130 likes | 231 Views
How Spam Interconnects with Spy ware. Lisa Nichol Wesch LIB105. Privacy:Caldwell, Wilma. Computer Security Sourcebook. Detroit, MI: Omnigraphics, 2003.
E N D
How Spam Interconnects with Spy ware Lisa Nichol Wesch LIB105
Privacy:Caldwell, Wilma. Computer Security Sourcebook. Detroit, MI: Omnigraphics, 2003. • This book was about the how a person can secure their hard-drives and how computer viruses can work their way into a computer system and destroy all of a person’s files within minutes.
Privacy:Staples, Brent. “The Battle Against Junk Mail and Spy ware on the Web.”The New York Times 3 Jan. 2004: A14. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004 <http://www.infotrack.com >. • This article was about how a person can stop the junk mail or spy ware from getting onto their desktop or even into their systems
Privacy:Alexander, Steve. “Under Surveillance.” Star Tribune 8 May 2004: 1D.Lexis Nexis Academic. SUNY Plattsburgh Library. 22 July 2004<http://www.lexisnexis.com >. • This article explains how spy ware works and that most people don’t even know that they are downloading it, especially when they download music files from the Internet.
Privacy: Kehoe, B.P. “privacy.” Columbia Encyclopedia, Sixth Edition. 2004.<http://www.encyclopedia.com >. • This reference was about privacy on the internet and how people have the legal right to enforce it.
Thurman, Mathias. “Spy ware gets top billing: an infection on the CEO’s home system leads to a new call for preventive measures.” Computer World 5 July 2004:28. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004<http://www.infotrack.com >. • This article was about spy ware getting into a CEO’s computer system and ruining all of his files so now the company is taking top measures to ensure that this does not happen again.
Privacy:Hulme, George V., Claburn, Thomas. “Tiny, Evil Things; Much like spam, spy ware is a growing problem that’s costing businesses time and money.” Information Week 26 April 2004: NA. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004<http://www.infotrack.com >. • This article explains the effects of spy ware and how it leads to junk mail.
Privacy:Staples, Brent. “The Battle Against Junk Mail and Spy ware on the Web.”The New York Times 3 Jan. 2004: A14. Expanded AcademicASAP. SUNY Plattsburgh Library. 22 July 2004 <http://www.infotrack.com >. • This article was about how a person can stop the junk mail or spy ware from getting onto their desktop or even into their systems.
Privacy:Mitchell, Robert L. “Tech-Features; Spy ware sneaks into the office.” Computer World. 3 May 2004: 23. Lexis Nexis Academic. SUNY Plattsburgh Library. 22 July 2004.<http://www.lexisnexis.com >. • This article was about how spy ware started off as a little desktop problem and then evolved into a greater risk where people’s privacy was being violated.
Privacy:Oser, Kris. “Money, mayhem to be found with pop-ups; Ad-ware providers reach p profitability, but marketers file suit, others urge caution.” Advertising Age 28 June 2004: 51. Expanded AcademicASAP. SUNY Plattsburgh Library. 26 July 2004.<http://www.infotrack.com >. • This article was about how spam and spy ware contributed to the new problem with pop-up ads on the internet.
Privacy:Healan, Mike. “Spy ware Info.” 2001-2004. Invision Power Board. 22 July 2004. <http://www.spywareinfo.com >. • This web site explains what spy ware and spam is and how to get rid of it.
Privacy:Robinson, Darrell. “Spam & Spy Ware.” (N.D.). Buy Alaska. 23 July 2004. <http://www.enhancedbs.com/Spam-SpyWare.htm >. • The article explains where spam came from and the different lingos that go with it and what else is out there to look for.
Privacy:Beitzel, Traci. “Spy Ware, Legal Spam?” 10 Nov. 2003. Software Submit. 23 July 2004.<http://www.spyware-cop.com >. • This web site was about what spy ware and ad-ware is and how to get rid of it.