Spam Filtering and Detection

Author(s):  
Yasmin Bouarara

In today's world of globalization and technology without borders, the emergence of the internet and the rapid development of telecommunications have made the world a global village. Recently, the email service has become immensely used, and the main means of communication because it is cheap, reliable, fast, and easy to access. In addition, it allows users with a mailbox (BAL) and email address to exchange messages (images, files, and text documents) from anywhere in the world via the internet. Unfortunately, this technology has become undeniably the original source of malicious activity, in particular the problem of unwanted emails (spam), which has increased dramatically over the past decade. According to the latest report from Radicati Group, which provides quantitative and qualitative research with details of the e-mail, security, and social networks, published in 2012, 70-80% of email traffic consists of spam. The goal of the chapter is to give a state of the art on spam and spam techniques and the disadvantages of this phenomenon.

Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Tetyana Jezhyzhanska

In the information society the status of information is changing: this main value of global civilization becomes an important resource of socio- economic, technological and cultural development. The rapid development of virtual technologies and the growing number of Internet users in Ukraine and in the world causes the new challenges to communication of each organization. The book publishers are also obliged to respond to these processes. However, the works devoted directly to publishers’ communication in the modern media space are still lacking in Ukraine. The objective of the article is to clarify peculiarities and conditions of the activities of Ukrainian book publishers in today’s media space which is an important issue today. It is analyzed the literature and sources on this issue and it is ascertained the theoretical and practical possibilities to take into account the trends in the world of modern media in the PR-activity of book publishers. Also the prospects for further scientific study and practical use of PR-communications in the activity of publishers are determined. The analysis of current changes in the modern information space allows us to trace the general tendencies: the new subject and object areas are formed; the number of subjects is expanded; the new formats of interaction within the system of communications of the organization and in society as a whole are created. That means that publishing house’s PR-communications are complicated by the emergence of new elements, such as active audience, social networks as communication channels, promotions on the Internet and others. PR communication in the Internet space is the most effective and inexpensive tool for interaction of publishers with active audiences. Thus, the activation of PR communication in the modern media space is associated with the emergence of the latest information technologies, online media as well as development of Internet. The use of online channels of Internet for communication with the target audience of publishing organizations has certain advantages over traditional media. At the same time, it is necessary to take into account the information saturation of media space, which complicates the way of PR-messages of book publishers to the reader.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Author(s):  
Nasreen Abdel - Ilah Zahra

The study was used to study the reality of the use of postgraduate students for e- mail. The descriptive descriptive method was used. The questionnaire was used as a tool for study، which averaged 1.99 and a standard deviation of 0.61. It was applied to 45 students from post- Different The results showed that postgraduate students have a desire to use e- mail in university education and to communicate with colleagues and faculty members. However، there are obstacles to their use. The faculty members do not encourage students to use e- mail، lack e- mail skills، Access to the internet laboratory at the college، the reluctance of faculty members to give their email address to students، network problems (slow) In the light of the results، a set of recommendations and proposals were presented to activate the use of e- mail in university education، especially among postgraduate students in the Faculty of Education and various Syrian and Arab universities


Author(s):  
Mikael Wiberg

Kleinrock (1996, 1998) claims that advanced wireless technologies, the Internet, Global Positioning Systems, portable and distributed computing, and so forth will realize the vision of “anytime, anywhere” computing. We can today see the first signs of this vision. For example, telework is now possible, remote organizations can be engaged in close cooperation, and people can form communities on the Internet. The world has become a “global village,” some claim (Castells, 1996; Preece, 1994), where you can interact with anybody independent of time and space.


Author(s):  
Chen Zhu ◽  
Zixuan Fu

With the rapid development of the Internet and electronic payment, digital currencies with blockchain as the underlying technology have gradually entered people's horizons and have also received the attention of governments around the world. Due to the convenience and decentralization of digital currency transactions that are not limited by time and region, it has a significant impact on traditional commercial systems around the world, and its core block chain technology may trigger changes in many areas. At present, different countries have different views on the legal status of bitcoin digital currencies, but digital currencies circulate across borders and regions. Once problems arise, it is difficult to have a unified regulatory measure to deal with them.


2009 ◽  
Vol 60 (1) ◽  
pp. 30
Author(s):  
Ralph L Scott

We have all become increasingly aware that, for commercial and perhaps other reasons, our use of the Internet can and is being tracked. For most of us this tracking has become a major concern as unwanted e-mail (commonly called SPAM) has begun to clog our incoming mailboxes.  There are a variety of ways to combat both the tracking and the receipt of unwanted e-mail. One of the ways of dealing with this problem is the use of an anonymiser service, many of which are available over the Web.


2019 ◽  
Vol 1 (3) ◽  
pp. 77-86
Author(s):  
Samia Bouguerra

The development of the world today in information and communication technologies has affected all aspects of the economic life of the countries, especially with the emergence of the Internet and the new media through social networks such as Facebook, Twitter, Instagram and others. With the emergence of social networks on the Internet, the marketing of services, especially tourism services, depends on the human factor itself through the exchange and exchange of information about tourist areas, traditional products, hotels and others. The new era has begun to depend on the consumers themselves and their contribution to the promotion of services and places... With the rapid development of social networks, especially Facebook, the importance of harnessing these sites to serve the tourism industry in the countries of the world in general and Algeria in particular, where the industry depends largely on the views of consumers and the spread of information among them, which opened a wide door to identify the places of tourism and hotels and offer services from By visiting people and benefiting from their services, which positively affects other users who may one day be tourists in the same areas. Therefore, this study is an attempt to highlight the role of social networks and their contribution to the activation of tourism in general and local tourism in particular, taking the Facebook network model, through the analysis of the Facebook page beaches of Annaba, and answer the following fundamental question:To what extent does Facebook contribute to the activation of local tourism in Algeria? JEL Classification: Z3, M3.


2020 ◽  
pp. 67-84

The rapid development of science and technology, production, globalization and integration processes in the world, the intensive interaction of world languages create the basis for the continuous enrichment of the vocabulary of languages. It should be emphasized that the effective use of the extensive experience gained in the world linguistics, in the study of the Internet terms in Uzbek and English, the creation of dictionaries and, to some extent, the editing gives good results.The system of the Internet terminology has its own specifics. The study of terminology brings to the idea that the phenomenon of figurative use of terms is valid. Specifics of the Internet Terminology can include the following:1) open Internet concepts; 2) absence or uncertainty of affiliation between species and varieties; 3) complicated by emotional components; 4) genetic connection and active interaction with common vocabulary; 5) adoption of appropriations; 6) rapid enrichment of the vocabulary. The main trend of our time is the improvement and complication of knowledge in the field of the Internet. With the development of the Internet, people create linguistic units the main function of which is to name increasingly comprehensive concepts. The approach to understanding Internet terms will change, and this will immediately affect the size of the meanings of names associated with the Internet terms.


2021 ◽  
Vol 6 (3) ◽  
pp. 33-39
Author(s):  
Oleg O. Viushchenko ◽  
◽  
Maria A. Maslova ◽  

The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge impact on both social life and the business environment of a person. The widespread adoption of connected devices in the IoT has created a huge demand for reliable security in response to the growing demand of billions of connected devices and services around the world. But at the same time, the number of threats continues to grow every day, and attacks are increasing both in number and complexity. The number of attackers is also growing, and the tools they use are constantly being improved and becoming more effective. Therefore, it is necessary to constantly protect against threats and vulnerabilities for IoT. In this article, we will analyze the development of IoT, consider existing threats, attacks on IoT, as well as methods of protecting devices from threats and vulnerabilities for IoT.


Sign in / Sign up

Export Citation Format

Share Document