December 13, 2011

BLOCKING SPAM & SPYWARE FOR DUMMIES PDF

In this part . . .
Here I introduce some background regarding the spam and spyware problem and sketch the outline of a battle plan to deal with the threat that they pose to your company. If you’re going to deal with the spam problem for your company, you have a big job in front of you, so I describe the steps you need to take and some of the issues that you’ll run into along the way. 
I also help you gain a better understanding of the enemy. Because the people behind spam and spyware are a somewhat elusive lot, I provide some insight into their business plans and some of the dirty tricks they use to accomplish those plans.

Spyware collects information as relatively harmless as a user’s surfing habits, and as harmful as key logging spyware that records your keystrokes and sends the record to someone else). A corporate user’s Workstation with a working key logger can create liability if it captures a user accessing sensitive information, and the key logger’s owner subsequently compromises that data.




No comments:

Post a Comment