Security: Difference between revisions

631 bytes added ,  12 years ago
no edit summary
No edit summary
No edit summary
Line 116:
===Select Programs, Applications, Software===
 
TOR Vidalia project.
 
 
Line 125:
 
Bambauer, Derek, and Oliver Day. 2010. [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1561845 The Hacker's Aegis]. March 1. (Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845). SSRN.
 
Cluley, Graham. 2011. [http://nakedsecurity.sophos.com/2011/10/10/german-government-r2d2-trojan-faq/ German 'Government' R2D2 Trojan FAQ]. October 10. Naked Security.
 
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com.
 
Mayer, Jonathan. 2011. [http://cyberlaw.stanford.edu/node/6694 Tracking the Trackers: Early Results]. July 12. Stanford, CA: Stanford Law School.
 
Nachawati, Leila. 2011. [http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/ BlueCoat: US technology surveilling Syrian citizens online]. October 10. advocacy.globalvoicesonline.org.
 
 
Which VPN Providers Really Take Anonymity Seriously?. 2011. [https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/ Which VPN Providers Really Take Anonymity Seriously?]. torrentfreak.com.
 
 
'''Android'''
 
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.
 
 
Line 167 ⟶ 174:
===Select Websites===
 
Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google.
 
 
Anonymous user