MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 801-810 Newer>
PC Magazine
October 1, 2003
Jim Louderback
The Lookout: Widespread Windows Hole Microsoft Corp. has revealed a gaping hole inside most Windows PCs. mark for My Articles 105 similar articles
PC Magazine
October 1, 2003
Cade Metz
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. mark for My Articles 240 similar articles
PC Magazine
September 15, 2003
Sebastian Rupley
Bad Pitch Dissonance is in the air. The Recording Industry Association of America (RIAA) is raising the stakes in the music-swapping battle by pursuing legal action against individuals who may share music online. mark for My Articles 93 similar articles
PC Magazine
September 15, 2003
Sebastian Rupley
What's My Name? Do you keep a list of your user names and passwords in your wallet or PDA? If so, you're not the only one who can't remember them all. mark for My Articles 99 similar articles
PC Magazine
September 9, 2003
Bill Machrone
Internet Radio: Failed Promise? At least Internet radio stations have a reprieve from the record companies' usual shortsighted thuggery. mark for My Articles 212 similar articles
PC World
October 2003
Andrew Brandt
Sneaky Apps Attack More-aggressive applications are creeping onto your hard drive, serving you endless ads or resetting your browser. mark for My Articles 118 similar articles
PC World
October 2003
Andrew Brandt
Privacy Watch: California Law Protects Us All From Security Breaches New identity theft statute likely to help consumers everywhere. mark for My Articles 398 similar articles
PC World
October 2003
Stuart J. Johnston
Bugs & Fixes: New Windows Holes, Dangerous Music Prevent hackers from using music files to take charge of your machine. mark for My Articles 178 similar articles
Bio-IT World
September 11, 2003
Philip D. Quarles
Safeguarding the Security of Clinical Data Given the frequency of Web site attacks, can data be safely stored on a server connected to the Internet? Yes, provided that the application is properly designed and the network and server properly secured. mark for My Articles 111 similar articles
Wired
October 2003
Jeff Howe
BigChampagne is Watching You In fact, they're tracking every download and selling the data to the music industry. How one company is turning file-sharing networks into the world's biggest focus group. mark for My Articles 13 similar articles
<Older 801-810 Newer>    Return to current articles.