MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 651-660 Newer>
Fast Company
January 2003
Alison Overholt
If You Have Received This by Mistake... Email was supposed to make your life easier, faster, and cheaper -- not messier, uglier, and cheesier. Here's how to keep the spam off your plate. mark for My Articles 890 similar articles
PC World
January 2003
Andrew Brandt
Privacy Watch: The Dangers of Do-It-Yourself Security Beware the misuse of vulnerability-testing software. mark for My Articles 38 similar articles
D-Lib
December 2002
Julien Masanes
Towards Continuous Web Archiving: First Results and an Agenda for the Future An outline of the contribution of the national library of France (BnF) to a general discussion of web archiving. mark for My Articles 119 similar articles
PC World
December 12, 2002
Joris Evers
Microsoft Patches Eight Software Holes Security holes, two of which are serious, involve the virtual machine used to run Java apps on Windows. mark for My Articles 343 similar articles
New Architect
January 2003
Christopher Null
Spam Filtering: A Fable Some IT magic just isn't worth the effort mark for My Articles 20 similar articles
New Architect
January 2003
Bret A. Fausett
Ask Not What the Internet Can Do for You Your role in national security: the government's "National Strategy to Secure Cyberspace" starts in the home with the individual user. mark for My Articles 63 similar articles
New Architect
January 2003
Brian Wilson
OmniCluster SlotShield 3000 A security appliance delivered on a PCI-compatible, plug-and-play blade mark for My Articles 355 similar articles
New Architect
January 2003
Thomas Claburn
Pretty Good Isn't Good Enough Phil Zimmermann, creator of PGP (Pretty Good Privacy) encryption, won the crypto war. Whither privacy? mark for My Articles 31 similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles 336 similar articles
T.H.E. Journal
December 2002
Judith B. Rajala
Web Site Filtering Web site filtering is the selection of Internet or Web site content deemed acceptable for viewing and/or prohibiting the viewing of objectionable Web content. Advice and practicable strategies for filtering in schools mark for My Articles 64 similar articles
<Older 651-660 Newer>    Return to current articles.