Articles, Blog , , , , , , , , , , 1 Comment

Alright! Welcome to another episode of the OSINT Curious podcast Or, to the OSINT Curious project webcast. How about that? Thank you for joining us. We’ve got a special guest this week & we’ve got a couple of other people from the OSINT Curious project as well, so we’ll go around and introduce ourselves. Tracy,

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , , , , , , , , , 100 Comments

Encryption is the process of taking a message and scrambling it’s contents so that only certain people can look at your message. There are two types of encryption: symmetric and asymmetric encryption. Let’s first take a look at symmetric encryption to understand why asymmetric encryption was created. To do that, let me introduce you to

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , 1 Comment

Welcome to Episode #238 of CxOTalk. I’m Michael Krigsman, industry analyst, and your host. I want to thank Livestream for being our video streaming partner because those guys are great. And if you go to Livestream.com/CxOTalk, they will give you a discount. Today on CxOTalk, we are speaking about one of the most important topics

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , , 90 Comments

All right, thank you everybody for coming out. This is “How Do I Tails?: A Beginner’s Guide to Anonymous Computing”. First off, I’d like to thank the EFF for providing an awesome space and the opportunity to be able to talk and help share this information with you guys. It is a little strange to

Read More

Articles, Blog , , , , , , , , , 0 Comments

Top 12 Smart Computing Tips What is the combination for safeguarding personal data and UW’s institutional information? 1. Update and patch 2. Antivirus 3. Passwords 4. Be selective 5. Know your data 6. Back up data 7. Encryption 8. Use caution with links 9. Lock your workstation 10. Use https 11. Check privacy settings 12.

Read More

Articles , , , , , , , , , , , , , , , , , , , , , , , , , , 10 Comments

SPEAKER: This is CS50. DAVID MALAN: Hello, world. This is episode two of the CS50 podcast. My name is David Malan,and I'm here with– COLTON OGDEN: Colton Ogden. You know, in the last couple episodes–just to get us kicked off here– we've had this theme of robocalls. And recently I haven't been receivingany robocalls– at

Read More