Barney, Doug
September 2000
Network World;09/25/2000, Vol. 17 Issue 39, p7
Trade Publication
Presents computer network-related news items, compiled in the week of September 25, 2000. Alliance of 15 online marketers to control unsolicited electronic mail messages; Electronic commerce shakeout predicted by business consultant Tom Peters.


Related Articles

  • The spam wars part 2 -- new challenges for email users. Stoller, Jacob // CMA Management;Mar2008, Vol. 81 Issue 10, p48 

    The article discusses difficulties in combating spam and other online abuses to business organizations. It states that they pose as challenges to business organizations using electronic mail to communicate with customers and partners. Companies employ automated filters to guard corporate...

  • Dump the junk. Ebersohn, Gerrie // Finance Week;7/21/2003, p74 

    Reports on the use of electronic mail to advertise a company's goods and services. Provisions of South Africa's Electronic Communications and Transactions Act; Need to inform recipients that they can opt out of the mailing list; Commission of an unfair business practice.

  • IS E-MAIL A FRIEND OR FOE OF E-BUSINESS? Tinnirello, Paul C. // eWeek;11/06/2000, Vol. 17 Issue 45, p84 

    Suggests technological solutions to curb unwanted e-mails or spams. Improvement in protocols used to classify e-mail as it is sent and received; Authentication of e-mail senders; Parsing of relevant content with a key encryption method.

  • The gated Net community. Tinnirello, Paul // eWeek;10/13/2003, Vol. 20 Issue 41, p46 

    The public streets and highways of the Internet have become like neighborhoods where it is no longer safe to venture. Corporate firewalls, spam filters and other Internet security measures are losing ground to the onslaught that has crippled some organizations' abilities to use the Internet as...

  • FIGHTING SPAM: MOTIVATING AN ACCOUNT-BASED APPROACH. Schryen, Guido // Proceedings of the IADIS International Conference on WWW/Interne;Nov2004, p937 

    Spam as unsolicited e-mail to a large number of recipients is known to become an increasingly disturbing and costly issue of electronic business and Internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the...

  • Strength in numbers. Bradbury, Danny // Computer Bulletin;Sep2004, Vol. 46 Issue 5, p18 

    The article discusses the effort of researchers to develop ways of combining the online experiences of the huge number of networked users across the world to help prevent spam, increase security, and recommend films. It discusses a theory known as Metcalfe's law or the Net Effect. According the...

  • Proof point uses anti-spam product to find inside leaks. Garretson, Cara // Network World;8/23/2004, Vol. 21 Issue 34, p14 

    Anti-spam vendor Proofpoint wants to take what it knows about keeping spam out of an organization and apply it to helping companies keep trade secrets, intellectual property and other sensitive information inside the corporate network. Within six months, the company plans to release software...

  • Tips to fight junk mail. Ebersöhn, Gerrie // Finance Week;5/10/2004, p76 

    Provides tips on how to curb spams or junk e-mails. Techniques being used by spammers to locate e-mail addresses; Ways to prevent an e-mail address from being discovered by search bots; Creation of an online contact form; Dictionary attacks; Appropriate anti-spam software; Caution about...

  • Protect Your Company Online With Web Filtering Tools. Wenzel, Elsa // PCWorld;Sep2011, Vol. 29 Issue 9, p34 

    The article discusses the use of Web filtering tools to protect small companies from online threats. Companies are advised to consider their budget, legal needs, size and culture when developing network and data security plans. Web filtering is done by blocking uniform resource locator (URL) and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics