1 / 13

How Spam Interconnects with Spy ware

How Spam Interconnects with Spy ware. Lisa Nichol Wesch LIB105. Privacy:Caldwell, Wilma. Computer Security Sourcebook. Detroit, MI: Omnigraphics, 2003.

Download Presentation

How Spam Interconnects with Spy ware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How Spam Interconnects with Spy ware Lisa Nichol Wesch LIB105

  2. Privacy:Caldwell, Wilma. Computer Security Sourcebook. Detroit, MI: Omnigraphics, 2003. • This book was about the how a person can secure their hard-drives and how computer viruses can work their way into a computer system and destroy all of a person’s files within minutes.

  3. Privacy:Staples, Brent. “The Battle Against Junk Mail and Spy ware on the Web.”The New York Times 3 Jan. 2004: A14. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004 <http://www.infotrack.com >. • This article was about how a person can stop the junk mail or spy ware from getting onto their desktop or even into their systems

  4. Privacy:Alexander, Steve. “Under Surveillance.” Star Tribune 8 May 2004: 1D.Lexis Nexis Academic. SUNY Plattsburgh Library. 22 July 2004<http://www.lexisnexis.com >. • This article explains how spy ware works and that most people don’t even know that they are downloading it, especially when they download music files from the Internet.

  5. Privacy: Kehoe, B.P. “privacy.” Columbia Encyclopedia, Sixth Edition. 2004.<http://www.encyclopedia.com >. • This reference was about privacy on the internet and how people have the legal right to enforce it.

  6. Thurman, Mathias. “Spy ware gets top billing: an infection on the CEO’s home system leads to a new call for preventive measures.” Computer World 5 July 2004:28. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004<http://www.infotrack.com >. • This article was about spy ware getting into a CEO’s computer system and ruining all of his files so now the company is taking top measures to ensure that this does not happen again.

  7. Privacy:Hulme, George V., Claburn, Thomas. “Tiny, Evil Things; Much like spam, spy ware is a growing problem that’s costing businesses time and money.” Information Week 26 April 2004: NA. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004<http://www.infotrack.com >. • This article explains the effects of spy ware and how it leads to junk mail.

  8. Privacy:Staples, Brent. “The Battle Against Junk Mail and Spy ware on the Web.”The New York Times 3 Jan. 2004: A14. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004 <http://www.infotrack.com >. • This article was about how a person can stop the junk mail or spy ware from getting onto their desktop or even into their systems.

  9. Privacy:Mitchell, Robert L. “Tech-Features; Spy ware sneaks into the office.” Computer World. 3 May 2004: 23. Lexis Nexis Academic. SUNY Plattsburgh Library. 22 July 2004.<http://www.lexisnexis.com >. • This article was about how spy ware started off as a little desktop problem and then evolved into a greater risk where people’s privacy was being violated.

  10. Privacy:Oser, Kris. “Money, mayhem to be found with pop-ups; Ad-ware providers reach p profitability, but marketers file suit, others urge caution.” Advertising Age 28 June 2004: 51. Expanded AcademicASAP. SUNY Plattsburgh Library. 26 July 2004.<http://www.infotrack.com >. • This article was about how spam and spy ware contributed to the new problem with pop-up ads on the internet.

  11. Privacy:Healan, Mike. “Spy ware Info.” 2001-2004. Invision Power Board. 22 July 2004. <http://www.spywareinfo.com >. • This web site explains what spy ware and spam is and how to get rid of it.

  12. Privacy:Robinson, Darrell. “Spam & Spy Ware.” (N.D.). Buy Alaska. 23 July 2004. <http://www.enhancedbs.com/Spam-SpyWare.htm >. • The article explains where spam came from and the different lingos that go with it and what else is out there to look for.

  13. Privacy:Beitzel, Traci. “Spy Ware, Legal Spam?” 10 Nov. 2003. Software Submit. 23 July 2004.<http://www.spyware-cop.com >. • This web site was about what spy ware and ad-ware is and how to get rid of it.

More Related