Unwanted PopUp Ads: Intrusive Internet Advertisements

Unwanted pop-up ads are intrusive Internet advertisements that are displayed when you access web pages. This white paper provides information about different type of pop-up ads, losses they cause, how they work, and suggests key features that a good pop-up ad filter software should have.

Featured Software Research:

VoIP Introduction

VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the... Read More

Future Tech: Where Will Telephony Be in Two Years?

Right now, there are two clear trends that will continue to shape business telephony into the next two years: Internet protocol (IP)-based communications and mobility. Download this concise executive brief to get an expert's take on voice over IP (VoIP), IPv6, converged networks, and more. Read More

You may also be interested in these related documents:

Problematic, Unloved, and Argumentative: What Is a Potentially Unwanted Application (PUA)?

  • Source: Eset
  • Written By:
  • Published:
Determining when to classify a program as being either unwanted or unsafe can be particularly challenging, because a researcher has to look not just at what a program does, but what the intent is behind it. Business, ethical, and legal questions come into play, too. Read this white paper to understand the difference between the outright threats posed by malware such as viruses and worms and those that are classified as being potentially a threat. Read More

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More

Design Can Be Your Next Asset to Manage: E-mail Marketing

In an unpredictable economy, you need to refocus your marketing efforts to be more cost-effective, while achieving measurable results in even shorter time frames. E-mail marketing has many advantages when used as part of an overall marketing solution. Beyond just driving short-term results, you’ll see opportunities to differentiate your firm—so you can expand your market share while building brand awareness. Read More
 
comments powered by Disqus