The 802.11n task grouplast weeknarrowed the number of candidates for the new wireless Ethernet standard 802.
Real World IT
George Ou's networking and security insights keep enterprise managers in the know and vendors up at night.
Along the theme of a previous blog "Are users really to blame for poor security", the "geniuses" in IT are at it again. They're spending valuable business resources to craft a fake e-mail virus to "test" which users are going to be fooled into double clicking it.
A recent story on "Evil twin" Wi-Fi networks that spoof legitimate hotspots or corporate networks makes it clear that all public hotspots should immediately implement 802.1x and PEAP authentication.
Recently, T-Mobile announced that they are the firstU.S.
Wow! I guess $450 million in pocket change from Cisco can get just about anyone to sell out.
When I mention the word "underclock," I am greeted by big frowns from my PC enthusiast friends. How dare I suggest that they lower their CPU or system speed!
As the commoditization and open sourcing of operating systems and applications continue to disrupt the software companies, telephony vendors have so far enjoyed a relative calm in the closed and proprietary phone systems market with substantial profit margins. That could now all be turned on its head with the proliferation of open source VoIP and PBX software.
It's a new year and time for a new place to live. When I moved in to my new complex last week, I performed a Wireless LAN survey as any self respecting geek would.
It is widely asserted as "fact" that Firefox is more secure, but does that assertion really hold up under intense scrutiny? Peter Torr of Microsoft doesn't seem to think so.
Later today, Joshua Wright will release an upgraded version of his ultra-high speed password cracking tool called ASLEAP . For those of you already familiar with ASLEAP, you might be wondering what this has to do with Microsoft's PPTP VPN protocol since ASLEAP is a LEAP authentication dictionary attack tool.