Messaging Pipeline | Blog
Free Newsletter GlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business
August 2005

August 26, 2005
Google Talk -- Just Say No

Google has officially announced that it's in the IM business. Hooray? Some months ago the company put out its e-mail effort, GMail. Hooray, I suppose. It's popular among a few GoogleManiacs, but it's really crappy as e-mail systems go. Hell, you can't even delete a message, a feature about as smart as the original Pascal programming language that couldn't display results or take input. If Google Talk is as good as GMail everyone -- especially AOL, MSN, and Yahoo!-- should just ignore it.

Posted by John Dickinson at 10:44 AM | Permalink | Comments

August 25, 2005
Stopping The Scourge Requires Internet Citizenship

In her column, MailFrontier CEO Anne Bonaparte calls on Internet messaging industry leaders to drop their ego-centric agendas and cooperate in the war against spam, viruses and phishing, by implementing both Sender ID and DKIM authentication systems, as well as some sort of sender accreditation system on a cooperative basis. I'd take it a step further and call on everyone to also work with the ISPs to help them throttle the attacks sent from Zombie networks implemented on home-based PCs. Please note that I didn't say anything about money--that's because this is about Internet citizenship, not corporate profit.

. . . Full Story: "Stopping The Scourge Requires Internet Citizenship"

Posted by John Dickinson at 10:50 AM | Permalink | Comments

August 17, 2005
Jason Smathers: Internet Criminal

Let's think about this a second. Our good friend Jason Smathers sold 92 million America Online e-mail addresses to a spammer for $28,000. Those names generated an estimated 7 billion spam e-mail messages so far, and caused at least $400,000 in damages to AOL. And for that, the judge sentenced him to one year and three months in jail, and a payment of $82,000 in restitution to AOL (see AOL Worker Who Stole E-Mail List Sentenced). That works out as follows:

. . . Full Story: "Jason Smathers: Internet Criminal"

Posted by John Dickinson at 02:58 PM | Permalink | Comments

August 11, 2005
Strange Bedfellows

You might think that Individualized Lifecycle Marketing, phishing and other fraud schemes, and a court case that allowed the University of Texas to block unsolicited marketing messages from entering the campus e-mail system, make for strange bedfellows, but you shouldn't. They're connected by a broad, sticky cord of despicable human beings ranging in class from pranksters all the way down to gangsters. Whatever they are, they're slime and nothing more -- all of them!

. . . Full Story: "Strange Bedfellows"

Posted by John Dickinson at 11:18 AM | Permalink | Comments

August 04, 2005
And So -- What's Up With The Focus On Fraud?

We've long been covering plain old phishing attacks, you know those e-mail messages you and your users get that tell you to update your financial information, or check your balances, or give you some other mealy-mouthed excuse to hand off your financial log-in information. On the surface, they look like specialized spam, but those "phishermen's special" e-mail messages are the tip of a very insidious iceberg that includes criminal theft of identity and money from innocent people and from the financial institutions that house their futures.

. . . Full Story: "And So -- What's Up With The Focus On Fraud?"

Posted by John Dickinson at 07:42 PM | Permalink | Comments


March 2006
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Monthly Archives

Messaging Pipeline

Get the latest Messaging news, product info, and trends every week.

  Get The Messaging Pipeline Blog RSS Feed

Editorial and vendor perspectives


Editor's Picks
The Six Flavors Of Windows Vista
Microsoft plans to release a full six-pack of Vista versions, one for every taste. Which Vista will be right for you?

Hope is Not Enough When It Comes To Compliance

Three Ways To Authenticate E-Mail And Stop Spam

Wikis In The Workplace

Review: Google Desktop 3

Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.

Roaring Penguin's CanIt-PRO anti-spam solution offers customizable spam and virus control for enterprises, campuses and ISPs. Designed for the mail server, CanIt-PRO lets you stop spam on YOUR terms. Click for free price quote for your organization.

Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age.

Analysts at the Tolly Group put a leading Branch Office IT services solution to the test, measuring performance, security and data reliability. Download the results, detailed in this free report, now.

Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software.

Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   | 
 |   |   |   |   | 
Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2006 | MESSAGING PIPELINE All rights reserved. | |