On Mon, 15 Oct 2007 16:02:54 -0700 plus or minus some time ' =JeffH '
[EMAIL PROTECTED] wrote:
I haven't come across any detailed Storm extent analysis, even with
having Google search specific security company sites (e.g. using
site:sec-corp.com). So if anyone has pointers to pages (other
On Oct 22, 2007, at 12:07 PM, Steven M. Bellovin wrote:
On Thu, 18 Oct 2007 12:49:40 -0700
Jon Callas [EMAIL PROTECTED] wrote:
Ah, there are some trustworthy photons. Oops, we can trust them,
but we don't know if they are relevant. Ah, there's a relevant
photon
And we know they are
| Xerox Unveils Technology That Blocks Access to Sensitive Data in
| Documents to Prevent Security Leaks
| http://www.parc.com/about/pressroom/news/2007-10-15-redaction.html
|
| The Innovation: The technology includes a detection software tool that
| uses content analysis and an intelligent user
--- Ali, Saqib [EMAIL PROTECTED] wrote:
Xerox Unveils Technology That Blocks Access to Sensitive Data in
Documents to Prevent Security Leaks
http://www.parc.com/about/pressroom/news/2007-10-15-redaction.html
The Innovation: The technology includes a detection software tool
that
uses