HowStuffWorks via myPod

Cybercrime History: Virtually Reflecting Reality, Part 6


Listen Later

Cybercrimeology


More about Our Guesthttps://faculty.nps.edu/dedennin/From this Episode:Morris Wilkes: https://en.wikipedia.org/wiki/Maurice_WilkesHis book "Time-sharing computer systems" from 1968 provide for the Security of the System on page 91 noting that "Passwords, if used must be carefully guarded and changed frequently; the console printing should be switched off when the users is invited to type in his password". So perhaps we can give Bill Burr a break. I learned about that line from a Dorothy Denning LectureA Declaration of the Independence of Cyberspace by John Perry Barlowhttps://www.eff.org/cyberspace-independencethe Cult of the Dead Cowhttps://cultdeadcow.com/https://en.wikipedia.org/wiki/Cult_of_the_Dead_CowCARNAVOREhttps://en.wikipedia.org/wiki/Carnivore_(software)https://computer.howstuffworks.com/carnivore.htmHoneypotshttps://en.wikipedia.org/wiki/Honeypot_(computing)https://www.projecthoneypot.org/index.phphttps://www.honeynet.org/Napsterhttps://en.wikipedia.org/wiki/NapsterDid you know there were viral videos and memes before Facebook, YouTube and even Gmail?Money Good. Napster Badhttps://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad


https://www.listennotes.com/e/f71eb87904444f3b8db445552d1839b0/
...more
View all episodesView all episodes
Download on the App Store

HowStuffWorks via myPodBy Joshua Hoover

  • 1
  • 1
  • 1
  • 1
  • 1

1

1 ratings


More shows like HowStuffWorks via myPod

View all
Stuff You Should Know by iHeartPodcasts

Stuff You Should Know

78,828 Listeners