The ABCs of securing your wireless network

Sunday, May 4th, 2008

Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...

Glowing video tape USB hub

Friday, May 2nd, 2008

Nowadays, usb hubs are getting smaller and smaller (and then, they fall behind your desk because the cable is heavier than the hub an then you have to crouch behind your computer to recover it) So I needed something better (of course, i could have simply glued it in place ) I ...

IronKey Unveils 8GB Version of Secure USB Drive

Friday, May 2nd, 2008

IronKey Inc., maker of the world's most secure flash drive, announced today availability of the 8GB-capacity of its IronKey secure USB devices. IronKey brings unprecedented mobile data convenience and security to individuals and organizations with its rugged, waterproof and tamper resistant USB drives that include always-on hardware encryption, strong authentication, portable ...

Malicious hardware may be next hacker tool

Thursday, May 1st, 2008

As if computer viruses and worms aren't enough of a nuisance, malicious hardware, which will be much more difficult to detect, could soon become a threat too. Today, computer viruses, which are programs downloaded either as an email attachment or when someone visits a website, are responsible for most computer attacks. ...

Wireless modem considerations

Thursday, May 1st, 2008

I am pretty sure that there are a number of you out there reading this blog over a wireless network. Given that wireless is so widely distributed these days, its not uncommon that users are unaware of how insecure their wireless setup maybe. Unfortunately one other reality is that a number ...