Linux Privacy - Page 54
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Google is arguable the world's most popular search engine. However, contrary perhaps to a naive impression, in some cases the results of a search are affected by various government-related factors. That is, search results which may otherwise be shown, are deliberately . . .
American businesses feel a little like a rope that's being used in a tug of war between privacy and patriotism. Their customers want the personal information that businesses collect to be kept private, but the government wants access to some of that data for use in various homeland security plans. . . .
The URU Web service will identify individuals online without invading their privacy - and says it can alert people to attempted identity theft. A service is being developed that will help businesses check the identity of people they are dealing with -- without increasing the number of places where personal data is stored.. . .
The Six/Four System is peer-to-peer technology that makes it possible to carry out almost any Internet activity securely and -- more importantly, for all sorts of reasons -- anonymously. The Hacktivismo system, or anything based on it, just may become the . . .
Ask two Internet users a question and you'll get three opinions, all of them fiery, heartfelt, and contradictory... unless the subject is unsolicited commercial e-mail. The only difference of opinion on spam will be who gets first crack at the cretins who send it out. . .
Companies sending text message or e-mail adverts will have to get the permission of users before they do so under new rules. Regulations on new media have now been included in the latest edition of the code of advertising practice, . . .
Speaking Friday at a University of California at Berkeley conference on the law and policy of digital rights management, experts from all circles seem to agree that more is going wrong than right with the current approach to protecting digital content. . . .
Felix Lin and Linus Upson want to make it harder to send and receive e-mail. They believe it's the best way to deal with the problem of spam. On Monday, the two co-founders of AvantGo launched a new spam filter . . .
Protecting personal information on the digital frontier remains a tough task, even for the most ardent privacy activists. That's the lesson the American Civil Liberties Union learned this week after sending out an e-mail newsletter that inadvertently contained the names . . .
Recent reports available with news sites and also published in the Economic Times of India suggest that Microsoft [hereinafter referred to as MSFT] will be pushing through the Windows Rights Management Architecture & Services [WRMA & WRMS] by the 1st week of March, 2003. In the light of such an event, this article proposes to establish the fallacy of the Trusted Computing paradigm as made available in public document(s) from TCPA [https://www.trustedcomputing.org] . . .
Today I found my email account at Yahoo.com deactivated. It is an account that I have been using since when Yahoo first opened its doors and offered free email to the masses. I attempted to logon as has been my . . .
There's a lot happening with ENUM fairly quickly, and it's hard to keep track of half of it. Alas, one thing about ENUM seems pretty clear: as currently specified, ENUM's intersection with the DNS creates a major privacy problem for the . . .
As spam continues to roll over corporate networks in ever-larger quantities, the cavalry of vendors offering defenses continues to grow as well. No fewer than five vendors are shipping or are about to release new products designed to keep spam . . .
Of all the ineffectual e-mail disclaimers I see, one I received earlier this week takes the prize for self-defeating impotence. A public relations flak wrote me trying to get publicity for a security conference. His was the standard spiel: the whos who would be there, the whats that would be learned, the wheres and whens and whys.. . .
It's no surprise the entertainment industry uses copyright law to protect its products. But a printer maker? Lexmark International (LXK ) is doing just that--and it could cost you money. If you have an Optra T620 laser office printer, you can . . .
The human gene pool should be incapable of producing enough idiots to financially support the vast number of spammers whose scat litters so many inboxes. So how do spammers make any money when no one with even half a clue . . .
Many spammers are ignoring laws forbidding them to insert covert tracking codes in their messages, according to a survey by out-law.com, the IT and ecommerce legal service arm of law firm Masons, and network security outfit iomart. The survey highlights . . .
Identity theft is a growing problem in the U.S., with complaints rising 73 percent from 2001 to 2002. But there's a mistaken impression that identity theft is carried out merely by rogue hackers. That's not the case. If . . .
What do Viagra, stock tips, personal ads and activities with farm animals have in common? They are all the subject lines of unwanted, unsolicited e-mail messages, not-so-affectionately known as spam. The sheer volume of electronic junk mail has overwhelmed users' inboxes . . .
A sweeping new anti-terrorism bill drafted by the Justice Department would dramatically increase government electronic surveillance and data collection abilities, and impose the first-ever federal criminal penalties for using encryption in the U.S. . .