News

Wireless networking

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 21, 2005 21 Nov'05

    Wireless security: Public Wi-Fi could open security holes

    A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.

  • November 20, 2005 20 Nov'05

    Wireless security crucial to railway safety

    A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.

  • November 16, 2005 16 Nov'05

    Wireless security: Companies deal with software updates

    A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.

  • September 05, 2005 05 Sep'05

    Extending perimeters

    The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.

  • May 11, 2005 11 May'05

    A new era of computer worms: Wireless mobile worms

    In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.

  • March 08, 2005 08 Mar'05

    Small businesses targeted with RFID

  • December 01, 2004 01 Dec'04

    Phreaks love Bluetooth

    Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.

  • May 23, 2004 23 May'04

    Hacking for Dummies: Chapter 10 -- Wireless LANs

    Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.

  • November 15, 2000 15 Nov'00

    Wap usage: Planes, phones and automobiles



    So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate...

CIO
Security
Networking
Data Center
Data Management
Close