Linux Privacy - Page 52
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The Flint Hills School, a prep academy in Oakton, Va., might seem an unlikely place to find an Internet spammer. But late last year, technicians at America Online were able to trace the origin of a new torrent of spam, or unsolicited e-mail advertisements, to the school's computer network. . .
It's a memory aid! A robotic assistant! An epidemic detector! An all-seeing, ultra-intrusive spying program! The Pentagon is about to embark on a stunningly ambitious research project designed to gather every conceivable bit of information about a person's life, index . . .
Trust must be earned. This hard lesson is being learned by the five tech giants behind "trusted-computing" initiatives aimed at securing user privacy. Depending on whom you believe, the companies developing trusted-computing technology are either Santa or Satan. . .
If you're overwhelmed by spam like the rest of us, there aren't any really terrific solutions. You can try smarter spam filters, though you'll still have to verify that legit mail isn't swept up among the dross. You can switch . . .
I agree with the recent Linux and Main editorial that one of the most misunderstood aspects of the spam debate is the confusion about how it should be defined. While I'm willing to admit that there needs to be some discussion . . .
We've all been reading about how folks are fed up with spam. I receive 2 spams for every legitimate e-mail (And I receive a lot of e-mail daily). I use spamassassin and just let it send all the garbage to /dev/null. . . .
In a ruling that marks a victory for privacy proponents, a federal appeals panel is allowing a group of Web surfers to sue a company that gathered certain data about them without their consent. . .
It started out in an unassuming manner: an industrious developer, Paul McNett, had a growing interest in Linux. He began playing around with the open-source implementation of Windows for Linux called WINE and wondered how his favorite development tool, Microsoft Visual . . .
The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule became effective April 14, which means it's time to pay attention if you haven't done so already. . .
Jay Walker achieved fame and fortune as an internet pioneer (Priceline.com), then notoriety and considerably less fortune as an icon of the dot-com bust. But his legacy might one day be a sweeping scheme for homeland security that doesn't earn him . . .
Nobody likes to feel they're being watched or that their employer doesn't trust them. But, in some workplaces, every email written is scrutinised and employers check out every website visited. Apart from the detrimental effect this has on employees, it . . .
I spent last week at the Federal Trade Commission's three-day spam summit, where hundreds of people, fed up with the skyrocketing amount of unsolicited bulk e-mail, gathered to figure out how to stop it. The suggestions were predictable: As they . . .
In part one we looked at the fundamental problem of spam, which is theft of services, and put forth the radical notion that we are not put on this Earth merely for the convenience of marketers, but have exclusive rights to . . .
I get a lot of spam e-mail. These days, however, most of it doesn't go to my e-mail Inbox, because I'm filtering my e-mail with SpamProbe. SpamProbe is a spam detector; you train it to recognize what you consider to be . . .
The anxious wait endured by health care organizations ended when the final Security Rules for the Health Insurance Portability and Accountability Act (HIPAA) were released in February. For most, the news was confirmation that their improved secure infrastructures conformed with . . .
Congress is in the early stages of considering what to do about spam, but that doesn't mean spam artists who clog computers with massive volumes of unsolicited e-mail have nothing to worry about. A tough new bill to combat spam . . .
Pressed by increasingly effective anti-spam efforts, senders of unsolicited commercial e-mail are resorting to outright criminality in their efforts to conceal the source of their ill-sent missives, using Trojan horses to turn the computers of innocent netizens into secret spam zombies. . . .
Linus Torvalds, the founder of the Linux operating system, threw a curve ball into the open-source programming community Thursday. In a posting sent to a key Linux-focused e-mail list, he outlined a controversial proposal: Nothing in the basic rules for the Linux operating system should block developers from using digital rights management (DRM) technology.. . .
Today, get an update on the ongoing war by the entertainment industry against privacy and civil liberties. Oppressive intrusiveness for its own sake isn't Hollywood's intent. But it is the effect. The movie and music industries are frantic because people . . .
Here's a site that is definitely worth your time: the Google Zeitgeist. Basically, the uber-search site Google keeps a running compendium of the items people search for using its search engine. As Google helpfully explains on the Web page, "zeitgeist" is . . .