Walled Off

December 2011
Forbes Asia;Dec2011, Vol. 7 Issue 14, p32
The article reports on new computer security measures adopted by the Chinese authority. In its efforts to block certain services the government does not approve, it is looking for certain security measures. The article also offers information on anticensorship and anonymity service Tor. It is stated how the Chinese government has been on the hunt for censorship circumvention tools.


Related Articles

  • Two-Factor Authentication Has One Big Endorsement: Google. Quittner, Jeremy // American Banker;2/14/2011, Vol. 176 Issue 24, p1 

    The article focuses on plans of Google Inc., the Internet search company, to add additional security measures by implementing a two-factor authentication for account access. Details of the verification plan are outlined. Comments on the security measures are offered from executives including...

  • Amazement as IT wolf turns into ID sheepdog. Tebbutt, David // Information World Review;Apr2006, Issue 223, p13 

    Presents an article about the challenges faced by web service providers concerning computer identity security issues. Efforts taken by Microsoft Corp. to prevent secure the identity of computer users; Comments on the development of the InfoCard program of the firm; Impact of the launch of the...

  • The Agora Internet. Filman, Robert E. // IEEE Internet Computing;Sep/Oct2005, Vol. 9 Issue 5, p4 

    Offers observation on the Internet marketplace. Parallels between the Internet's evolution and social interactions; Threat posed by computer crimes to the market; Mechanisms needed to protect the agora Internet.

  • Taking measures to block network blackmailers. Dipple, Chris // New Media Age;10/28/2004, p17 

    This article discusses a variety of measures that can be taken to counter an illegal online activity. The crime is characterized by a ransom note by email, shortly followed by the victims' servers being bombarded with huge volumes of traffic. To address this problem, Web sites can spread...

  • Are you in control of your data? Dempster, Ann // Money Marketing;11/28/2013, p49 

    The article examines how financial advisers can protect their client's data. According to the author, many firms are resorting to storing information through the Internet to better improve client data protection because this eliminates the risks associated with carrying around sensitive client...

  • Online ad industry must put consumer trust above all. Desai, Kit // New Media Age;9/11/2008, p17 

    The author looks at issues relating to the online advertising industry. There were mixed perception concerning online advertising, as well as concerns since some people have lost their trust over the concept of online advertising. To address this issue, the online advertising industry together...

  • DOWNTIME.  // Computer Weekly;7/6/2004, p52 

    This article reports on several developments from the computer industry. A supermarket shelf stacker from Southampton, England has been jailed for two years for trying to blackmail the Playboy Web site. Raids by police and FBI agents followed his threats to target Playboy customers if the soft...

  • Eliciting security requirements with misuse cases. Sindre, Guttorm; Opdahl, Andreas // Requirements Engineering;Feb2005, Vol. 10 Issue 1, p34 

    Use cases have become increasingly common during requirements engineering, but they offer limited support for eliciting security threats and requirements. At the same time, the importance of security is growing with the rise of phenomena such as e-commerce and nomadic and geographically...

  • Supply and Demand. Bryce, Robert // Interactive Week;10/15/2001, Vol. 8 Issue 40, p36 

    Discusses the advantages of computer security demand on compensations in the information technology sector in the U.S. Security operations for the Internet industry; Spendings on wireless device usage in 2005.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics