A common performance problem occurs when Windows automatically loads an excessive number of programs at startup.
When you plug in a USB flash drive or other removable drive and specify you want to use it as a ReadyBoost device
ReadyBoost technology takes advantage of the fact that flash memory offers lower seek times than hard disks.
Physical memory might be the vital lubricant of a happily humming Windows machine
Random access memory (RAM) is the vital stuff that keeps Windows running smoothly.
One of the many advantages of choosing the NTFS file system over FAT32 is that it offers slick and essentially seamless on-the-fly compression.
The problem that many users have with startup programs is not creating them
One of the great things about shortcuts is that you can throw them out when they’re no longer needed.
The easiest ways to create a new shortcut are
The Radio Frequency Identification (RFID) concept has created some major privacy issues.
After confronting a war driver once, I asked him, “Why do you do it?”
America’s laws and law enforcement agencies have taught us that rarely is a crime committed without a motive.
Cell phones have had a slight advantage over other types of wireless communications in the security realm.
The IEEE, which is an acronym for Institute of Electrical and Electronics Engineers, is the group that created all the 802 standards.
On November 4, 2003, Robert Moskowitz found out that WPA and 802.11i suffer from an offline dictionary attack.
Many wireless gateways use several means of authentication.
When Michael came out, a need to prevent message modification attacks was built into it.
The 802.1x protocol had experienced a number of vulnerabilities when the industry decided to adapt it to wireless.
RADIUS uses a shared secret to communicate between a RADIUS server and a RADIUS device or client.
Cisco LEAP has a number of discovered vulnerabilities.
After the initial weaknesses of WEP were in the media and out in front of all the IT people, some of them started using MAC filtering as an interim solution until a standardized one was created.
We will take a look at denial-of-service (DoS) attacks against wireless.
WEP has undergone major scrutiny and subsequently failed all three tenets of its original design.
Many firewalls use a technique called network address translation
Unlike cabled networks, wireless networks don’t need a hub or switch.
One of the most important differences between using an isolated computer
A network is nothing more than two or more computers
Windows stores information about user accounts and security groups in a security database
Windows distinguishes two types of access privileges: permissions and rights.