Linux Privacy - Page 47
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Privoxy version 3.0.3 was today released. Privoxy is a web proxy with advanced filtering capabilities for protecting privacy, modifying web page content, managing cookies, controlling access, and removing ads, banners, pop-ups and other obnoxious Internet junk. . . .
In October, 2002 Julian Green was arrested in Devon, England after police searched his home PC and found examples of child pornography. ISP had logs identified Green as the person responsible for the downloads, and the existence of the child porn on his PC seemed to be all the corroboration the constable would have needed to obtain a conviction. However, a defense forensic expert also found evidence that there were Trojans planted on Green's computer that were designed to piggyback his browser, and log into porn sites. The Trojans probably were downloaded as e-mail attachments -- made all the more likely by the fact that Green had a teenage son. Unable to definitively prove that Green knowingly and intentionally downloaded the files, the prosecution dismissed the charges. . . .
The Bank of England said Tuesday that it had intercepted more than 100,000 fraudulent e-mails masquerading as computer security software issued by the central bank. . . .
Another phishing expedition appeared on the Internet Thursday, this one dubbed W32/Cayam and targeting eBay users.. . .
If a rapid-fire series of announcements from cable and telecom bigwigs this week confirms that Voice over IP has a future as a mainstream consumer technology, it's worth noting that the electronic surveillance mavens in the FBI and Justice Department saw it coming.. . .
On Nov. 22, the U.S. House of Representatives voted 392 to 5 to pass the Can Spam Act of 2003, which is designed to put controls on the distribution of spam. For once, the House and Senate saw eye to eye, . . .
Its only fair that we publish a different, more hopeful point of view on the CAN-SPAM issue. Larry Seltzer at eWeek writes that this law, while certainly not the silver bullet to end all spam, is still a welcome start.. . .
Well, the CAN-SPAM act finally passed through the its final hurdles in Congress, and with Bush promising a signature within the year, it will be law soon. But will it protect you?. . .
The book took nine months to write and three months to edit and publish. That doesn't include research which began when the tech bubble burst. Writing went smoothly. I had excellent editorial support, as you know. HNS was my tech editor . . .
According to the 2003 Computer Crime Survey conducted by the Computer Security Institute in conjunction with the FBI, nearly 13 per cent of respondents were the victim of identity theft in the past year in the US, writes Fran Howarth OF Bloor Research. In total, losses from identity theft in the US in the past year are estimated to have amounted to around $50 billion.. . .
The Coalition Against Unsolicited Commercial E-Mail (CAUCE, https://www.cauce.org/) is disappointed by the passage of a weak anti-spam bill in the House of Representatives. This legislation fails the most fundamental test of any anti-spam law, in that it neglects to actually tell any marketers not to spam. . . .
Anti-spam researchers are working on technologies designed to authenticate e-mail senders. Earlier this year, researchers predicted that solutions would be in place within months, but now those predictions appear overly optimistic, and researchers say it will take some time to produce tangible results.. . .
Most of us know by now not to give out our passwords, ATM PINs, or other secret information when requested by e-mail. But an increasing number of people are giving out that information, even those of us who should know better. . . .
A bill to take the "spy" out of spyware got a public hearing before a Congressional subcommittee Wednesday. The legislation filed by Rep. Mary Bono (R-California) would require spyware purveyors to inform computer users of the presence, nature and function of . . .
Citing an "arms race" in the ongoing spam wars, AT&T defended its patenting of a technology to thwart antispam filters. The patent, awarded to AT&T on Nov. 4, describes a "system and method for counteracting message filtering." The patent . . .
For lunch, Scott Richter ordered ham--a meat of uncomplicated origins, as opposed to Hormel's mysterious jumble. His choice seems somehow appropriate for a person who says he's a legitimate bulk E-mail marketer, rather than a spammer. It's understandable that he . . .
I don't know what to make of Scott Richter's claims that he is not a spammer, but rather a legitimate e-mail marketer. Three things are true about spam: (1) There are many spammers. (2) There are many legitimate e-mail marketers. (3) . . .
You think you've got spam problems with a hundred or so spam messages a day? Try being an ISP or a business where on a good day you don't get more than a one hundred thousand spam mails a day. . .
While analysts say radio-frequency identification tags don't work well enough to replace UPC codes, and costs are still prohibitively expensive, some technology companies, retailers and government entities remain determined to infuse RFID into daily consumer life.. . .
When Lew Wagner, chief information security officer of the M.D. Anderson Cancer Center at the University of Texas, began to build a business case for investing hundreds of thousands of dollars in technology to help thwart spam and viruses, he took . . .