-
Recent Posts
- HOW CAN GREATER SECURITY, SAFETY AND TRUST IN THE INTERNET BE CREATED?
- Testing, testing, testing for a more secure (internet) world
- Why are internet security standards badly deployed and what to do about it?
- Internet consolidation at EuroDIG 2019: Questions in need of an answer
- Chances and opportunities or the U.S., the E.U. and privacy regulation
Archives
- August 2020
- April 2020
- March 2020
- September 2019
- February 2018
- January 2018
- March 2017
- January 2017
- July 2016
- June 2016
- May 2016
- March 2016
- November 2014
- March 2014
- February 2014
- January 2014
- May 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
Categories
- Book review
- Botnets
- Court decision
- Cyber arrests
- Cyber awareness
- Cyber crime
- Cyber crime data or the absence of it
- Cyber crime reporting
- Cyber education
- Cyber espionage
- Cyber ethics
- Cyber security
- Cyber warfare
- Digital transition
- Direct marketing
- Hacking
- International cooperation: cross border aspects
- International cooperation: IP resources
- Internet consolidation;
- Internet governance
- Internet standards;
- Malware enforcement
- Mobile
- News flash
- Privacy
- Self regulation
- Skimming
- spam
- Spam enforcement
Meta
Monthly Archives: June 2011
A question on Deep Packet Inspection
So KPN admitted it applies Deep Packet Inspection (DPI), a technique which makes it possible to look into the digital packets that as a whole make up an e-mail or data sent on the Internet. Old telephony vs. the new … Continue reading
Posted in Cyber crime, Cyber ethics, Cyber security, Internet governance, Mobile, Privacy, spam
Tagged Cyber crime, Cyber ethics, cyber policy, Internet governance;, Malware;, Spam, Spam; privacy
Leave a comment