% This is csc-poster-sample, a sample CSC poster %% Copyright (C) 2003 Computer Science Club of the University of Waterloo %% %% This program is free software; you can redistribute it and/or modify %% it under the terms of the GNU General Public License as published by %% the Free Software Foundation; either version 2 of the License, or %% (at your option) any later version. %% %% This program is distributed in the hope that it will be useful, %% but WITHOUT ANY WARRANTY; without even the implied warranty of %% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the %% GNU General Public License for more details. %% %% You should have received a copy of the GNU General Public License %% along with this program; if not, write to the Free Software %% Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA \documentclass{article} \usepackage{csc-poster} \begin{document} \vspace*{-0.3in} %% TITLE % This command lays out the top of the document. % The first parameter is the title. % The second parameter is the speaker. This parameter may be empty. \cschead{Security and Privacy Lecture Series}{Calum T. Dalek} %% SUBTITLE % This command prints the sub-title and is completely optional. \cscsubtitle{Practical Tor Usage -- Simon Gladstone} An introduction to and overview of how to use the Tor Browser Bundle to browse the ``Deep Web'' and increase security while browsing the Internet. Tor is not the be all end all of Internet security, but it is definitely a step up from using the more popular browsers such as Chrome, Firefox, or Safari.\\ \noindent This is the third lecture of six in the Security and Privacy Lecture Series. %% FOOTER % The first through third arguments tell us the date and time. % The last argument is a pithy saying. It may be empty. % Following the footer, the CSC logo is printed. \cscfoot{Tuesday, 2013-10-24}{6:30 PM}{DC 1302}{{\tt :()\{ :|:\& \};:}} \end{document}