Tuesday, April 29th, 2008
It's long been assumed that Microsoft has built in various "backdoors" for law enforcement to get around its own security, but now reader Kevin Stapp writes in to let us know that the company has also been literally handing out the keys to law enforcement. Apparently, they're giving out special ...
Posted in Hardware, Privacy, Security, Windows | No Comments
Saturday, April 26th, 2008
It works seamlessly with any hardware and operating system combination supporting USB keyboards such as Windows, MacOS, Linux and others. The Key generates and sends unique time-variant authentication codes by emulating keystrokes through the standard keyboard interface. The computer to which the Key is attached receives this authentication code character ...
Posted in Hardware, Privacy, Security | No Comments
Monday, April 21st, 2008
With all the high storage devices like the iPod classic going up to 160GB and just fitting in your inside pocket, people are getting more scared of data loss. Even Dave Lewis from Liquidmatrix recently saw someone at a client site using an iPod to pull corporate data onto it ...
Posted in Hardware, Security | No Comments
Thursday, April 17th, 2008
It's no secret that there are a lot of strange USB devices out there, particularly flash drives. Not a comprehensive list, but we've sure seen Lego, twigs, action figures, bowling balls, sushi, anatomical parts, transparent drives, erasers, cassette tapes and on and on and on.
Despite all that, the picture above ...
Posted in Hardware | No Comments
Friday, April 11th, 2008
It's not only mission-critical business information that should be backed up. The data on your home PC needs to be backed up as well. But how should you choose between the traditional method of saving files on storage media yourself and a newer method of storing your data offsite with ...
Posted in Hardware, Networking, Security, Software | No Comments