Remove 2005 Remove Archiving Remove Case Study Remove Libraries
article thumbnail

Feature Spotlight: Notes

Archive-It

by Tanya Ulmer, Web Archivist for Archive-It Notes are a convenient way to communicate with others working in the same Archive-It account, or even with yourself at a later date. I work on the Japan Disasters Digital Archive project (JDA) , sponsored by the Reischauer Institute of Japanese Studies at Harvard University.

article thumbnail

Feature Spotlight: Notes

Archive-It

by Tanya Ulmer, Web Archivist for Archive-It Notes are a convenient way to communicate with others working in the same Archive-It account, or even with yourself at a later date. I work on the Japan Disasters Digital Archive project (JDA) , sponsored by the Reischauer Institute of Japanese Studies at Harvard University.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2005, Sony BMG delivered millions of CDs with a rootkit that monitored listening habits and unintentionally left a backdoor to the device for cybercriminals. While this case study is just a snapshot, vigilance in the app store is required. Examples of Backdoor Malware Attacks. Phishing and Social Engineering. Trojan Type .

Phishing 105