Monthly Archives: January 2004
Biometric Security – 2
One of the most common causes of network security breaches is easily guessable or insecure passwords. Many users choose common names or words that...
Making the Best of WEP
I keep hearing that WEP (Wired Equivalent Privacy) is too weak a security scheme for wireless networks, but Im not prepared to throw out...
Private Browsing
For about the same price as a regular USB flash memory device, the StealthSurfer comes with Netscape Browser 7.0 and privacy software. You can...
File Warden: Help Protect Yourself from Identity Theft
In the last five years, identity theft has hit over 27 million Americans, costing $5 billion and requiring 300 million hours to resolve, according...
Industry Leaders Have Open Debate
CAMBRIDGE, Mass.—When is "open" not so open? Industry leaders debated this topic and others related to the future of open source software at Harvard...
Switch, Software Upgrades Take Aim at Enterprise Video
The push is on to make IP-based video more common place within the walls of the enterprise. In two separate announcements on Tuesday, communications...
SCO Sues Novell Over Unix Copyrights
The SCO Group Inc. pushed its continuing legal battles over Unix into overdrive on Tuesday with a copyright and business-practices lawsuit against Novell Inc.
According...
SightSpeed Adds Videoconferencing to Mac, Linux
SightSpeed Inc. announced on Monday a new version of its desktop videoconferencing software that expands operating system support beyond Windows.SightSpeed Video Messenger 2.0 gains...
Red Hat to Protect Linux Customers
NEW YORK—Red Hat Inc. on Tuesday will follow the lead of Hewlett-Packard Co. and Novell Inc. by announcing a plan to protect its enterprise...
Siebel Boosts Hosted Services with Ineto Buy
Siebel Systems Inc. added to its growing portfolio of hosted customer relationship management service offerings with the acquisition Tuesday of Ineto Services Inc. in...