Protection from cyber-terrorist

Hackers certainly are a type of lawbreaker who increases usage of computers, systems and automated information system audit devices through the use of their abilities to break all of them down in a way you might not believe possible. They will also use their particular skills of stealing information via people and companies.

Personal information is in all places online, and hackers are particularly interested in this info. It could include information on bank accounts, visa card numbers, passwords, medical files and anything more that can be used to name you.

The initial thing to do is change your accounts. Strong, sophisticated passwords are important to guard your information. Try to keep the passwords unique for each web page and device you use, so hackers can’t easily figure them out.

A good guideline is to use at the very minimum eight personas, with a combination of emails, numbers and particular characters. You can even choose a pass word that is difficult to guess, for example a phrase or maybe a number.

Two-factor authentication promotes protection from cyber-terrorist, as it requires you to input a code that is certainly sent to your phone or perhaps email address. Choosing strong accounts and enabling two-factor authentication is a must for anyone who uses an online service.

Viruses and spyware are another threat to your protection, as they can attack your computer or perhaps mobile equipment and take control of it not having your knowledge. They will download spyware and to your program or even trigger your computer to crash.

A firewall may be a network program that stops hackers from accessing your computer or system. Most computers have a firewall, but it needs to be stimulated. It can be tricky to use, nevertheless it’s well worth the extra attempt to ensure the privacy.

Work Group

Objective Enactive
This online lecture-demonstration unfolds the term ´Poetic Materiality´ within the context of designing and choreographing with Somatic Costumes. Through critiquing and applying the somatic practice of Skinner Releasing Technique, the poetics of philosopher Gaston Bachelard and the materiality of anthropologist Tim Ingold, this talk begins to map poetic and material agencies between bodies-costumes within the design-performance encounter.

Artist Talk

Objective Enactive

This talk will focus on the first outcome of Glitsch(ening) Ci(rculari)ty, a tripartite site-specific, where I am pursuing a speculative exploration of the ecology of the city, between the urban and the biological, unfolding its layers and materiality of time. The talk will end in a conversation between fellow researchers and artists in the collaborative project Urban Ecologies, where Glitsch(ening) Ci(rculari)ty, is generated from.


Polyvocal Tongue The presentation will focus on relational ethics and polyvocality in performative text. It will also explore the use of plural languages in a play, looking at how a polylingual praxis can open up new aesthetic potential in playwrighting and in artistic research in general.


TRANSPOSITIONS— JAR, Mette Edvardsen and modular diaries At the start, the idea for an artistic research conversation with Mette Edvardsen did not spring out of the topics shortlisted for the conference—hospitality, vulnerability and care—but a book that she had co-edited, and dropped in my shelf.

Panel Discussion

The Ethics of Vulnerability and Artistic Research

Any ethical framework must take account of the vulnerability of the human condition. This is significant in all creative endeavours – especially in artistic practice and the teaching of it – since the very act of creating something and putting it out into the world is an expression of vulnerability.