666 Results for:E-MAIL

  • Sort by: 

Why ODPi & LF AI have come together

By Adrian Bridgwater 26 Oct 2020

This is a guest post written by John Mertic in his role as ODPi program Director at The Linux Foundation -- founded in 2000, the foundation is dedicated to building sustainable ecosystems around ... Read More

How to repair a corrupt Outlook 2010 deployment

By Brien Posey 19 Jul 2012

When Outlook goes down, don’t automatically download a third-party tool. Instead, try one of these approaches suggested by our expert. Read More

Developer renews court battle to claim 50% of Facebook

By Warwick Ashford 13 Apr 2011

A New York developer has renewed his court battle in claiming at least a 50% share of Facebook almost a year after his first attempt stalled. Read More

Is the internet destroying Western Liberal Democracy?

By Philip Virgo 18 Jun 2019

There is an irony in the appointment by the House of Lords of a committee to explore the impact of digital technologies on democracy.  The Internet is now, however, global. The majority of users ... Read More

Maltego user guide part 2: Infrastructural reconnaissance

By Karthik Poojary 13 Jun 2012

This part of our Maltego tutorial details how you can use the multi-faceted tool for infrastructural aspects of information gathering. Read More

How e-signatures fix broken digitisation

By Cliff Saran 02 Jan 2019

A big barrier to the end-to-end digitisation of business processes is that certain steps require paper – but DocuSign plans to fix this Read More

Cyber Reconnaissance, Surveillance and Defense

05 Oct 2015

In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Read More

Why U.S. election security needs an immediate overhaul

By Kevin McDonald 30 Nov 2018

There's no evidence that threat actors have been able to manipulate or change vote counts in our elections, but Kevin McDonald says that doesn't mean it can't -- or won't -- happen. Read More

Why sending personalized marketing emails is an effective strategy

By Anna Fiorentino 20 Nov 2018

For some companies, personalizing email newsletter content still proves to be a highly effective marketing strategy for engaging customers and driving sales. Read More

Types of ransomware and a timeline of attack examples

By Sharon Shea, Isabella Harford 31 Aug 2023

There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work, and review notable ransomware attacks and variants. Read More