April 1, 1996 |
Shakespeare wrote, in Othello: "Who steals my purse steals trash. . . . But he that filches from me my good name robs me of that which not enriches him, and makes me poor indeed." In cyberspace, it's getting harder to hang onto one's good name. Phil Agre, a professor of communications at UC San Diego, manages an Internet listserv, or subscription e-mail service, called Red Rock Eaters.
May 30, 2011
Egged on by French President Nicolas Sarkozy, the leaders of the Group of 8 nations announced Friday that the Internet was too important for governments to leave ungoverned. Cyberspace needs a legal framework that promotes human rights, the rule of law, privacy, security and the protection of intellectual property, they declared, and they pledged to work on one. Good luck with that. The declaration reflects the wrongheaded wish of many foreign leaders to tame the Net, particularly freewheeling Web-based businesses and online speech.
April 28, 1996 |
Anne works at a university in Scotland. Brooke, in Los Angeles, is preparing to attend law school this fall. The two have never met face to face, but in some ways they are closer than sisters. Rape, and the filthy feeling it inflicted on them, has been their bond, the Internet their refuge. "We talk daily, Monday through Friday," Brooke says. "We are working it out together on a friend-friend basis."
CALIFORNIA | LOCAL
July 8, 1997
So the Supreme Court says it's OK to inundate kiddie cyberspace with porn--and the Los Angeles Police Department brass denies the vice squad the privilege of ogling pinups (July 2). Said brass, if it has nothing better to do, should be promoted to three-wheelers to paper felonious criminals whose parking meters have expired. ANTHONY J. BRADISSE Los Angeles
October 23, 2011 |
Earlier this month, researchers discovered a cunning strain of malware, dubbed the Lurid Downloader, that has been systematically and silently stealing data from carefully targeted government computers in 61 countries. The discovery was made by Trend Micro, a Tokyo-based computer security company, which identified the invader as a version of a well-known strain of malware that exploits vulnerabilities in the popular programs Adobe Reader and Microsoft Office. It inserts itself into a computer's core, and then phones home to a remote operator who moves continually from domain to domain on the Internet to avoid detection.
April 6, 1995 |
I'm writing this in the office, using an IBM 286 with hard-drive and a single floppy. I have access to all the knowledge accumulated in The Times since 1985. I can also link up with the Internet. Whoopee. Pardon me for dissing the information superhighway, but without visuals provided by a CD-ROM attachment, cyberspace can be a cyber bore. This is important to remember if you're about to buy your (expensive) first computer and think your life is going to change.