5 research outputs found

    Geostrategies of the European neighbourhood policy

    Get PDF
    The debate about the European Neighbourhood Policy (ENP) has, in essence, been about borders and bordering. Such departures could contribute — and often do so — to a rather fixed geopolitical vision of what the EU is about and how it aims to run and to organize the broader European space. However, this article aims to retain space for viewing the ENP as a developmental and somewhat fluid process. A conceptual framework, based on outlining three geopolitical models and a series of different geopolitical strategies employed by the EU in regard to its borders, is hence employed in order to be able to tell a more dynamic story regarding the developing nature of the ENP and the EU's evolving nature more generally. The complexity traced informs us that various geostrategies may be held at the same time at the external border. Moreover, the dominance of one geostrategy may be replaced by another or a different combination of them with regard to the same neighbourhood. It is, more generally, argued that if anything it is precisely this dynamism that should be championed as a valuable resource, avoiding the tendency to close off options through the reification of particular visions of the nature of the EU and its borders

    Botnets

    No full text

    Botnets

    No full text
    Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. (Verlagsangaben
    corecore