background preloader

What is the Deep Web?A first trip into the abyss

What is the Deep Web?A first trip into the abyss

How Faraday Cages Work Electricity is the lifeblood of many aspects of our world. Without volts and amps, many of our technological innovations would cease to exist. Even our bodies wouldn't function without an electrical charge zipping through our cells. But what electricity gives, electricity can take away. Although this form of energy is vital to so much of our lives, it's one of those things that are only good in the right amounts. Too much electricity can electrocute people. But thanks to Michael Faraday, the brilliant 19th-century scientist, and one of his namesake inventions, the Faraday cage, we humans have developed plenty of ways to control electricity and make it safer for our computers, cars and other inventions -- and for us, too. Faraday cages shield their contents from static electric fields. These cages often look distinctly, well, cagelike. Electromagnetic radiation is all around us. That basic function has plenty of fascinating uses in our electrically cluttered and technology-packed world.

Authentication Authentication (from Greek: αὐθεντικός authentikos, "real, genuine," from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data (datum) or entity. In contrast with identification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing's identity, authentication is the process of actually confirming that identity. It might involve confirming the identity of a person by validating their identity documents, verifying the validity of a Website with a digital certificate, tracing the age of an artifact by carbon dating, or ensuring that a product is what its packaging and labeling claim to be. In other words, authentication often involves verifying the validity of at least one form of identification. Methods[edit] Authentication has relevance to multiple fields. Authentication can be considered to be of three types: Attribute comparison may be vulnerable to forgery. Packaging[edit]

Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites “Don’t do your online banking or anything sensitive on a public Wi-Fi network.” The advice is out there, but why can using a public Wi-Fi network actually be dangerous? And wouldn’t online banking be secure, as it’s encrypted? There are a few big problems with using a public Wi-Fi network. Snooping Encryption normally helps protect your network traffic from prying eyes. When you connect to an open Wi-Fi network like one at a coffee shop or airport, the network is generally unencrypted — you can tell because you don’t have to enter a passphrase when connecting. This was illustrated most sensationally with Firesheep, an easy-to-use tool that allows people sitting in coffee shops or on other open Wi-Fi networks to snoop on other people’s browsing sessions and hijack them. Protecting Yourself: If you’re accessing something sensitive on public Wi-Fi, try to do it on an encrypted website. Compromised Devices Compromised laptops and other devices may also be connected to the local network.

Is The Cloud Secure? - Minneapolis, St Paul, Edina| Imagine IT, Inc. One of the biggest concerns companies have when considering moving their business to the cloud is privacy and security. “Will I be able to access my data when I need it?” “Can I protect my vital company data from hackers or unauthorized users?” These are the important questions that need to be answered before you shift your business to the cloud. But the most important step in evaluating the Security Risks of the Cloud is to assess the Security Risks that exist right now within your business. Are there Dangers and Risks by moving your business to the Cloud – ABSOLUTELY YES, but there are Dangers and Risks if you don’t move to the Cloud too – and the reality of the dangers and risks on the Cloud are much less. In order for a business to make sense of the issues that surround Security and the Cloud, the business must first understand what needs to be protected and why. First – Assign value to your Assets (data, operating systems etc.) lost customer data can cost a fortune Compliance Regulations

Top Five Recommendations for Mitigating the Effects of DDoS Attacks - Slide 2 As with all incident response plans, advance preparation is key to rapid and effective action, avoiding an “all-hands-on-deck” scramble in the face of a DDoS attack. A DDoS response plan lists and describes the steps organizations should take if its IT infrastructure is subjected to a DDoS attack. Increasingly, Corero is seeing that DDoS attacks against high-profile targets are intelligent, determined and persistent. This new breed of highly capable attackers will switch to different attack sources and alternative attack methods as each new attempt is countered or fails. According to Corero Network Security (CNS: LN), a leader in on-premises Distributed Denial of Service (DDoS) Defense Systems for enterprises, data centers and hosting providers, for all the pain and suffering DDoS attacks have caused, there are a number of best practices that companies can implement to reduce their risk. How to Make a Great Impression in Your First 90 Days Start your new job off right with these tips.

World's Biggest Data Breaches & Hacks Skip to content New! Learn to do data-viz with our online seminars. World’s Biggest Data Breaches & Hacks Loading Share this: Facebook 7,592 Twitter 11,308 Reddit 243 LinkedIn Pinterest Sign up for more! World’s Biggest data breaches and hacks. Let us know if we missed any big data breaches. Created with data-visualisation software VizSweet. » See the data: bit.ly/bigdatabreaches » Safely check if your details have been compromised in any recent data breaches: Learn to Create Impactful Infographics » Sign up to be notified when we release new graphics» Check out our beautiful books» Learn to create visualizations like this: Workshops are Beautiful Sources: IdTheftCentre, DataBreaches.net, news reports Credits: Design & concept: David McCandless Code: Tom Evans Tech: VizSweet Balloon Race Research: Miriam Quick, Ella Hollowood, Christian Miles, Dan Hampson, Duncan Geere Data: View the data Topics: Tech & Digital More Snake Oil Cannabis? Is yours here?

How To Choose a Strong Password » Information Security For more information on choosing strong passwords visit the BU’s IS&T page General Guidelines: So, how do you have a “strong” password that is easy to remember? While it may seem tough to do this, there are a few simple tips that can make it easy.Note: the examples below illustrate just the concepts being discussed. No single technique should be used on its own, but rather should be used with other techniques. Use a mix of alphabetical and numeric characters. Choose You want to choose something that is easy to remember with a minimum of 8 characters that uses as many of the techniques above as possible. Some examples: If you are selecting a password for a website, you may want to incorporate the first few letters of the website name into your password so that every password is different and if one gets out, you don’t have to change them all. Do Not Choose… Your name in any form — first, middle, last, maiden, spelled backwards, nickname or initials. The longer your password the more secure.

IT Disaster Recovery Plan Businesses use information technology to quickly and effectively process information. Employees use electronic mail and Voice Over Internet Protocol (VOIP) telephone systems to communicate. Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another. An information technology disaster recovery plan (IT DRP) should be developed in conjunction with the business continuity plan. Businesses large and small create and manage large volumes of electronic information or data. Recovery strategies should be developed for Information technology (IT) systems, applications and data. Information technology systems require hardware, software, data and connectivity. Some business applications cannot tolerate any downtime. Internal Recovery Strategies Many businesses have access to more than one facility. Vendor Supported Recovery Strategies There are vendors that can provide “hot sites” for IT disaster recovery. Developing the Data Backup Plan

Create a retro game console with the Raspberry Pi The projects people have created with the Raspberry Pi are truly incredible. The low-cost microcomputer has been used to power home automation projects, servers, media centers, and many other do-it-yourself projects. One of the coolest projects is called Retro Pie, which transforms the Raspberry Pi into a retro gaming console and gives you the ability to play classics like Super Mario Bros., Space Invaders, Sonic the Hedgehog, and many others. The project is a little difficult and requires you to input various lines of code, but you should be fine if you follow these directions. If this is your first time with the Raspberry Pi, I suggest you check out my earlier article for more information about the device. Requirements The Retro Pie can work with either the $25 (£18.65 in the UK, and AU$28.50 in Australia) Raspberry Pi Model A or the slightly more expensive Model B, I recommend the latter. Preparing the SD card. First boot Configure the Xbox Controller Don't forget to save the selection.

USB Type-C: One cable to connect them all - CNET Look around your house and chances are you that have a least a few devices equipped with Universal Serial Bus (USB) cables. On average, some 3 billion USB ports are shipped each year, by far the most successful type of peripheral connection. In recent years, though, USB's competition has intensified and it now trails behind the new Thunderbolt standard both in speed and ease of use. This is the gap that the latest USB development, USB Type-C, finalized just earlier this month, intends to fill. Before you can understand USB Type-C, however, you need to know the difference between USB Type-A and Type-B, and tell between the various versions of the USB standard. USB Type-A Also known as USB Standard-A, USB Type-A is the original design for the USB standard with a flat and rectangular shape. On a typical USB cable, the Type A connector, aka the A-male connector, is the end that goes into a host, such as a computer. USB Type-B Proprietary USB USB versions USB Type-C (or USB-C)

Two-factor authentication: What you need to know (FAQ) You may not know it, but you probably already use two-factor authentication in the physical world. This explanation of what it is should help convince you why it's a good idea to use it with mission-critical online services, too. Two-factor authentication, or 2FA as it's commonly abbreviated, adds an extra step to your basic log-in procedure. "Twitter made the decision to use SMS [to deliver its second factor] because it makes sense from their position," said Jon Oberheide, chief technology officer of Duo Security, which uses apps to prove identity. But Twitter has faced some backlash, he said, because many of the highest-profile Twitter hacks have been against corporate Twitter accounts. "Two-factor authentication does help, but Twitter is a high-value target, and it needs to be protected like one," said Jim Fenton, chief security officer at OneID, an enterprise password replacement system. What is two-factor authentication? How old is two-factor authentication? OK, not really.

Related: