies involved say customers' privacy is protected because no personally identifying details are released.
  • Although common tracking systems, known as cookies, have counted a consumer's visits to a network of sites, the new monitoring, known as "deep-packet inspection," enables a far wider view -- every Web page visited, every e-mail sent and every search entered. Every bit of data is divided into packets -- like electronic envelopes -- that the system can access and analyze for content.
  • There's a fear here that a user's ISP is going to betray them and turn their information over to a third party
  • ...1 more annotation...
  • uidelines for behavioral advertising have been outpaced by the technology and do not address the practice directly
    • Peter Ruwoldt
       
      Example of where law lags technology
  •  
    The online behavior of a small but growing number of computer users in the United States is monitored by their Internet service providers, who have access to every click and keystroke that comes down the line
Peter Ruwoldt

Business & Technology | UW team researches a future filled with RFID chips | Seattle Ti... - 0 views

  • The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely. "What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
  • Our objective is to create a future world where RFID is everywhere and figure out problems we'll run into before we get there,
  • For more than a year, a dozen researchers have carried around RFID tags equipped with tiny computer chips that store an identification number unique to each tag. Researchers installed about 200 antennas throughout the computer-science building that pick up any tag near them every second.
  • ...12 more annotations...
  • The system can show when people leave the office, when they return, how often they take breaks, where they go and who's meeting with whom,
  • if people don't see the tags, it's easy to forget they are giving out information whenever they come within range of a reader.
  • how to make the technology useful while protecting privacy
  • The system is transparent, so each can tell if the other has checked his whereabouts.
  • Users can search the calendar to jog their memories about when they last saw someone or how, where and with whom they spent their time.
    • Peter Ruwoldt
       
      I can see these things being useful. Like the idea of transparency
  • have been designed to divulge more information than necessary, opening the door to security and privacy problems
  • There's no reason to have remotely readable technology in a driver's license," Borriello said. He recommends a system that requires contact with the surface of a reader, so the license-holder knows when information on his license is being read.
    • Peter Ruwoldt
       
      Ethical issues to choose the right technology for the problem. Good point
  • data from radio tags can be pieced together to offer a detailed profile of a person's habits without his or her knowledge.
  • People don't understand the implications of information they're giving out," Borriello said. "They can be linked together to paint a picture, one you didn't think you were painting."
    • Peter Ruwoldt
       
      Critical for people to be street smart. Important role for schools
  • Last year, the number of police requests for information from London's RFID-based transit card rose from four per month to 100
  • It's important to understand what the technology can do and we, collectively, have to decide what we're going to use it for
  • As soon as it becomes widely used, then it's more attractive and people start attacking it," showing its vulnerabilities, Borriello said. The trouble is "by that time, it's hard to change.
    • Peter Ruwoldt
       
      Good that someone is being proactive about this.
  •  
    The project is meant to explore both positive and negative aspects of a world saturated with technology that can monitor people and objects remotely. "What we want to understand," Borriello said, "is what makes it useful, what makes it threatening and how to balance the two."
Peter Ruwoldt

Gang of 100 Phishers Charged in U.S., Egypt | Threat Level | Wired.com - 0 views

  •  
    A gang of more than 100 alleged phishers has been charged in the U.S. and Egypt in connection with a global scheme to steal bank credentials of victims and siphon money from their accounts.
  •  
    A gang of more than 100 alleged phishers has been charged in the U.S. and Egypt in connection with a global scheme to steal bank credentials of victims and siphon money from their accounts.
Peter Ruwoldt

Microsoft Hotmail accounts hacked into and posted online | Mail Online - 0 views

  •  
    Hotmail security breach spreads as 30,000 Gmail and Yahoo! passwords are posted online
  •  
    Hotmail security breach spreads as 30,000 Gmail and Yahoo! passwords are posted online
Peter Ruwoldt

The Bachelor Guy ยป The Greatest Parking Meter Your City Will Never Install - 0 views

  •  
    An interesting case study scenario for ITS students.
Peter Ruwoldt

Computer Science Unplugged - Home - 0 views

  •  
    A collection of activities designed to teach the fundamentals of computer science without requiring a computer.
Peter Ruwoldt

kidsprogramming wiki - 0 views

  •  
    Mike Leishmann
Peter Ruwoldt

New: The Internet - Snotr - 0 views

  •  
    A revolution in which 15 million people take part!
Peter Ruwoldt

BBC NEWS | UK | UK Politics | Anger over pupils database plan - 0 views

  •  
    Anger over pupils database plan. The government is being urged to scrap a database of all pupils' school records amid data security fears.
Peter Ruwoldt

Antivirus Inventor: Security Departments Are Wasting Their Time - Desktop Security News... - 0 views

  •  
    the inventor of the program that became Norton AntiVirus -- said that about one third of today's security practices are based on outmoded or outdated concepts that don't apply to today's computing environments.
Peter Ruwoldt

ABC Science Show - 29December2007 - Alfred Deakin Innovation Lecture - 0 views

  •  
    Brian Fitzgerald, Head of the Law School at Queensland University of Technology, will discuss the success of open source in the information technology world, and the lessons for other fields of science. Transcript and Audio available at this link
1 - 20 Next › Last »
Showing 20 items per page