POPULARITY
We conclude our epic trilogy on spam with the modern world of bots, worms, splogs, and all kinds of other strange, frightening innovations in the world of spam. Join us and our returning guest Brandon Knox as we fight our way out of the darkest corners of cyberspace. See and hear Brandon's other fun work at https://www.laughingvikings.com/podcastWant to correct all the computer facts we got wrong? Email us at artnersincrime@outlook.comOur intro and outro music is by Commuted. Find him at https://commuted.bandcamp.com/Our art is by Jennifer Walker. Find her at https://www.jenniferwalker.design/ Sources: Brunton, Finn. Spam: A Shadow History of the Internet. Published 2013 by MIT Press.https://en.wikipedia.org/wiki/Email_spamhttps://en.wikipedia.org/wiki/History_of_email_spamhttps://www.templetons.com/brad/spamreact.htmlhttps://www.britannica.com/topic/ARPANEThttp://www.juliandibbell.com/texts/mytinylife.html#VR8https://en.wikipedia.org/wiki/Davis_Wolfgang_Hawkehttps://www.techdirt.com/articles/20060802/0854203.shtmlhttps://en.wikipedia.org/wiki/MydoomMonty Python SPAM
Cyber crime - as we saw all too recently with the downed systems of Facebook, Twitter and others - occurs every day and costs billions of dollars in lost productivity and actual theft. Join Limor Schafman as she discusses with Mikko Hypponen of F-Secure what is the current status of cyber attacks, how organized crime works online, and why we can't seem to make this stop. Mr. Hypponen is the Chief Research Officer of F-Secure [F-Secure.com]. He was the first to warn of the Sasser attack in 2004 and named the Storm Worm in 2007. He will be a speaker at the upcoming NORDIC OSAC conference taking place in September [http://www.amcham.fi/Default.aspx?tabid=303]
Cyber crime - as we saw all too recently with the downed systems of Facebook, Twitter and others - occurs every day and costs billions of dollars in lost productivity and actual theft. Join Limor Schafman as she discusses with Mikko Hypponen of F-Secure what is the current status of cyber attacks, how organized crime works online, and why we can't seem to make this stop. Mr. Hypponen is the Chief Research Officer of F-Secure [F-Secure.com]. He was the first to warn of the Sasser attack in 2004 and named the Storm Worm in 2007. He will be a speaker at the upcoming NORDIC OSAC conference taking place in September [http://www.amcham.fi/Default.aspx?tabid=303]
Printer sharing, making your own ringtones, Profiles in IT (Leonard Kleinrock, inventor of packet switched networks), Domain Keys Identified Mail (DKIM) standard will force sender address validation, QWERTY versus Dvorak keyboards, digital TV update ($40 coupons distributed to help buy digital converters), Valentines day Storm Worm attack, and best/worst Valentines Day text messages. This show originally aired on Saturday, February 16, 2008, at 9:00 AM EST on 3WT Radio (WWWT).
Printer sharing, making your own ringtones, Profiles in IT (Leonard Kleinrock, inventor of packet switched networks), Domain Keys Identified Mail (DKIM) standard will force sender address validation, QWERTY versus Dvorak keyboards, digital TV update ($40 coupons distributed to help buy digital converters), Valentines day Storm Worm attack, and best/worst Valentines Day text messages. This show originally aired on Saturday, February 16, 2008, at 9:00 AM EST on 3WT Radio (WWWT).
BizIII - A Daily Podcast with Ideas Information Inspiration to help you make more money ... with Les Bain and Mike Hughes Monday, October 1st, 2007 The Storm Work Botnet is a series of computers that were compromised by the Storm Worm and collectively have more computing power than the world's largest super computer. Duration: 3:51 Share This Show with a Friend Send a Story Idea to BizIII