𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Linux infected by Remote Shell Trojan b


Publisher
Elsevier Science
Year
2002
Tongue
English
Weight
104 KB
Volume
2002
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


news memo follows a similar missive two years ago, which announced the .NET strategy.

Privacy

According to the memo, "users should be in control of how their data is used. Policies for information use should be clear to the user. Users should be in control of when and if they receive information to make best use of their time. It should be easy for users to specify appropriate use of their information, including controlling the use of email."

It went on to state that improving privacy would be prioritized over adding new functionality, "a good example of this is the changes we made in Outlook to avoid emailbourne viruses. If we discover a risk that a feature could compromise someone's privacy, that problem gets solved first.