MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
May 3, 2002
Tom Spring
Kazaa Sneakware Stirs Inside PCs AltNet's dormant programs will awaken some time in May to ask for your cash, storage space, and system cycles... mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
PC World
May 2005
Scott Spanbauer
It's Time to Update Your Internet Security Arsenal Every tool you need to secure your Windows PC is free on the Internet. Here's where they are. mark for My Articles similar articles
InternetNews
July 27, 2006
Roy Mark
Kazaa Settles Up Kazaa agreed to pay a reported $100 million to the trade organizations representing the international music industry. mark for My Articles similar articles
PC Magazine
February 3, 2004
Leon Erlanger
IM and P2P Security The explosion of IM and P2P in the workplace can be a security nightmare. Here's how to keep your network--and your company--safe. mark for My Articles similar articles
PC Magazine
March 2, 2004
Sebastian Rupley
P2P Problems Peer-to-peer (P2P) file-sharing networks are having more problems than just dramatic declines in download numbers. mark for My Articles similar articles
PC World
June 2004
Mary Landesman
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. mark for My Articles similar articles
InternetNews
June 23, 2005
Roy Mark
P2Ps Still Dominate Downloads While productive uses of P2P are possible, illegal music and movie and music downloads are still the most common uses of P2P applications. mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
InternetNews
March 4, 2004
Jim Wagner
Lindows Grabs BitTorrent By The Bit Figuring they can save money using peer-to-peer technology (P2P), alternative operating system developers Lindows is giving customers 50 percent discounts if they download using BitTorrent. mark for My Articles similar articles
PC World
October 2004
Scott Spanbauer
Tweak Windows XP SP2 Security to Your Advantage Fine-tune the settings in Microsoft's recently released Windows XP Service Pack 2. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
July 2002
Kevin McKean
Who Really Controls Your PC? Increasingly, a phantom army of marketers, hackers, and virus writers does... mark for My Articles similar articles
PC World
November 14, 2002
Michelle Madigan
Copyright Cops Target Workplace, Schools Music industry renews piracy fight with correspondence and courts, while colleges and companies consider their liability. mark for My Articles similar articles
PC Magazine
November 25, 2003
File Sharers, Beware With most popular file-sharing services, you could be sharing more than you think. We tell you how to stay safe. mark for My Articles similar articles
PC Magazine
August 3, 2004
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. mark for My Articles similar articles
InternetNews
September 6, 2005
Roy Mark
Kazaa to Continue Court Fight Down Under The peer to peer file-swapping service Kazaa loses a major round in legality of business model in Australia. mark for My Articles similar articles
PC World
December 2003
Scott Spanbauer
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. mark for My Articles similar articles
HBS Working Knowledge
April 16, 2007
Sean Silverthorne
Delivering the Digital Goods: iTunes vs. Peer-to-Peer ITunes demonstrates that to compete effectively against free p2p networks, online digital distribution must deliver experiences to consumers that cannot be easily matched by decentralized, self-sustained peer-to-peer networks. mark for My Articles similar articles
Entrepreneur
June 2004
Mike Hogan
Not-So-Good Fellas Keep the bad guys at bay with these steps to improve your company's computer security. You can also try out these resources and Web sites for secure computing. mark for My Articles similar articles
PC World
April 2001
Cameron Crouch & Sean Captain
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... mark for My Articles similar articles
PC World
June 2002
Tom Mainelli
Disasterware? Most shareware is great, but bad apps can hurt a PC. Here's what readers say -- and what to do... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
PC Magazine
July 16, 2003
Konstantinos Karagiannis
Free Music Services The threat of lawsuits is not turning users off from file sharing, however. In fact, it may be driving users to seek out anonymous services. mark for My Articles similar articles
PC World
November 2003
Kandra & Brandt
The Great American Privacy Makeover An exclusive PC World survey reveals that even savvy Web users can do more to safeguard their privacy and data. Take the quiz and find out how vulnerable you are; then use our tips to improve your score. mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
Wired
February 2003
Todd Woody
The Race to Kill Kazaa The servers are in Denmark. The software is in Estonia. The domain is registered Down Under, the corporation on a tiny island in the Pacific. The 60 million users are everywhere around the world. The next Napster? Think bigger. And pity the poor copyright cops trying to pull the plug. mark for My Articles similar articles
PC World
April 4, 2002
George A. Chidi Jr.
Kazaa Download Offers Unexpected Feature Users may be surprised to learn that application includes software that turns your PC into part of a distributed supercomputer... mark for My Articles similar articles
BusinessWeek
August 30, 2004
Stephen H. Wildstrom
Windows: Security Is Suddenly Job One By attacking some of the worst security problems in Windows, Windows XP Service Pack 2 could save you a lot of trouble. Bite the bullet and install it -- the sooner the better. mark for My Articles similar articles
PC World
June 2002
Robert Luhn
PC Security in the Zone ZoneAlarm Pro 3 protects your PC from hackers and blocks ads, cookies, and spyware... mark for My Articles similar articles
PC World
March 11, 2001
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... mark for My Articles similar articles
InternetNews
May 6, 2004
Roy Mark
P2P Group Accuses Music Industry of Smut Smear File sharing trade association tells Congress facts don't support claims of rampant P2P pornography. mark for My Articles similar articles
Bio-IT World
July 11, 2002
Salvatore Salamone
P2P's Powerful Promise Systems management remains difficult, but the payoff is getting teraflop computing from a sea of commodity PCs. Just ask Entelos and Novartis. mark for My Articles similar articles
PC World
November 2002
Scott Spanbauer
Internet Tips: Lock Out Internet Pests, Lock In Network Security Enhance your wireless network's security; safely share files; block spam in Outlook cooperatively. mark for My Articles similar articles
Salon.com
August 2, 2001
Damien Cave
The parasite economy There's a new software business model in town -- symbiotic plug-ins that pay for the privilege of piggybacking on the hot download of the moment... mark for My Articles similar articles
PC Magazine
January 12, 2005
Cade Metz
The New Internet First came the Boom. Then came the Bust. And when the dust cleared, the Internet found itself in a bit of a rut. In the nineties, as countless users logged on to the Internet for the first time. mark for My Articles similar articles
CIO
April 15, 2003
Sarah D. Scalet
The Pirates Among Us The entertainment industry is battling the illegal distribution of copyrighted music and movie files -- and will stop at nothing to enlist your help. mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
New Architect
April 2002
Charlie Cho
Making Connections Emerging platforms for peer-to-peer application development... mark for My Articles similar articles
CIO
March 1, 2001
John Edwards
Not Just for Music Anymore Napster's revolution begins to sing a business melody... mark for My Articles similar articles
PC Magazine
February 2, 2005
Gottesman & Karagiannis
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. mark for My Articles similar articles
PC Magazine
February 1, 2008
Matthew D. Sarrel
Unified Threat Management A single interface to protect your network makes good sense. mark for My Articles similar articles
PC World
May 15, 2001
Frank Thorsberg
Does Your PC Harbor Zombies Waiting to Attack? Unprotected broadband connections can leave your PC open to raids by malicious hackers... mark for My Articles similar articles
The Motley Fool
January 7, 2004
Seth Jayson
Why the Decline in Downloading? The Pew Internet Project's report on online file swapping doesn't tell the whole story. mark for My Articles similar articles
New Architect
June 2002
Lincoln D. Stein
The Morpheus Incident How corporate squabbles could stifle the Web... mark for My Articles similar articles
PC World
August 5, 2002
Kim Zetter
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application. mark for My Articles similar articles
PC World
December 2005
Stuart J. Johnston
Windows Bug Allows Repeat Invasions Microsoft recently released a Security Advisory for a Firewall quirk... Avoid a fake Google site... A problem with Windows updates... Fix Wi-Fi router problems... mark for My Articles similar articles
InternetNews
October 21, 2005
Roy Mark
P2P Outfit in False Ad Pinch The Federal Trade Commission won a temporary court order earlier this week to rein in the advertising practices of an Internet operation claiming "file-sharing is 100 percent legal." mark for My Articles similar articles