Spam

Results: 7722



#Item
881Spamming / Electronic documents / Email / Computer-mediated communication / Spam filtering

      Youth  Historical  Writer  Challenge   Submission  Form  

Add to Reading List

Source URL: www.borhs.org

Language: English - Date: 2015-01-16 18:13:26
882Computing / Email / Anti-spam techniques / Email spam / Spam / Mobile phone spam / Email authentication / CAN-SPAM Act / Whitelist / Spamming / Spam filtering / Internet

A Multifaceted Approach to Spam Reduction Barry Leiba, IBM Thomas J Watson Research Center, Hawthorne, NY Nathaniel Borenstein, IBM Lotus Division, Office of the CTO, Cambridge, MA {barryleiba, nborenst}@us.ibm.com 1

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2011-04-20 17:23:22
883Opera Software / Web browsers / Password / Phishing / Anti-spam techniques / World Wide Web / Opera / Website / Internet fraud / Software / Computing / Spamming

Client-side defense against web-based identity theft Neil Chou Robert Ledesma Yuka Teraguchi John C. Mitchell Computer Science Department, Stanford University, Stanford CA 94305 {neilchou, led242, yukat, jcm}@stanford.ed

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:48
884Computer-mediated communication / Anti-spam techniques / Content filtering / Email spam / Email filtering / Spam / Content-control software / Internet censorship in Australia / Spam Reader / Spam filtering / Internet / Computing

Internet Filtering and Censorship Proposals Summary notes from the talk by Siva Sivasubramanian at UNSW Introduction: I am not going to discuss censorship, its merits or demerits. That is outside the scope of my talks an

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2009-03-31 21:22:00
885Internet / Software / Bayesian spam filtering / Anti-spam techniques / Email spam / Spam / Email filtering / Whitelist / Bayesian poisoning / Spam filtering / Spamming / Computing

SpamGuru: An Enterprise Anti-Spam Filtering System Richard Segal, Jason Crawford, Jeff Kephart, Barry Leiba IBM Thomas J. Watson Research Center {rsegal, ccjason, kephart, barryleiba}@us.ibm.com Abstract. Spam-reduction

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2011-04-20 17:23:23
886Business / PayPal / Phishing / Password / Email authentication / Email spam / Email / Internet fraud / Password manager / Spamming / Cybercrime / Internet

SECURITY GUIDE With internet use on the rise, cybercrime is big business. Computer savvy hackers and opportunistic spammers are constantly trying to steal or scam money from internet users. PayPal works hard to keep your

Add to Reading List

Source URL: www.paypalobjects.com

Language: English - Date: 2014-01-06 19:25:02
887Internet / Unified threat management / Layer 2 Tunneling Protocol / Virtual private network / Proxy server / Point-to-Point Tunneling Protocol / Anti-spam techniques / Check Point / Comparison of firewalls / Computer network security / Computing / Network architecture

GB-2500 Gigabit Firewall UTM Appliance The GB-2500 Firewall UTM Appliance is a powerful and robust UTM appliance designed for businesses with extensive network demands. Powerful Gigabit Unified Threat Management Performa

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-10-21 12:09:09
888Internet / Electronic mailing list / Spam / Email address harvesting / Suppression list / Email / Computer-mediated communication / Computing

Using regional alumni e-mail distribution lists Electronic distribution lists are established for each regional alumni group to help with communication and event promotion. With approval from the Alumni Relations team,

Add to Reading List

Source URL: www.fuqua.duke.edu

Language: English - Date: 2013-07-29 16:24:47
889Internet / Gmail / Email service provider / Anti-spam techniques / Email / Computer-mediated communication / Computing

Annex A: Sample Chambers Email Policy [Name of Chambers] Policy on the use of Chambers IT Systems Introduction The purpose of this policy is to provide a short guide to the rules that chambers require to be observed by u

Add to Reading List

Source URL: www.barcouncil.org.uk

Language: English - Date: 2015-02-18 13:40:40
890Electronics / Email spam / Usenet / Crossposting / Acceptable use policy / Hutchison 3G / Telecom New Zealand / Computing / Internet / Email

Acceptable Use Policy - NBN Services Important Note: Smart Business Telecom and its distribution affiliates (“Smart Business Telecom Pty. Ltd.”) may revise this Acceptable Use Policy from time to time by posting a ne

Add to Reading List

Source URL: smartbusinesstelecom.com.au

Language: English - Date: 2015-03-10 22:57:16
UPDATE