Honeypots The blog can be run off a virtual machine, this allow the website to look like an easy target by weakening it’s security so that a hacker would aim for it. This would attract the hacker to access the virtual machine while providing the system administrator with valuable information. VPN - Virtual private network … Continue reading Securing your own blog
Category: Uncategorized
Privacy on Social Media
When looking at privacy on social media, I will be using Facebook as the example. Allowing the user to allow or deny the sharing of their physical data, such as their address and phone number ensures the user has physical privacy. Mental privacy is ensured where you can delete content that you do not want … Continue reading Privacy on Social Media
More about Digital Law and Ethics in South Africa
Origin of Ethics Infographic on Five Laws of Media and Information South African Print and Digital Media Ethics https://www.youtube.com/watch?v=ydjoGxT28W0 Social Media and Business Use
About me
Hi there! I am a student in Varsity College studying a Bachelor of Computer and Information Sciences specializing in Application Development. My modules this semester include database, programming, mathematics, web development, and digital law and ethics. My hobbies include arts & crafts, listening to music, eating and spending time with friends. I like using social … Continue reading About me
About this blog
Hi there! Welcome to my blog! This blog has been created as part of my Digital Law and Ethics assignment. It is based on the concept of teaching first year students about Digital Law and Ethics in South Africa. We will be looking at a brief background of ethics and digital law and will thereafter … Continue reading About this blog