CS4ProgrammingWeek5
Contents
Monday
A Look Inside
Debugging a C++ program using Microsoft Visual Studio Interactive Development Environment (IDE).
We will see:
- How to step through the program line by line.
- The value of variables at each step.
- The representation of variables data in computer memory.
Continue Caesar Cipher Exploration (Exercise 2.).
Tuesday
Continue Caesar Cipher Exploration (Exercise 2.)
Thursday (Lab)
Continue Caesar Cipher Exploration (Exercise 4.)
Test Preparation
We will be having a test on next Monday 10th Feb covering what we have learnt in the first half of the quarter.
Technology Friday
In The News
Impostors bilk Omaha's Scoular Co. out of $17.2 million
Emails can easily be forged.
Another Corporate Hack - Anthem health insurance
The nation’s second-largest health insurer, formerly known as WellPoint, said hackers stole Social Security numbers, names, birthdates, email addresses, employment details, incomes and street addresses of people who are currently covered or had coverage in the past.
Useful information if you believe your data was exposed
China’s Great Firewall Gets Taller
Internet Filter Makes It Harder to Circumvent Blocks to Services Like Google and Facebook
"China’s government has unveiled a smarter and stricter Internet filter, riling web users and widening the divide between China’s Internet and the World Wide Web.
A recent upgrade to China’s web filters, commonly referred to as the Great Firewall, has made it more difficult to use services called virtual private networks to circumvent the country’s blocks to U.S. services like Google and Facebook .
Chinese officials confirmed a crackdown on VPNs this week, saying that new measures were needed as the Internet evolved. In the past week, major VPN providers such as Astrill have reported disruptions to their services."
Sony Hack Analysis
Video from FCCT (Foreign Correspondents' Club of Thailand in Bangkok) from January 2015
- 18:00 -> 20:20 - Demonstration of capability - attempt at creating a worst case scenario
- 28:45 -> 33:30 - How to protect yourself - compartmentation
- 41:00 -> 42:55 - Equipment and ability needed to perform attack
- 43:30 -> 43:45 - US DOD does not allow USB Flash drives
- 44:20 -> 45:10 - Secure systems - Use Windows 8.1 or 10, or Mac
- 48:50 -> 51:50 - iPhones, iPads, Cloud security