Jump to content

vMuz1c-♕™

Members
  • Posts

    2,207
  • Joined

  • Last visited

  • Days Won

    9
  • Country

    Algeria

Everything posted by vMuz1c-♕™

      • 1
      • Haha
  1. Good luck :( i hope you come back
  2. V1 : V2 : Start vote
  3. Name of the oponent: @#FiGhTeR Theme of work: Type of work (signature, banner, avatar, Userbar, logo, Large Piece):Avatar Size : 150x250 *Text: Girl Watermark: csbd / CSBLACKDEVIL Stop votes ( min. 4 - max. 8 ):8 Working time: 5hrs
  4. Watch this Video : download link : https://www.microsoft.com/en-pk/download/details.aspx?id=48145
  5. Welcome to CSBD have fun and enjoy !
  6. Accepted !
  7. V2 text , Brush
  8. V1 Text , effect
  9. vMuz1c-♕™

    Need Help

    @-Sn!PeR- i need more information about your phone and pc pm me in ts3 !!
  10. Start vote : v1 : v2 : Good luck
  11. Who believe end of the world in (23 September) ? by PlanetX?

    :164:

     

    1. Show previous comments  4 more
    2. vMuz1c-♕™

      vMuz1c-♕™

      I will tell nibiru :D to let the day to 25Th Septmber :D

    3. ScareCrow

      ScareCrow

      hahaa dont worry about it , the end of the world is on 3797 accoring to nostradamus

    4. vMuz1c-♕™
  12. Name of the oponent: ✘ City™ ✘ Theme of work: Type of work (signature, banner, avatar, Userbar, logo, Large Piece):Avatar Size: 150x250 *Text:Battle Watermark: csbd / csblackdevil Stop votes ( min. 4 - max. 8 ):8 Working time:1 hr
  13. was recently invited to contribute a paper on personal data in the healthcare context to a journal on the Privacy and Security of Medical Information published by Springer-Nature. The paper, “Trust and ethical data handling in the healt care context” examines the issues associated with healthcare data in terms of ethics, privacy, and trust, and makes recommendations about what we, as individuals, should ask for and expect from the organisations we entrust with our most sensitive personal data. It's a topical subject, from an Internet Society perspective, because the Internet appears to offer some attractive solutions to pressing problems that confront people and governments, around the globe. We live in a time of aging demographics, with increased life expectancy and high expectations of the number and type of ailments that can be successfully treated. This, in turn, raises serious questions about the economics of healthcare, and how it should be funded - with widely differing models in countries with state- or insurance-funded systems, and some hybrids of the two. In the context of the Internet, the monetisation of personal data is unquestionably one of the strongest economic factors: it funds and drives many of the products and services we are offered. Arguably the Internet, as we know it today, could not exist in its current form without the large-scale collection and monetisaton of personal data. But are these two forces - the economics of healthcare for an aging demographic on the one hand, and the economics of the personal data ecosystem on the other - destined to collide? And if they do, what are the prospects for personal privacy? What implications would that collision have for us as patients, and for the organisations that process healthcare data? I hope you’ll read the paper and let us know what you think of the approach we suggest. I also hope organisations will take to heart the paper’s recommendations - to build ethics into the fabric of their products and services, aim for better privacy outcomes, and build trust with us, their users.
  14. Last Friday, 25 August, a routing incident caused large-scale internet disruption. It hit Japanese users the hardest, slowing or blocking access to websites and online services for dozens of Japanese companies. What happened is that Google accidentally leaked BGP prefixes it learned from peering relationships, essentially becoming a transit provider instead of simply exchanging traffic between two networks and their customers. This also exposed some internal traffic engineering that caused many of these prefixes to get de-aggregated and therefore raised their probability of getting accepted elsewhere. The incident technically lasted less than ten minutes, but spread quickly around the Internet and caused some damage. Connectivity was restored, but persistently slow connection speeds affected industries like finance, transportation, and online gaming for several hours. Google apologized for the trouble, saying it was caused by an errant network setting that was corrected within eight minutes of its discovery. This incident showed, again, how fragile the global routing system still is against configuration mistakes, to say nothing about malicious attacks. What it also showed is a lack of defense – the incident propagated seemingly without any attempt from other networks to stop it.
  15. You should care about your privacy online even if you think you have nothing to hide. A key aspect of privacy is being able to choose what information you share publicly and what is private. Would you want your bank account balance displayed for anyone to see? What about your medical history? Encryption is a vital tool for protecting private communications online from unwanted eyes. We use it every day, often without even realizing it. But, encryption is not magic. If you want to better protect your privacy online, here are five steps you can take right now: Use End to End Encryption for all Messages: End to End (E2E) encryption is a way to secure the messages you send via email or a messaging app so that they can only by read by those you intended to read it including your friends, bank, doctor, etc. Read the fine print – not all encrypted services are E2E. Use messaging apps that have E2E encryption (e.g. Signal, Wire). Encourage your friends and family to switch to an app that has E2E. Remember that sending an unencrypted message is like sending a postcard. Anyone can read it and you wouldn’t even know. One po[CENSORED]r method of setting up encrypted Use a VPN: A virtual private network (VPN) will encrypt your Internet traffic and send it through a server that physically sits in another location. It acts like a tunnel. This means that your Internet Service Provider (ISP) will no longer be able track your online activity, but will only see traffic coming in and out of the VPN. Use an SSL Browser Extension: Many websites can encrypt the information you send and receive, typically using a protocol called Secure Socket Layer (SSL). If you do your banking or shopping online, you may be familiar with SSL already. Many browsers will show a closed padlock symbol when a website is using the protocol. Browser plugins and extensions like the open-source HTTTPS Everywhere will ensure that if a website offers an encrypted SSL connection, it will use it. Secure your Devices with 2-Factor Authentication: 2-Factor Authentication (2FA) is a way of providing additional reassurance that only you have access to your data. (For greater data security, you should use this with encryption.) With 2FA, two factors must be compromised to gain access, rather than just one. They should be different kinds of factors, such as one thing you know (e.g. a password or an answer to a security question) and something you have (e.g. a hardware 2FA device like aYubiKey). A YubiKey is almost like a car’s ignition key, but for your computer. It means you’ll need a small USB key, plus a username and password, to access your files or log in to your apps and services. You can even keep it on your key-ring. Change your Internet and Technology Habits: The methods above provide some specific ways to protect your data during certain online activities. However, they are only as effective as the person using them. Be aware of when you are being protected and when you aren’t. Shape your online activities and preferences towards safer options (e.g. use E2E and 2FA, turn privacy settings on, be deliberate about what you share). But, remember that no method offers perfect protection.
      • 1
      • I love it
  16. 2 pictures good but i will vote for V1 , i like the brush
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.