Public or Private (1)
|
|
- Kristin Higgins
- 5 years ago
- Views:
Transcription
1 100% Results from Tutorial 2012 Public or Private (1) 90% 80% 70% 60% CCST Mar, 2013 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 50% 40% 30% 20% 10% 0% No Depends Yes 2 Defining Public vs. Private n It is extremely difficult to define what is public information and what is private information n It depends on context, intention, convention, social norm, legal system, etc. n All of them very difficult to have a solid definition From Private to Public (1) E.g. Consider the fact that you like the girl sitting next to you. 1. You keep it to yourself without telling anybody Private to you, public to nobody else. 2. You tell the girl you like her, started to date each other, but you don t want other people to know about it Private to you and your girlfriend only 3 4
2 From Private to Public (2) 3. You two decided to let your closest friends knows about your relationship Public information among your friends, but not other people. 4. You two decided to get married Public to everybody And many more variations Variation on the situation n Before stage 3, you and your girlfriend are shopping in a public shopping mall, acting like a couple. Situation 1 A stranger on the street saw you two, and realized you two are dating each other Situation 2 Your parent walked by and saw you two, and realized you two are dating each other Do you feel your privacy being violated in either scenarios? 5 6 Some Definitions of Privacy n The issue isn t privacy but control: control of our information and our identities -- Jeff Jarvis, Public Parts, p.93. n privacy is not about controlling information, but about having the ability to control a social situation. -- dana boyd Reverse of Default n Note that in the earlier example, information starts from being private and progress into public information. è Public through effort n A new generation, pioneered by Facebook, has a reverse default that information is public by default è Private through effort E.g. message on a FB wall is viewable by all your friends/public by default, made private by setting it explicitly 7 8
3 Evolution of Facebook Default A visualization by Matt McKeon Questions to Ponder Upon n What kind of information about you is available, both offline and online? n How do you control the access to the information? n How do you control how your information can be used? n Where do you draw a line between public and private information? n How do you protect your private information? n Why do you need to protect your private information? 9 10 Content of your s/IMs n Almost 100% of the students said the contents of their s should remain private. Survey from CCST But are they really private? 11 12
4 A packet passes through many networks! All your conversations Tier 3 Tier-2 Tier-2 Tier 1 Tier 1 Tier-2 Sending Letters are transmitted as data packets that travel across the Internet. Everybody in the middle can take a look at your message. NAP Tier 1 Do you expect the postmen to read your content of your letter before they deliver your mail? Tier-2 Tier-2 Photo by gbaku Sending Postcards Content is wide open Are s/ims more like sealed letters or postcards? Do you expect the postmen to read the content of your postcard before they deliver your mail? 14 What makes the difference? Sealing envelope è do not expect people to see the content inside Photo by JohnnyEnglish - A. Letter B. Postcard 15 16
5 Encrypting your messages n One way to avoid people reading your IMs (and s) while it travels across the Internet is to encrypt the messages n Many kinds of encryption: Encrypting the content Application layer Encrypting the traffic Transport layer Encrypting the physical network And more Without Encryption Transport Layer Encryption With Server in Between 9c8sk 9c8sk e.g. When you type https in the web browser e.g. You may be connected to an e-commerce site securely with https, but the site relay your information insecurely
6 Caveats n The server in the middle will know all your /IM content The server knows exactly where and who are you talking to An adversary breaks into the server has the same knowledge n User do not know exactly what kind of encryption is used Usually just a simple encrypt chat button n Not all /IMs provide built-in encryption End-to-end Encryption Orange Orange b6c70 Orange Orange Built-in Encryption Facility? ICQ/AIM Yahoo Messenger Google Talk MSN messenger An adversary may obtain the transmitted information but true meaning is still hidden Example: Dorabella Cipher n Supposedly an encrypted message by music composer Edward Elgar to Miss Dora Penny in 1897 n True meaning remains unsolved until today n An example of Application Layer end-to-end encryption Application Layer Encryption n For example, if you and your friend understand apple means YES; orange means NO. Then everybody else will only see apple and orange But n You need different ways to code your message to different friends n Also, with insecure lower layer, you increase the chance that someone can break your encryption n E.g. It s quite easy to decrypt simple codebook messages like above if a bad person knows something about you 23 24
7 Encryption Summary n Transport layer encryption provides endto-end connection between two machines on the Internet n But many applications rely on the presence of a centralized server The server might be able to see all content in some cases n True, application-layer encryption avoid any entity in the middle to decrypt the content Administrivia n Quiz next week Covers lecture & tutorial materials since last quiz n Homework 1 is being graded Results will be available next week n Homework 2 will be posted by end of this week Individual homework Due 5 April 20% penalty per late day Submit through Moodle Automatic plagiarism check through integrated Turnitin function 27 28
8 Current Location n In the same survey from 2012 ~60% said private ~20% said depends n Most of you said depends on how precise the location information is OK if it is about the level of city NOT OK if it is very precise How well modern technologies can track your position? Knowing your Location n IP address n Global positioning system n WiFi access point association n Cellphone tower association n Digital photos n Many more 31 32
9 Identifying Computer n Computers are identified by the IP address on the Internet n Current standard (2012), IPv4 address expressed as 4 numbers between 0 to 255, separated by a dot E.g n Each computer MUST have a unique public IP address on the Internet Maximum about 4 billion addresses in IPv4 Locating IP Addresses n IP addresses are allocated by an international body called Internet Assigned Numbers Authority (IANA) n IP addresses allocated hierarchically IANA è Regional Internet Registries (RIR) RIR è Internet Service Provider () n The ownership of each IP address can be traced n i.e. A lot can be found out from just the IP address Information from IP address n From your IP address, many of the following information can be found: Your location Your The corresponding name n Try looking up the following IPs: n Free online tools: Other Information Exposed n Apart from IP address, many more information can be obtained about you: n E.g. Browser Screen resolution Your computer platform n Try:
10 Using your IP location? Datacenter Co-Location Localized Recommendations n Large companies have their data replicated across the globe through colocation E.g. Google, YouTube, Yahoo, etc Allow much faster access to data by redirecting your traffic to the nearest datacenter geographically n Localized service Local search results from Google Localized advertisements Targeted Advertisement n 37 Geographical Location Restrictions 38 Discussion Companies restrict contents to particular physical locations Do you mind your current IP address be known to the webserver (e.g. Facebook, YouTube) you are connected to? A. Yes B. No C. I have no choice 39 40
11 Hiding your IP n One way (there are many ways) to obscure your IP address is to use a proxy server Originally designed for performance enhancement/ management n Instead of connecting from A to B Connect from A to C Ask C to connect to B Web server Returns the result to A proxy Tradeoff in using Proxy Server n Now all your traffic has to go through the proxy server It knows all your content Why would someone wants to redirect your content? For profit? n On the other hand, some companies, countries require the use of proxy servers All contents are managed Filter out unwanted contents Content audit With proxy Without proxy client 41 42
Public or Private (1)
Pi Day: 3.14 Public or Private (1) CCST9015 14 Mar, 2012 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 3.1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923078164
More informationIntroduction to the Internet
Introduction to the Internet CCST9015 8 th Sep, 2010 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Internet in 2003 3 Internet Basics The Internet is a network that connects
More informationThe Internet. Charging for Internet 2/8/12. Conceptual Picture of the Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
2/8/12 The Internet CCST9015 Feb 8, 2012 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How
More informationSession Booklet Social Media & Facebook
Session Booklet Social Media & Facebook Social networking refers to the use of online social networks such as Facebook to communicate with other people. A social network can include blogs and other ways
More informationCLIENT ONBOARDING PLAN & SCRIPT
CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in
More informationCLIENT ONBOARDING PLAN & SCRIPT
CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in
More informationA SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS
A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS EXPLORING THE INTERNET through HOBBIES AND INTERESTS. LEARN HOW TO KEEP IN TOUCH WITH FRIENDS AND FAMILY USING THE INTERNET In these busy times it s easy
More informationThe Free Internet. Questions to Ponder On. Packet Switching Network. Circuit Switch vs Packet Switch. Circuit Switching
The Free Internet CCST9015 Feb 15, 2012 Questions to Ponder On 1. Think of 5 things that you get for free from the Internet. 2. Think of 5 things that you get for free in real life. Dr. Hayden Kwok-Hay
More informationCS Paul Krzyzanowski
Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide
More informationGoogle Docs Tipsheet. ABEL Summer Institute 2009
Google Docs Tipsheet ABEL Summer Institute 2009 Contents Logging in to Google Apps for CollaborativeSchools.net for the First Time... 2 Text Documents Creating a New Text Document in Google Docs... 5 Uploading
More informationThe Basics of Networking
c h a p t e r 3 The Basics of Networking Making the Connection lawrence snyder Times are Changing Nowhere Is Remote People are more interconnected Social interactions are changing Freedom of Seach and
More informationSo on the survey, someone mentioned they wanted to work on heaps, and someone else mentioned they wanted to work on balanced binary search trees.
So on the survey, someone mentioned they wanted to work on heaps, and someone else mentioned they wanted to work on balanced binary search trees. According to the 161 schedule, heaps were last week, hashing
More informationThe Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation
The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? In our experience, we find we can get over-excited when talking to clients or family or friends and sometimes we forget that not everyone
More informationA Step by Step Guide to Postcard Marketing Success
A Step by Step Guide to Postcard Marketing Success Table of Contents Why VerticalResponse?...3 Why Postcards?...4 So why use postcards in this modern era?...4 Quickstart Guide...6 Step 1: Setup Your Account...8
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationComputer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So
Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer
More informationFamily Technology Boundaries:
General questions to answer Family Technology Boundaries: How much time per day/week will various technologies be allowed? Can social media be accessed from all devices? What should children do if they
More informationComputer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017
Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes
More informationAnalytics, Insights, Cookies, and the Disappearing Privacy
Analytics, Insights, Cookies, and the Disappearing Privacy What Are We Talking About Today? 1. Logfiles 2. Analytics 3. Google Analytics 4. Insights 5. Cookies 6. Privacy 7. Security slide 2 Logfiles Every
More informationPrivate Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes
Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationSecurity in ECE Systems
Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today
More informationMeeting 39. Guest Speaker Dr. Williams CEH Networking
Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More information** Pre-Sell Page Secrets **
** Pre-Sell Page Secrets ** Page 1 - CommissionBlueprint.com 2008 Introduction Using a pre-sell page is a highly effective tactic that can be used in almost any market to motivate a visitor into purchasing
More informationMap & Locations 16 Using Google Maps Using HTC Footprints
Map & Locations 16 Using Google Maps...16-2 Turning on Location Services... 16-2 Opening Maps... 16-2 Searching for a Location... 16-3 Getting Directions... 16-3 Finding Friends with Google Latitude...
More informationCyber Smarts Using Social Media Wisely
Cyber Smarts Using Social Media Wisely Posted on March 24, 2016 by Shridevi Stock Photo You have access to the world s largest museum, art gallery, library and social group ever created. You also have
More informationSocial Networking Applied
Social Networking Applied 1 I. Facebook Social Networking Applied Uses: An address book: Facebook users can share their current city, e-mail address, phone number, screen name, street address, and birthday
More informationIntroduction to the Internet. Internet Basics. Back in time ARPANET 11/20/10 ENGG st semester, Hayden Kwok-Hay So
11/20/10 Introduction to the Internet ENGG1015 1st Semester, 2010 Hayden Kwok-Hay So 2 Internet Basics The Internet is a that connects millions of of computing devices throughout the world. The Internet
More informationStudent Guide INTRODUCTION TO ONLINE RESOURCES
Student Guide INTRODUCTION TO ONLINE RESOURCES Date: 12. March. 2018 By: Technical Support Team Table of Contents 1) Introduction 3 2) Student Panel (SIS) 3 2.1) Student Panel (SIS) Login 3 2.1.1) Definitions
More informationTELSTRA TECH SAVVY SENIORS - BEGINNERS GUIDE INTRODUCTION TO SOCIAL MEDIA - PART 1
TOPIC: INTRODUCTION TO SOCIAL MEDIA PART 1 WHAT TO USE AND WHEN The internet helps you stay in touch with friends and loved ones. Social media sites like Facebook and Twitter let you see what s happening
More informationWebsite Designs Australia
Proudly Brought To You By: Website Designs Australia Contents Disclaimer... 4 Why Your Local Business Needs Google Plus... 5 1 How Google Plus Can Improve Your Search Engine Rankings... 6 1. Google Search
More informationFacebook Basics. Agenda:
Basics Agenda: 1. Introduction 2. The evolution of Facebook 3. Your profile 4. Finding friends 5. Saving and sharing 6. Chat and messages 7. Facebook privacy 8. Practice, Questions, Evaluation In order
More informationCourse Staff Intro. Distributed Systems Intro. Logistics. Course Goals. Instructor: David Andersen TAs: Alex Katkova.
Distributed Systems Intro Instructor: David Andersen TAs: Alex Katkova Course Staff Intro Jonathan Harbuck Administrative: Angela Miller Logistics Course Policies see web page... http://www.cs.cmu.edu/~dga/15-440/f10
More informationGOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL
GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP INSTRUCTIONS WITH
More informationKey questions to ask before commissioning any web designer to build your website.
Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,
More informationFACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:
FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,
More informationVoIP/SIP: Economy and Mobility
Nowadays VoIP-services become more and more popular all over the world. VoIP stands for Voice Over Internet Protocol, a communications protocol that allows for telephonic communication via the Internet.
More informationStudent Guide INTRODUCTION TO ONLINE RESOURCES
Student Guide INTRODUCTION TO ONLINE RESOURCES Date: 08. June. 2017 By: Technical Support Team STUDENT GUIDE southwales.unicaf.org 1)Introduction...4 2)Student Panel (SIS)...4 2.1)Student Panel (SIS) Login...4
More informationGetting Started with Moodle
Getting Started with Moodle Moodle is the Virtual Learning Environment (VLE) for the University of Kent. Your teachers will use Moodle to provide course materials such as handouts, lecture notes and PowerPoint
More informationUser Manual for Student. Moodle Administrator
User Manual for Student Moodle Administrator 1.Introduction About this document This document is part of a Moodle Learning Management System(LMS) documentation Start Guides for Students. What is Moodle?
More informationDistributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to
More informationThe Internet and World Wide Web. Chapter4
The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History
More informationTomTom Navigation app for iphone/ipad Reference Guide
TomTom Navigation app for iphone/ipad Reference Guide Contents Getting Started 6 Start TomTom Navigation app for iphone/ipad... 6 Updating your TomTom Navigation app for iphone/ipad... 6 GPS reception...
More informationComputer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet
More informationMeeting 40. CEH Networking
Cyber@UC Meeting 40 CEH Networking If You re New! Join our Slack ucyber.slack.com SIGN IN! Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach, Recruitment
More informationLecture 41 Blockchain in Government III (Digital Identity)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III
More informationCSC 261/461 Database Systems. Fall 2017 MW 12:30 pm 1:45 pm CSB 601
CSC 261/461 Database Systems Fall 2017 MW 12:30 pm 1:45 pm CSB 601 Agenda Administrative aspects Brief overview of the course Introduction to databases and SQL ADMINISTRATIVE ASPECTS Teaching Staff Instructor:
More informationfeel free to poke around and change things. It's hard to break anything in a Moodle course, and even if you do it's usually easy to fix it.
Teacher s Manual Teacher Manual This page is a very quick guide to creating online courses with Moodle. It outlines the main functions that are available, as well as some of the main decisions you'll need
More informationECE 158A: Data Networks I. Fall 2015 Massimo Franceschetti
ECE 158A: Data Networks I Fall 2015 Massimo Franceschetti What is a Network? A system of links that interconnect nodes in order to exchange information A B We will focus on the INTERNET Where nodes are
More informationWhy isn t your chapter on Facebook?
Why isn t your chapter on Facebook? Last Updated February 2011 Why Facebook? Interact with other Women of Today members Recruit members for your chapter Connect with younger generation Facebook is the
More informationINTRODUCTION TO SOCIAL MEDIA Part 1
TECH SAVVY SENIORS The NSW Tech Savvy Seniors program is a key initiative of the NSW Ageing Strategy and the Telstra Digital Literacy Strategy. Victorian Tech Savvy Seniors is a Seniors Card Age Friendly
More informationBowie Senior Center Surfing the Web
Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful
More informationfacebook a guide to social networking for massage therapists
facebook a guide to social networking for massage therapists table of contents 2 3 5 6 7 9 10 13 15 get the facts first the importance of social media, facebook and the difference between different facebook
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 08 Tutorial 2, Part 2, Facebook API (Refer Slide Time: 00:12)
More informationvolley: automated data placement for geo-distributed cloud services
volley: automated data placement for geo-distributed cloud services sharad agarwal, john dunagan, navendu jain, stefan saroiu, alec wolman, harbinder bhogan very rapid pace of datacenter rollout April
More informationIntroduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras
Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.
More informationLecture (02) The TCP/IP Networking Model
Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationDefinition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party
Definition Anonymous Communication Hiding identities of parties involved in communications from each other, or from third-parties Who you are from the communicating party Who you are talking to from everyone
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationData Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 18 Tries Today we are going to be talking about another data
More informationIntroduction to Computer Networking
Introduction to Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 17, 2014 Outline General course information Program Preliminary schedule Intro to computer networking:
More informationStudent Guide. By UNICAF University
vnhgfj Student Guide By UNICAF University 1 2 Table of Contents 1) Introduction... 5 2) Student Panel (SIS)... 5 2.1) Student Panel (SIS) Login... 5 2.1.1) Definitions... 5 2.1.2) Registration Email...
More information7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it.
7, 8, 8.1, 10 This presentation is on windows 10. Most if not all procedures we will discuss today will work on all 4 versions of windows talk about today. Below is when support ends for each version.
More informationModern cryptography 2. CSCI 470: Web Science Keith Vertanen
Modern cryptography 2 CSCI 470: Web Science Keith Vertanen Modern cryptography Overview Asymmetric cryptography Diffie-Hellman key exchange (last time) Pubic key: RSA Pretty Good Privacy (PGP) Digital
More informationMoodle Tutorial. Tak Auyeung. April 5, 2006
Moodle Tutorial Tak Auyeung April 5, 2006 1 Self Enrollment Moodle allows you to self enroll with courses. Depending on the class, you may or may not require a password. This section guides you through
More informationLecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)
Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda Introduction to networking architecture Historical
More informationUsing the Staff Directory Portlet
Using the Staff Directory Portlet Table of Contents Introduction... 3 Who Should Use This Guide... 3 Setting Up Roles... 3 Adding a Staff Directory Portlet... 4 Setting up the Staff Directory... 4 Tabs
More informationHardening Network Routing. Kevin Brady ICTN 4040 April, 2006
Hardening Network Routing Kevin Brady ICTN April, 6 7 NETWO RK P ROCES SI NG ENG INE- 7 NETWO RK P ROCES SI NG ENG INE- 7 NETWO RK P ROCES SI NG ENG INE- In today s world we are constantly reminded of
More informationHaving said this, there are some workarounds you can use to integrate video into your course.
HOW TO SESSION : Options for creating & sharing video Overview Video is everywhere. We watch it on YouTube and Netflix. It s how we get our news, communicate with friends and family in other cities, and
More informationLecture (02) The TCP/IP Networking Model
Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
More informationiaide Mid-term report Moquan Chen & Stian Kilaas
iaide Mid-term report Moquan Chen & Stian Kilaas Table of Contents Introduction... 3 Background... 3 Process... 3 Goal... 4 Evaluation of existing applications... 4 Transport: TaxiNå!, Trafikanten, Google
More informationUnderstanding Today s Mobile Device Shopper. Google/Compete, U.S. Mar 2011
Understanding Today s Mobile Device Shopper Google/Compete, U.S. Mar 2011 Methodology This study was based on understanding the attitudes of online users who identified themselves as wireless purchasers
More informationOnline Marketng Checklist
Online Marketng Checklist By Claude Bailey PUBLISHED BY: Weston Bailey, LLC Copyright 2016 Weston Bailey, LLC Contents Is My Website Mobile-Friendly?... 3 Is My Website Indexed By The Big 3 Search Engines?...
More informationGOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL
Your Your Company Logo Logo GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL GOOGLE RECONSIDERATION REQUESTS DOCUMENTATION ADDS STEP-BY-STEP
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More informationGathering Open Source Intelligence Anonymously Ntrepid Corporation. All rights reserved. PROPRIETARY
Gathering Open Source Intelligence Anonymously Background Founded Anonymizer in 1995 Creating Solutions Since 1992 Known for Consumer Privacy Service Major Corporate and Government Customers 2 Exposed
More informationCertificate-based authentication for data security
Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important
More informationFIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE
FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE CONTENTFAC.COM As an FYI, this document is designed to go along with our video by the same name. If you haven t checked that out yet, you
More informationCSCI 1100L: Topics in Computing Lab Lab 1: Introduction to the Lab! Part I
CSCI 1100L: Topics in Computing Lab Lab 1: Introduction to the Lab! Part I Welcome to your CSCI-1100 Lab! In the fine tradition of the CSCI-1100 course, we ll start off the lab with the classic bad joke
More informationCS November 2018
Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University
More informationFacebook Basics (for individuals)
P a g e 1 Facebook Basics (for individuals) ABOUT THIS CLASS This class is designed to give a basic introduction into Facebook Basics. Throughout the class, we will progress from learning how to create
More informationWelcome to Moodle! How To Moodle
Welcome to Moodle! The MH Vicars School Moodle site is where you ll find all the online components of your Vicars curriculum. For the following year, this will include quizzes and access to multimedia
More informationINTRODUCTION TO CLOUD STORAGE
INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What You Will Learn WHAT IS THE CLOUD? PAGE 03 Basic Vocabulary Advantages of the Cloud Disadvantages of the Cloud CLOUD STORAGE SERVICES
More informationA Letting agency s shop window is no longer a place on the high street, it is now online
A Letting agency s shop window is no longer a place on the high street, it is now online 1 Let s start by breaking down the two ways in which search engines will send you more traffic: 1. Search Engine
More informationProblem Solving through Programming In C Prof. Anupam Basu Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Problem Solving through Programming In C Prof. Anupam Basu Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 15 Branching : IF ELSE Statement We are looking
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationBuilding an Online Presence Where to Start? An Introduction to Establishing your Digital Reputation. Michelle Jordan, Executive Director
findlocalstorage.com Building an Online Presence Where to Start? An Introduction to Establishing your Digital Reputation Michelle Jordan, Executive Director Host: Storage Business Owner s Alliance (SBOA)
More informationNow that you have your phone, computer or tablet, and your and code.you re ready to get started!
RDS Parent Access How to Manual It s easy to track you child s progress in school. All you need is a smart phone or computer, and your child s grades, attendance and test scores are all at your fingertips.
More informationONLINE SAFETY. Messaging, , Vlogging and Sexting
ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.
More informationAn overview of Moodle blocks
An overview of Moodle blocks Academic Advisers When you click on the link in the Academic Advisers block it will display information about the students enrolled on your current Moodle course. You can change
More informationComputer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect
More informationAdvertising Network Affiliate Marketing Algorithm Analytics Auto responder autoresponder Backlinks Blog
Advertising Network A group of websites where one advertiser controls all or a portion of the ads for all sites. A common example is the Google Search Network, which includes AOL, Amazon,Ask.com (formerly
More informationAN SEO GUIDE FOR SALONS
AN SEO GUIDE FOR SALONS AN SEO GUIDE FOR SALONS Set Up Time 2/5 The basics of SEO are quick and easy to implement. Management Time 3/5 You ll need a continued commitment to make SEO work for you. WHAT
More informationHome-Mobile. The Cast Devices. The Cast Network Related (2) The Cast Network Related. Voice over IP (VoIP) Dr. Hayden Kwok-Hay So
The Cast Devices Home-Mobile Desktop Computer Mostly data Wired network Standard Telephone Mostly voice Wired phone line CCST9015 6th Oct, 2010 Dr. Hayden Kwok-Hay So Notebook Computer Mostly data Wireless
More informationLecture 1: Perfect Security
CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 04 Tutorial 1, Part 1 Ubuntu Hi everyone, welcome to the first
More informationMIND THE GOOGLE! Understanding the impact of the. Google Knowledge Graph. on your shopping center website.
MIND THE GOOGLE! Understanding the impact of the Google Knowledge Graph on your shopping center website. John Dee, Chief Operating Officer PlaceWise Media Mind the Google! Understanding the Impact of the
More information