Monday, December 8, 2014

Week 16 12/8

Blog Post Title: 12/8 100 Unique and Weird ScholarshipsHave you heard of any of these scholarships?  Do any of these apply to you?  Which of these scholarships would you be interested in?  Which is the wierdest one?  Why?  If you had to do #45, what would you tell yourself? 


Blog Post Title: 12/8 Did North Korea hack Sony?Where was this hack perpetrated?  What was leaded in the hack?  Who is suspected behind the attack?  What is the theory behind the attack?   What is a wiper program?  What is a Denial of Service attack? 

No comments:

Post a Comment

BP 5/20

BP 5/20: Bluetooth's Complexity Has Become a Security Risk WHat is the BlueBorne flaw? How is Bluetooth developed? How can malicious...