Security: Difference between revisions

581 bytes added ,  11 years ago
no edit summary
No edit summary
No edit summary
Line 53:
|
|}
 
 
 
 
Line 78 ⟶ 80:
 
 
===Select Blogs, Twitters, etc.===
 
 
Line 121 ⟶ 123:
 
===Select Idea Competitions / Conversations / Dialogues===
 
 
===Select Images, Infographics, etc.===
 
 
Line 169 ⟶ 174:
 
===Select Quotes, Quotations, etc.===
 
 
===Select RSS FeedFeeds===
 
 
Line 176 ⟶ 184:
===Select References===
 
Almiraat, Hisham. 2013. [http://advocacy.globalvoicesonline.org/2013/01/10/deletecontrol-campaign-against-digital-repression/ #DELETECONTROL/: Campaign Against Digital Repression]. January 10. Cambridge, MA: Global Voices Online.
 
Almiraat, Hisham. 2013. [http://advocacy.globalvoicesonline.org/2012/12/31/10-new-years-resolutions-to-browse-the-internet-safely-in-2013/ 10 New Year's Resolutions to Browse the Internet Safely in 2013]. Cambridge, MA: advocacy.globalvoicesonline.org.
Line 192 ⟶ 200:
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html
 
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com.
 
Gjelten, Tom and Audie Cornish. 2013. [http://www.npr.org/2013/01/28/170494486/pentagon-to-dramatically-expand-cyber-warrior-force Pentagon To Dramatically Expand 'Cyber Warrior' Force]. January 28. Washington, DC: npr.org.
 
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com.
Line 206 ⟶ 216:
Nachawati, Leila. 2011. [http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/ BlueCoat: US technology surveilling Syrian citizens online]. October 10. advocacy.globalvoicesonline.org.
 
Nakashima, Ellen. 2013. [http://m.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html Pentagon to boost cybersecurity force]. Washington, DC: m.washingtonpost.com.
O’Brien, Danny. 2013. [http://cpj.org/internet/2013/01/yahoo-encrypted-mail-not-moment-too-soon--nor-too.php Yahoo HTTPS mail not a moment too soon, nor too late]. New York, NY: Committee to Protect Journalists.
 
O’Brien, Danny. 2013. [http://cpj.org/internet/2013/01/yahoo-encrypted-mail-not-moment-too-soon--nor-too.php Yahoo HTTPS mail not a moment too soon, nor too late]. New York, NY: Committee to Protect Journalists.
 
Smith, Stacey Vanek. 2012. [http://www.marketplace.org/topics/tech/growing-art-data-dodging The growing art of data dodging]. November 29. Marketplace.
 
Soulskill. 2013. http://mobile.slashdot.org/story/13/01/09/1910210/nokia-redirecting-traffic-on-some-of-its-phones-including-https Nokia Redirecting Traffic On Some of Its Phones, Including HTTPS]. January 09. mobile.slashdot.org.
 
Which VPN Providers Really Take Anonymity Seriously?. 2011. [https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/ Which VPN Providers Really Take Anonymity Seriously?]. torrentfreak.com.
Line 218 ⟶ 230:
 
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.
 
 
===Select Search Engines===
 
 
Line 226 ⟶ 241:
 
 
===Select Societies, Associations, Groups, Networks, etc.===
 
 
Line 248 ⟶ 263:
 
===Select Timelines===
 
 
===Select Twitters===
 
 
Line 262 ⟶ 280:
===Select Websites===
 
#DELETECONTROL/. 2013. [http://www.deletecontrol.nl/ Hivos People Unlimited]. (The Netherlands-based Humanist Institute for Cooperation, Hivos, in partnership with Global Voices Advocacy, Witness, Mideast Youth and Tactical Technology Collective, is launching a campaign called #DELETECONTROL/ ). Netherlands: Hivos People Unlimited.
 
Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google.
Line 289 ⟶ 307:
 
Social Science: http://worlduniversity.wikia.com/wiki/Social_Science
 
 
 
 
Line 528 ⟶ 544:
 
Yahoo Groups' World University and School: http://groups.yahoo.com/group/worlduniversityandschool/
 
 
===RSS Feed===
 
 
Anonymous user