Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cybercrimeology

Cybercrime History: Virtually Reflecting Reality, Part 6

01 Nov 2020

Description

More about Our Guesthttps://faculty.nps.edu/dedennin/From this Episode:Morris Wilkes: https://en.wikipedia.org/wiki/Maurice_WilkesHis book "Time-sharing computer systems" from 1968 provide for the Security of the System on page 91 noting that "Passwords, if used must be carefully guarded and changed frequently; the console printing should be switched off when the users is invited to type in his password". So perhaps we can give Bill Burr a break. I learned about that line from a Dorothy Denning LectureA Declaration of the Independence of Cyberspace by John Perry Barlowhttps://www.eff.org/cyberspace-independencethe Cult of the Dead Cowhttps://cultdeadcow.com/https://en.wikipedia.org/wiki/Cult_of_the_Dead_CowCARNAVOREhttps://en.wikipedia.org/wiki/Carnivore_(software)https://computer.howstuffworks.com/carnivore.htmHoneypotshttps://en.wikipedia.org/wiki/Honeypot_(computing)https://www.projecthoneypot.org/index.phphttps://www.honeynet.org/Napsterhttps://en.wikipedia.org/wiki/NapsterDid you know there were viral videos and memes before Facebook, YouTube and even Gmail?Money Good. Napster Badhttps://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.