Sunday, June 23, 2013

Spam: A Shadow History of the Internet [Excerpt, Part 4]

Spammers deploy malware to hijack unwary machines and use them as purveyors of junk messaging. Read this last installment about how the history of the Internet coincides with the history of spam


Image: The MIT Press

  • Showcasing more than fifty of the most provocative, original, and significant online essays from 2011, The Best Science Writing Online 2012 will change the way...

    Read More??

A software worm called Storm?intricately crafted malware?became an engine for distributing spam and hijacking unwary computers to further spread the contagion. It also became a laboratory specimen for both security specialists and hackers who wished to study the workings of this scheme for hijacking and subjugating multitudes of unsuspecting machines to the worm-writer?s purposes. In yet another incarnation, spam floods Estonia?s Internet as digital effluvia becomes an implement of cyber warfare.

TABLE OF CONTENTS

Reprinted from Spam: A Shadow History of the Internet, by Finn Brunton. Copyright ? 2013, by Massachusetts Institute of Technology. Used with permission of the publisher, the MIT Press.

Source: http://www.scientificamerican.com/article.cfm?id=spam-shadow-history-of-internet-excerpt-part-four

peyton hillis fletcher cox charlotte bobcats new york rangers nfl mock draft 2012 norfolk island michael brockers

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.