Linux Privacy - Page 54
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Want to stop spammers from clogging your in-box with get-rich-quick schemes, invitations from hot girls and Nigerian money-laundering antics? You might want to act like a criminal on the lam: Change your name, use a variety of identities and stay . . .
Earlier this month, on a single day, America Online, the nation's largest Internet-service provider, blocked more than 1 billion pieces of junk mail. It was a new one-day record for e-mails blocked. Users of AOL or any other service provider . . .
Australian consumers supported electronic health records but the healthcare sector was ignoring their expectations, an industry conference has heard. "Consumer expectations of these e-health schemes tends to be the last consideration," according to Amanda Cornwall, complaints and quality project manager . . .
Google is arguable the world's most popular search engine. However, contrary perhaps to a naive impression, in some cases the results of a search are affected by various government-related factors. That is, search results which may otherwise be shown, are deliberately . . .
American businesses feel a little like a rope that's being used in a tug of war between privacy and patriotism. Their customers want the personal information that businesses collect to be kept private, but the government wants access to some of that data for use in various homeland security plans. . . .
The URU Web service will identify individuals online without invading their privacy - and says it can alert people to attempted identity theft. A service is being developed that will help businesses check the identity of people they are dealing with -- without increasing the number of places where personal data is stored.. . .
The Six/Four System is peer-to-peer technology that makes it possible to carry out almost any Internet activity securely and -- more importantly, for all sorts of reasons -- anonymously. The Hacktivismo system, or anything based on it, just may become the . . .
Ask two Internet users a question and you'll get three opinions, all of them fiery, heartfelt, and contradictory... unless the subject is unsolicited commercial e-mail. The only difference of opinion on spam will be who gets first crack at the cretins who send it out. . .
Companies sending text message or e-mail adverts will have to get the permission of users before they do so under new rules. Regulations on new media have now been included in the latest edition of the code of advertising practice, . . .
Speaking Friday at a University of California at Berkeley conference on the law and policy of digital rights management, experts from all circles seem to agree that more is going wrong than right with the current approach to protecting digital content. . . .
Felix Lin and Linus Upson want to make it harder to send and receive e-mail. They believe it's the best way to deal with the problem of spam. On Monday, the two co-founders of AvantGo launched a new spam filter . . .
Protecting personal information on the digital frontier remains a tough task, even for the most ardent privacy activists. That's the lesson the American Civil Liberties Union learned this week after sending out an e-mail newsletter that inadvertently contained the names . . .
Recent reports available with news sites and also published in the Economic Times of India suggest that Microsoft [hereinafter referred to as MSFT] will be pushing through the Windows Rights Management Architecture & Services [WRMA & WRMS] by the 1st week of March, 2003. In the light of such an event, this article proposes to establish the fallacy of the Trusted Computing paradigm as made available in public document(s) from TCPA [https://www.trustedcomputing.org] . . .
Today I found my email account at Yahoo.com deactivated. It is an account that I have been using since when Yahoo first opened its doors and offered free email to the masses. I attempted to logon as has been my . . .
There's a lot happening with ENUM fairly quickly, and it's hard to keep track of half of it. Alas, one thing about ENUM seems pretty clear: as currently specified, ENUM's intersection with the DNS creates a major privacy problem for the . . .
As spam continues to roll over corporate networks in ever-larger quantities, the cavalry of vendors offering defenses continues to grow as well. No fewer than five vendors are shipping or are about to release new products designed to keep spam . . .
Of all the ineffectual e-mail disclaimers I see, one I received earlier this week takes the prize for self-defeating impotence. A public relations flak wrote me trying to get publicity for a security conference. His was the standard spiel: the whos who would be there, the whats that would be learned, the wheres and whens and whys.. . .
It's no surprise the entertainment industry uses copyright law to protect its products. But a printer maker? Lexmark International (LXK ) is doing just that--and it could cost you money. If you have an Optra T620 laser office printer, you can . . .
The human gene pool should be incapable of producing enough idiots to financially support the vast number of spammers whose scat litters so many inboxes. So how do spammers make any money when no one with even half a clue . . .
Many spammers are ignoring laws forbidding them to insert covert tracking codes in their messages, according to a survey by out-law.com, the IT and ecommerce legal service arm of law firm Masons, and network security outfit iomart. The survey highlights . . .