'

George Ou

George Ou, a former ZDNet blogger, is an IT consultant specializing in Servers, Microsoft, Cisco, Switches, Routers, Firewalls, IDS, VPN, Wireless LAN, Security, and IT infrastructure and architecture.</p>

Latest Posts

Cisco unveils new triple play in security appliances

Cisco unveils new triple play in security appliances

At Interop 2005, Cisco unveiled their new all-in-one ASA 5500 series security appliance.  The new 1U rack mount appliance integrates the best of the Cisco PIX firewall, VPN 3000 series concentrator, and Cisco IDS/IPS (intrusion detection and prevention) appliance in to a single box at approximately the same price as their enterprise PIX series of appliances (without the IDS/IPS option).

May 4, 2005 by in Cisco

Enterprise-class wireless LAN security in a $60 box?

Enterprise-class wireless LAN security in a $60 box?

What do you think is the cost of building a secure enterprise grade wireless LAN composed of the following ingredients?RADIUS authentication server PKI certificate authority server AES capable wireless access point Would you believe me if I said "under $100" or would you think I was trying to sell you ocean front property in Nevada?

April 26, 2005 by in Networking

What CPU is right for you?  Look for yourself.

What CPU is right for you? Look for yourself.

In the ongoing debate on who has the best CPU in the x86 market, Tomshardware released this awesome comprehensive CPU comparison database.  Now you can blow past all the marketing and hype and see for yourself which processor is right for you.

April 21, 2005 by in Processors

The fight for the WLAN switch standards

The fight for the WLAN switch standards

With the recent acquisition of Airespace by 800-pound networking gorilla Cisco, the pressure is on smaller wireless LAN switch makers Aruba and Trapeze to promote a vendor neutral wireless LAN switch standard called SLAPP (Secure Light Weight Access Point Protocol).

April 17, 2005 by in Cisco

Fix SMTP and leave port 25 alone for the sake of spam

Fix SMTP and leave port 25 alone for the sake of spam

Larry Seltzer of eWeek, whom I have great respect for and usually agree with, wrote this article on dealing with spam using the controversial tactic of blocking all outbound port 25 access.? The logic behind this is that the vast majority of spam in the world comes from "zombies" (millions of computers that have been hijacked by professional hackers and spammers?

April 11, 2005 by in Tech Industry

Free WPA client for most version of Windows

Free WPA client for most version of Windows

Although Windows XP can be upgraded to Service Pack 2 to natively support the enhanced security capabilities of WPA, users of earlier operating systems were left in the dark up until now.? A company called Wireless Security Corporation is offering a free WPA-PSK client utility that works on Windows 98, ME, 2000, and XP.

April 10, 2005 by in Tech Industry

Is Moore's Law dead at 40 or is this just a mid-life crisis?

Is Moore's Law dead at 40 or is this just a mid-life crisis?

Last week, Michael Kanellos published this FAQ on the 40th anniversary of Moore's law, which is famously known as the phenomenon that computer processing power will double every 18 months.? Actually, Gordon Moore only said that transistor count would double every 24 months and it was David House (a former executive of Intel) who extrapolated that performance would double every 18 months as a result of the increase in transistors.?

April 4, 2005 by in Processors

FBI demonstrates 3 minute Wi-Fi hack

FBI demonstrates 3 minute Wi-Fi hack

For those of you who have been reading my blogs on a routine bases, it would come as no surprise to you that the FBI demonstrated the hacking of a wireless LAN in 3 minutes.? It was only last month that I blogged about how you can hack most wireless LANs in minutes with the very same techniques.?

April 1, 2005 by in Government : US

Is Wi-Fi security paint a myth or fact?

Is Wi-Fi security paint a myth or fact?

In one of my previous blogs on "The six dumbest ways to secure a wireless LAN", I struck a cord with my readers like never before. I'm still laughing over the fact that of all the wireless articles I've written over the years on how to secure your wireless LAN, I finally get around to write an article on how NOT to secure your wireless LAN and it gets the best responses.

March 24, 2005 by in Security

The six dumbest ways to secure a wireless LAN

The six dumbest ways to secure a wireless LAN

[Updated 4/2/2007 - follow-up article here] For the last three years, I've been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths.

March 17, 2005 by in Networking

Top Stories