csc-propaganda/poster-archive/security13/security-03.tex

51 lines
1.9 KiB
TeX

% This is csc-poster-sample, a sample CSC poster
%% Copyright (C) 2003 Computer Science Club of the University of Waterloo
%%
%% This program is free software; you can redistribute it and/or modify
%% it under the terms of the GNU General Public License as published by
%% the Free Software Foundation; either version 2 of the License, or
%% (at your option) any later version.
%%
%% This program is distributed in the hope that it will be useful,
%% but WITHOUT ANY WARRANTY; without even the implied warranty of
%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
%% GNU General Public License for more details.
%%
%% You should have received a copy of the GNU General Public License
%% along with this program; if not, write to the Free Software
%% Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
\documentclass{article}
\usepackage{csc-poster}
\begin{document}
\vspace*{-0.3in}
%% TITLE
% This command lays out the top of the document.
% The first parameter is the title.
% The second parameter is the speaker. This parameter may be empty.
\cschead{Security and Privacy Lecture Series}{Calum T. Dalek}
%% SUBTITLE
% This command prints the sub-title and is completely optional.
\cscsubtitle{Practical Tor Usage -- Simon Gladstone}
An introduction to and overview of how to use the Tor Browser Bundle to browse
the ``Deep Web'' and increase security while browsing the Internet. Tor is not
the be all end all of Internet security, but it is definitely a step up from
using the more popular browsers such as Chrome, Firefox, or Safari.\\
\noindent This is the third lecture of six in the Security and Privacy Lecture
Series.
%% FOOTER
% The first through third arguments tell us the date and time.
% The last argument is a pithy saying. It may be empty.
% Following the footer, the CSC logo is printed.
\cscfoot{Tuesday, 2013-10-24}{6:30 PM}{DC 1302}{{\tt :()\{ :|:\& \};:}}
\end{document}