TITLE

Fighting spam: Theory and practice

AUTHOR(S)
Gibbs, Mark
PUB. DATE
February 2004
SOURCE
Network World;2/16/2004, Vol. 21 Issue 7, p90
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Elaborates on the theory and practice of preventing spam. Technical formatting of the required infrastructure; Importance of considering the legal issues associated with spam prevention; Need of charging for e-mail.
ACCESSION #
12265700

 

Related Articles

  • FILTER. Macsai, Dan // Fast Company;Jul/Aug2010, Issue 147, p26 

    The article presents information on the Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference to be held in Redmond, Washington on July 13, 2010.

  • Is Google rolling its own 10 Gigabit Ethernet switches?  // Network World;11/26/2007, Vol. 24 Issue 46, p10 

    The article offers news briefs related to the computer industry in the U.S. Google Inc. has introduced its 10 Gigabit Ethernet switches with the aim of interconnecting its servers in their data centers. Mozilla Corp. has introduced Firefox 3.0 web browser which addresses malicious Web sites by...

  • Antispam tools multiplying like spam. Fontana, John // Network World;2/17/2003, Vol. 20 Issue 7, p18 

    Reports on the increase in number of antispam technology products. Release of gateway product and upgrades to MailFrontier Inc.'s client software at Demo 2003 conference; Server edition of Sunbelt Software Corp.'s spam filtering software; Announcement of name and product of Q-Spam.

  • BARNEY'S RUBBLE. Barney, Doug // Network World;09/25/2000, Vol. 17 Issue 39, p7 

    Presents computer network-related news items, compiled in the week of September 25, 2000. Alliance of 15 online marketers to control unsolicited electronic mail messages; Electronic commerce shakeout predicted by business consultant Tom Peters.

  • AITP on-line. Oriez, Charlie // Information Executive;Nov/Dec99, Vol. 3 Issue 11/12, p6 

    Presents tips on how to avoid spams or unsolicited e-mail. Includes use of high-level domain; Options for blocking spam at the servers; Places spammers use to harvest e-mail addresses.

  • Verizon's weird antispam science. Gibbs, Mark // Network World;3/19/2007, Vol. 24 Issue 11, p70 

    The author reflects on the antispam technologies of Verizon Communications Inc. in the U.S. He states that the sender call-back verification (SCV) technique used by the company became a liability to the users, instead of being a tool for filtering unsolicited email messages. He states that SCV...

  • Music star outwits hate-mail spammers.  // Computer Weekly;7/4/2002, p56 

    Reports information technology developments in Great Britain as of July 2002. Launch of online dating service; Availability of the online archive service; Strategy in avoiding unsolicited mails.

  • Settlements prove that spam laws have teeth. Garretson, Cara // Network World;8/15/2005, Vol. 22 Issue 32, p12 

    This article examines whether spam laws have an impact on the computer industry in the U.S. Federal and state laws enacted to limit spam generally have been viewed as the weak part of the three-component anti-spam approach that includes technology and education. However, successes in the legal...

  • Spam busters go on the offensive. Weinberg, Neal // Network World;1/31/2005, Vol. 22 Issue 4, p19 

    This article highlights legal and technological issues presented at the gathering of anti-spam crusaders at the Massachusetts Institute of Technology. On the legal front, founding partner of the Internet Law Group Jon Praed, reported that convicted North Carolina spammer Jeremy Jaynes is...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics