| [ |
January 10, 2001 |
] |
Lotus Flaw Threatens Email Security |
 |
Lotus has given the highest priority to fixing a security hole in its Domino messaging system which could allow junior employees to read the email of the most senior figures in companies using the software. The exploitable gap in the system's security was reported to the moderated industry mailing list bugtraq late on Monday. It prompted some consultants to inform clients that they had no secure alternative but to close down their email servers until a workaround was published ... »
|
| [ |
January 10, 2001 |
] |
Suffering from E-mail Overload? |
 |
[Ottawa, ONTARIO] Getting tired of sifting through copious amounts of e-mail in an effort to discern what's important and what's not? These days, e-mail subscribers not only receive messages on their desktop computers, but on their laptops, Personal Digital Assistants (PDAs) and cell phones as well. Needless to say, they run the risk of spending the majority of their day gathering and prioritizing messages. AmikaNow! is cashing in on this phenomenon with its artificial intelligence software that interprets and abbreviates electronic text, and then readies it for delivery to desktop or wireless devices ... »
|
| [ |
January 10, 2001 |
] |
Rise in E-Mail Bullying |
 |
City firms are seeing a rise in employees taking legal actions against them for bullying and sexual harassment by e-mail. Employees are printing off e-mails received from bosses or colleagues as evidence of misconduct towards them. In the wake of the recent high-profile case in which action was taken against employees of Royal and Sun Alliance for e-mailing lewd material, a Norwich expert on employment law has warned that companies are being left rocking in the wake of new technology ... »
|
| [ |
January 10, 2001 |
] |
E-mail Virus Protection Handbook |
 |
The growth of the Internet and its reach into the fabric of business and personal life has outdistanced most organizations' ability to protect the confidentiality and integrity of information. The increased exposure and the constant escalation of threats to network security have increased the need for effective controls that can restore availability, confidentiality, and integrity to information systems. Mission Critical Internet Security shows how security can be provided in TCP/IP at any layer, and outlines the advantages and disadvantages of each approach. ... »
|
| [ |
January 10, 2001 |
] |
E-Mail, Direct Mail or Both? |
 |
Technology is ever-evolving. How direct mailers can make the best use of it is the question of the new year. Clients are continually asking when and how to use e-marketing and e-fulfillment technology to their best advantage. When is sending bills, invoices, statements and marketing information through the Internet more efficient than sending hard copy through the U.S. Postal Service? How do response rates between e-mail and traditional mail compare? What are the overall return-on-investment differences between the two marketing and customer relationship management techniques? ... »
|
| [ |
January 10, 2001 |
] |
E-Mail As Evidence: Threat Or Opportunity? |
 |
Johannesburg (ITWeb, January 10, 2001) - In today's business environment managers are increasingly being asked to monitor and create policies on the use of enterprise technology and information. The use of e-mail within a company falls within this ambit and, because e- mail correspondence can have more and more of a legal implication, managers are having to make decisions with legal or ethical implications relating to e-mail content. ... »
|
| [ |
January 10, 2001 |
] |
Bill aims to block wireless junk email |
 |
Internet users have for years been complaining about unwanted email, or spam, with messages that promise everything from quick cash to an enhanced love life. Consumers now are concerned about spam sent to their wireless devices such as Internet-ready phones, and Congress is taking notice ... »
|
| [ |
January 10, 2001 |
] |
E-mail Virus Protection Handbook |
 |
The growth of the Internet and its reach into the fabric of business and personal life has outdistanced most organizations' ability to protect the confidentiality and integrity of information. The increased exposure and the constant escalation of threats to network security have increased the need for effective controls that can restore availability, confidentiality, and integrity to information systems. Mission Critical Internet Security shows how security can be provided in TCP/IP at any layer, and outlines the advantages and disadvantages of each approach ... »
|
| [ |
January 9, 2001 |
] |
Advanced Email Extractor 1.32 has been Released Today |
 |
We are very sorry for bug at address 0x004228ae in Advanced Email
Extractor v1.31. We receive many-many bug reports during holidays,
thank you! ... »
|
| [ |
January 9, 2001 |
] |
Downsize Photos for E-Mail |
 |
I've been getting New Year's "resolution" calls lately, which tells me that a lot of new digital photographers are snapping and e-mailing photos to family and friends. The typical question goes something like this: "My son-in-law sent me a photo of the kids, but when I call it up on my screen, it's so big that I can't see anything except a little corner of it. Is there any way to make it smaller?" ... »
|