Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Lecture 7: CSCI E-1 Spring 2013
Search
Tommy MacWilliam
April 10, 2013
Education
0
620
Lecture 7: CSCI E-1 Spring 2013
Tommy MacWilliam
April 10, 2013
Tweet
Share
More Decks by Tommy MacWilliam
See All by Tommy MacWilliam
Lecture 9: CSCI E-1 Spring 2013
tmacwill
0
330
Lecture 8: CSCI E-1 Spring 2013
tmacwill
0
500
Lecture 6: CSCI E-1 Spring 2013
tmacwill
1
480
Lecture 5: CSCI E-1 Spring 2013
tmacwill
1
650
Incorporating Version Control into Programming Courses
tmacwill
1
120
Lecture 4: CSCI E-1 Spring 2013
tmacwill
0
440
Lecture 3: CSCI E-1 Spring 2013
tmacwill
0
530
Lecture 2: CSCI E-1 Spring 2013
tmacwill
0
860
Lecture 1: CSCI E-1 Spring 2013
tmacwill
0
320
Other Decks in Education
See All in Education
チーム開発における責任と感謝の話
ssk1991
0
240
2025/06/05_読み漁り学習
nag8
0
190
Avoin jakaminen ja Creative Commons -lisenssit
matleenalaakso
0
2k
高校におけるプログラミング教育を考える
naokikato
PRO
0
160
サンキッズゾーン 春日井駅前 ご案内
sanyohomes
0
920
みんなのコード 2024年度活動報告書/ 2025年度活動計画書
codeforeveryone
0
290
JOAI2025講評 / joai2025-review
upura
0
420
RSJ2025 ランチョンセミナー 一歩ずつ世界へ:学生・若手研究者のための等身大の国際化の始め方
t_inamura
0
280
Common STIs in London: Symptoms, Risks & Prevention
medicaldental
0
140
Présentation_1ère_Spé_2025.pdf
bernhardsvt
0
210
附属科学技術高等学校の概要|Science Tokyo(東京科学大学)
sciencetokyo
PRO
0
150
生成AIとの上手な付き合い方【公開版】/ How to Get Along Well with Generative AI (Public Version)
handlename
0
630
Featured
See All Featured
The Power of CSS Pseudo Elements
geoffreycrofte
77
6k
We Have a Design System, Now What?
morganepeng
53
7.8k
StorybookのUI Testing Handbookを読んだ
zakiyama
31
6.1k
Performance Is Good for Brains [We Love Speed 2024]
tammyeverts
12
1.1k
ピンチをチャンスに:未来をつくるプロダクトロードマップ #pmconf2020
aki_iinuma
126
53k
Making the Leap to Tech Lead
cromwellryan
135
9.5k
Connecting the Dots Between Site Speed, User Experience & Your Business [WebExpo 2025]
tammyeverts
8
520
Responsive Adventures: Dirty Tricks From The Dark Corners of Front-End
smashingmag
252
21k
BBQ
matthewcrist
89
9.8k
Understanding Cognitive Biases in Performance Measurement
bluesmoon
29
1.9k
Gamification - CAS2011
davidbonilla
81
5.4k
How to train your dragon (web standard)
notwaldorf
96
6.2k
Transcript
Computer Science E-1 Lecture 7: Privacy and Design
Malware
Viruses
Melissa Virus
Worms
Botnets
DDoS
Conficker
ILOVEYOU
Spyware
Keyloggers
Trojan Horses
Adware
Anti-Malware
Passwords
Dictionary Attack
Password Safes
Hashing Passwords
MD5, SHA-1
Deleting Files
DBAN
Disk Encryption
Cold Boot Attack
None
http://youtu.be/JDaicPIgn9U
Authentication
None
OpenID
None
Authorization
OAuth
None
Cookies
None
None
http://arstechnica.com/business/ 2013/02/firefox-22-will-block-third- party-cookies/
Logs
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
User Agent
157.166.226.25 - - [31/Mar/2013:03:39:47 +0000] "GET /cats HTTP/1.1" 200 37813
"-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/ 26.0.1410.43 Safari/537.31"
Netscape, Mosaic
WebKit, KHTML, Gecko
http://webaim.org/blog/user-agent- string-history/
Analytics
None
A/B Testing
Protecting Privacy
Proxy Server
None
Switching User Agents
None
TrueCrypt
GPG
None
Hacking
“To programmers, "hacker" connotes mastery in the most literal sense:
someone who can make a computer do what he wants —whether the computer wants to or not.”
Cracking
DMCA
Copyright
DRM
Design
CRAP
Contrast Repetition Alignment Proximity
Contrast
None
None
Repetition
None
Alignment
None
None
Proximity
None
None
Usability
Visibility of system status
None
Match between system and real world
None
User control and freedom
None
Consistency and standards
None
Error prevention
None
Recognition rather than recall
None
Flexibility and efficiency of use
None
Aesthetic and minimalist design
None
Help users recognize, diagnose, and recover from errors
None
Help and documentation
Typography
None
None
None
None
Leading
Tracking
Kerning
Design Critiques
None
None
None
None
None
None
None
None
None
None
Computer Science E-1 Lecture 7: Privacy and Design