Data Mining 101: Finding Subversives with Amazon Wishlists
[inline:1] This article describes how anybody in the world can develop sophisticated profiles of hundreds of thousands of U.S. citizens, using only free and publicly available resources.read more
View ArticleOverview of Encryption I
[inline:1] Codes and ciphers are important when securing communications. This is a quick primer on several methods.read more
View ArticleOverview of Encryption II
[inline:1] Describing how to obtain a shared key without prior trusted contact.read more
View Article
More Pages to Explore .....