|
Computer Security
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryHow to Leak to The Intercept Lee, Micah Article 2015 Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely. OptOut Website Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent. Passphrases That You Can Memorize - But That Even the NSA Can't Guess Lee, Micah Article 2015 A passphrase is like a password, but longer and more secure. In essence, it's an encryption key that you memorize. Once you start caring more deeply about your privacy and improving your computer secu... Popular Security Software Came Under Relentless NSA and GCHQ Attacks Fishman, Andrew; Marquis-Boire, Morgan Article 2015 The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n... Preparing for a Digital 9/11 Greenberg, Karen Article 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... With Virtual Machines, Getting Hacked Doesn't Have To Be That Bad Lee, Micah Article 2015 Lee explains how to install and use a virtual machine, a fake computer running inside the real computer. Sources LibraryThe Motherboard Guide to Not Getting Hacked Motherboard Staff 2017 Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherb... US was 'key player in cyber-attacks on Iran's nuclear programme' Obama reported to have approved bid to target Tehran's nuclear efforts Beaumont, Peter; Hopkins, Peter 2012 Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies. Watch your attachments: Microsoft Office bug lets hackers take over computers 2014 A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr... Why you shouldn't trust Geek Squad ever again The government reportedly pays Geek Squad technicians to dig through your PC Patrizio, Andy 2017 The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gen... |