SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Category Archives: FYWS
At this point, the cat is out of the box with regards to encryption. Available to all internet users are extremely secure encryption systems, and this is why trying to limit their use is a mistake. Strong encryption should be available to all internet users. Pretty much as it stands, terrorists or people engaging in […] Continue reading
During WWII, Germans sent out thousands of messages encrypted using the supposedly unbreakable Enigma machine. It was discovered after the war that German intelligence knew that these messages could be captured by the Allies, but they could not think anyone would have the time or resources to possibly decipher them. This strongly held idea that Enigma […] Continue reading
It is curious to think of how the world was just one hundred years ago. So many things that are now obvious were unknown or shrouded in mystery. In 1915, barely anything was known about heredity and the cellular functions that were involved in it. Now, we have mapped the entire human genome and can […] Continue reading
Writing my practical cryptography paper requires a lot of time and effort. Firstly and most importantly, I have found all of the sources I need in writing this paper. This took a great amount of time to find the perfect articles on the internet to address my topic, phishing. After finding and printing out all […] Continue reading
The overwhelming theme of the novel Little Brother concerns the privacy of an individual and a society in all aspects of life. From the moment in which Marcus is first questioned by the National Homeland Security (NHS) until the end … Continue reading → Continue reading
For some time before the development of the Vigenère cipher, “anybody sending an encrypted message had to accept that an expert enemy codebreaker might intercept and decipher their most precious secrets.” (Singh, p. 45) How is this environment different from … Continue reading → Continue reading