SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: floreaa
One of the most surprising aspects of the radiolab episodes was the concept of the Botnet. Essentially these botnets are pieces of software that connect and can control groups of hacked or infected computers. Smaller botnets would control over 1000 computers, while larger ones could dominate over millions of computers. It’s hard to imagine that […] Continue reading
Strong public encryption greatly benefits the general public. The ability to send all your messages with the knowledge that it is secure and will only be read by the recipient is a modern day luxury. One of the arguments against strong encryption points out that if you don’t have any secrets to hide then your […] Continue reading
The podcast, Something Out of Nothing, discussed theories that believe that Shakespeare did not any of his sonnets, poems, or even plays. The speaker dives into the presence of cryptography in a lot of Shakespeare’s writing; the speaker gathered information about a unique cipher that utilized a substitute key and a form of stenography to […] Continue reading
Admiral William Hall decided to keep the information that the English broke the enciphered Zimmerman telegram a secret because he believed that the knowledge for decrypting the telegram would be an asset to the them in the near future. Those who were thoughtful of the future such as Admiral Hall would believe this choice to […] Continue reading
When I looked closely at the various responses on the whiteboard I noticed that the people who advocated for surveillance held different opinions about the intensity that our surveillance has on people’s data. Some people in this pro surveillance group believed in a strong surveillance systems and wrote things such as “text messages and phone […] Continue reading
By the mid 19th century, the skills and techniques used to break simple monoalphabetic substitution ciphers or keyword ciphers were well known between coder breakers. Tools such as frequency analysis were vital to decoding messages, encrypted messages intercepted through Morse code had no chance of staying secure. Messages needed to be encrypted with a stronger […] Continue reading
Not long after Marcus is released, he was followed by two police officers and was arrested for taking unusual trips at unusual times using the BART. Because Marcus’s fast pass was able to collect data on where and when he took trips, a computer algorithm incorrectly marked him down as a possible criminal. When he […] Continue reading
In his idea that Mary Queen of Scots would have been better off without her relatively weak cipher, Singh acknowledges the crucial relationship between the strength of a cipher and the level of accountable knowledge that encrypted messages contain. Mary Queen of Scots and Babington where often trading highly sensitive messages that outlined the plot […] Continue reading