SlideShare une entreprise Scribd logo
1  sur  10
Hey, you.

Yeah, you.
I can see everything you do.

Every time you log into this
 course or click on a link,
         I know.
How?
The eLC tracks your every move
          using your
     digital fingerprint.
Like the fingerprint on your
thumb, your computer is unique.

 Your IP address, your settings, the
programs you use, the websites you
visit, your login names, etc. create a
 “fingerprint” that distinguishes your
     computer from mine. (Fenlon par. 2)
This doesn’t only apply to the
            eLC.

It applies to every website you
               visit.
You can delete the list of sites that
you’ve visited in your Internet browser
   and the cookies stored on your
 computer, but you can’t delete your
    computer’s digital fingerprint.

                Ever.
The police and companies can use
 this information to track your activity
            on the Internet.

The eLC uses your login information to
         track you as well.
This means that, on the eLC, your
 teacher knows if you clicked on
 a forum post, tried to submit an
    assignment, or watched a
         required video.
They even know when you did it.
  They also know if you didn’t.
Creepy, huh?

That’s why you should always be
    careful on the Internet…
       … and on the eLC.
Now click on the next assignment.
 I’ll know whether or not you did.
Works Cited

Fenlon, Wesley. “How Digital Fingerprinting
     Works.” 24 July 2012. < http://computer.
     howstuffworks.com/digital-
     fingerprinting3.htm>

Contenu connexe

Similaire à ECT Digital Fingerprint Presentation

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safernerakmac
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfEric Selje
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
Access off Campus to MDX resources: Psychology
Access off Campus to MDX resources: PsychologyAccess off Campus to MDX resources: Psychology
Access off Campus to MDX resources: Psychologyveades
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Digital life
Digital lifeDigital life
Digital lifeHarm7
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Informationebooker97
 
Action Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc InformationAction Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc Informationebooker97
 
Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience Harman Innovation
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 

Similaire à ECT Digital Fingerprint Presentation (20)

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Access off Campus to MDX resources: Psychology
Access off Campus to MDX resources: PsychologyAccess off Campus to MDX resources: Psychology
Access off Campus to MDX resources: Psychology
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Digital life
Digital lifeDigital life
Digital life
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
 
Action Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc InformationAction Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc Information
 
Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Windows 7
Windows 7Windows 7
Windows 7
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 

Plus de MrsBrynaCannon

Accessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLCAccessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLCMrsBrynaCannon
 
Accessing Students' Grades on the eLC
Accessing Students' Grades on the eLCAccessing Students' Grades on the eLC
Accessing Students' Grades on the eLCMrsBrynaCannon
 
Fd wl how to find rubrics presentation
Fd wl how to find rubrics presentationFd wl how to find rubrics presentation
Fd wl how to find rubrics presentationMrsBrynaCannon
 
CCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy VideosCCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy VideosMrsBrynaCannon
 
CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC MrsBrynaCannon
 
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)MrsBrynaCannon
 
ECT What Not to Wear Presentation
ECT What Not to Wear PresentationECT What Not to Wear Presentation
ECT What Not to Wear PresentationMrsBrynaCannon
 
FD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing PresentationFD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing PresentationMrsBrynaCannon
 
Fundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting PresentationFundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting PresentationMrsBrynaCannon
 
Fundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement PresentationFundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement PresentationMrsBrynaCannon
 
Fundamentals Technical Writing Presentation
Fundamentals Technical Writing PresentationFundamentals Technical Writing Presentation
Fundamentals Technical Writing PresentationMrsBrynaCannon
 
Fundamentals Playwriting Presentation
Fundamentals Playwriting PresentationFundamentals Playwriting Presentation
Fundamentals Playwriting PresentationMrsBrynaCannon
 
Fundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers PresentationFundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers PresentationMrsBrynaCannon
 
Fundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause PresentationFundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause PresentationMrsBrynaCannon
 
Fundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 PresentationFundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 PresentationMrsBrynaCannon
 
Fundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes PresentationFundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes PresentationMrsBrynaCannon
 
Fundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing PresentationFundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing PresentationMrsBrynaCannon
 
Fundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation PresentationFundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation PresentationMrsBrynaCannon
 

Plus de MrsBrynaCannon (18)

Accessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLCAccessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLC
 
Accessing Students' Grades on the eLC
Accessing Students' Grades on the eLCAccessing Students' Grades on the eLC
Accessing Students' Grades on the eLC
 
Fd wl how to find rubrics presentation
Fd wl how to find rubrics presentationFd wl how to find rubrics presentation
Fd wl how to find rubrics presentation
 
CCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy VideosCCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy Videos
 
CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC
 
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
 
ECT What Not to Wear Presentation
ECT What Not to Wear PresentationECT What Not to Wear Presentation
ECT What Not to Wear Presentation
 
FD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing PresentationFD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing Presentation
 
Fundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting PresentationFundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting Presentation
 
Fundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement PresentationFundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement Presentation
 
Fundamentals Technical Writing Presentation
Fundamentals Technical Writing PresentationFundamentals Technical Writing Presentation
Fundamentals Technical Writing Presentation
 
Fundamentals Playwriting Presentation
Fundamentals Playwriting PresentationFundamentals Playwriting Presentation
Fundamentals Playwriting Presentation
 
Fundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers PresentationFundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers Presentation
 
Fundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause PresentationFundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause Presentation
 
Fundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 PresentationFundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 Presentation
 
Fundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes PresentationFundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes Presentation
 
Fundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing PresentationFundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing Presentation
 
Fundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation PresentationFundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation Presentation
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

ECT Digital Fingerprint Presentation

  • 2. I can see everything you do. Every time you log into this course or click on a link, I know.
  • 3. How? The eLC tracks your every move using your digital fingerprint.
  • 4. Like the fingerprint on your thumb, your computer is unique. Your IP address, your settings, the programs you use, the websites you visit, your login names, etc. create a “fingerprint” that distinguishes your computer from mine. (Fenlon par. 2)
  • 5. This doesn’t only apply to the eLC. It applies to every website you visit.
  • 6. You can delete the list of sites that you’ve visited in your Internet browser and the cookies stored on your computer, but you can’t delete your computer’s digital fingerprint. Ever.
  • 7. The police and companies can use this information to track your activity on the Internet. The eLC uses your login information to track you as well.
  • 8. This means that, on the eLC, your teacher knows if you clicked on a forum post, tried to submit an assignment, or watched a required video. They even know when you did it. They also know if you didn’t.
  • 9. Creepy, huh? That’s why you should always be careful on the Internet… … and on the eLC. Now click on the next assignment. I’ll know whether or not you did.
  • 10. Works Cited Fenlon, Wesley. “How Digital Fingerprinting Works.” 24 July 2012. < http://computer. howstuffworks.com/digital- fingerprinting3.htm>