Security: Difference between revisions

Content added Content deleted
No edit summary
No edit summary
Line 115: Line 115:


===Select Programs, Applications, Software===
===Select Programs, Applications, Software===

TOR Vidalia project.




Line 124: Line 126:
Bambauer, Derek, and Oliver Day. 2010. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1561845 The Hacker's Aegis]. March 1. (Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845). SSRN.
Bambauer, Derek, and Oliver Day. 2010. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1561845 The Hacker's Aegis]. March 1. (Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845). SSRN.


Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com.
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com.


Mayer, Jonathan. 2011. [http://cyberlaw.stanford.edu/node/6694 Tracking the Trackers: Early Results]. July 12. Stanford, CA: Stanford Law School.
Mayer, Jonathan. 2011. [http://cyberlaw.stanford.edu/node/6694 Tracking the Trackers: Early Results]. July 12. Stanford, CA: Stanford Law School.


'''Android'''

Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.




Line 159: Line 166:


===Select Websites===
===Select Websites===

Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google.