Monday, May 12th, 2008
For years, organizations have focused on the evil outsiders that were behind attacks on their networks. Firewalls, IDS, IPS technologies have come to the rescue and have resulted in impregnable walls protecting organization networks. Now with strong walls, the challenge is ensuring the trusted insiders don't walk out with the ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Monday, May 12th, 2008
Google's new Web Security for Enterprise service enables companies in the US and Europe to safeguard their internet traffic with protection against viruses and spyware and malicious URLs. According to Google the system "powered by Postini, stops web-borne spyware and viruses before they infiltrate your network and compromise or disable ...
Posted in Internet, Networking, Privacy, Security | No Comments
Monday, May 12th, 2008
I recently found myself in an airport terminal with a laptop and time to kill. Not knowing what the WiFi options were, I let Windows XP search for available wireless networks. As you can see below, one of the networks was called "Free Public WiFi". If this happens to you, ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, May 7th, 2008
RedTacton is a new Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path.
Using a new super-sensitive photonic electric field sensor, RedTacton can achieve duplex communication over the human body at a maximum speed of 10 Mbps.
RedTacton uses the minute ...
Posted in General BS, Networking, Privacy, Security | No Comments
Tuesday, May 6th, 2008
Security in IT is everywhere: firewalls, proxies, anti-[spam|virus], IDS and more! But what about physical security to your IT infrastructure? Read the following story: Peter Gabriel’s web site was off the web due to a server theft! I would like to know how the thieves performed!
Why spend money to protect ...
Posted in Hardware, Security | No Comments