Spam busters go on the offensive

Weinberg, Neal
January 2005
Network World;1/31/2005, Vol. 22 Issue 4, p19
Trade Publication
This article highlights legal and technological issues presented at the gathering of anti-spam crusaders at the Massachusetts Institute of Technology. On the legal front, founding partner of the Internet Law Group Jon Praed, reported that convicted North Carolina spammer Jeremy Jaynes is sentenced to nine years in a Virginia jail. Jaynes is the first person ever convicted in the U.S. on felony spam charges, which are based on a tough Virginia law in which penalties increase based on the number of fraudulent messages being sent.


Related Articles

  • Settlements prove that spam laws have teeth. Garretson, Cara // Network World;8/15/2005, Vol. 22 Issue 32, p12 

    This article examines whether spam laws have an impact on the computer industry in the U.S. Federal and state laws enacted to limit spam generally have been viewed as the weak part of the three-component anti-spam approach that includes technology and education. However, successes in the legal...

  • Fighting spam: Theory and practice. Gibbs, Mark // Network World;2/16/2004, Vol. 21 Issue 7, p90 

    Elaborates on the theory and practice of preventing spam. Technical formatting of the required infrastructure; Importance of considering the legal issues associated with spam prevention; Need of charging for e-mail.

  • 'Certified e-mail' plans draw mixed reactions. Fontana, John // Network World;2/13/2006, Vol. 23 Issue 6, p19 

    The article examines mixed reactions toward certified electronic (e)-mail plans. In an effort to restore confidence in e-mail systems, companies such as certification vendor Goodmail Systems and a start-up working behind the Web address Karma sphere.com, are planning to introduce authorization,...

  • CipherTrust tool blocks spam. Solheim, Shelley // eWeek;8/29/2005, Vol. 22 Issue 34, p10 

    This article reports that messaging security vendor CipherTrust Inc. will roll out a new appliance that stops spam and other unwanted messages before they hit corporate networks. The company also is releasing the newest version of its flagship IronMail e-mail security gateway appliance, which...

  • Defending The Network. Perry, Simon // Database & Network Journal;Dec2004, Vol. 34 Issue 6, p11 

    This article explains how organizations should protect the computer network. To many organizations security is like a soft-boiled egg The firewall provides a shell, which is supposed to protect all internal networks and data. However, organizations need to move from the soft-boiled egg defense...

  • Tips to fight junk mail. Ebersöhn, Gerrie // Finance Week;5/10/2004, p76 

    Provides tips on how to curb spams or junk e-mails. Techniques being used by spammers to locate e-mail addresses; Ways to prevent an e-mail address from being discovered by search bots; Creation of an online contact form; Dictionary attacks; Appropriate anti-spam software; Caution about...

  • SPAM FILTERS.  // Technology Review;Apr2004, Vol. 107 Issue 3, p79 

    The article describes several techniques in spam filtering. In 2003, nearly half of all e-mails were identified as spam, according to the Radicati Group, a research firm in Palo Alto, CA. There are eight to ten basic techniques for filtering spam, which can be used in combination. Some of the...

  • Barracuda Snaps Up Spam. Grimes, Roger A. // InfoWorld;5/17/2004, Vol. 26 Issue 20, p34 

    This article presents a review of the Spam Firewall 300 1U appliance from Barracuda Networks. As experienced, perimeter solutions usually rank just behind Internet-hosted service offerings in accuracy, with end-point solutions having the worst rates. Such is allegedly not the case with the...

  • Barracuda Networks Predicts.  // Software World;Jan2009, Vol. 40 Issue 1, p23 

    The article reports on the prediction of Barracuda Networks Inc., the worldwide leader in email and Web security appliances, that spam volumes will rise a little higher than 95 percent in the year ahead as growing use of botnets continues to grow. According to an analysis of data from one...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics