Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer...
46 KB (5,098 words) - 17:25, 28 May 2025
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers...
97 KB (11,568 words) - 01:40, 15 June 2025
computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network...
24 KB (2,746 words) - 17:13, 16 June 2025
video surveillance to be manipulated in order to support a conviction to pursue a political agenda. Computer and network surveillance Mass surveillance Sousveillance...
121 KB (13,160 words) - 15:15, 24 May 2025
Dataveillance (redirect from Data Surveillance (Dataveillance))
dataveillance, and facilitative mechanisms. Unlike computer and network surveillance, which collects data from computer networks and hard drives, dataveillance...
18 KB (2,405 words) - 12:40, 6 July 2024
social, economic and political progress in countries across the world. Computer and network surveillance – Monitoring of computer or network activity This...
24 KB (2,086 words) - 23:43, 24 May 2025
Cellphone surveillance Closed-circuit television (CCTV) Computer and network surveillance COVID-19 surveillance Data privacy Data retention Discipline and Punish:...
111 KB (12,314 words) - 02:45, 11 June 2025
The United States Space Surveillance Network (SSN) detects, tracks, catalogs and identifies artificial objects orbiting Earth, e.g. active/inactive satellites...
33 KB (4,075 words) - 11:51, 1 May 2025
manipulate, or move computer data, such as computers, data networks, and all devices connected to or included in said networks, such as routers and switches. All...
18 KB (1,725 words) - 19:07, 26 March 2025
Tempest (codename) (redirect from Tempest (surveillance))
TEMPEST-shielded). Air gap (networking) - air gaps can be breached by TEMPEST-like techniques Computer and network surveillance Computer security MIL-STD-461...
35 KB (4,247 words) - 20:02, 24 May 2025
Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance...
9 KB (968 words) - 05:21, 25 May 2025
outbound network traffic at the device or local-area-network level A computer and network surveillance device or software, of a variety of types An Internet...
952 bytes (171 words) - 06:51, 21 March 2021
reports on computer equipment. Monitoring and surveillance agents are often used to monitor complex computer networks to predict when a crash or some other...
1 KB (152 words) - 13:59, 24 July 2023
List of websites blocked in the United Kingdom (section Court ordered implementations targeting copyright and trademark infringement)
Anti-Counterfeiting Trade Agreement (ACTA) Censorship in the United Kingdom Computer and network surveillance Copyright infringement Copyright in the United Kingdom Child...
34 KB (1,540 words) - 21:53, 30 January 2025
labor Emotional labor Microwork Post-Fordism Post-Marxism Computer and network surveillance Hyperreality Wages for housework Lazzarato, Maurizio (1996)...
9 KB (1,003 words) - 09:54, 28 May 2025
Educational Rights and Privacy Act (FERPA) – federal privacy law often cited in educational AUPs Computer and network surveillance – institutional enforcement...
14 KB (1,263 words) - 15:45, 7 June 2025
Internet Freedom Consortium Bypassing content-control filters Computer and network surveillance Library resources about Internet censorship in Switzerland...
7 KB (830 words) - 00:04, 25 May 2025
Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific...
97 KB (9,773 words) - 17:19, 12 June 2025
layers, leading towards both power and EM side-channel attack immunity. Brute-force attack Computer and network surveillance Covert channel Side effect Wire...
31 KB (3,588 words) - 14:14, 13 June 2025
through a network, typically as part of an IP video surveillance system. NVRs typically have embedded operating systems. As a more flexible and serviceable...
2 KB (222 words) - 03:34, 22 May 2024
Index of cryptography articles (category Cryptography lists and comparisons)
assumption • Computational hardness assumption • Computer insecurity • Computer and network surveillance • COMSEC equipment • Conch (SSH) • Concrete security...
67 KB (2,932 words) - 23:20, 16 May 2025
Health network surveillance is a practice of health information management involving a combination of security, privacy and regulatory compliance with...
4 KB (500 words) - 15:04, 17 July 2024
Utah Data Center (category Mass surveillance)
security computer and network surveillance program operated by the NSA, as enabling in-depth surveillance on live Internet communications and stored information...
16 KB (1,568 words) - 01:21, 9 June 2025
great reporting and allows you to assign users with different roles.” Comparison of time-tracking software Computer and network surveillance "How Introverts...
6 KB (505 words) - 15:08, 3 January 2023
between "surveillance assets", "surveillance capital", and "surveillance capitalism" and their dependence on a global architecture of computer mediation...
33 KB (3,296 words) - 22:58, 11 April 2025
government surveillance projects and related databases throughout the world. ECHELON: A signals intelligence (SIGINT) collection and analysis network operated...
34 KB (3,264 words) - 15:41, 14 February 2025
TRENDnet (category Networking companies of the United States)
manufacturer of computer networking products headquartered in Torrance, California, in the United States. It sells networking and surveillance products especially...
3 KB (171 words) - 10:16, 30 January 2025
TURBINE (US government project) (category Computer surveillance)
management and control of a large surveillance network. The NSA has built an infrastructure which enables it to covertly hack into computers on a mass...
8 KB (727 words) - 15:17, 28 March 2025
Closed-circuit television camera (redirect from Surveillance camera)
image quality. Network cameras can be used for very cheap surveillance solutions (requiring one network camera, some Ethernet cabling, and one PC), or to...
8 KB (1,055 words) - 02:33, 4 June 2025
Internet filter (section Network-based filtering)
content-control software and providers (incl. parental control software) Computer and network surveillance David Burt, a former librarian and advocate for content-control...
42 KB (5,053 words) - 16:16, 8 May 2025