SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: mackense
Currently, I am still very early in the process for writing my practical cryptography paper. I am starting to realize the amount of effort the paper will take, which gives me a sense of urgency to really get underway. So far, I have really enjoyed thinking about the ways that I will be able to […] Continue reading
In the newer technological age, cryptography is becoming more and more relevant in everyday life. Unfortunately, there is a down side to this increase in technology and encryption. Encryption helps to protect the interests and communications of criminals and terrorism. … Continue reading → Continue reading
After early domination of the seas by German U-boats, Bletchley desperately needed to end the intelligence blackout. Through a series of dangerous raids on German U-boats, a German Naval codebook was captured, thus making the Naval Enigma transparent. Finally, Ally … Continue reading → Continue reading
The section of the book that most caught my attention can be found at the beginning of Chapter 10. Marcus is in the early stages of setting up the Xnet and is beginning to realize that his heavily encrypted system … Continue reading → Continue reading
The Great Cipher used by Louis XIV remained unbroken for 200 years. What were the factors that led to such a secure cipher? The father-son team of Antoine and Bonaventure Rossignol invented The Great Cipher while working closely with Louis … Continue reading → Continue reading
For this blog assignment, I have decided to respond to the article discovered by Nate called “The 5 biggest online privacy threats of 2013”. This article is based around protecting online users from privacy threats. Based off this reading, the … Continue reading → Continue reading