Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 10 of 53 by Eszter Hargittai tagged security

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

"As the Internet has exploded over the past fifteen years, recently reaching over a billion users, dozens of national governments from China to Saudi Arabia have tried to control the network by filtering out content objectionable to the countries for any of a number of reasons. A large variety of different projects have developed tools that can be used to circumvent this filtering, allowing people in filtered countries access to otherwise filtered content. In this report, we describe the mechanisms of filtering and circumvention and evaluate ten projects that develop tools that can be used to circumvent filtering"

Share It With Others!

Share It With Others!

(Information Week)"Data breaches caused by human error last year accounted for 35.2% of incidents with reported causes. "

Share It With Others!

Share It With Others!

just in case your laptop gets stolen

Share It With Others!

unless a message is really from ebay.com or paypal.com, it shouldn't show up in GMail inboxes (or even spam folders) at all

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT