666 Results for:E-MAIL
- Sort by:
Why ODPi & LF AI have come together
26 Oct 2020This is a guest post written by John Mertic in his role as ODPi program Director at The Linux Foundation -- founded in 2000, the foundation is dedicated to building sustainable ecosystems around ... Read More
How to repair a corrupt Outlook 2010 deployment
19 Jul 2012When Outlook goes down, don’t automatically download a third-party tool. Instead, try one of these approaches suggested by our expert. Read More
Developer renews court battle to claim 50% of Facebook
13 Apr 2011A New York developer has renewed his court battle in claiming at least a 50% share of Facebook almost a year after his first attempt stalled. Read More
Is the internet destroying Western Liberal Democracy?
18 Jun 2019There is an irony in the appointment by the House of Lords of a committee to explore the impact of digital technologies on democracy. The Internet is now, however, global. The majority of users ... Read More
Maltego user guide part 2: Infrastructural reconnaissance
13 Jun 2012This part of our Maltego tutorial details how you can use the multi-faceted tool for infrastructural aspects of information gathering. Read More
How e-signatures fix broken digitisation
02 Jan 2019A big barrier to the end-to-end digitisation of business processes is that certain steps require paper – but DocuSign plans to fix this Read More
Cyber Reconnaissance, Surveillance and Defense
05 Oct 2015In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Read More
Why U.S. election security needs an immediate overhaul
30 Nov 2018There's no evidence that threat actors have been able to manipulate or change vote counts in our elections, but Kevin McDonald says that doesn't mean it can't -- or won't -- happen. Read More
Why sending personalized marketing emails is an effective strategy
20 Nov 2018For some companies, personalizing email newsletter content still proves to be a highly effective marketing strategy for engaging customers and driving sales. Read More
Types of ransomware and a timeline of attack examples
31 Aug 2023There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work, and review notable ransomware attacks and variants. Read More