Linux Privacy - Page 50

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Is Privacy Making a Comeback

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the immediate aftermath of Sept. 11, 2001, the worry in Washington, D.C., was more about national security than about individual privacy. A couple days after the terror attacks, the U.S. Senate voted to grant the Federal Bureau of Investigation . . .

ActiveState's Field Guide To SPAM

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anyone who receives spam - and who doesn't these days? - will likely notice the widespread use of colors, special fonts, pictures, and links to web sites. These features have become so common because most spammers now use HyperText Markup Language . . .

Privacy Isn't the Issue, Trust Is

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy is an issue that uniquely plagues the online industry. Consumers don't seem to mind that banks sell their balance information, or that their in-store transactions, catalogue purchases, and magazine subscriptions are routinely sold to direct marketers. Or that security cameras . . .

The Next Big Linux Controversy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's the next big Linux controversy: Who should be liable if customers wind up using software that was created from misappropriated intellectual property? Linux resellers are not especially eager to tackle the question, but they know it lurks just over . . .

Who's Spying on You at Work?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"You better be prepared for what you find out, and it may be that the most senior people in your organization are perpetrating the biggest problem," says Atthought CEO Arthur Tisi. "And then it becomes, 'How can I tell the CEO he can't go to Pamela Lee's Web site?'" . . .

PDAs pose potential privacy problems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies are risking legal action by failing to protect data held on personal digital assistants (PDAs) and smartphones, according to a survey. While there are no official statistics about the number of these devices that have been stolen, as many as . . .

Spam Fight Divides on Party Lines

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Once thoroughly bipartisan, the debate in Washington over how to reduce the flow of bulk e-mail is now pitting Democrats against Republicans--a development that threatens to complicate enactment of laws regulating spam. Politicians on Capitol Hill have realized that their . . .

It's Way Past Time To Stop E-mail SPAM

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This summer, my 15-year-old son asked me to help him download an e-mail attachment. When we finished, he started checking his other messages. All of a sudden, there was DeeDee, a voluptuous vixen in a plunging red tank top and Daisy . . .

Feinstein Seeks Hacker Notification Law

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

U.S. Sen. Dianne Feinstein (D-Calif.) introduced legislation Friday to require businesses or government agencies to notify individuals if a database has been broken into and personal data has been compromised, including Social Security numbers, driver's licenses and credit cards. . .

RFID Chips Are Here

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Bar codes are something most of us never think about. We go to the grocery store to buy dog food, the checkout person runs our selection over the scanner, there's an audible beep or boop, and then we're told how much . . .

Sorting The Ham From The Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Would you use the phone if you had to listen to a 10-second brothel advertisement every time you made a call? That is the size of the challenge that confronts email: beat spam, or the medium will forever fall short of its potential. . .

Protecting Privacy in the Database Nation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The convergence of privacy-invading technologies and Washington's appetite for surveillance have put civil liberties on the run. This is especially true in the war against terrorism. Controversial initiatives have included biometric face cameras, wiretap enhancements, invasive computer-assisted airline passenger screening, . . .

Web Privacy Policies Confuse Net Surfers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy policies that explain a company's Web surveillance habits have done little to dispel confusion among Internet users about how they are tracked online, according to a report released Wednesday. The dense, legalistic documents that many commercial Web sites post . . .

Setting The Rules For ISPs and Spammers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Peter Hall's troubles with spam began the week of Aug. 5, 1997, when the New York-based independent film producer learned that his EarthLink account had been shut off without warning. EarthLink, a leading Internet service provider (ISP), had concluded--incorrectly, it . . .

Info With a Ball and Chain

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The key to this shift is the technology that protects information from unauthorized or illegal use. It's called digital-rights-management software, or DRM. Like it or not, rights management is increasingly going to be a fact of your life. Not only will . . .