Skip to main content

Home/ VCE Info Tech/ Group items tagged information

Rss Feed Group items tagged

Roland Gesthuizen

Guide to securing personal information| Office of the Australian Information Commission... - 0 views

  •  
    This 'Guide to securing personal information' (Guide) provides guidance on the reasonable steps entities are required to take under the Privacy Act 1988 (Cth) (Privacy Act) to protect the personal information they hold from misuse, interference, loss, and from unauthorised access, modification or disclosure. It also includes guidance on the reasonable steps entities are required to take to destroy or de-identify personal information that they hold once it is no longer needed (unless an exception applies).
Roland Gesthuizen

Spies blow their cover through the internet - 0 views

  • Social engineering is the art of manipulating people into divulging confidential information, either through the introduction of malware into computer systems through carefully crafted, personalised emails - spear phishing, obtaining access to security codes - or by orchestrating social contact with intelligence targets.
  • the abundance of personal and career information available on the internet posed a clear security risk for both government and the corporate sector, especially companies engaged in national security work or high technology activities
  • Defence Department security instructions require that ''when engaged in online forums … Defence personnel must exercise professional judgment to ensure no information breaches operational security''.
  •  
    "HUNDREDS of former and some present Australian spies have posted information about their employment with intelligence agencies on the internet in what security experts have called ''a gift for foreign espionage''. "
Roland Gesthuizen

Web security in doubt after discovery of 'Heartbleed' flaw - 0 views

  •  
    "Millions of websites, online stores and social networks are operating with a major security hole in place, exposing user information and financial information to hackers. That is because a core safety mechanism used to secure the internet has a flaw in it. Worse still, it has been in place for over two years and experts are unsure if it has been exploited for criminal or espionage purposes."
Roland Gesthuizen

Malte Spitz: Your phone company is watching | Talk Video | TED - 0 views

  •  
    "What kind of data is your cell phone company collecting? Malte Spitz wasn't too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code - a detailed, nearly minute-by-minute account of half a year of his life. "
Roland Gesthuizen

Jinha Lee: Reach into the computer and grab a pixel | Talk Video | TED - 0 views

  •  
    "The border between our physical world and the digital information surrounding us has been getting thinner and thinner. Designer and engineer Jinha Lee wants to dissolve it altogether. As he demonstrates in this short, gasp-inducing talk, his ideas include a pen that penetrates into a screen to draw 3D models and SpaceTop, a computer desktop prototype that lets you reach through the screen to manipulate digital objects."
Roland Gesthuizen

Wolfram Alpha Drills Deep into Facebook Data - 0 views

  •  
    "Back in January, when Wolfram Alpha launched an updated version of its Personal Analytics for Facebook module, the self-billed "computational knowledge engine" asked users to contribute their detailed Facebook data for research purposes. The researchers at Wolfram Alpha, having crunched all that information, are now offering some data on how users interact with Facebook."
Roland Gesthuizen

Privacy Lost - Four Corners - 0 views

  •  
    "When a contractor from America's National Security Agency (NSA) downloaded tens of thousands of top-secret documents from a highly secure Government network, it led to the largest leak of classified information in history - and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. "
Roland Gesthuizen

'Vexatious' digital activist forces Australian Electoral Commission to release secret c... - 0 views

  •  
    "The Senate has forced the Australian Electoral Commission to disclose the source code of the software that counts Senate preference votes after the organisation refused to release it in response to a freedom-of-information request. "
Colin Sutton

DocHub | Instant Documentation Search - 0 views

  •  
    DocHub is a great resource for finding documentation for whatever programming language you need. It currently includes CSS, HTML, JavaScript, DOM, jQuery, PHP, and Python. You can either search or browse through the properties, making it very easy to find whatever information you need.
Roland Gesthuizen

Good Ol' Excel Is The Ultimate Data Visualization Tool (In Most Cases) - 0 views

  •  
    "Since our post about Infographics, a *lot* of people, stunned by Tufte's "less is more" gif, have been asking us lately what's our recommendation for a data visualization package. Considering the size of their datasets, and the kind of story they wanna tell, our answer has been invariably the same: "Well, use your dusty ol' Excel". Surprising isn't it?"
buycashapp11

Buy Verified CashApp Accounts - BTC Enable Aged CashApp by buycashapp200 - Issuu - 0 views

  •  
    If you're looking to get started in the cryptocurrency world, one of the first things you'll need to do is create a Binance account. Binance is one of the largest and most popular cryptocurrency exchanges, so it's a good idea to have an account there. Creating a Binance account is relatively simple and only requires a few pieces of information from you. However, before you can start trading on Binance, you'll need to verify your account. This process can take a little bit of time, but it's worth it to make sure your account is secure. Once your account is verified, you'll be able to deposit money into it and start trading cryptocurrencies.
1 - 11 of 11
Showing 20 items per page