Alternative View 2006 - for john schou
Alternative View 2006 - for john schou
Alternative View 2006 - for john schou
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
What Really Happened Jan_06.xls Seite 225<br />
18.01.<strong>2006</strong> X 22 Symantec Hides Rootkits In Software - What's worse than finding spyware<br />
and viruses on your computer? Finding out that the software you use to keep<br />
your computer safe may be just as dangerous ... the usage of rootkits by<br />
commercial companies is "very worrisome"<br />
20.01.<strong>2006</strong> The Register 22 PC virus celebrates 20th birthday … the evolution of virus writing hobbyists<br />
into criminally operated gangs bent on financial gain<br />
20.01.<strong>2006</strong> X 22 Computer crime costs $67 billion according to the FBI - Why isn't there law<br />
en<strong>for</strong>cement ef<strong>for</strong>t consistant with the scale of the crime?<br />
21.01.<strong>2006</strong> X 22 ZoneAlarm Security Suite …. discovered ZA 6.0 was surreptitiously sending encrypted data<br />
back to four different servers, despite disabling all of the suite‘s communications options -<br />
ZoneLabs was bought out by Checkpoint, an Israeli company. Remember when the Israeli<br />
company that does all the phone company records was caught giving Israeli drug smugglers<br />
police phone and page data?<br />
26.01.<strong>2006</strong> Independant 22 Google has become the latest technology company to founder against the<br />
Great Firewall of China with the news that it will censor its search engine to<br />
give it greater access to the Chinese market<br />
02.02.<strong>2006</strong> X 22 The nation's largest telephone and cable companies are crafting an alarming<br />
set of strategies that would trans<strong>for</strong>m the free, open and non-discriminatory<br />
Internet of today to a privately run and branded service that would charge a<br />
fee <strong>for</strong> virtually everything we do online<br />
06.02.<strong>2006</strong> Telepolis 22 Porto für eMails - AOL und Yahoo wollen zur Bekämpfung von Spam<br />
vertrauenswürdige Unternehmen dazu bringen, für ihre Mails zu bezahlen,<br />
die dann direkt unter Umgehung der Filter im Briefkasten der Kunden landet<br />
09.02.<strong>2006</strong> NY Times 22 The US gov. is developing a massive computer system that can collect huge<br />
amounts of data and, by linking far-flung in<strong>for</strong>mation from blogs and e-mail to<br />
government records and intelligence reports, search <strong>for</strong> patterns of terrorist<br />
activity. The gov. can spend the time and money to go through your online<br />
recipes, but can't be bothered hunting down the hackers<br />
09.02.<strong>2006</strong> X 22 Computer experts say spyware can get onto computers through following a<br />
link on an unscrupulous e-mail, or downloading something like a screensaver<br />
or chatroom tool from a Web site<br />
10.02.<strong>2006</strong> BBC 22 "Unless you configure Google Desktop very carefully, and few people will,<br />
Google will have copies of your tax returns, love letters, business records,<br />
financial and medical files, and whatever other text-based documents the<br />
desktop software can index<br />
10.02.<strong>2006</strong> Yahoo 22 Internet Explorer users can be as much as 21 times more likely to end up<br />
with a spyware-infected PC than people who go online with Mozilla's Firefox<br />
browser, academic researchers from Microsoft's backyard said in a recently<br />
published paper<br />
11.02.<strong>2006</strong> SF_Gate 22 The investigations focus on a hacker who apparently gained access to a<br />
Northern Cali<strong>for</strong>nia retailer's computer system. The stolen account data were<br />
used to create counterfeit debit cards, which subsequently were sold on the<br />
black market worldwide<br />
12.02.<strong>2006</strong> X 22 If a consumer chooses to use it, the new "Search Across Computers" feature<br />
will store copies of the user's Word documents, PDFs, spreadsheets and<br />
other text-based documents on Google's own servers, to enable searching<br />
from any one of the user's computers<br />
13.02.<strong>2006</strong> X 22 It's getting harder to cover your tracks as even the most everyday activities --<br />
from running a Google search to using the E-Z Pass lane -- leave a lengthy<br />
digital trail<br />
23.02.<strong>2006</strong> X 22 Scott Levine, 46, was .. sentenced to 8 years in prison in a computer theft<br />
case involving more than 1 billion records ... [he] owned Snipermail Inc., a<br />
Florida company that distributed Internet ads to e-mail addresses<br />
03.03.<strong>2006</strong> Xymphora 22 Sourcefire makes intrusion detection software known as ‗Snort‘, which guards some classified<br />
U.S. military and intelligence computers. Putting it in the hands of an Israeli company is<br />
tantamount to handing all these secrets to the Israeli generals on a silver platter. Israel has what<br />
can only be described as an abominable record of misusing American secrets, from Pollard, to<br />
the most recent controversy over selling secret American military technology to China to the<br />
AIPAC scandal