Jal, Markos; Good, Dan; Heimlich, Daniel
December 2007
Network World;12/17/2007, Vol. 24 Issue 49, p6
Trade Publication
Several letters to the editor are presented in response to the article in the previous issue, including "Microsoft Patch Tuesday has three on critical list," "Scary tech stories: How dangerous user behavior puts networks at risk," and an article discussing the forecast of Symantec on the spam congestion in November 2007.


Related Articles

  • Getting consumers to open your email by careful targeting. Maccario, Etienne // Media: Asia's Media & Marketing Newspaper;5/5/2006, p15 

    The article presents information on the decline in email open rate by e-mail users. The decline in email open rates is a fact and it is primarily based on two factors. The first factor relates to ever-increasing range of anti-spam features being implemented in email clients. The second factor...

  • WHO DO YOU TRUST? Kooser, Amanda C. // Entrepreneur;Jul2002, Vol. 30 Issue 7, p44 

    Focuses on the Trusted Sender Program launched by privacy organization TRUSTe and consulting company ePrivacy Group in order to help Internet users distinguish between good and bad ways to serve up spam. Features of the program; Companies that support the program.

  • Choosing Anti-Spam Software ED TITTEL. Tittel, Ed // Certification Magazine;Dec2004, Vol. 6 Issue 12, p32 

    This article presents tips in choosing anti-spam software. If there is one phenomenon that all users on the Internet share, it is the common feeling of pain and discomfort when the topic of spam comes up. According to anti-spam vendor Postini, in the past 30 days of monitoring, it has observed...

  • Letters. Sullivan, John; Jenner, Donald; Templar, Robert // InfoWorld;10/25/2004, Vol. 26 Issue 43, p9 

    Presents letters to the editor referencing articles and topics discussed in previous issues of "InfoWorld.Com." Response to the article "Taking a Chance on Hackers," by P. J. Connolly; Response to the article "Rival Solutions Smack Down Spam"; Sentiment regarding the journal.

  • Spam: The Killer Application Killer. Arlen, Gary // Multichannel News;2/3/2003, Vol. 24 Issue 5, p28 

    Focuses on the problem of unsolicited electronic mails, also known as spam, faced by the internet users in the United States. Functions of spam mails; Findings of the study conducted by research firm Harris Interactive study about various types of spam mails that affect internet users; Steps...

  • Invasive E-Mail 'Spam'  // Christian Science Monitor;4/6/2001, Vol. 93 Issue 92, p10 

    Editorial. Discusses the problem of spam, or unsolicited electronic mail messages, with Internet users.

  • Strength in numbers. Bradbury, Danny // Computer Bulletin;Sep2004, Vol. 46 Issue 5, p18 

    The article discusses the effort of researchers to develop ways of combining the online experiences of the huge number of networked users across the world to help prevent spam, increase security, and recommend films. It discusses a theory known as Metcalfe's law or the Net Effect. According the...

  • Ban mail from yourself. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Nov2006, p19 

    The author reflects on issues related to the use of e-mails by spammers. According to the author, the only way to spot a well-crafted mail relay is to inspect the logs from a mail server's public interface and then correlate these with the workstation mail client. He states that anyone using the...

  • www.  // Finance Week;8/2/2004 Supp Richer Life, p9 

    The article presents news for Internet users to help them avoid any spam or virus attack. There is completely a different scene on the computer when a person is on Internet . All sorts of colorfully named applications are saved without knowing. As a result of which some one can use the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics