TITLE

Pulling the shades on Internet data thieves

AUTHOR(S)
OReilly, Michael
PUB. DATE
August 1999
SOURCE
CMAJ: Canadian Medical Association Journal;8/24/99, Vol. 161 Issue 4, p423
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Focuses on ways to prevent personal demographic information from being collected by web sites without the user's knowledge. Tools such as ZipLip to encrypt email; Programs to disable cookies; The `history file'; The security problem posed by Java and Javascript; The Anonymizer Web site.
ACCESSION #
2204690

 

Related Articles

  • UK Tops League of Top Bot Countries.  // Database & Network Journal;Apr2005, Vol. 35 Issue 2, p18 

    This article reveals that Great Britain has emerged as the country with the highest percentage of worldwide bot-infected computers, according to the Symantec "Internet Security Threat Report". Great Britain has more than a quarter of all bots, software programs that are covertly installed on...

  • SPECIALISED FIREWALLS. Taylor, Nathan // Australian PC User;Sep2004, Vol. 16 Issue 9, p40 

    Presents information on specialized computer firewalls. Functions; Limitations. INSET: HOW WE TESTED THE FIREWALLS.

  • Calculating Costs of a DEFENSE SYSTEM.  // Baseline;Apr2006, Issue 57, p45 

    The article presents information on a computer system defense system project against bot attacks. The project will provide protection from the garbage traffic bursts that Denial of Service (DoS) creators use to take Web sites out of service. It will take a critical look at networks' security...

  • BOTS: SEVEN SAFETY TIPS. Nash, Kim S. // Baseline;Apr2006, Issue 57, p52 

    The article gives advice to companies on how to prevent, detect and derail bot attacks to computer networks. One way is to run a full set of security technology, including firewalls, antivirus software and intrusion detection and prevention system, at each level of computing. Educate users not...

  • Computer protection. Gilmer, Brad // Broadcast Engineering;Apr2007, Vol. 49 Issue 4, p26 

    The article discusses various threats and safety measures for computer networks. It considers the importance of passwords, but warns against possible access from unauthorized users. It likewise adds that an antivirus software is essential to protect networks against major problems caused by...

  • Network security investment pays off. Patton, Sean // Wenatchee Business Journal;Feb2004, Vol. 18 Issue 2, pC8 

    Discusses information on computer network security. Importance of network security; Suggestions for creating network security; Installation of firewall; Need to ensure that network security measures are in place.

  • SECURE AGAINST ROGUE DEVICES. Riciputi, Joel // Communications News;Jul2007, Vol. 44 Issue 7, p30 

    The article discusses computer security to protect against rogue devices. Discovering everything that is on the network, accurately classifying all of the devices, monitoring for changes, and providing automated remediation are key building blocks to helping organizations regain control and...

  • The Luck of the Virus. Fox, Steve // InfoWorld;8/23/2004, Vol. 26 Issue 34, p10 

    This article describes the experience of InfoWorld in testing a intrusion detection system (IDS). At the middle of a test of an IDS, InfoWorld was slammed by the Sasser worm and ran into a host of Microsoft II attacks and a plague of Gator spyware. For the four-month torture test, the staff...

  • Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols. Junghyun Nam; Kim-Kwang Raymond Choo; Juryon Paik; Dongho Won // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p47 

    Protocols for password-based authenticated key exchange (PAKE) enable two or more parties communicating over a public network to build a secure communication channel using their easy-to-remember passwords. However, off-line dictionary attacks have always been a major security concern in...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics