A Look Inside
Debugging a C++ program using Microsoft Visual Studio Interactive Development Environment (IDE).
We will see:
- How to step through the program line by line.
- The value of variables at each step.
- The representation of variables data in computer memory.
Continue Caesar Cipher Exploration (Exercise 2.).
Continue Caesar Cipher Exploration (Exercise 2.)
Continue Caesar Cipher Exploration (Exercise 4.)
We will be having a test on next Monday 10th Feb covering what we have learnt in the first half of the quarter.
In The News
Impostors bilk Omaha's Scoular Co. out of $17.2 million
Emails can easily be forged.
Another Corporate Hack - Anthem health insurance
The nation’s second-largest health insurer, formerly known as WellPoint, said hackers stole Social Security numbers, names, birthdates, email addresses, employment details, incomes and street addresses of people who are currently covered or had coverage in the past.
China’s Great Firewall Gets Taller
"China’s government has unveiled a smarter and stricter Internet filter, riling web users and widening the divide between China’s Internet and the World Wide Web.
A recent upgrade to China’s web filters, commonly referred to as the Great Firewall, has made it more difficult to use services called virtual private networks to circumvent the country’s blocks to U.S. services like Google and Facebook .
Chinese officials confirmed a crackdown on VPNs this week, saying that new measures were needed as the Internet evolved. In the past week, major VPN providers such as Astrill have reported disruptions to their services."
Sony Hack Analysis
Video from FCCT (Foreign Correspondents' Club of Thailand in Bangkok) from January 2015
- 18:00 -> 20:20 - Demonstration of capability - attempt at creating a worst case scenario
- 28:45 -> 33:30 - How to protect yourself - compartmentation
- 41:00 -> 42:55 - Equipment and ability needed to perform attack
- 43:30 -> 43:45 - US DOD does not allow USB Flash drives
- 44:20 -> 45:10 - Secure systems - Use Windows 8.1 or 10, or Mac
- 48:50 -> 51:50 - iPhones, iPads, Cloud security