Security: Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 116: | Line 116: | ||
===Select Programs, Applications, Software=== |
===Select Programs, Applications, Software=== |
||
TOR Vidalia project. |
TOR Vidalia project. |
||
Line 125: | Line 125: | ||
Bambauer, Derek, and Oliver Day. 2010. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1561845 The Hacker's Aegis]. March 1. (Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845). SSRN. |
Bambauer, Derek, and Oliver Day. 2010. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1561845 The Hacker's Aegis]. March 1. (Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845). SSRN. |
||
Cluley, Graham. 2011. [http://nakedsecurity.sophos.com/2011/10/10/german-government-r2d2-trojan-faq/ German 'Government' R2D2 Trojan FAQ]. October 10. Naked Security. |
|||
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com. |
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com. |
||
Mayer, Jonathan. 2011. [http://cyberlaw.stanford.edu/node/6694 Tracking the Trackers: Early Results]. July 12. Stanford, CA: Stanford Law School. |
Mayer, Jonathan. 2011. [http://cyberlaw.stanford.edu/node/6694 Tracking the Trackers: Early Results]. July 12. Stanford, CA: Stanford Law School. |
||
Nachawati, Leila. 2011. [http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/ BlueCoat: US technology surveilling Syrian citizens online]. October 10. advocacy.globalvoicesonline.org. |
|||
Which VPN Providers Really Take Anonymity Seriously?. 2011. [https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/ Which VPN Providers Really Take Anonymity Seriously?]. torrentfreak.com. |
|||
'''Android''' |
'''Android''' |
||
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org. |
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org. |
||
Line 167: | Line 174: | ||
===Select Websites=== |
===Select Websites=== |
||
Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google. |
Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google. |
||