Hunt, James
October 2013
Micro Mart;10/31/2013, Issue 1284, p94
The answer to a question on how to deal with an email to a blog that offers to acquire an advertising space on the web site is presented.


Related Articles

  • Us Versus Them. Kennedy, Shirley Duglin // Information Today;Apr2007, Vol. 24 Issue 4, p15 

    The article focuses on comment spammers who take advantage of the open comment forums on blogs to raise their Google rankings by posting links to sites that sell the sorts of goods and services being flogged in e-mail spam. According to the author, the blogosphere has developed methods to defend...

  • Zombies in business suits: how to beat the sinister side of spamming. Simpson, Pete // Computer Weekly;10/12/2004, p34 

    This article reports that unsolicited e-mail wastes network and storage resources, steals staff time and diverts information technology (IT) resources to managing defences and poring over quarantine lists. Spam zombies are PCs and servers that have been hijacked to send out spam. Much of the...

  • Employee control. Harler, Curt // Smart Business Northern California;Sep2008, Vol. 1 Issue 10, p22 

    An interview with Michael A. McCabe, a shareholder of Munck Carter PC, is presented. He claims that one could legally monitor the electronic mail messaging account of employees. He emphasizes that any form of written communications that are transmitted over employer's computer system can be...

  • SPLOG! OR HOW TO STOP THE RISE OF A NEW MENACE ON THE INTERNET.  // Harvard Journal of Law & Technology;Fall2006, Vol. 20 Issue 1, p467 

    The article discusses how to stop the spread of computer viruses over the Internet as of April 2006. Weblogs and wikis are open and collaborative technologies. New forms of spam attack such technologies to clog them with links and information undesired by most users of the Web sites. According...

  • CLUELESS ON THE INTERNET. Rapoza, Jim // eWeek;1/18/2010, Vol. 27 Issue 2, p10 

    A blog on the importance of Internet security is presented.

  • BBC's botnet Click special irresponsible and illegal.  // Computer Weekly;3/24/2009, p20 

    A blog featuring comments of Internet lawyer Robert Carolina on BBC's Click programme in preparing and broadcasting its botnet is presented.

  • Security resolutions can't wait for new year. Goodwin, Bill // Computer Weekly;9/22/2009, p34 

    A blog from editor of the journal "Computer Weekly" Bill Goodwin, is discussed.

  • New cyber security blog tackles DCS, SCADA vulnerabilities.  // Control Engineering;Dec2008, Vol. 55 Issue 12, p23 

    A blog titled "Industrial Cyber Security," from the periodical "Control Engineering," is discussed.

  • Blog Banter. Herberg, Craig // Baseline;Sep2007, Issue 76, p12 

    An excerpt from "Baseline" magazine's security blog, reflecting on how hackers attempted to hijack the root servers that run the Internet's naming system, is presented.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics