Trojan Horse clip from TroyAnthony Vance2011-03-28 | HD version of this clip is available here: youtu.be/Td1uPq9K--E.What Shall We Give to the Babe in the Manger?Anthony Vance2020-12-28 | Music by the Tabernacle Choir at Temple Square.
What shall we give to the babe in the manger, What shall we offer the child in the stall? Incense and spices and gold we've a-plenty- Are these the gifts for the king of us all?
Tan ta tan tan ta ta tan ta ta tan ta Ta ta tan tan ta ta tan ta ta ta
What shall we give to the boy in the temple, What shall we offer the man by the sea? Palms at his feet and hosannas uprising; Are these for him who will carry the tree?
Tan ta tan tan ta ta tan ta ta tan ta Tan ta tan tan ta ta tan ta ta ta
What shall we give to the lamb who was offered, Rising the third day and shedding his love? Tears for his mercy we'll weep at the manger, Bathing the infant come down from above.
(via musixmatch.com)NCIS ridiculous hacking scene: one keyboard, two typists HDAnthony Vance2020-12-10 | ...Visualizing Third-party Cookies for the U.S. Alexa.com top 50 websitesAnthony Vance2020-03-29 | This video shows the relationships among third-party cookies for many of the U.S. Alexa.com top 50 websites using the excellent (and unfortunately no longer maintained) Lightbeam extension for Mozilla Firefox.How to Conduct an fMRI Study to Examine Usable Privacy and SecurityAnthony Vance2015-07-28 | This is a presentation I gave at the Symposium on Usable Privacy and Security (SOUPS) 2015 held July 22–24 in Ottawa, Canada.Trojan Horse clip from Troy HDAnthony Vance2015-05-26 | ...Using fMRI and Mouse Cursor Tracking to Explain Habituation to Security WarningsAnthony Vance2015-03-17 | This video is a 4-minute overview of our research on habituation to security warnings using fMRI and mouse cursor tracking. For more information about this study, visit http://neurosecurity.byu.edu/chi_fmri_habituation.30-second Preview: How Habituation to Security Warnings Occurs in the Brain—An fMRI StudyAnthony Vance2015-02-17 | This is a 30-second preview of the CHI 2015 paper, "How Polymorphic Warnings Reduce Habituation in the Brain—Insights from an fMRI Study." You can read about this paper here: http://neurosecurity.byu.edu/chi_fmri_habituation.KSL Video Summarizing Malware EEG StudyAnthony Vance2015-02-03 | News station KSL summarizes the study, "Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)," published in the Journal of the Association for Information Systems.How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)Anthony Vance2014-10-14 | This video explains how to compute the RSA algorithm, including how to select values for d, e, n, p, q, and φ (phi).How to Make a Computer 100% Secure, Version 2Anthony Vance2014-08-16 | With the coda "Can a computer ever be 100% secure?," suggested by Tadayoshi Kohno.How to Make Your Computer 100% Secure Part 2Anthony Vance2014-08-08 | ...How to Make your Computer 100% Secure Part 1Anthony Vance2014-08-08 | ...How to Make Your Computer 100% SecureAnthony Vance2014-08-05 | ...War Games War Dialing clipAnthony Vance2014-07-31 | "Protovision, I have you now!"24 Clip on Blowfish CryptographyAnthony Vance2014-07-31 | Check the file header!Grand Moff Tarkin and Risk HDAnthony Vance2014-07-31 | Grand Moff Tarkin demonstrates why risk is the product of likelihood and impact in 47 seconds.There is No Teacher But the EnemyAnthony Vance2014-07-31 | Clip from "Ender's Game" about why the enemy is the only teacher.Harry Potter and Defense in DepthAnthony Vance2013-08-10 | This montage from "Harry Potter and the Sorcerer's Stone" filmically illustrates the security principle of defense in depth, as explained by Bruce Schneier in his book "Beyond Fear":
"In J.K. Rowling's first Harry Potter novel, Professor Dumbledore arranges to protect the Philosopher's Stone (the Sorcerer's Stone, in the American edition) not with one but with a series of countermeasures: Fluffy the three-headed dog, devil's snare plants, a locked door with flying keys, a giant chess puzzle, a troll, a logic problem involving potions, and finally a magic mirror. An attacker would have to penetrate every one of them, rather than just the weakest of them. Security is not just a matter of numerous countermeasures, but countermeasures that work independently and in series and that present different sets of challenges to the attacker. In general, a moat-wall combination is better than two walls" (p. 105).Grand Moff Tarkin and RiskAnthony Vance2010-08-10 | Grand Moff Tarkin demonstrates why risk is the product of likelihood and impact in 40 seconds.