Monthly Archives: August 2018

Mining Student Data – To protect students or invade students’ life

In his essay, Michael Morris states that through mining student data, threat-assessment teams of universities have a great chance and plausible accuracy to predict possible violent behaviors with mining algorithms. As a result, it is responsible for every university to monitor students’ academic record and prevent every possible tragedy. Undoubtedly, in no way are we supposed to […] Continue reading

Posted in cryptography, datamining, privacy, Student Posts, threat assessment | Comments Off on Mining Student Data – To protect students or invade students’ life

Player Interaction in MOBAs

Hello! I’m Kevis Tsao. I’ve been an avid moba gamer all my life, from the earliest flash games like Minions and VORP! to the largest franchises today like League and Dota 2. I love all kinds of games, especially roguelikes, deck-builders, and strategy turn-based games, but the genre that holds my heart and my mind … Continue reading “Player Interaction in MOBAs” Continue reading

Posted in competitive gaming, Gaming, Mentality, MOBAs, obstacles to competitive gaming, Opinion, Play, player interaction | Comments Off on Player Interaction in MOBAs

Mining Student Data Could Save Lives – or Make Life Harder

In his essay, “Mining Student Data Could Save Lives”, Michael Morris argues that universities should implement data mining algorithms to detect patterns in student activities on their networks (e.g. any activity occurring on the WiFi network, school computers, or communications through university email accounts). According to Morris, the implementation of these algorithms could potentially prevent […] Continue reading

Posted in internet privacy, privacy, Privacy versus security, Student Posts, surveillance | Comments Off on Mining Student Data Could Save Lives – or Make Life Harder

The Encryption That Revealed More Than It Hid

“A false sense of security is the only kind there is” -Michael Meade In the epoch of technology and the internet, this particular quote rings painfully true. We read about black hat hacking being ubiquitous yet we don’t think twice before entering privileged information into a website whilst being connected to the free, unprotected airport […] Continue reading

Posted in Blog Assignments, Student Posts | Comments Off on The Encryption That Revealed More Than It Hid

Operation Rainfall

Games have become a part of our everyday lives and culture. Whether you play them or not, games are all around the world, and they can differ from country to country. Japan, more specifically Nintendo, has been known for developing titles specifically for their country and not releasing them overseas, such as with the acclaimed … Continue reading “Operation Rainfall” Continue reading

Posted in Gaming | Comments Off on Operation Rainfall

Different Applications of Cryptography Over Time

The only records we have of cryptography used in the past come from people with the resources and technical skills to encrypt and decrypt messages, whether they were World War II spies, Arab scholars, or Greek military leaders. Although not all of the encryption methods mentioned by Singh in Chapter 1 required exceptional resources (the […] Continue reading

Posted in cipher, cryptography, Encryption, Student Posts | Comments Off on Different Applications of Cryptography Over Time

The Problem with Weak Encryption

In Chapter 1 of The Code Book, author Simon Singh states, “The cipher of Mary Queen of Scots clearly demonstrates that a weak encryption can be worse than no encryption at all.”  What this essentially means is that overconfidence with a cipher, especially a relatively weak one, can be dangerous in that it creates an illusion […] Continue reading

Posted in privacy, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Problem with Weak Encryption

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography