TITLE

CHINA'S BIG FIREWALL

AUTHOR(S)
Coonan, Clifford
PUB. DATE
August 2006
SOURCE
Daily Variety;8/17/2006, Vol. 292 Issue 32, p7
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the establishment of a firewall to block Internet broadcasts of online films that mock officially approved culture in China. According to the Beijing News, the State Administration for Radio, Film and Television is drafting rules to render Internet broadcasts about films, celebrities and Communist icons off-limits for sarcasm. Countrywide monitors would enforce a 2004 rule requiring censor for all audiovisual materials.
ACCESSION #
22030795

 

Related Articles

  • How to put SCADA on the Internet.  // Control Engineering;Sep2003, Vol. 50 Issue 9, p16 

    Deals with the use of the Internet for supervisory control and data acquisition (SCADA) to provide access to real-time data, display, alarming, trending and reporting from remote equipment. Problems associated with the implementation of an Internet-based SCADA system; Details on embedded...

  • BENCHMARKS.  // B to B;10/10/2005, Vol. 90 Issue 12, p28 

    This section presents a ranking of products/services related to the marketing industry. The products/services are ranked according to total impressions of ads bought by companies in each segment. Some of the services listed are: web hosting, online advertising, firewalls, Signs & printing,...

  • Managing Vulnerability To Network Attacks. Kleinfeld, Abe // Government Security;Aug2004, Vol. 3 Issue 5, p16 

    The article presents information about the information security. Despite legislation and heightened awareness of the negative impact of network breaches, many government organizations still lag behind in efforts to protect their networks-and comply with regulations. Typical reactive technologies...

  • A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. Pozo, S.; Ceballos, R.; Gasca, R. M. // Journal of Networks;Oct2009, Vol. 4 Issue 8, p698 

    Writing and managing firewall ACLs are hard and error-prone tasks for a wide range of reasons. During these tasks, inconsistent rules can be introduced. An inconsistent firewall ACL implies in general a design error, and indicates that the firewall is accepting traffic that should be denied or...

  • ZoneAlarm Pro 4.  // Australian Personal Computer;Jul2004, Vol. 24 Issue 7, p76 

    Firewalls are evolving to provide protection against pop-ups, advertising and cookies as well as restricting the flow of personal information. ZoneAlarm Pro is unusual in that it's suitable for both the paranoid Internet user and the average home user. It provides home users with a solid level...

  • All in one Laptop security.  // Management Services;Jul2004, Vol. 48 Issue 7, p31 

    This article provides information on an integrated security solution from Zone Labs. The system integrates the Zone Labs firewall technology with antivirus technology from Computer Associates. The antivirus technology of Computer Associates has received the VB100 award for the past four...

  • NEC tightens control of internal network. Goodwill, Bill // Computer Weekly;2/18/2005, p6 

    This article informs that the National Exhibition Centre (NEC) has installed specialist firewalls to protect its internal networks against viruses and worms after a spate of infections caused by exhibitors failing to secure their own PCs used on display stands. The problem arose because...

  • Setting up OS X's Firewall.  // MacUser;Jun2014, Vol. 30 Issue 6, p43 

    The article discusses firewall as a software that protects the computer by controlling traffic passing between it and the internet by applying a series of rules against every packet of incoming or outgoing data. It cites OS X that comes with a built-in application firewall although a router has...

  • editorial. Sarno, Tony // APC (Bauer Media Group);Jul2006, Vol. 26 Issue 7, p6 

    The article presents the author's views on the feedback received by him in response to the comparison of the Internet security suites in the June issue of the journal. The author informs how one reader was unhappy with the rating given to Norton Internet Security 2006 as the reader admitted...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics