Sep 27

A common performance problem occurs when Windows automatically loads an excessive number of programs at startup.

Sep 27

When you plug in a USB flash drive or other removable drive and specify you want to use it as a ReadyBoost device

Sep 27

ReadyBoost technology takes advantage of the fact that flash memory offers lower seek times than hard disks.

Sep 27

Physical memory might be the vital lubricant of a happily humming Windows machine

Sep 27

Random access memory (RAM) is the vital stuff that keeps Windows running smoothly.

Sep 27

One of the many advantages of choosing the NTFS file system over FAT32 is that it offers slick and essentially seamless on-the-fly compression.

Sep 17
Sep 13

The problem that many users have with startup programs is not creating them

Sep 13

One of the great things about shortcuts is that you can throw them out when they’re no longer needed.

Sep 13

The easiest ways to create a new shortcut are

Sep 13

The Radio Frequency Identification (RFID) concept has created some major privacy issues.

Sep 13

After confronting a war driver once, I asked him, “Why do you do it?”

Sep 13

America’s laws and law enforcement agencies have taught us that rarely is a crime committed without a motive.

Sep 13

Cell phones have had a slight advantage over other types of wireless communications in the security realm.

Sep 13

The IEEE, which is an acronym for Institute of Electrical and Electronics Engineers, is the group that created all the 802 standards.

Sep 13

On November 4, 2003, Robert Moskowitz found out that WPA and 802.11i suffer from an offline dictionary attack.

Sep 13

Many wireless gateways use several means of authentication.

Sep 13

When Michael came out, a need to prevent message modification attacks was built into it.

Sep 13

The 802.1x protocol had experienced a number of vulnerabilities when the industry decided to adapt it to wireless.

Sep 13

RADIUS uses a shared secret to communicate between a RADIUS server and a RADIUS device or client.

Sep 13

Cisco LEAP has a number of discovered vulnerabilities.

Sep 13

After the initial weaknesses of WEP were in the media and out in front of all the IT people, some of them started using MAC filtering as an interim solution until a standardized one was created.

Sep 13

We will take a look at denial-of-service (DoS) attacks against wireless.

Sep 13

WEP has undergone major scrutiny and subsequently failed all three tenets of its original design.

Aug 24

Many firewalls use a technique called network address translation

Aug 24

Unlike cabled networks, wireless networks don’t need a hub or switch.

Aug 24

One of the most important differences between using an isolated computer

Aug 24

A network is nothing more than two or more computers

Aug 20

Windows stores information about user accounts and security groups in a security database

Aug 20

Windows distinguishes two types of access privileges: permissions and rights.

Page 2 of 912345...Last »