MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 821-830 Newer>
PC Magazine
October 28, 2003
Neil J. Rubenking
No Such Addressee For the past month, I have been receiving e-mail with addresses similar to but not exactly mine in the To: field. Or have I? mark for My Articles 598 similar articles
PC Magazine
October 7, 2003
Mark Hachman
Long Arm of The Law The havoc created by widespread viruses in August resulted in serious legal hardball. U.S. law enforcement agents say the arrest of the alleged author of the Blaster worm sends a message to virus writers that the federal government will prosecute similar crimes. mark for My Articles 184 similar articles
Knowledge@Wharton
October 8, 2003
Suing Your Customers: A Winning Business Strategy? The record industry's solution to its downloading woes appears as novel as the technology it fears: launch hundreds of lawsuits against otherwise law-abiding consumers who download music. The same tactic was tried 100 years ago against Henry Ford. It didn't work then, and it won't work now. mark for My Articles 238 similar articles
Technology Research News
October 8, 2003
Kimberly Patch
Old idea retooled for security Computers have become quite powerful over the years, but they remain less than reliable. A concept widely used in mainframe computing in the '70s and '80s -- the virtual machine -- could keep computers safe and sound in the age of hackers and viruses. mark for My Articles 70 similar articles
CIO
October 1, 2003
Art Jahnke
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. mark for My Articles 378 similar articles
CIO
October 1, 2003
Gary Beach
Beware of the Telephone Most of your employees think hacks originate via a computer. According to Kevin Mitnick, they'd be wrong. Mitnick knows the weakest link in corporate infrastructure security: human beings. mark for My Articles 15 similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles 160 similar articles
Fast Company
October 2003
Linda Tischler
Joe Trippi's Killer App Howard Dean's campaign manager has used the Internet to turn an obscure ex-governor into a real presidential contender. It's anything but politics as usual. Will it work? mark for My Articles 77 similar articles
Fast Company
October 2003
Jennifer Reingold
Harnessing the Net, One Phone at a Time. Voxiva's Paul Meyer is using telephones to bring the power of the Internet to areas that can't afford computers. mark for My Articles
Information Today
October 2003
Dick Kaser
The Day the Music Died? Whether or not this generation of music fans views their loss of innocence (with regard to the legality of song-sharing on peer-to-peer networks) as the day the music died is a subject that remains to be polled. mark for My Articles 95 similar articles
<Older 821-830 Newer>    Return to current articles.