Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.
ACM News Service: Understanding Spyware - Risk and Response. 2004-11-13: This blurb emphasizes what I call the ultimate trust irony for computer security. The easiest means of inserting spyware deeply onto a system is via software that is alleged to provide anti-spyware measures and heightened computer security.
The Wes Ames article for the IT Professional September/October 2004 issue is available as a promotional PDF download. The paper provides a nice explanation of the progressive levels of spyware and then looks at detection and prevention approaches.