Detect, Protect, Dis-infect

Written by Robert Rogers

Consumers Online Face Wide Choices in Security Products

With new threats to computer security and data integrity a regular feature ofrepparttar evening news, a panoply of products that promise to detect, protect, and dis-infect are being marketed to consumers. Intrusion detection systems, firewalls and anti-virus software are critical to online security, butrepparttar 105892 Federal Trade Commission,repparttar 105893 nation’s consumer protection agency, says computer users — from grade school kids to grandparents — need to know exactly why they need online security products and what they’re buying.

Whyrepparttar 105894 Need Computers “talk” to each other overrepparttar 105895 Internet by sending data through their communications ports. If a port is open, it “listens” for communications fromrepparttar 105896 Internet. A computer has thousands of ports: which ones are open depends onrepparttar 105897 softwarerepparttar 105898 computer is running. Hackers can “eavesdrop” or scanrepparttar 105899 ports to determine which are open and vulnerable to unauthorized access.

Detection An intrusion detection system (IDS) monitors incoming Internet traffic, much like a security camera “watches” your front door to see who might be trying to come in. Whenrepparttar 105900 IDS detects a suspicious pattern, it sends an alert (and creates a record) that an intruder may be trying to break in to your computer. Some IDS alerts — but not all — show a pop-up message on your screen. An IDS alone cannot prevent an unauthorized entry into your computer; only a firewall can do that.

CAN-SPAM Rules for Internet Marketers

Written by John Calder

© 2004, John Calder

On January 1, 2004,repparttar "CAN-SPAM Act", short for "Controllingrepparttar 105891 Assault of Non-Solicited Pornography and Marketing Act of 2003", took effect. Marketers who send any form of commercial email as defined byrepparttar 105892 act will need to comply with CAN-SPAM rules in order to avoid legal consequences. The act was designed to reduce unsolicited commercial messages, sent both as email and to wireless devices such as cell phones.

There is of course much debate about how effective this law will prove to be in stopping spam. After all, spammers can easily send their messages from email servers located overseas, in locations beyondrepparttar 105893 effective reach of US enforcement efforts. Many marketers feel that spam will continue flooding us as ever, while legitimate, opt-in marketers, who want to comply withrepparttar 105894 law, will have to jump through time-consuming and sometimes expensive extra hoops to be able to send email. In fact, many believe thatrepparttar 105895 act will lead to an upsurge in spam regardless, because it seems to be legal as long as it meetsrepparttar 105896 requirements ofrepparttar 105897 act.

For marketers to comply withrepparttar 105898 law, they need to follow some simple guidelines provided for inrepparttar 105899 legislation. Virtually all marketers who run email lists are already in compliance with most ofrepparttar 105900 law. Generally, any business communicating with existing customers or prospects by mail must include in their emails a valid return email address that is active for at least 30 days after commercial email is sent; a physical mailing address, valid and NOT a P.O. Box; and a way for recipients to opt-out of future mailings. In addition,repparttar 105901 subject line must not be misleading or deceptive, state in some wayrepparttar 105902 message is an advertisement or commercial in nature, andrepparttar 105903 marketer must honor opt-out requests. Again, probably none of that is too much different from what you're already doing, except perhaps forrepparttar 105904 addition ofrepparttar 105905 physical mailing address.

Cont'd on page 2 ==> © 2005
Terms of Use