Linux Privacy - Page 50
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The protocol that has defined e-mail for more than two decades may have a fatal flaw: It trusts you. Developed when the Internet was used almost exclusively by academics, the Simple Mail Transfer Protocol, or SMTP, assumes that you are . . .
While no one has sympathy for the devils that fill inboxes with promises of lower mortgages and larger members, not everyone is supporting the new movement to banish spammers from the Internet. Some online advocates worry that heavy-handed antispam measures, . . .
Internet telephone calls are fast becoming a national security threat that must be countered with new police wiretap rules, according to an FBI proposal presented quietly to regulators this month. . .
In the immediate aftermath of Sept. 11, 2001, the worry in Washington, D.C., was more about national security than about individual privacy. A couple days after the terror attacks, the U.S. Senate voted to grant the Federal Bureau of Investigation . . .
Anyone who receives spam - and who doesn't these days? - will likely notice the widespread use of colors, special fonts, pictures, and links to web sites. These features have become so common because most spammers now use HyperText Markup Language . . .
Privacy is an issue that uniquely plagues the online industry. Consumers don't seem to mind that banks sell their balance information, or that their in-store transactions, catalogue purchases, and magazine subscriptions are routinely sold to direct marketers. Or that security cameras . . .
It's the next big Linux controversy: Who should be liable if customers wind up using software that was created from misappropriated intellectual property? Linux resellers are not especially eager to tackle the question, but they know it lurks just over . . .
"You better be prepared for what you find out, and it may be that the most senior people in your organization are perpetrating the biggest problem," says Atthought CEO Arthur Tisi. "And then it becomes, 'How can I tell the CEO he can't go to Pamela Lee's Web site?'" . . .
Companies are risking legal action by failing to protect data held on personal digital assistants (PDAs) and smartphones, according to a survey. While there are no official statistics about the number of these devices that have been stolen, as many as . . .
Once thoroughly bipartisan, the debate in Washington over how to reduce the flow of bulk e-mail is now pitting Democrats against Republicans--a development that threatens to complicate enactment of laws regulating spam. Politicians on Capitol Hill have realized that their . . .
This summer, my 15-year-old son asked me to help him download an e-mail attachment. When we finished, he started checking his other messages. All of a sudden, there was DeeDee, a voluptuous vixen in a plunging red tank top and Daisy . . .
California's Security Breach Information Act (SB 1386) becomes official Tuesday and mandates for the first time that businesses must inform customers when electronic data is compromised by a hacker. SB 1386 requires companies that own or maintain the personal information . . .
U.S. Sen. Dianne Feinstein (D-Calif.) introduced legislation Friday to require businesses or government agencies to notify individuals if a database has been broken into and personal data has been compromised, including Social Security numbers, driver's licenses and credit cards. . .
Spam has become an international crisis. Security company MessageLabs says about 55 percent of all the e-mail it scans for viruses is actually spam. That's bad news for you and me. Thanks to continuing effort by legislators and private companies . . .
Bar codes are something most of us never think about. We go to the grocery store to buy dog food, the checkout person runs our selection over the scanner, there's an audible beep or boop, and then we're told how much . . .
Would you use the phone if you had to listen to a 10-second brothel advertisement every time you made a call? That is the size of the challenge that confronts email: beat spam, or the medium will forever fall short of its potential. . .
The convergence of privacy-invading technologies and Washington's appetite for surveillance have put civil liberties on the run. This is especially true in the war against terrorism. Controversial initiatives have included biometric face cameras, wiretap enhancements, invasive computer-assisted airline passenger screening, . . .
Privacy policies that explain a company's Web surveillance habits have done little to dispel confusion among Internet users about how they are tracked online, according to a report released Wednesday. The dense, legalistic documents that many commercial Web sites post . . .
Peter Hall's troubles with spam began the week of Aug. 5, 1997, when the New York-based independent film producer learned that his EarthLink account had been shut off without warning. EarthLink, a leading Internet service provider (ISP), had concluded--incorrectly, it . . .
WASHINGTON -- The U.S. Senate Commerce Committee approved legislation Thursday that could cost spammers who use false headers or misleading subject lines up to a year in jail and a maximum fine of $1 million. The sponsors of the bill, Conrad . . .