- Welcome Guest
- Sign In
Renewed interest in biometric security is heating up the cell phone industry in Asia. Industry watchers report that advanced security devices using biometrics are already popular in technology hungry countries in Asia and Europe. However, new biometric products already available to businesses and co...
Denial of service (DoS) attacks get all the press, but stealth attacks are the ones to really worry about. What are some of these attacks (with colorful names like "Bot" and "Zombie"), and how can you determine if your site has been compromised? Unfortunately, on the Internet, there is no real borde...
One would not call them intimate at this stage, but certainly the mutual interest between wireless LANs and video applications is growing. Companies and consumers have deployed a growing number of WLANs to support a variety of data applications, such as electronic mail and Web browsing. Users are st...
The Voice over IP landscape has changed considerably in the last few years. The easy availability of broadband access to the Internet, coupled with Herculean leaps in technology, makes VoIP service a viable alternative to traditional telephone and PBX offerings. Today's VoIP services offer a variety...
Spyware is so prevalent that it is becoming nearly impossible to find computers that do not contain at least some intrusive code lurking on the hard drive or buried deep within the Windows Registry. Spyware is any technology that aids in gathering information about a person or organization without t...
The quest for more bandwidth is neverending, so soon after vendors make one technical advance, they move on to the next. With 54 Mbps 802.11g wireless LANs now poised to gain a lion's share of product shipments, vendors are examining ways to push the bandwidth plateau past the 100 Mbps mark. Proprie...
Internet security firms are gearing up for an onslaught of new attacks that hackers will hurl at inboxes and against Web sites. As the computer industry awaits the release of Service Pack 2 of Microsoft's Windows XP -- which will feature improved security capabilities -- hackers are waiting too. The...
The sight of commuters' heads bobbing up and down as they listen to music on their way to work may be replaced by intent gazes examining the previous night's episode of the "Sopranos" or the ninth inning of the baseball game. Manufacturers are hoping that the next big wave in personal entertainment ...
Consumer devices, such as entertainment systems and home security products, are gaining intelligence and becoming more PC-like. As this occurs, users want to connect them to home local area networks and automate processes, such as moving music files from PCs to stereos or turning lights on and off.
College students across the U.S. are majoring in a new technology: wireless connectivity. It is a subject they are learning hands-on and using everywhere they go on campus. Of course, wireless connectivity is not a credit-bearing subject on a long list of prerequisites to earn their degrees. Instead...
In today's world of warnings, dangers and the need for safety precautions, even surfing the Internet for business or pleasure is fraught with hazards. Despite the growing epidemic of spyware infections, many computer users remain unfazed by the call to arms in the fight for safer computing practices...
More and more digital devices are being put in homes as a result of consumers doing such things as moving audio files from PCs to home entertainment systems. In response to the upswing in demand for networked services in the home, the HomePlug Powerline Alliance is moving to make the technology to c...
Spyware, an intrusive malicious software -- or malware -- application that slips into computers via free downloads and visits to some Web sites, is quickly becoming the second most troublesome computer malady after virus infections. Spyware can track Web surfing habits and send the results to purvey...
Wireless carriers are finding online gaming via use of cell phones to be the latest cash cow to boost revenues. "Carriers have been surprised that wireless gaming is even more lucrative than ringtones," Ken Hyers, a senior analyst with market research firm In-Stat/MDR, told TechNewsWorld. Online gam...
In the wake of federal e-signature legislation that Congress approved nearly four years ago, the online financial world has seen dozens of Internet companies proffer solutions that promised tamper-proof electronic signatures. The recurring result was a steady stream of solutions that raised lots of ...