12 research outputs found

    Identity Theft and Used Gaming Consoles: Recovering Personal Information from Xbox 360 Hard Drives

    Get PDF
    Traditionally, when individuals wanted online access they connected their PCs to the internet. Now, non-traditional devices such as cell phones, smart phones, and gaming consoles serve as common means of online access. Gaming consoles, just like PCs need proper sanitization processes to help fight identity theft. Individuals understand you cannot simply throw away a computer that has your personal data on it without some sort of sanitization process; gaming consoles are no different. Simply returning your console back to “factory state” will not do the trick, you need to take things one step further.In this research paper the authors aim to bring awareness to the gaming public, researchers and practitioners that improperly discarding used consoles without proper sanitization practices can inadvertently release personal data which can result in identity theft. The researchers will demonstrate through a case study how easy it is to steal an identity through a discarded Xbox. Finally, the researchers will demonstrate how gamers can sanitize their game consoles when upgrading their systems to ensure their identity is not at risk when the used device is retired

    Proteomic identification of binding targets of isothiocyanates: A perspective on techniques

    No full text
    Intake of cruciferous vegetable is inversely associated with the risk of several cancer types. Isothiocyanates (ITCs) are believed to be important constituents contributing to these cancer-preventive effects. Although several mechanisms, including induction of apoptosis, have been proposed for the anti-carcinogenesis activities of ITCs, detailed upstream triggering events are still not fully understood. Identification of ITC binding targets in cellular proteins is crucial for not only mechanistic studies but also future drug screening and design. In this review, we summarize recent progress in discovery of ITC protein targets from a technical perspective. The advantages and limitations of each method are discussed to facilitate future studies on target discovery of ITCs and perhaps other compounds
    corecore