Sunday, May 4th, 2008
Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, May 2nd, 2008
Nowadays, usb hubs are getting smaller and smaller (and then, they fall behind your desk because the cable is heavier than the hub an then you have to crouch behind your computer to recover it)
So I needed something better (of course, i could have simply glued it in place )
I ...
Posted in Hardware, Networking | No Comments
Friday, May 2nd, 2008
IronKey Inc., maker of the world's most secure flash drive, announced today availability of the
8GB-capacity of its IronKey secure USB devices. IronKey brings unprecedented mobile data convenience and security to individuals and organizations with its rugged, waterproof and tamper resistant USB drives that include always-on hardware encryption, strong authentication, portable ...
Posted in Hardware, Privacy, Security | No Comments
Thursday, May 1st, 2008
As if computer viruses and worms aren't enough of a nuisance, malicious hardware, which will be much more difficult to detect, could soon become a threat too.
Today, computer viruses, which are programs downloaded either as an email attachment or when someone visits a website, are responsible for most computer attacks. ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Thursday, May 1st, 2008
I am pretty sure that there are a number of you out there reading this blog over a wireless network. Given that wireless is so widely distributed these days, its not uncommon that users are unaware of how insecure their wireless setup maybe.
Unfortunately one other reality is that a number ...
Posted in Hardware, Internet, Privacy, Security, Software | No Comments