News
Wireless networking
-
November 05, 2007
05
Nov'07
Google announces open source operating system for smartphones
After months of speculation, Google has officially announced Android, an mobile devices OS it's developing in partnership with a wide variety of companies.
-
November 01, 2007
01
Nov'07
ISCSI storage gets performance makeover
Suppliers, including Ibrix, Mellanox, Alacritech and EqualLogic, are offering juiced-up new iSCSI configurations, while 3PAR, CipherMax and NeoScale boost data security products.
-
October 23, 2007
23
Oct'07
How to manage mobility
Planning a new mobility deployment? This tip and podcast offer eight strategies to make sure you get it right.
-
September 20, 2007
20
Sep'07
Wireless troubleshooting
Wireless network troubleshooting basics are discussed in this guide.
-
September 19, 2007
19
Sep'07
802.11 protocols
802.11 wireless protocols and deployment basics are discussed in this guide.
-
September 18, 2007
18
Sep'07
Cisco to acquire Cognio
Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility.
-
September 18, 2007
18
Sep'07
Wireless security
Wireless security and polices are covered in this guide.
-
September 17, 2007
17
Sep'07
Wireless network deployment and management
Wireless network deployment and management are discussed in this guide.
-
September 17, 2007
17
Sep'07
Wireless access points
The basics of wireless access point (AP) as well as configuration and placement are covered in this guide.
-
September 16, 2007
16
Sep'07
Wireless protocols learning guide
Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide.
-
September 04, 2007
04
Sep'07
Cisco goes next generation with 802.11n
Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access.
-
September 02, 2007
02
Sep'07
Wireless network security: Controlling secondary connections
Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured.
-
August 23, 2007
23
Aug'07
Nokia Intellisync boosts device management
Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities.
-
August 08, 2007
08
Aug'07
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...
-
August 08, 2007
08
Aug'07
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
July 25, 2007
25
Jul'07
Cisco issues warning for wireless LAN controller flaws
Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University.
-
July 19, 2007
19
Jul'07
Wireless interference can be frustrating (and fun?)
Since Wi-Fi operates in unlicensed bands, the enterprise wireless spectrum can be shared by other, seemingly innocuous devices like Bluetooth and wireless game controllers. But interference from such devices, or from having too many devices on one ...
-
April 29, 2007
29
Apr'07
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it.
-
April 04, 2007
04
Apr'07
Wireless VoIP market to grow rapidly
VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012.
-
March 22, 2007
22
Mar'07
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes.
-
March 11, 2007
11
Mar'07
Wi-Fi interference
In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs.
-
February 28, 2007
28
Feb'07
RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology.
-
February 27, 2007
27
Feb'07
Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker.
-
December 18, 2006
18
Dec'06
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community...
-
December 11, 2006
11
Dec'06
SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional.
-
November 28, 2006
28
Nov'06
Effective wireless security is available, but holes exist
Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it.
-
October 30, 2006
30
Oct'06
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the ...
-
October 15, 2006
15
Oct'06
Flaw found in Toshiba wireless device driver
Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines.
-
October 03, 2006
03
Oct'06
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.
-
October 03, 2006
03
Oct'06
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.
-
September 14, 2006
14
Sep'06
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...
-
September 06, 2006
06
Sep'06
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.
-
September 05, 2006
05
Sep'06
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.
-
August 14, 2006
14
Aug'06
Wireless security boost for laptops outside the office
>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks?
-
August 02, 2006
02
Aug'06
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ...
-
July 26, 2006
26
Jul'06
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.
-
November 28, 2005
28
Nov'05
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.
-
November 21, 2005
21
Nov'05
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.
-
November 20, 2005
20
Nov'05
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.
-
November 16, 2005
16
Nov'05
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.
-
September 05, 2005
05
Sep'05
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.
-
May 11, 2005
11
May'05
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.
-
March 08, 2005
08
Mar'05
Small businesses targeted with RFID
-
December 01, 2004
01
Dec'04
Phreaks love Bluetooth
Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.
-
May 23, 2004
23
May'04
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.
-
November 15, 2000
15
Nov'00
Wap usage: Planes, phones and automobiles
So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate...