5.5 5.6 hacks
blog posts for the 5.5 and the 5.6 hacks
5.5 reflection
-
When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.
- all of the licenses that are listed in github are open source licenses. ALL of the licenses don’t support support liability and warranty. minority of the license don’t support trademark use and patent use. all of the licenses support Commercial use, Modification, Distribution, and Private use.
-
In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.
- i think that licenses are a good thing. as a APCSP student, licenses can help me stay out of legal trouble. But the licenses listed in github is not enough of you wanted other types of license for example a closed source github repo.
-
Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.
- for all the repo, we use MIT open-source license. its supports all of the things we need to protect (nothing), and it protects us from using another closed source project for our own benefit and change it to our liking.
5.6 reflection
- Describe PII you have seen on project in CompSci Principles.
- the PII’s that i’ve seen in projects is names. i have not yet found something else.
- What are your feelings about PII and your personal exposure?
- it should be private because i value my privacy and will decide to remain incognito amongst the sea of users on the internet.
- Describe good and bad passwords? What is another step that is used to assist in authentication.
- a good password is that doesn’t include your name, ur birth date, or your mother’s maiden name.
- a good password has characters, digits, symbols and numbers.
- Try to describe Symmetric and Asymmetric encryption.
- Symmetric: one key used amongst many users
- Asymmetric: multiple keys that only one key can unlock.
- Provide an example of encryption we used in AWS deployment.
- in aws, we used .pem files to secure our aws deployment.
- Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
- i have not yet been phished, yet. one of the main phishing techniques is sending peoples by email and the topic of the email is something that brickbats the user into clicking.