Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Computer Security
AlterLinks Topic Index

  1. Applied Cryptography
    Protocols, Algorithms, and Source Code in C (Second Edition)

    Resource Type: Book
    Published: 1995
    Data security expert, Schneier, provides information on the protocols and algorithms used to implement a variety of impenetrable encryptions.
  2. easyDNS Technologies Inc.
    Media Profile in Sources

    Resource Type: Organization
  3. The FBI Can Bypass Encryption
    Why Cyber Security is a Magic Act

    Resource Type: Article
    Published: 2014
  4. How to Leak to The Intercept
    Resource Type: Article
    Published: 2015
    Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
  5. The Motherboard Guide to Not Getting Hacked
    Resource Type: Article
    Published: 2017
    Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherboard's comprehensive guide to digital security, which will be regularly updated and replaces some of our old guides. This guide is also available as a printable PDF.
  6. Passphrases That You Can Memorize - But That Even the NSA Can't Guess
    Resource Type: Article
    Published: 2015
    A passphrase is like a password, but longer and more secure. In essence, it's an encryption key that you memorize. Once you start caring more deeply about your privacy and improving your computer security habits, one of the first roadblocks you'll run into is having to create a passphrase. You can't secure much without one.
  7. Popular Security Software Came Under Relentless NSA and GCHQ Attacks
    Resource Type: Article
    Published: 2015
    The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden.
  8. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  9. US was 'key player in cyber-attacks on Iran's nuclear programme'
    Obama reported to have approved bid to target Tehran's nuclear efforts

    Resource Type: Article
    Published: 2012
    Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
  10. Watch your attachments: Microsoft Office bug lets hackers take over computers
    Resource Type: Article
    Published: 2014
    A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects programs like Word, PowerPoint, and Excel – and could allow an intruder to gain access to and control over a user's entire computer.
  11. Why you shouldn't trust Geek Squad ever again
    The government reportedly pays Geek Squad technicians to dig through your PC

    Resource Type: Article
    Published: 2017
    The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gentlemen, is about as blatant a case of unconstitutional search and seizure as it gets.
  12. With Virtual Machines, Getting Hacked Doesn't Have To Be That Bad
    Resource Type: Article
    Published: 2015
    Lee explains how to install and use a virtual machine, a fake computer running inside the real computer.

Sources-journalists use the sources website to find you


AlterLinks


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.