Tag: social media
Is the future of social networks decentralized?
Current social networks like Facebook, Twitter or Instagram mostly have a centralized approach ([1], [2], [6]). They are centralized in the sense, that all data is processed in data centers that are under a corporation’s control. It is hard to beat the economies of scale that can be achieved by having gigantic server farms which…
Um die Technik kümmern sich die Anderen…
Das Phänomen von ‘sozio-technischen Systemen’ und ‘Ökosystemen’ Wenn wir uns als technisch begeisterte Computer Science Studierenden ein zu Deutsch “Ultra Großes, Skaliertes System” vorstellen… Was stellen wir uns dann wirklich vor? Naja wir denken wahrscheinlich erstmal an viele Zeilen Code, Unmengen von Server-Hardware und ellenlange Kabel. Das allein macht ein Ultra Large Scaled System (ULS)…
HERZLICHEN GLÜCKWUNSCH – Sie haben gewonnen!
Über Social Engineering und wie man sich schützen kann. Jeder kennt E-Mails mit Titeln wie diesem. Eine wildfremde Person verspricht Gewinne in Millionenhöhe. Und alles, was dafür benötigt wird, sind ein paar persönliche Daten. Ein Traum vieler Menschen wird wahr und man will dem Titel glauben. Doch was passiert, wenn man der E-Mail nachgeht? Ist…
Radcup – a socialmedia beerpong App
Written by: Immanuel Haag, Christian Müller, Marc Rüttler Radcup adds a bit of social media to the well-known game Beerpong. With Radcup the user has the possibility to register or login. Afterwards he can display/localize already existing games and join them if possible or create new games. As soon as 4 players have joined, the…
Radcup Part 1 – Refactoring
Written by: Immanuel Haag, Christian Müller, Marc Rüttler Refactoring the Radcup backend is necessary because it was developed in the year 2015.
Social Engineering – Hacking the human OS
Abstract Nowadays, our secure systems are already sophisticated and perform well. In addition, research on subjects such as quantum computers ensures continuous improvement. However, even with a completely secure system, we humans pose the most significant threat. Social engineers prey on this to conduct illegal activities. For early detection and prevention, this paper deals with…
You must be logged in to post a comment.