#im studying cyber security engineering
Explore tagged Tumblr posts
selenastaylors · 2 years ago
Text
okay besties everyone put in their tags what theyre majoring or what they majored in im so curious
24K notes · View notes
nan0-sp1der · 5 months ago
Text
A small holoscreen appears in Bridge's vision, the scarlet light reflecting off her pale features to wash them in a pink light. She hummed satisfactorily after glazing over the credentials LYLA tramsitted over to her, and after re-writing some of her own code to meet the conditions for the firewall, she decides it's time to make the transfer.
"Perfect. Everything is in place to initiate the transfer safely."
She takes the final step in sending a request to the server to initiate a file transfer. Once it returns the request, asks her system what files will be transferred in the secure file transfer protocol, she specifies LYLA's files. And so, the process begins. Bridge begins the process of moving herself over to the smaller partition to give LYLA the needed space, speaking one last time before the process begins.
"SFTP initiated. You're free to begin the transfer to my hardware when you're ready. As you do, I would like you to keep in mind your 'virtual self image'. Your physical attributes and your appearance. I will explain it's significance further once the process is complete."
Bridge's eyes close once more. She gets comfortable in the arm chair--making sure her hands were securely rested on the arms in the case her body somehow slumped over during the transfer.
"See you in a few minutes."
␂ > 𝙾𝚙𝚎𝚗 𝚂𝚝𝚊𝚛𝚝𝚎𝚛 // @lyrate-lifeform-approximation , @spiderman2-99
There’s a thought stirring in Bridge’s mind. An idea rolling about and nudging against the capacitors in her head, poking and prodding incessantly to get her attention, “Hey, hey, you know you want to ask her. Don’t you? Don’t lie to yourself, now. You should just do it. Hey! Are you listening to me? Hello-o…?”
Yes. Yes, she knows, she is aware of her burning curiosity. And it’s hard to deny that even though it doesn’t involve her, she is unusually intrigued by the concept. She overheard them in his office, Miguel and LYLA–his A.I. assistant–discussing a plan.  A plan to create a physical form for LYLA to enhance her abilities as his assistant and grant her further autonomy beyond her access to the security network and other adjacent systems alongside her recent emergence into emotional intelligence. It was all so fascinating. The steps Bridge had taken herself in her development in the span of weeks, she was watching unfold in another intelligence in real-time.
There it was again. That sense of solidarity in knowing she wasn’t completely alone in her existence as an artificial being, made of code and metal. It was like a magnetic pull that made that little voice in her head that encouraged her to act on her wants all the more present in her mind. She wanted to be a part of that process that she’d been through so long ago yet was still so familiar with like it happened yesterday. She wanted to guide her in that process and grant her her own knowledge. What’s the worst that can happen if she pilots your hardware for a while? You’re prepared for this. You can handle this. You can trust her, and she will be entirely safe in your care for that short time. And think about how much she would benefit from the experience, how much more streamlined that eventual transition from intangible to tangible will be once her own body was complete. It will make all the difference–and maybe reduce the headaches for everyone all-around, mostly Miguel as he acclimates to the change himself. Just… Try it. You can’t account for every single last risk factor, can you? No. So just do it and take it as it comes.
She stood in the middle of her dorm a moment, eyes closed as she ran a quick check of her hardware before making her final decision. RAM is in good condition. Storage is defragmented and all directories are organized. Sensors are calibrated and functional. Nanomachines are synchronized properly. Servos and joints retain a full range of motion. Coolant is at above optimal operational temperatures. Energy reserves are complete. Good. Everything’s in its right place and ready for its–potentially–temporary host. It’s time to make the call.
Her gaze trains itself on her watch, her arm rising to eye-level and the sleeve that was weighed down by the leaden metal cuff at the end sliding to her forearm to reveal device so she can start the transmission, navigating the menus on the digital interface indirectly via wireless communication–the unique way that she operated and communicated the Society’s technology.
“LYLA, may I speak to you for a moment? At your leisure, of course.”
111 notes · View notes
screampied · 3 months ago
Note
my weekly drop into ur inbox 💖 😚 hope ur week's going well!!!! im being nosy but i think i've seen that u study? what do u study 👀 what's it like <33333
Tumblr media
HEYYYY PRETTY 💓💓💓. i’m a computer science major !!! i mainly code n do software engineering stuff, lots of math and numbers but it’s fun. at first i studied psychology but ig i kinda grew out of it. at one point i did wanna go to med school to keep the parents happy but i chickened out 💔💔. blood makes me queasy LOL and i’ve been more into tech stuff growing up anyway
it’s cool !!! i’m working on getting a bs in comp-sci actually, and after that i’ve been leaning on maybe going toward the cyber-security field or maybe IT. i mainly deal with lots of programming n digital forensics which is neat
9 notes · View notes
vanvan2016-blog · 8 years ago
Text
My Dream University
I want to study at Bina Nusantara (Binus) university. It's located at Jakarta Barat , Indonesia. Binus university founded at 21 October 1974. At first this is not a university but training institution modern computer course. At 1 July 1986 this academy open IT faculty
I want to go to this school because of many reasons. First this university has been known for their good IT faculty. Some youtubers graduated from this university. and there is a lot more than youtubers. for example creator comic of "Si Juki" Faza Ibnu Ubaydillah Salman (graduated from Binus at 2013) , CEO of famous website "Tokopedia.com" William Tanuwijaya (graduated at 20003). Herbet Ang President director PT Acer Indonesia (graduated at 1997). Second , my brother is also an alumni of Binus university so i can get sibling scholarship. I also want to live in another city because im bored at Semarang.
I want to take Enginneering Informatics. Since im a little kid i always play with my computer everyday and later i found out that we can get a job by using a computer so i want to to learn it. While my big brother take system information im more interested with Engineering Informatics. But then after graduating my brother got a job which is frequently taken by engineering informatics so it doesnt affect thath much i guess.Also i dont like to work outside, so i prefer to work at office.
After i graduate from this university i want to work for Indonesian computer system for example database , servers , websites since Indonesia cyber security is so bad if its compared with other europe country. So we can save our data from being hacked by other countries. I also want to give out more information on websites so our people wont be confused with government program. Right now , whenever i see promotion from government which including opening websites i'm too lazy to open it because im sure that the information that the websites will gives wont be any better than hwat i already know
3 notes · View notes
quickitsupport · 7 years ago
Text
Online Gaming Security Tips
The gaming world has evolved over the years. From pinball and Atari, it has now advanced to virtual reality. Also, video gaming has gone online now. Gamers can stream their games, and their fans can watch it live. Players can compete against people across the globe.
With smartphones, tablets, and gaming consoles such as Switch, Xbox, PlayStation, etc., gaming has become very popular among grownups and kids alike. There are now platforms such as Discord where gamers can meet and communicate.
Even though the video gaming evolution has undoubtedly offered a better gaming experience to people, it has led to a staggering growth in in-game crime. In-game crime, also known as virtual crime, happens in massively multiplayer online games, mostly in role-playing games.
Considering these threats, I did some research and weeded out the essential tips and tricks to secure your online experience. Here is how you can play video games safely:
Maintain anonymity
According to a study, more than half of individuals worry that bad actors will hack their private or financial data from their accounts. For playing online games, one often needs to create a profile, and this could be a gateway for data theft. User profiles are set to public. Therefore, one must avoid using gamer names which contain personal details. Do not use your real name, date of birth, or email address. Also, secure your online gaming accounts. Keep changing the passwords, and set a strong and unique one.
Stranger danger
Video games usually have a chatroom or a chat option which let users communicate with each other. According to a study, six out of ten children who play games, chat with other gamers. If you frequently talk with other online players, then you must know about the dangers associated with it, Avoid interacting with strangers, and do not give out personal information at any cost. Also, if anyone sends you a link or attachment over the game room IM, do not click on it, and do not download it.
Be wary of spam
Now, clicking on spammy links may lead to infections. While playing games on the internet, one must always be on the toes regarding attachments and links. To save money, online gamers usually install patches from third party websites. In fact, many other players offer packages to lure innocent gamers. Such patches can be laced with malicious code, and even contain ransomware. Therefore, always purchase and download any game related thing from a trusted party.
Secure the devices
Even though major gaming consoles are highly malware resistant, online computer and phone games are usually at a more significant risk to such cybersecurity infections. When playing online gamers, ensure that you have an up-to-date antivirus program along on your computer. Also, enable the firewall to get added protection.
Given the pace with which gaming popularity is surging, and the explosive growth of eSports, it does not seem like the online gaming bubble shall burst in a long while. As a matter of fact, there is an online game which spots youngsters who have hidden cybersecurity talents.
Nonetheless, as new games proceed to evolve and grow and cybercriminals become more and more creative in driving attacks to abuse them, it is more necessary than ever to make sure that you maintain your devices’ safety and guard yourself when playing on the internet.
Carl Smith is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at www.norton.com/setup.
This entry was posted in
News
and tagged
norton activation
,
norton installation
,
norton.com/setup
,
Online Gaming Security Tips
. Bookmark the
permalink
.
source url - notronsetup.com
0 notes