-
1
-
-
0042467876
-
-
This data comes from a recent study sponsored by Peoplesoft. The results were posted by Nua, an Internet consultancy, at http://www.nua.ie/ surveys/ in July 2000.
-
-
-
-
2
-
-
0042969121
-
-
A CCD lens is a combination of optical and digital technology. The light strikes a "charge coupled device." The "image" is converted into ones and zeroes and can be immediately fed to a server for real-time access via the Internet to the image and sound captured by the camera
-
A CCD lens is a combination of optical and digital technology. The light strikes a "charge coupled device." The "image" is converted into ones and zeroes and can be immediately fed to a server for real-time access via the Internet to the image and sound captured by the camera.
-
-
-
-
3
-
-
0041466147
-
-
CraftShop.com
-
Toysmart got in hot water when it advertised the sale of its customer list in The Wall Street Journal. The U.S. Federal Trade Commission has taken action to halt the sale of Toysmart's customer database. After Toysmart went out of business, its principal asset was the customer data. Walt Disney Co., a principal owner of Toysmart, has been tarred by the uproar over privacy concerns that exploded in a class action suit to block the sale of personal data that Toysmart allegedly said it would never divulge. Other companies that may try to sell customer information include Boo. com and CraftShop.com.
-
The Wall Street Journal
-
-
-
4
-
-
0041967340
-
AOL/ Netscape hit with privacy lawsuit
-
July 07
-
Lisa M. Bowman, ZDNet News, "AOL/ Netscape hit with privacy lawsuit," July 07, 2000.
-
(2000)
ZDNet News
-
-
Bowman, L.M.1
-
7
-
-
0041466146
-
-
and the newsletter are published by Evan Hendricks
-
http://www.privacytimes.com and the newsletter are published by Evan Hendricks.
-
-
-
-
8
-
-
0042467869
-
-
Other companies offering software services for user anonymity include Freedom by Zero Knowledge Systems and Norton Internet Security by Symantec. An interesting approach is http://geocities.com/jiboprox
-
http://www.aononymizer.com. Other companies offering software services for user anonymity include Freedom by Zero Knowledge Systems and Norton Internet Security by Symantec. An interesting approach is http://geocities.com/jiboprox/.
-
-
-
-
9
-
-
0041466142
-
-
Any electronic mail software that supports Hypertext Markup Language can embed an active link to another site in the text of a message. The only safeguard is to complete personal information forms on sites where the integrity of the operator is known. Providing personal data to an unknown site is risky
-
Any electronic mail software that supports Hypertext Markup Language can embed an active link to another site in the text of a message. The only safeguard is to complete personal information forms on sites where the integrity of the operator is known. Providing personal data to an unknown site is risky.
-
-
-
-
10
-
-
0042969122
-
-
This server can be made more secure with special add-in software. For details, consult http://www.apache-ssl.org
-
The most popular Web server is the Apache Software Foundation's Apache server. [http://www.apache.org]. This server can be made more secure with special add-in software. For details, consult http://www.apache-ssl.org.
-
-
-
-
11
-
-
0042467874
-
-
A well-known encryption system is PGP or Pretty Good Privacy. Once the user installs the software and signs up, an encryption key is issued. A privacy key looks like this: 42 57 B3 D2 39 8E 74 C3 5E 4D AC 43 25 D2 26 D4. The software is available at http://web.mit.edu/network/pgp.html.
-
-
-
-
12
-
-
0041967338
-
-
http://www.phrack.infonexus.com, and http://www.2600. com, among others. A search of Deja.com or Remarq.com can yield useful information about these cracking techniques
-
For more information about Trojan horse programs, see http://www.securityfocus.com, http://www.phrack.infonexus.com, and http://www.2600. com, among others. A search of Deja.com or Remarq.com can yield useful information about these cracking techniques.
-
-
-
-
13
-
-
0042467873
-
-
http://www.abanet.org/journal/oct 98/10FIDSB.HTML
-
-
-
-
14
-
-
0042969124
-
-
System administrators must be required to review security logs. Organizations without a system administrator oversight function are at risk. Windows 2000 security can be supplemented with third-party products like RSA Security's SecrID [www. rsasecurity.com]. In Windows NT and 2000 the system event viewer and policy change services provide clues to cracker activity.
-
-
-
-
15
-
-
0041967341
-
-
The software is available at http:// www.child-monitor.com/spector/. It costs about $50.
-
-
-
-
16
-
-
0041967342
-
-
The site is located at http://www.docu search.com.
-
-
-
-
17
-
-
0041466145
-
-
See the Cheskin Research Web site at http://www.cheskin.com for information about the relationship of privacy and trust in different countries.
-
-
-
-
18
-
-
0042467871
-
-
Business 2.0, July 2000, provides a summary of trust factors in Internet space. See pages 166 ff
-
Business 2.0, July 2000, provides a summary of trust factors in Internet space. See pages 166 ff.
-
-
-
-
19
-
-
0042969108
-
-
Cluster analysis is the chief claim to fame for Claritas. However, Claritas cluster analyses can easily reach six figures. Lower-cost services have sprouted to meet the demand for rough-and-ready clustering
-
Cluster analysis is the chief claim to fame for Claritas. However, Claritas cluster analyses can easily reach six figures. Lower-cost services have sprouted to meet the demand for rough-and-ready clustering.
-
-
-
-
20
-
-
0041967334
-
-
"Opt in" means that the person completing an electronic mail or paper form checks a box that gives the recipient of the card permission to use the electronic mail address in other marketing programs
-
"Opt in" means that the person completing an electronic mail or paper form checks a box that gives the recipient of the card permission to use the electronic mail address in other marketing programs.
-
-
-
-
21
-
-
0042467868
-
-
On the international front, Echelon performs that same function. The U.S. National Security Agency is participating in this program with Great Britain and Australia, among other countries
-
On the international front, Echelon performs that same function. The U.S. National Security Agency is participating in this program with Great Britain and Australia, among other countries.
-
-
-
-
22
-
-
0041466140
-
-
Encrypted messages can be "broken" or decoded. Encrypted messages must be processed by separate subsystems. The security agencies classify the methods for breaking encrypted messages in the hopes of keeping an advantage over individuals who believe encrypted messages are secure
-
Encrypted messages can be "broken" or decoded. Encrypted messages must be processed by separate subsystems. The security agencies classify the methods for breaking encrypted messages in the hopes of keeping an advantage over individuals who believe encrypted messages are secure.
-
-
-
-
23
-
-
0041967339
-
-
iMarketing News is a publication of Mill Hollow Corporation. The editorial office is at 100 Sixth Avenue, New York, New York 10013. The firm's Web site is http://www.dm news.com.
-
-
-
-
24
-
-
0042467870
-
-
For information about the CPS Systems "border" products, visit http:// www.cps.com.au/.
-
-
-
-
25
-
-
0041466143
-
-
The TSS catalog is located at http:// www.surveillancesolutions.com/cata log/internet/
-
-
-
-
26
-
-
0042467858
-
-
The first person to hold this position is Barry C. West. He can be reached at barry.west@gsa.gov
-
The first person to hold this position is Barry C. West. He can be reached at barry.west@gsa.gov.
-
-
-
-
27
-
-
0041967337
-
-
The company's Web site is located at http://www.iss.net.
-
-
-
|