Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Lecture 7: CSCI E-1 Spring 2013
Search
Tommy MacWilliam
April 10, 2013
Education
0
500
Lecture 7: CSCI E-1 Spring 2013
Tommy MacWilliam
April 10, 2013
Tweet
Share
More Decks by Tommy MacWilliam
See All by Tommy MacWilliam
Lecture 9: CSCI E-1 Spring 2013
tmacwill
0
300
Lecture 8: CSCI E-1 Spring 2013
tmacwill
0
410
Lecture 6: CSCI E-1 Spring 2013
tmacwill
1
440
Lecture 5: CSCI E-1 Spring 2013
tmacwill
1
540
Incorporating Version Control into Programming Courses
tmacwill
1
110
Lecture 4: CSCI E-1 Spring 2013
tmacwill
0
400
Lecture 3: CSCI E-1 Spring 2013
tmacwill
0
480
Lecture 2: CSCI E-1 Spring 2013
tmacwill
0
770
Lecture 1: CSCI E-1 Spring 2013
tmacwill
0
320
Other Decks in Education
See All in Education
【COPILOT無料セミナー】エンゲージメントと自律性の高いプロジェクト型人材育成に向けて~プロジェクト・ベースド・ラーニング(PBL)という選択肢~
copilot
PRO
0
190
ThingLink
matleenalaakso
28
3.8k
Tableau トレーニング【株式会社ニジボックス】
nbkouhou
0
23k
Flinga
matleenalaakso
2
13k
Zero to Hero
takesection
0
130
1030
cbtlibrary
0
320
Human Perception and Cognition - Lecture 4 - Human-Computer Interaction (1023841ANR)
signer
PRO
0
750
Security, Privacy and Trust - Lecture 11 - Web Technologies (1019888BNR)
signer
PRO
0
2.6k
LLMs for Social Simulation: Progress, Opportunities and Challenges
wingnus
1
120
人々はさくらになにを込めたか
jamashita
0
120
Repaso electricidade e electrónica
irocho
0
210
Medicare 101 for 2025
robinlee
PRO
0
310
Featured
See All Featured
Put a Button on it: Removing Barriers to Going Fast.
kastner
59
3.6k
Speed Design
sergeychernyshev
25
670
Fontdeck: Realign not Redesign
paulrobertlloyd
82
5.3k
Docker and Python
trallard
41
3.1k
Stop Working from a Prison Cell
hatefulcrawdad
267
20k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
330
21k
The Art of Programming - Codeland 2020
erikaheidi
53
13k
Intergalactic Javascript Robots from Outer Space
tanoku
270
27k
RailsConf 2023
tenderlove
29
940
Done Done
chrislema
181
16k
Why You Should Never Use an ORM
jnunemaker
PRO
54
9.1k
Faster Mobile Websites
deanohume
305
30k
Transcript
Computer Science E-1 Lecture 7: Privacy and Design
Malware
Viruses
Melissa Virus
Worms
Botnets
DDoS
Conficker
ILOVEYOU
Spyware
Keyloggers
Trojan Horses
Adware
Anti-Malware
Passwords
Dictionary Attack
Password Safes
Hashing Passwords
MD5, SHA-1
Deleting Files
DBAN
Disk Encryption
Cold Boot Attack
None
http://youtu.be/JDaicPIgn9U
Authentication
None
OpenID
None
Authorization
OAuth
None
Cookies
None
None
http://arstechnica.com/business/ 2013/02/firefox-22-will-block-third- party-cookies/
Logs
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
User Agent
157.166.226.25 - - [31/Mar/2013:03:39:47 +0000] "GET /cats HTTP/1.1" 200 37813
"-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/ 26.0.1410.43 Safari/537.31"
Netscape, Mosaic
WebKit, KHTML, Gecko
http://webaim.org/blog/user-agent- string-history/
Analytics
None
A/B Testing
Protecting Privacy
Proxy Server
None
Switching User Agents
None
TrueCrypt
GPG
None
Hacking
“To programmers, "hacker" connotes mastery in the most literal sense:
someone who can make a computer do what he wants —whether the computer wants to or not.”
Cracking
DMCA
Copyright
DRM
Design
CRAP
Contrast Repetition Alignment Proximity
Contrast
None
None
Repetition
None
Alignment
None
None
Proximity
None
None
Usability
Visibility of system status
None
Match between system and real world
None
User control and freedom
None
Consistency and standards
None
Error prevention
None
Recognition rather than recall
None
Flexibility and efficiency of use
None
Aesthetic and minimalist design
None
Help users recognize, diagnose, and recover from errors
None
Help and documentation
Typography
None
None
None
None
Leading
Tracking
Kerning
Design Critiques
None
None
None
None
None
None
None
None
None
None
Computer Science E-1 Lecture 7: Privacy and Design