First Page | Document Content | |
---|---|---|
![]() Date: 2014-07-21 01:39:40Rogue software Spyware Computer network security Adware Keystroke logging Privacy-invasive software Gator E-wallet Espionage System software Malware | Add to Reading List |
![]() | Comments on Spyware March 2004 WRITTEN COMMENTS OF DR. JOHN R. LEVINE It is my honor and privilege to submit these comments to the Subcommittee on Communications of the Senate Committee on Commerce, Science, and TransporDocID: 18PuX - View Document |
![]() | http://www.latimes.com/technology/la-na-spyware26nov26,1,267008DocID: 18grN - View Document |
![]() | Invasive Browser Sniffing and Countermeasures Markus Jakobsson Sid Stamm Indiana UniversityDocID: 13tCc - View Document |
![]() | Microsoft Word - Appendix JDocID: 132oy - View Document |
![]() | 9 Spyware: An Emerging Threat Brent A. Atchley and Allen R. Lee Spyware Overview The year is 2004, and the United States Government has enactedDocID: 121Pt - View Document |