Diferencia entre revisiones de «Página principal/en»
De FdIwiki ELP
m (→Privacy) |
(→Computer crimes) |
||
Línea 127: | Línea 127: | ||
* [[Hacker Ethics]] | * [[Hacker Ethics]] | ||
* [[Cracking]] | * [[Cracking]] | ||
+ | * [[Shellcode]] | ||
* [[Conferencia_seguridad|Security]] | * [[Conferencia_seguridad|Security]] | ||
* [[Botnet]]s | * [[Botnet]]s |
Revisión de 20:52 25 ene 2017
Welcome to Computer Ethic's Wiki (ELP) This is an experimental wiki for the subject "Computer Ethics" at Facultad de Informática of Universidad Complutense de Madrid Contents available are the result of co-creation from ELP students, and are free under Creative Commons license International 4.0. You can check already created posts up until this moment and recent changes. |
322 articles |
Topics · Assignments · Lectures · Community Website · Café · Help |
Contenido
Starting out
- In the Contents user guide you can check how to create articles, edit, search, etc on this wiki.
- Important: when creating a page for a Social Impact Project we use the prefix Project: followed by the title without leaving a space, like so Trabajo:Distribuciones para niños. This title format is that of namespaces and is meant for Project to be one.
ELP Topics
Introduction to ethics
Privacy
- Vigilance
- Social Networks
- Videogames
- Companies
- Storage services
- Your browser
- Google Hacking
- RFID
- NFC
- LOPD
- Cyphering of communications
- Cryptography
- Stenography
- PGP/GPG
- GNU LibreJs
- Proxy
- Manuals
- Privacy map
- Google privacy on devices
- Assignment:Encryption, licenses, privacy
- Assignment:Cookies policy
- Cookies
- How to remain anonymous on the Internet
- Assignment:Accepted privacy politics
- Safe Harbor
- SOPA Law
Gender digital breakthrough
Important Inventions of Women in Technology
Freedom of speech on the Internet
- Blogsphere
- Cyberspace
- Frontiers
- Online communities
- Anonymity
- Censorship
- Transparency
- Neutrality of the web
- LE-Commerce Law
- The fighting kit for the Internet
- LulzSec
Intelectual property
- Intelectual property Javier de la Cueva
- Author rights
- Copyright
- Copyleft
- Licenses
- Free software
- Free hardware
- FSF and OSI
- Free culture
- Round Table of Free Culture
- Pro-common
- Private copy
- DRM
- Piracy
- P2P
- Patents. Protection of inventions Eduardo Martín
- SGAE. Monopolies. Software patents
- Fork
- TFG - Who intelectual property rights belong to
Computer crimes
- Telematic crimes - Óscar de la Cruz
- Hacker Ethics
- Cracking
- Shellcode
- Security
- Botnets
- Honeypots
- Virus
- Spam
- Spam(links)
- Phishing
- Infowar
- Cyberbullying
- Other crimes and their sentences
- Ransomware
- Social Engineering
- Nmap (eng)
Profesión
- What is to be a computer engineer
- Assignment:Guía laboral del sector de las TIC en España
- Assignment: How to make a curriculum
- Workers regulations
- Labour Agreement Computer Science
- Types of employers
- Investigation
- Assignment: What can I do after leaving University
- Professional options
- Enterprising
- Job interview
- How theatre affects a job interview
- Internship
- Version control with Git and GitHub
Security at work
Responsible use of technology
- Fiction
- Luddism
- Science
- Technology and society
- Technological determinism
- Distopia and utopia
- Control of technology
- Social control bottom-up
- Centralised control top-down
- Distributed systems.
- Bitcoin
- Digital breakthrough (age, origin, class, gender, region)
- 1984 (novel)
- A Brave New World
- Ghost in the Shell
- The private eye
- Fahrenheit 451(novel)
- I, Robot (film)
- Augmented reality
Reliability and responsibility
- Faults, errores, risks
- Critical systems
- Dependency
- Certifications
- Normalization
- De Facto and De Jure Standards.
Proffesional ethics codes
- Interests conflicts
- ACM code