Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Lecture 7: CSCI E-1 Spring 2013
Search
Tommy MacWilliam
April 10, 2013
Education
0
460
Lecture 7: CSCI E-1 Spring 2013
Tommy MacWilliam
April 10, 2013
Tweet
Share
More Decks by Tommy MacWilliam
See All by Tommy MacWilliam
Lecture 9: CSCI E-1 Spring 2013
tmacwill
0
280
Lecture 8: CSCI E-1 Spring 2013
tmacwill
0
360
Lecture 6: CSCI E-1 Spring 2013
tmacwill
1
420
Lecture 5: CSCI E-1 Spring 2013
tmacwill
1
470
Incorporating Version Control into Programming Courses
tmacwill
1
110
Lecture 4: CSCI E-1 Spring 2013
tmacwill
0
370
Lecture 3: CSCI E-1 Spring 2013
tmacwill
0
450
Lecture 2: CSCI E-1 Spring 2013
tmacwill
0
730
Lecture 1: CSCI E-1 Spring 2013
tmacwill
0
320
Other Decks in Education
See All in Education
Course Review - Lecture 12 - Next Generation User Interfaces (4018166FNR)
signer
PRO
0
1.5k
240607_曲建仲_核融合成新顯學 創新技術將帶來全新方向
learnenergy2
0
160
MLH Hackcon: Keynote (2024)
theycallmeswift
0
140
困ったときのガイドライン / We Support You in Any Situation
yasulab
2
3.7k
Цифровые финансы - магистерская программа Финэка МГИМО 2024 г.
niellony
0
670
ブームだけで終わらせない、組織内でコーチングを活用する方法/How to Use Coaching in Your Organization Without It Being Just a Fad
yuko_yokouchi
1
240
英語学習から海外発表までの流れ
yasulab
18
4.1k
Pen-based Interaction - Lecture 4 - Next Generation User Interfaces (4018166FNR)
signer
PRO
0
1.4k
エンジニアの イネーブルメントを支える 技術発信文化の作り方
sedo
0
150
Lecture on Management at Waseda University
tsogo817421
2
590
謙虚なアジャイルコーチ__アダプティブ_ムーブ_による伴走支援.pdf
antmiyabin
0
180
【基本】Oracle Database データベース・ユーザー・セキュリティ入門
oracle4engineer
PRO
1
660
Featured
See All Featured
How to Think Like a Performance Engineer
csswizardry
16
940
For a Future-Friendly Web
brad_frost
174
9.3k
Designing the Hi-DPI Web
ddemaree
278
34k
Atom: Resistance is Futile
akmur
261
25k
Dealing with People You Can't Stand - Big Design 2015
cassininazir
363
22k
The Cult of Friendly URLs
andyhume
76
5.9k
Design by the Numbers
sachag
277
19k
GitHub's CSS Performance
jonrohan
1029
450k
Bootstrapping a Software Product
garrettdimon
PRO
304
110k
Six Lessons from altMBA
skipperchong
26
3.3k
What's in a price? How to price your products and services
michaelherold
242
11k
Writing Fast Ruby
sferik
623
60k
Transcript
Computer Science E-1 Lecture 7: Privacy and Design
Malware
Viruses
Melissa Virus
Worms
Botnets
DDoS
Conficker
ILOVEYOU
Spyware
Keyloggers
Trojan Horses
Adware
Anti-Malware
Passwords
Dictionary Attack
Password Safes
Hashing Passwords
MD5, SHA-1
Deleting Files
DBAN
Disk Encryption
Cold Boot Attack
None
http://youtu.be/JDaicPIgn9U
Authentication
None
OpenID
None
Authorization
OAuth
None
Cookies
None
None
http://arstechnica.com/business/ 2013/02/firefox-22-will-block-third- party-cookies/
Logs
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
User Agent
157.166.226.25 - - [31/Mar/2013:03:39:47 +0000] "GET /cats HTTP/1.1" 200 37813
"-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/ 26.0.1410.43 Safari/537.31"
Netscape, Mosaic
WebKit, KHTML, Gecko
http://webaim.org/blog/user-agent- string-history/
Analytics
None
A/B Testing
Protecting Privacy
Proxy Server
None
Switching User Agents
None
TrueCrypt
GPG
None
Hacking
“To programmers, "hacker" connotes mastery in the most literal sense:
someone who can make a computer do what he wants —whether the computer wants to or not.”
Cracking
DMCA
Copyright
DRM
Design
CRAP
Contrast Repetition Alignment Proximity
Contrast
None
None
Repetition
None
Alignment
None
None
Proximity
None
None
Usability
Visibility of system status
None
Match between system and real world
None
User control and freedom
None
Consistency and standards
None
Error prevention
None
Recognition rather than recall
None
Flexibility and efficiency of use
None
Aesthetic and minimalist design
None
Help users recognize, diagnose, and recover from errors
None
Help and documentation
Typography
None
None
None
None
Leading
Tracking
Kerning
Design Critiques
None
None
None
None
None
None
None
None
None
None
Computer Science E-1 Lecture 7: Privacy and Design