Search
Related Links

 

 

Informative Articles

Congress Taking A Fresh Look At Online Sales Taxes
Linknet Internet News Digest - December 22, 2005 - According to a 1992, U.S. Supreme Court ruling, states can only require sellers that have a physical presence or "nexus" in the same state as the consumer to collect sales taxes. The Supreme...

Got Virus?
GOT VIRUS? Your Data is NOT lost forever! In the wake of so many computer viruses running wild, “Hope is not lost”! With the recent release of such viruses as: mydoom; netsky; mofei, lovegate and many more destructive viruses, there is an...

Longer Term Play
When the Trade Towers came down in 01, communications came to a halt. Cell phones were hit or miss and the regular radio frequencies were so jammed with traffic it was sort of like trying to get your message through a million other calls at the...

StarForce Protection Solutions at Games Convention 2004
A famous Russian expert in the field of copy protection and software licensing presents its brand news technologies at Games Convention 2004, Leipzig. StarForce to introduce its latest software protection and licensing technologies at Games...

Wireless Network
If you want to have a network in your home or office, you can connect the computers together using a wireless network also known as 802.11 networking and WiFi. (Wireless Fidelity). You can connect computers anywhere in your home or office...

 
The Economics of Spam

Tennessee resident K. C. "Khan" Smith owes the internet service provider EarthLink $24 million. According to the CNN, last August he was slapped with a lawsuit accusing him of violating federal and state Racketeering Influenced and Corrupt Organizations (RICO) statutes, the federal Computer Fraud and Abuse Act of 1984, the federal Electronic Communications Privacy Act of 1986 and numerous other state laws. On July 19 - having failed to appear in court - the judge ruled against him. Mr. Smith is a spammer.

Brightmail, a vendor of e-mail filters and anti-spam applications warned that close to 5 million spam "attacks" or "bursts" occurred last month and that spam has mushroomed 450 percent since June last year. PC World concurs. Between one seventh and one half of all e-mail messages are spam - unsolicited and intrusive commercial ads, mostly concerned with sex, scams, get rich quick schemes, financial services and products, and health articles of dubious provenance. The messages are sent from spoofed or fake e-mail addresses. Some spammers hack into unsecured servers - mainly in China and Korea - to relay their missives anonymously.

Spam is an industry. Mass e-mailers maintain lists of e-mail addresses, often "harvested" by spamware bots - specialized computer applications - from Web sites. These lists are rented out or sold to marketers who use bulk mail services. They come cheap - c. $100 for 10 million addresses. Bulk mailers provide servers and bandwidth, charging c. $300 per million messages sent.

As spam recipients become more inured, ISP's less tolerant, and both more litigious - spammers multiply their efforts in order to maintain the same response rate. Spam works. It is not universally unwanted - which makes it tricky to outlaw. It elicits between 0.1 and 1 percent in positive follow ups, depending on the message. Many messages now include HTML, JavaScript, and ActiveX coding and thus resemble viruses.

Jupiter Media Matrix predicted last year that the number of spam messages annually received by a typical Internet user is bound to double to 1400 and spending on legitimate e-mail marketing will reach $9.4 billion by 2006 - compared to $1 billion in 2001. Forrester Research pegs the number at $4.8 billion next year.

More than 2.3 billion spam messages are sent daily. eMarketer puts the figures a lot lower at 76 billion messages this year. By 2006, daily spam output will soar to c. 15 billion missives, says Radicati Group. Jupiter projects a more modest 268 billion annual messages by 2005. An average communication costs the spammer 0.00032 cents.

PC World quotes the European Union as pegging the bandwidth costs of spam worldwide at $8-10 billion annually. Other damages include server crashes, time spent purging unwanted messages, lower productivity, aggravation, and increased cost of Internet access.

Inevitably, the spam industry gave rise to an anti-spam industry. According to a Radicati Group report titled "Anti-virus, anti-spam, and content filtering market trends 2002-2006", anti-spam revenues are projected to exceed $88 million this year - and more than double by 2006. List blockers, report and complaint generators, advocacy groups, registers of known spammers, and spam filters all proliferate. The Wall Street Journal reported in its June 25 issue about a resurgence of anti-spam startups financed by eager venture capital.

ISP's are bent on preventing abuse - reported by victims - by expunging the accounts of spammers. But the latter simply switch ISP's or sign on with free services like Hotmail and Yahoo! Barriers to entry are getting lower by the day as the costs of hardware, software, and communications plummet.

The use of e-mail and broadband connections by the general population is spreading. Hundreds of thousands of technologically-savvy operators have joined the market in the last two years, as the dotcom bubble burst. Still, Steve Linford of the UK-based Spamhaus.org insists that most spam emanates from c. 80 large operators.

Now, according to Jupiter Media, ISP's and portals are poised to begin to charge advertisers in a tier-based system, replete with premium services. Writing back in 1998, Bill Gates described a solution also espoused by Esther Dyson, chair of the Electronic Frontier Foundation:

"As I first described in my book 'The Road Ahead' in 1995, I expect that eventually you'll be paid to read unsolicited e-mail. You'll tell your e-mail program to discard all unsolicited messages that don't offer an amount of money that you'll choose. If you open a paid message and discover it's from a long-lost friend or somebody else who has a legitimate reason to contact you, you'll be able to cancel the payment. Otherwise, you'll be paid for your time."

Subscribers may not be appreciative of the joint ventures between gatekeepers and inbox clutterers. Moreover, dominant ISP's, such as AT&T and PSINet have recurrently been accused of knowingly collaborating with spammers. ISP's rely on the data traffic that spam generates for their revenues in an ever-harsher business environment.

The Financial Times and others described how WorldCom refuses to ban the sale of spamware over its network, claiming that it does not regulate content. When "pink" (the color of canned spam) contracts came to light, the implicated ISP's blame the whole affair on rogue employees.

PC World begs to differ:

"Ronnie Scelson, a self-described spammer who signed such a contract with PSInet, (says) that backbone providers are more than happy to do business with bulk e-mailers. 'I've signed up with the biggest 50 carriers two or three times', says Scelson ... The Louisiana-based spammer claims to send 84 million commercial e-mail messages a day over his three 45-megabit-per-second DS3 circuits. 'If you were getting $40,000 a month for each


circuit', Scelson asks, 'would you want to shut me down?'"

The line between permission-based or "opt-in" e-mail marketing and spam is getting thinner by the day. Some list resellers guarantee the consensual nature of their wares. According to the Direct Marketing Association's guidelines, quoted by PC World, not responding to an unsolicited e-mail amounts to "opting-in" - a marketing strategy known as "opting out". Most experts, though, strongly urge spam victims not to respond to spammers, lest their e-mail address is confirmed.

But spam is crossing technological boundaries. Japan has just legislated against wireless SMS spam targeted at hapless mobile phone users. Four states in the USA as well as the European parliament are following suit. Expensive and slow connections make this kind of spam particularly resented. Still, according to Britain's Mobile Channel, a mobile advertising company quoted by "The Economist", SMS advertising - a novelty - attracts a 10-20 percent response rate - compared to direct mail's 1-3 percent.

Net identification systems - like Microsoft's Passport and the one proposed by Liberty Alliance - will make it even easier for marketers to target prospects.

The reaction to spam can be described only as mass hysteria. Reporting someone as a spammer - even when he is not - has become a favorite pastime of vengeful, self-appointed, vigilante "cyber-cops". Perfectly legitimate, opt-in, email marketing businesses often find themselves in one or more black lists - their reputation and business ruined.

In January, CMGI-owned Yesmail was awarded a temporary restraining order against MAPS - Mail Abuse Prevention System - forbidding it to place the reputable e-mail marketer on its Real-time Blackhole list. The case was settled out of court.

Harris Interactive, a large online opinion polling company, sued not only MAPS, but ISP's who blocked its email messages when it found itself included in MAPS' Blackhole. Their CEO accused one of their competitors for the allegations that led to Harris' inclusion in the list.

Coupled with other pernicious phenomena, such as viruses, the very foundation of the Internet as a fun, relatively safe, mode of communication and data acquisition is at stake.

Spammers, it emerges, have their own organizations. NOIC - the National Organization of Internet Commerce threatened to post to its Web site the e-mail addresses of millions of AOL members. AOL has aggressive anti-spamming policies. "AOL is blocking bulk email because it wants the advertising revenues for itself (by selling pop-up ads)" the president of NOIC, Damien Melle, complained to CNET.

Spam is a classic "free rider" problem. For any given individual, the cost of blocking a spammer far outweighs the benefits. It is cheaper and easier to hit the "delete" key. Individuals, therefore, prefer to let others do the job and enjoy the outcome - the public good of a spam-free Internet. They cannot be left out of the benefits of such an aftermath - public goods are, by definition, "non-excludable". Nor is a public good diminished by a growing number of "non-rival" users.

Such a situation resembles a market failure and requires government intervention through legislation and enforcement. The FTC - the US Federal Trade Commission - has taken legal action against more than 100 spammers for promoting scams and fraudulent goods and services.

"Project Mailbox" is an anti-spam collaboration between American law enforcement agencies and the private sector. Non government organizations have entered the fray, as have lobbying groups, such as CAUCE - the Coalition Against Unsolicited Commercial E-mail.

But Congress is curiously reluctant to enact stringent laws against spam. Reasons cited are free speech, limits on state powers to regulate commerce, avoiding unfair restrictions on trade, and the interests of small business. The courts equivocate as well. In some cases - e.g., Missouri vs. American Blast Fax - US courts found "that the provision prohibiting the sending of unsolicited advertisements is unconstitutional".

According to Spamlaws.com, the 107th Congress discussed these laws but never enacted them:

Unsolicited Commercial Electronic Mail Act of 2001 (H.R. 95), Wireless Telephone Spam Protection Act (H.R. 113), Anti-Spamming Act of 2001 (H.R. 718), Anti-Spamming Act of 2001 (H.R. 1017), Who Is E-Mailing Our Kids Act (H.R. 1846), Protect Children From E-Mail Smut Act of 2001 (H.R. 2472), Netizens Protection Act of 2001 (H.R. 3146), "CAN SPAM" Act of 2001 (S. 630).

Anti-spam laws fared no better in the 106th Congress. Some of the states have picked up the slack. Arkansas, California, Colorado, Connecticut, Delaware, Idaho, Illinois, Iowa, Kansas, Louisiana, Maryland, Minnesota, Missouri, Nevada, North Carolina, Oklahoma, Pennsylvania, Rhode Island, South Dakota, Tennessee, Utah, Virginia, Washington, West Virginia, and Wisconsin.

The situation is no better across the pond. The European parliament decided last year to allow each member country to enact its own spam laws, thus avoiding a continent-wide directive and directly confronting the communications ministers of the union. Paradoxically, it also decided, three months ago, to restrict SMS spam. Confusion clearly reigns. Finally, last month, it adopted strong anti-spam provisions as part of a Directive on Data Protection.


About the Author

Sam Vaknin ( http://samvak.tripod.com ) is the author of Malignant Self Love - Narcissism Revisited and After the Rain - How the West Lost the East. He served as a columnist for Central Europe Review, PopMatters, and eBookWeb , and Bellaonline, and as a United Press International (UPI) Senior Business Correspondent. He is the the editor of mental health and Central East Europe categories in The Open Directory and Suite101.

 

Tom's Hardware
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews.
www.tomshardware.com
 
HardwareCentral - Your source for in-depth computer hardware info.
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ...
www.hardwarecentral.com
 
Apple - Hardware
Find your favorite Mac, iPod and other Apple accessories.
www.apple.com
 
Ace Hardware
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information.
www.acehardware.com
 
Computer hardware - Wikipedia, the free encyclopedia
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ...
en.wikipedia.org
 
Hardware - Wikipedia, the free encyclopedia
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ...
en.wikipedia.org
 
Open Directory - Computers: Hardware
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ...
dmoz.org
 
Microsoft Hardware – Home Page
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools.
www.microsoft.com
 
AnandTech: your source for hardware analysis and news
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs.
www.anandtech.com
 
hardware.com - Routers, switches, firewalls, servers, memory ...
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom.
www.hardware.com
 
Slashdot: News for nerds, stuff that matters
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ...
hardware.slashdot.org
 
InformationWeek HardwareTech Center
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ...
www.informationweek.com
 
What is hardware? - A Word Definition From the Webopedia Computer ...
This page describes the term hardware and lists other pages on the Web where you can find additional information.
www.webopedia.com
 
Google Directory - Computers > Hardware
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ...
www.google.com
 
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ...
www.restorationhardware.com
 
HwB: The Hardware Book
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information.
www.hardwarebook.net
 
Reg Hardware: Product News and Gadget Reviews from The Register
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ...
www.reghardware.co.uk
 
red hat hardware compatibility lists
hardware.redhat.com/ - Similar pages
 
TrueValue.com
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ...
www.truevalue.com
 
A complete illustrated Guide to the PC Hardware
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ...
www.karbosguide.com
 
 

 

Content Menu
  • 10 easy steps to speed up your computer without upgrading

  • 1 simple step towards improved customer satisfaction for web hosts

  • 4 ways to get your opt in subscribers to trust you quickly

  • 5 desktop computer hardware myths exposed

  • 5 minute guide to video editing for beginners

  • 5 simple tips to prevent ms access database corruption

  • 5 steps to choosing a great host

  • 5 sure fire tips for buying a new computer

  • 5 ways to give your web site a big company look and feel

  • 7 barebones computer buying tips

  • 7 reasons not to take your laptop on holiday

  • 7 simple reasons why you need a network security camera for your home

  • 7 steps to cleaning the laser toner from your laser printer

  • adult web hosting the all you need to know

  • advancement in computer technology

  • advantages of buying used servers

  • all about the new scmad certification exam

  • alternatives to tape backup

  • another title by atari released on starforce protected dvds

  • anti spam at the enterprise level

  • are they watching you online

  • are you waiting for microsoft longhorn

  • are you well protected

  • a beginner guide to web hosting

  • a brief history of tablet pcs

  • a business center in your hotel curse or blessing

  • a computer and internet glossary

  • a hacker inside your computer

  • a review of refurbished toshiba laptops

  • a simple guide to web hosting

  • backing up your stuff part 2 a solution

  • backing up your stuff part 3 software

  • backing up your stuff part 7 where is it 3

  • basic computer maintenance

  • basic diagnosis guidelines for your pc

  • basic problem in a pc

  • beginners guide to pc video editing

  • beware of spyware

  • be informed when you purchase a computer

  • be prepared in the event computer disaster strikes

  • bios term

  • boost your websites search engine rankings in 5 simple steps

  • boot camp troubleshooting hardware bootup problems

  • build your first computer from hardware scratches

  • build your own computer or buy

  • burning bridges is bad but firewalls are good

  • buying a computer ask these 3 questions

  • buying a used laptop computer

  • buying e books on e bay e bay the one stop e book shop

  • cad

  • can i hear your web site

  • can you restore data from your backup

  • carnivore

  • chicken little entrepreneurs

  • choose your email marketing software wisely

  • choosing a web host

  • choosing the right host for your site

  • choosing the wrong server will literally make or break you

  • cisco ccna ccnp home lab why you need an isdn simulator

  • cisco certification suggested topologies for your ccna ccnp home lab

  • clustering solutions and zero downtime hosting pitfalls

  • colors for your website

  • combat computer spyware an antispyware program isnt enough

  • computer buying advice for novices

  • computer case modding

  • computer consulting 101 hiring tips part 1 of 2

  • computer data backup data backup solution will give you a peace of mind

  • computer hardware preventive maintenance software

  • computer hygiene take out the trash

  • computer network designing

  • computer network installation

  • computer rentals the best classroom computer training solution

  • computer sos inc release of upgraded league management software package

  • computer tips that help small businesses operate profitably

  • congress taking a fresh look at online sales taxes

  • coping with a serious data loss from your computer hard drive

  • credit card processing on the internet

  • crying for help online

  • cure for illegal operations sydrome

  • custom error pages

  • cyber warfare

  • data backups one key to business survival

  • data backup for beginners

  • data backup solution why you need a backup plan in place part 1

  • data backup solution why you need a backup plan in place part 2

  • death before birth the life cycle of a search engine

  • declarative programming strategies for solving software problems

  • dedicated co location inside a securely monitored bank vault at lasvegas net

  • dedicated server price check by www vipwh com

  • dedicated server vs co location web hosting by www vipwh com

  • dedicated web hosting the executive summary

  • defining olap solutions and data warehouse design

  • denial of service attack

  • desktop security software risks part 1

  • desktop security software risks part 2

  • device driver basics

  • dhcp

  • did i hear you say mama help me i lost my websites

  • different categories of computer games

  • digital dispatch is the internet safe

  • digital rights management

  • does it worth to backup emails from clients like outlook express

  • dont allow hackers to take out money from your bank account

  • do we really need the internet

  • do you need a web site monitoring service

  • d bust your computer part 5

  • easy to execute

  • edit able art

  • email anti spam and virus protection for businesses there is hope

  • esecurity

  • esolution software developments

  • exchange disaster recovery with sanrad v switch planning guide

  • finally an understandable introduction to computers

  • finding a physical phone tap

  • finding a quality and affordable web host

  • finding the right performance optimizer

  • find the host with the most

  • firewalls what they are and why you must have one

  • firewall protection does your firewall do this

  • five things to try if you are having wireless troubles

  • free detailed pc analysis

  • freight broker software

  • freight software

  • getting help using mailing lists

  • getting more bang for the storage buck

  • getting patched with windows service pack

  • get familiar with msdos sys

  • get your multimedia cbt educational cd educational software

  • got virus

  • got virus your data is not lost forever

  • great plains dexterity history and programming overview

  • guarding against email scams

  • hacking in cyberspace

  • hard drive crash the essential data recovery report

  • hard drive selection

  • helpdesk asset management software top questions to ask before you buy

  • help me choose linux vs windows web hosting

  • history of linux

  • home audio recording for everyone

  • how a security specialist fell victim to attack

  • how do wireless networks work

  • how multiple server hosting impacts your websites uptime

  • how multiple server hosting impacts your web sites uptime

  • how to become an information superstar

  • how to become a dot com millionaire part 2

  • how to buy a laptop buyers guide notes

  • how to change upgrade or remove and ide hard drive

  • how to choose a reliable web host

  • how to consider a web host

  • how to fight cyberterrorism

  • how to get the case off your pc

  • how to get the computer you want without spending a fortune

  • how to install cable dls and dialup modems fast

  • how to never pay a hotel phone bill again

  • how to overclock a processor

  • how to prevent spyware attacking your computer

  • how to quickly fix nagging dvd drive problems

  • how to really backup the windows registry

  • how to really create a startup disk

  • how to really install a modem

  • how to re record other video files

  • how to rip shrink a full dvd movie backup a dvd dvd shrink dvd decrypter tutorial

  • how to shop online safely

  • how to speed up your pc

  • how to start a tech support business

  • how to tame your mouse

  • how to tell you are infected with spyware ad ware or viruses

  • how to troubleshoot dvd drives fast

  • how to upgrade your pc

  • hpc systems inc announces first 8 way processor amd opterone server

  • ibm lotus domino or microsoft exchange

  • ie firefox opera netscape mozilla and more

  • if you had problems in the past with a computer virus then youll want to know how easy it is to setup firewall protection

  • image conversion in computers

  • implementation of asp application services provision

  • implementing a secure password policy

  • importance of backups

  • important steps to protect your computer from hurricanes

  • improve pc performance 6 tips you must know

  • improving sql performance

  • im guilty until proven innocent

  • index

  • inkjet printer tips to select proper printer

  • internet communication

  • internet faxing service review

  • internet security backups

  • intranet

  • intranet portal business case roi

  • introduction to dedicated servers

  • introduction to visual basic

  • invest wisely when buying a laptop

  • iscsi vs fc for meeting mission critical requirements

  • is it still good to share

  • is my pc vulnerable on the internet

  • is that pc still worth keeping

  • is voice over ip right for me

  • is your computer infected with spyware

  • is your laptop or home computer wireless enabled

  • its war i tell you

  • jungo joins texas instruments third party dsp network to provide software hardware connectivity solutions

  • keeping the windows registry operational

  • keep a diary of your computer

  • know linux

  • lay out tips

  • linux display settings

  • linux for home users

  • linux web hosting

  • linux web hosting the all you need to know

  • longer term play

  • lost your usb flash dont panic

  • low budget horror stories

  • managed and unmanaged dedicated hosting

  • managed hosting whats it all about

  • managed vs unmanaged dedicated hosting by www vipwh com

  • mcse 70 290 certification primer

  • memory bandwidth vs latency timings

  • microsoft class action settlement in minnesota submitting a claim

  • microsoft great plains if you are orphan client what to do and faq

  • microsoft sql 2000 disaster recovery with sanrad v switch planning guide

  • microworld antivirus mwav toolkit utility

  • more computer consulting 101 hiring tips part 2 of 2

  • more dvd burning tips

  • more free tools increase security for your pc

  • mpeg encoder for burning dvds

  • ms sql mysql a case study

  • music cd r vs data cd r is there a difference

  • need of document management system dms

  • network performance management the 6 pillars of network management system

  • network wiring standards

  • net words by nick usborne a book review

  • new olap concept

  • new software suite improves productivity and slashes costs for small and medium size businesses

  • no computer sound

  • no operating system

  • on reconditioned or refurbished notebooks

  • o software livre realmente nos libertar  dos custos

  • passwords or pass phrase protecting your intellectual property

  • pc gaming video meeting the demands

  • pc owners the largest criminal gang ever

  • pdf faster delivery lowered costs

  • physical topology of a network refers to the configuration of cables computers

  • plug and play resource allocation

  • plug ins and xtensions indesign indexers quarkxpress catalogers photoshop fixers

  • podcasting trend

  • printing troubleshooting guide

  • protecting your identity on the internet

  • protect your computer and internet privacy

  • protect your pc from viruses worms trojans

  • provisioning user management system upgrades part one ten reasons why not to do an upgrade or the gentle art of not doing when good systems go bad

  • provisioning user management system upgrades part two building awareness and building approval

  • p c security housekeeping basics

  • raid disk recovery

  • refurbished computers on the internet

  • registry cleaners why do you need one

  • remote deployment of surveillance spyware software

  • remove rogue desktop icons created by spyware

  • report on growth and economic impact of the it industry

  • reseller hosting explained

  • reseller web hosting

  • review on paint shop pro 7 solutions book

  • reviving old computer games

  • rotator

  • save your software

  • screenshots vista windows

  • script kiddies ii an advice to parents

  • secrets to spyproofing your computer in four easy steps

  • security firewalls

  • security in todays world

  • seecrets on security a gentle introduction on cryptography part 2

  • seecrets on security a gentle introduction to cryptography

  • see how to revive a dead computer

  • see how to troubleshoot pc mouse problems fast

  • setting up an internet connection

  • setting up a linux modem

  • setting up a tape backup strategy for your business

  • should i use windows update

  • should you build your own pc

  • should you upgrade your hardware pc

  • simplenet director of marketing

  • small wonders single board computers

  • software consulting

  • software for hard jobs contractors have some powerful tools in todays software

  • software piracy global increase

  • software that takes care of other software

  • special rules for selling software on ebay

  • spyware versus adware the difference impacts your privacy

  • spyware what it is and how to combat it

  • starforce protection solutions at games convention 2004

  • static discharge causes flaky damage

  • step by step troubleshooting ram

  • sticky sites rule the internet

  • streaming audio made easy

  • surge protector a simple mechanism description

  • system downtime

  • system restore the big undo

  • talking rugged notebook

  • ten great careers for computer geeks

  • ten percent of jimmy stewart

  • that darned old internet gateway

  • the art of display

  • the basics of hosting

  • the complete guide to spotting computer spies recording devices

  • the cost of spyware on your computer

  • the cycle of windows life

  • the database design alalysis business perspective

  • the economics of spam

  • the essential data recovery report

  • the hidden tiger

  • the host with the most

  • the important steps to protect your kids on the internet

  • the metaphors of the net

  • the metaphors of the net part ii

  • the metaphors of the net part iii

  • the metaphors of the net part iv

  • the never ending spywarestory

  • the never ending spyware story

  • the problems with passwords

  • the pros cons of hosting the site yourself

  • the seamless internet

  • the secret computer virus that is virtually undetectable

  • the security risks and ways to decrease vulnerabilities in a 802 11b wireless environment

  • the seven deadly habits of a dba and how to cure them

  • the spyware who loved me

  • the trials and tribulations of a confused computer

  • the two most important things you need to run a wildly successful web site

  • the universal serial bus

  • the worst case scenario how to protect your data

  • the xbox 360 a parental guide to this game console

  • things newbies need to know

  • tips about low cost web hosting services

  • tips for finding the perfect portable mp3 player

  • tips for turning cd duplication into a profitable side business

  • tips on finding a web host

  • tips to select proper hard drive

  • tips to select proper motherboard

  • top 7 reasons you should back up your data online

  • transportation management software

  • transportation software

  • trouble shooting mouse problems

  • tucsons nextwest inc announces partnership with dialresults inc

  • two enter internet battle

  • ultimate checklist on how to revive a dead computer

  • understanding the components of a home network

  • understanding the software layers of a computer

  • unleash the dragon inside your computer

  • unlimited bandwidth in web hosting

  • unlimited wealth creation through reseller hosting

  • unrelated inventiions catering for the uncommon denominator

  • ups technologies explained

  • usb hubs and ports explained

  • using a bluetooth headset with your pc

  • using sanrad v switch as the vss hardware provider for windows backups

  • video game rental pros of renting video games

  • virtual hosting the affordable hosting solution for reseller web hosting companies

  • virtual hosting vs dedicated hosting

  • virtual it anyone

  • virtual private server web hosting

  • voice over internet protocol

  • voip questions and answers

  • wealth for free

  • webfarms the only way to host

  • website and network stress monitoring

  • web hosting guide for beginner

  • web hosting reviews can you trust them

  • web hosting server what to look for

  • web hosting web development for beginners

  • web hosting web development understand and create great websites

  • web hosts the basics

  • welcome to the world of knoppix

  • we know why you havent decided yet to purchase a security product

  • whats in a name

  • whats your right photo shade

  • what are international isp global isp

  • what does your john hancock look like

  • what do customers really want

  • what is a server

  • what is computer programming anyway

  • what is data recovery a brief introduction

  • what is tcp ip

  • what is vsat broadband

  • what makes a good web hosting provider

  • what to consider when taking your cmms mobile

  • what to do once you are infected with spyware ad ware or viruses

  • what to look for in an assembled pc

  • when to rent a laptop computer

  • which web host is right for you

  • which web host should i choose to host my business site

  • which web server

  • why build your own gaming computer

  • why network documentation is so important

  • why slow access to your site is killing your business

  • why your online advertising traffic leaves as soon as it arrives

  • wifi range what are the limits

  • wilibox launches embedded linux wireless platform with industrys first 802 11 stack supporting access point and client modes simultaneously

  • will adobe manage to replace industry work horse quark express by giving adobe indesign for free

  • will voip be a mass market product

  • windows hosting versus linux hosting

  • windows ou linux

  • windows vs linux a comparison

  • wiping a hard drive how to ensure your data is gone

  • wireless home networking choosing the right one

  • wireless network

  • wireless networks how do they work

  • wireless network security

  • working with the registry

  • worms horses bugs and thugs

  • your affiliate business peripherals software computers

  • your fingertips and a phone line perhaps

  • you dont have to be rich to be a pc gamer

  • you do have an email list dont you

  • zero duty channel seeks clarity