TITLE

Computer fraudsters foiled by the small ads

AUTHOR(S)
Charles, D.
PUB. DATE
February 1992
SOURCE
New Scientist;2/29/92, Vol. 133 Issue 1810, p24
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Reports on a technique devised by researchers at Bell Communications Research in New Jersey for verifying that a document was created on a specific date. The technique relies on a mathematical procedure called a hash function; How it is used; Advertisements for this system run in the `New York Times.'
ACCESSION #
9203233850

 

Related Articles

  • Computer fraud--what can be done about it? Romney, Marshall // CPA Journal;May95, Vol. 65 Issue 5, p30 

    Addresses the problem of computer-based fraud. Dependence on computerized systems to meet increasing need for information; Ways to perpetrate computer fraud; Computer fraud techniques; Reduction of computer crimes by increasing the integrity of employee; Design of internal control systems. ...

  • `Innocent' hackers want their computers back. Charles, D. // New Scientist;5/9/92, Vol. 134 Issue 1820, p9 

    Reports that United States officials refuse to return computers to owners which were seized during Operation Sun Devil raids on computer hackers. Description of the operation; The meager results of the operation; Computer Professionals for Social Responsibility have gone to court over this.

  • `An Embezzler's Guide to Your Computer' available.  // Westchester County Business Journal;10/28/96, Vol. 35 Issue 44, p19 

    Presents excerpts from `An Embezzler's Guide to Your Computer,' a report available from Assets Protection Publishing. Embezzlement as the second most common crime against business; Two common embezzlement methods.

  • Trouble for employers.  // Nation's Business;Feb85, Vol. 73 Issue 2, p57 

    Whether computer criminals are corporate managers transferring assets, or hackers stealing hundreds of thousands of dollars of computer time, computer crime can present a company with a problem of devastating proportions. A variety of insurance security plans are being launched to reduce the...

  • On site: The tamperproof office. LaPlante, A. // PC World;Jul91, Vol. 9 Issue 7, p240 

    Describes the steps Sun Life Assurance Company of Canada has taken to protect itself from computer security threats. Protecting information on PCs; Identifying PC security risks; Security classifications for PCs; Preventive measures; Education in security threats.

  • Antivirus and security products. Heim, J. // PC World;Jul91, Vol. 9 Issue 7, p247 

    Lists 26 antivirus products. Types of virus fighters; Integrity checkers; Memory-resident monitors; Security products; Choosing an anti-virus or security product.

  • Fending off the hackers. Elliott, Robert // Inside Tucson Business;07/15/96, Vol. 6 Issue 16, p3 

    Recommends basic strategies for preventing computer crime. Includes minimizing Internet connectivity; Building a computer arbiter; Constant data reduction.

  • Staying ahead of the hacker. McQuilken, Barry // Telecom Asia;Jul96, Vol. 7 Issue 7, p46 

    Presents a class of electronic products designed to protect against unauthorized access to computer systems, services and resources. Includes granting of privileges; User authentication; Encryption; Strengths and weaknesses of the Internet; Implementation of information security.

  • Keep eye shut for computer fraud by other employees. Culp, Mildred // San Diego Business Journal;06/29/98, Vol. 19 Issue 26, p45 

    Advises on protecting a company's computer system from fraud by other employees. Company's need to use services of accounting firms to help look for incidence of fraud; Need for the implementation of outside and internal controls; Monitoring of employees who use computers secretly or unusually;...

  • Antivirus hardware. Mamis, Robert A. // Inc.;Sep92, Vol. 14 Issue 9, p50 

    Considers a line of computer hardware that physically bars the spread of data-garbling germs: Corporate Management Group's (Austin, Tex.) assortment of low-priced mechanical contrivances that, among other measures, seal the slots of computers' floppy drives and CD-ROMs. Different devices;...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics