| Old Articles: <Older 1501-1510 Newer> |
 |
InternetNews January 26, 2005 Roy Mark |
House Renews New Anti-Spyware Push The 109th Congress renewed its efforts to pass a federal anti-spyware bill by targeting the malware menace in the very first meeting of the House Energy and Commerce Committee.  |
National Defense February 2005 Michael Peck |
Soldiers Learn Hazards Of War in Virtual Reality The U.S. Army is testing the utility of a web-based training technology, the military version of the popular multiplayer online role-playing games, that lets soldiers share their combat experiences with troops preparing to deploy.  |
InternetNews January 21, 2005 Jim Wagner |
Microsoft Clamps Down on Mobile 2005 Stories Microsoft lawyers are attempting to force bloggers to remove a story revealing upcoming Windows Mobile technology.  |
Entrepreneur February 2005 Gwen Moran |
Capture the Tag Are RFID tags in danger of being hacked?  |
InternetNews January 21, 2005 Roy Mark |
FBI Abandons Carnivore New FOIA documents show that feds haven't used once controversial e-mail snooping system in two years.  |
InternetNews January 21, 2005 Sean Michael Kerner |
The Worm in CNN's Headlines A recent virus threat masquerades as a legitimate headline pulled right from the news Web site.  |
InternetNews January 21, 2005 Chris Nerney |
Malware: More than a Nuisance The growing deluge of spyware and adware is beginning to turn people away from the Internet.  |
InternetNews January 19, 2005 Susan Kuchinskas |
Search Leaders, Bloggers Band to Fight Comment Spam Industry group says it will support Google's 'no-follow' tag that tells search engine spiders to lay off links.  |
InternetNews January 19, 2005 Roy Mark |
DOJ Scores First Criminal P2P Convictions The U.S. Department of Justice bagged its first-ever criminal convictions for peer-to-peer copyright theft Tuesday when two men arrested in last summer's Operation Digital Gridlock pleaded guilty.  |
PC World February 2005 Brandt & Dahl |
New Ad Attacks Ads and adware have a new way to get on your PC: via music and video files. We show how they do it and how to stop them.  |
| <Older 1501-1510 Newer> Return to current articles. |