Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Lecture 7: CSCI E-1 Spring 2013
Search
Tommy MacWilliam
April 10, 2013
Education
0
630
Lecture 7: CSCI E-1 Spring 2013
Tommy MacWilliam
April 10, 2013
Tweet
Share
More Decks by Tommy MacWilliam
See All by Tommy MacWilliam
Lecture 9: CSCI E-1 Spring 2013
tmacwill
0
330
Lecture 8: CSCI E-1 Spring 2013
tmacwill
0
520
Lecture 6: CSCI E-1 Spring 2013
tmacwill
1
490
Lecture 5: CSCI E-1 Spring 2013
tmacwill
1
700
Incorporating Version Control into Programming Courses
tmacwill
1
120
Lecture 4: CSCI E-1 Spring 2013
tmacwill
0
440
Lecture 3: CSCI E-1 Spring 2013
tmacwill
0
530
Lecture 2: CSCI E-1 Spring 2013
tmacwill
0
870
Lecture 1: CSCI E-1 Spring 2013
tmacwill
0
320
Other Decks in Education
See All in Education
Requirements Analysis and Prototyping - Lecture 3 - Human-Computer Interaction (1023841ANR)
signer
PRO
0
1.3k
Avoin jakaminen ja Creative Commons -lisenssit
matleenalaakso
0
2k
Презентация "Знаю Россию"
spilsart
0
260
尊敬語「くださる」と謙譲語「いただく」の使い分け
hysmrk
0
100
The knowledge panel is your new homepage
bradwetherall
0
180
バケットポリシーの記述を誤りマネコンからS3バケットを操作できなくなりそうになった話
amarelo_n24
1
110
EVOLUCIÓN DE LAS NEUROCIENCIAS EN LOS CONTEXTOS ORGANIZACIONALES
jvpcubias
0
180
Introdución ás redes
irocho
0
260
Software
irocho
0
470
アントレプレナーシップ教育 ~ 自分で自分の幸せを決めるために ~
yoshizaki
0
210
今の私を形作る4つの要素と偶然の出会い(セレンディピティ)
mamohacy
2
110
QR-koodit opetuksessa
matleenalaakso
0
1.7k
Featured
See All Featured
The Art of Programming - Codeland 2020
erikaheidi
56
14k
Side Projects
sachag
455
43k
Producing Creativity
orderedlist
PRO
347
40k
Visualization
eitanlees
149
16k
The MySQL Ecosystem @ GitHub 2015
samlambert
251
13k
個人開発の失敗を避けるイケてる考え方 / tips for indie hackers
panda_program
114
20k
Become a Pro
speakerdeck
PRO
29
5.5k
Optimizing for Happiness
mojombo
379
70k
Building Flexible Design Systems
yeseniaperezcruz
329
39k
No one is an island. Learnings from fostering a developers community.
thoeni
21
3.5k
Scaling GitHub
holman
463
140k
Fight the Zombie Pattern Library - RWD Summit 2016
marcelosomers
234
17k
Transcript
Computer Science E-1 Lecture 7: Privacy and Design
Malware
Viruses
Melissa Virus
Worms
Botnets
DDoS
Conficker
ILOVEYOU
Spyware
Keyloggers
Trojan Horses
Adware
Anti-Malware
Passwords
Dictionary Attack
Password Safes
Hashing Passwords
MD5, SHA-1
Deleting Files
DBAN
Disk Encryption
Cold Boot Attack
None
http://youtu.be/JDaicPIgn9U
Authentication
None
OpenID
None
Authorization
OAuth
None
Cookies
None
None
http://arstechnica.com/business/ 2013/02/firefox-22-will-block-third- party-cookies/
Logs
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
User Agent
157.166.226.25 - - [31/Mar/2013:03:39:47 +0000] "GET /cats HTTP/1.1" 200 37813
"-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/ 26.0.1410.43 Safari/537.31"
Netscape, Mosaic
WebKit, KHTML, Gecko
http://webaim.org/blog/user-agent- string-history/
Analytics
None
A/B Testing
Protecting Privacy
Proxy Server
None
Switching User Agents
None
TrueCrypt
GPG
None
Hacking
“To programmers, "hacker" connotes mastery in the most literal sense:
someone who can make a computer do what he wants —whether the computer wants to or not.”
Cracking
DMCA
Copyright
DRM
Design
CRAP
Contrast Repetition Alignment Proximity
Contrast
None
None
Repetition
None
Alignment
None
None
Proximity
None
None
Usability
Visibility of system status
None
Match between system and real world
None
User control and freedom
None
Consistency and standards
None
Error prevention
None
Recognition rather than recall
None
Flexibility and efficiency of use
None
Aesthetic and minimalist design
None
Help users recognize, diagnose, and recover from errors
None
Help and documentation
Typography
None
None
None
None
Leading
Tracking
Kerning
Design Critiques
None
None
None
None
None
None
None
None
None
None
Computer Science E-1 Lecture 7: Privacy and Design