Security: Difference between revisions

473 bytes added ,  12 years ago
no edit summary
No edit summary
No edit summary
Line 115:
 
===Select Programs, Applications, Software===
 
TOR Vidalia project.
 
 
Line 124 ⟶ 126:
Bambauer, Derek, and Oliver Day. 2010. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1561845 The Hacker's Aegis]. March 1. (Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845). SSRN.
 
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com.
 
Mayer, Jonathan. 2011. [http://cyberlaw.stanford.edu/node/6694 Tracking the Trackers: Early Results]. July 12. Stanford, CA: Stanford Law School.
 
 
'''Android'''
 
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.
 
 
Line 159 ⟶ 166:
 
===Select Websites===
 
Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google.
 
 
Anonymous user